Assessment test questions (2) Flashcards

1
Q

You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use?

Implement a loop-avoidance scheme.

Create a flatter network structure using switches.

Create a VLAN.

A

Create a VLAN.

Virtual LANs break up broadcast domains in Layer 2 switched internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do most switches run the Spanning Tree Protocol by default?

It monitors how the network is functioning.

It stops data from forwarding until all devices are updated.

It prevents switching loops.

A

It prevents switching loops.

The Spanning Tree Protocol (STP) was designed to stop Layer 2 loops. All enterprise model switches have STP by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following describes MIMO correctly?

A protocol that requires acknowledgment of each and every frame

A data-transmission technique in which several frames are sent by several antennas over several paths and are then recombined by another set of antennas

A modulation technique that allows more than one data rate

A

A data-transmission technique in which several frames are sent by several antennas over several paths and are then recombined by another set of antennas

Part of the 802.11n wireless standard, MIMO sends multiple frames by several antennas over several paths; they are then recombined by another set of antennas to optimize throughput and multipath resistance. This is called spatial multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two practices help secure your wireless access points from unauthorized access? (Choose all that apply.)

Assigning a private IP address to the AP

Changing the default SSID value

Configuring a new administrator password

Changing the mixed-mode setting to single mode

A

Changing the default SSID value

Configuring a new administrator password

At a minimum, you need to change the default SSID value on each AP and configure new usernames and passwords on the AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPSec is defined at what layer of the OSI model?

Network

Physical

Layer 4

A

Network

IPSec works at the Network layer of the OSI model (Layer 3) and secures all applications that operate above it (Layer 4 and above). Additionally, because it was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use?

RADIUS

DNS

Virtual Network Computing

A

RADIUS

RADIUS combines user authentication and authorization into one profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Someone calls you and asks for your bank account number because the bank is having problems with your account. You give them this information and later find out that you were scammed. What type of attack is this?

Phishing

Calling scam

Analog scam

A

Phishing

Social engineering, or phishing, refers to the act of attempting to illegally obtain sensitive information by pretending to be a credible source. Phishing usually takes one of two forms: an email or a phone call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are types of denial-of-service attacks? (Choose all that apply.)

Ping of Death

Stacheldraht

SYN flood

Virus FloodSyn

A

Ping of Death

Stacheldraht

SYN flood

A denial-of-service (DoS) attack prevents users from accessing the system. All of the options are possible denial-of-service attacks except Virus FloodSyn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to stop a hacker in their tracks. Which of the following devices are proactive in providing this service?

Access control list (ACL)

Content filtering

Intrusion prevention system (IPS)

A

Intrusion prevention system (IPS)

Changing network configurations, terminating sessions, and deceiving the attacker are all actions that can be taken by an intrusion prevention system (IPS) device. These are all proactive approaches to security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You connected your company to the Internet, and security is a concern. What should you install?

Higher-quality cables

Firewall

DNS

A

Firewall

Firewalls help provide perimeter network security by allowing or denying connections and types of traffic in or out of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are WAN protocols or technologies? (Choose all that apply.)

ATM

ISDN

MPLS

RIP

A

ATM

ISDN

MPLS

Routing Information Protocol (RIP) is not a WAN protocol but a routing protocol used in local area connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The rate at which the Frame Relay switch agrees to transfer data is referred to as _______.

BE

FECN

CIR

A

CIR

The committed information rate (CIR) is the rate, in bits per second, at which the Frame Relay switch agrees to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hich two arp utility switches perform the same function?

–g

–Z

–d

–a

A

–g

–a

The arp utility’s –a and –g switches perform the same function. They both show the current ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use?

–r

–R

/r

A

–R

To purge and reload the remote NetBIOS name cache, you must use nbtstat –R. Remember that the R must be uppercase, and it will not work correctly without the hyphen before it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which tool is used to attach ends to network cables?

Punch-down tool

Crimper

VLAN tool

A

Crimper

A wire crimper or crimper is used to attach ends onto different types of network cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are using a TDR. Which of the following actions can you do with this device? (Choose all that apply.)

Estimate cable lengths

Find splice and connector locations and their associated loss amounts

Display unused services

Define cable-impedance characteristics

A

Estimate cable lengths

Find splice and connector locations and their associated loss amounts

Define cable-impedance characteristics

Due to sensitivity to any variation and impedance to cabling, options A, B, and D are all reasons you’d use a time-domain reflectometer (TDR)

17
Q

Which of the following are considered cabling issues? (Choose all that apply.)

Crosstalk

Shorts

Open impedance mismatch

DNS configurations

A

Crosstalk

Shorts

Open impedance mismatch

Because most of today’s networks still consist of large amounts of copper cable, they can continue to suffer from the physical issues (the options are not a complete list) that have plagued all networks since the very beginning of networking

18
Q

You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, what is your next step?

Question the obvious.

Establish a theory of probable cause.

Establish a plan of action to resolve the problem and identify potential effects.

A

Establish a plan of action to resolve the problem and identify potential effects.

Based on the standard troubleshooting model, the next step would be to establish a plan of action to resolve the problem and identify potential effects

19
Q

Which network performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

Traffic shaping

Jitter control

Logical network mapping

A

Traffic shaping

Traffic shaping, also known as packet shaping, is another form of bandwidth optimization

20
Q

You need to optimize network traffic by spreading it across multiple connections. Which strategy should be used?

Load balancing

Traffic shaping

Adding VLANs

A

Load balancing

Load balancing refers to a technique used to spread work out to multiple computers, network links, or other devices. You can load-balance work on servers by clustering servers so that multiple machines all provide the same service