Domain 2: Infrastructure Flashcards
Which of the following is the U.S. standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192?
A. SDH
B. SONET
C. ISDN
D. ATM
B. SONET
The Synchronous Optical Networking (SONET) standard defines a base data transfer rate of 51.84 Mbps, which is multiplied at the various optical carrier levels. An OC-3 connection therefore runs 155.52 Mbps, an OC-12 at 622.08 Mbps and so forth. The Synchronous Digital Hierarchy (SDH) is the European equivalent of SONET. Integrated Services Digital Network (ISDN) is a service that combines voice and data services using the Public Switched Telephone Network (PSTN), and Asynchronous Transfer Mode (ATM) is cell-switched protocol defining a combined voice, data, and video service.
Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?
A. Upgrade to 100Base-TX and keep the existing hubs.
B. Upgrade to 1000Base-T and keep the existing hubs.
C. Upgrade to 100Base-FX and replace all of the hubs with switches.
D. Upgrade to 1000Base-T and replace all of the hubs with switches.
D. Upgrade to 1000Base-T and replace all of the hubs with switches.
The best solution in this scenario is to upgrade to 1000Base-T and replace the existing hubs with switches. 1000Base-T provides the fastest transfer speeds supported by the existing cable. Since users are complaining that the network is slow with the existing hubs, it makes sense to replace the shared hub environment with switches that offer dedicated bandwidth out each port. Any solution that does not replace the hubs would not address the users’ complaints. 100Base-TX would provide a speed increase, but it runs at one-tenth the speed of 1000Base-TX. Upgrading to 100Base-FX would require the cabling to be replaced with fiber optic, which would be very expensive.
Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?
A. Frame relay
B. MPLS
C. ATM
D. PPPoE
B. MPLS
Multiprotocol Label Switching (MPLS) is a data transfer mechanism that assigns labels to individual packets and then routes the packets based on those labels. Frame relay, Asynchronous Transfer Mode (ATM), and Point-to-Point Protocol over Ethernet (PPPoE) do not assign labels to packets.
On an unmanaged network, which of the following virtual networking components have media access control (MAC) addresses assigned to them?
A. Virtual switches
B. Virtual NICs
C. Hypervisors
D. Virtual firewalls
B. Virtual NICs
Just like physical network interface cards (NICs), virtual NICs have six-byte MAC addresses assigned to them, which enable them to be identified by data link layer protocols. Unlike physical NICs, however, it is typically an easy matter to modify a MAC address on a virtual NIC. Virtual switches, like physical switches, are not addressable devices, so they do not have MAC addresses on an unmanaged network. The hypervisor is the component on a host server that makes virtualization possible, so it does not require a MAC address. Virtual firewalls operate at the application layer, so they do not require data link layer MAC addresses. On a managed network, these devices have a MAC address to communicate with the management console, but addresses are not needed on an unmanaged network.
Alice’s company has 10 users who telecommute from home. They all have Integrated Services Digital Network Basic Rate Interface (ISDN BRI) configured and installed in their homes. They all need to transfer files between their homes and the corporate network. Each user connection has its two B channels combined for a total data transfer rate of 128 Kbps. Alice’s corporate network must be able to support all of these connections simultaneously. What service should Alice install at the corporate site, and how should she configure it to support the remote client connections?
A. Alice should install a single BRI connection and configure the access router to combine its B channels.
B. Alice should install five BRI connections and configure the access router to combine all ten B channels.
C. Alice should install multiple Primary Rate Interface (PRI) connections and configure the access router to combine all of the B channels.
D. Alice should install a single PRI connection and configure the access router to combine all 23 B channels.
D. Alice should install a single PRI connection and configure the access router to combine all 23 B channels.
In this scenario, there are 10 users with BRI connections, each of which has its two B channels combined to provide a 128 Kbps transfer rate per user. To support simultaneous connections to the corporate site, Alice will need to install and configure a single PRI link to support the aggregation of multiple B channel connections. A single PRI link has 23 B channels and 1 D channel. Therefore, the router can support up to 11 inbound BRI sessions simultaneously, which is more than enough. Installing a single BRI at the corporate site would not enable multiple simultaneous BRI connections, and installing five BRI links, for a total of ten 64 Kbps B channels, would not support the ten 128 Kbps sessions that are required. Installing multiple PRI links is unnecessary since the site only has to support ten inbound BRI connections.
Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?
A. Active Directory
B. ICMP
C. DNS
D. iWINS
E. iSNS
E. iSNS
The Internet Storage Name Service (iSNS) is an application that provides iSCSI initiators with automated discovery of targets located on the network. iSNS can also function as a discovery service for Fibre Channel devices. Active Directory, Internet Control Message Protocol (ICMP), and Domain Name System (DNS) are not capable of registering iSCSI targets. iWINS does not exist.
At which layer of the Open Systems Interconnection (OSI) model do wireless range extenders operate?
A. Physical
B. Data link
C. Network
D. Transport
E. Session
F. Presentation
G. Application
A. Physical
Wireless range extenders are physical layer devices that receive signals from wireless access points and network adapters and retransmit them, enabling devices to connect that are farther apart than the network would normally support. Because the extenders do not process the packets in any way, but just retransmit the signals, they do not operate at any layer above the physical.
Ralph is installing an Ethernet local area network (LAN) for a small business with two offices on opposite sides of a courtyard. Ralph plans to run a multimode fiber-optic cable across the courtyard, but the budget is limited, and he can’t use fiber for the whole network. Therefore, he installs unshielded twisted pair (UTP) cable in the two offices, which have ten and twelve workstations, respectively. Which of the following devices should Ralph use to join the two UTP installations together into one LAN using the fiber-optic run across the courtyard, while keeping the cost to a minimum?
A. Media converters
B. Hubs
C. Switches
D. Routers
A. Media converters
Media converters will enable Ralph to join the multimode fiber-optic run to the UTP at both sides of the courtyard while maintaining a single network at minimum cost. Inexpensive small business hubs and switches cannot join different media together. Routers can join different media, but they are more expensive, and they would separate the installation into three separate networks.
A maintenance worker, while replacing a light fixture in an office building, accidentally severs a network cable in the drop ceiling. The tenants use a variety of local area network (LAN) technologies throughout the structure, but on that particular floor there are three separate LANs: a 10-node Thin Ethernet LAN using coaxial cable in a bus topology, a 25-node Gigabit Ethernet LAN using twisted pair cable in a star topology, and a 5-node Fiber Distributed Data Interface (FDDI) LAN using multimode fiber-optic cable in a double ring topology. Without knowing which of the LANs the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?
A. 0
B. 1
C. 5
D. 10
E. 25
F. 40
D. 10
The Thin Ethernet LAN is the network most endangered by the cable break. If a bus network is severed, all of the workstations on it are affected because the cable segments are no longer terminated at one end. The Gigabit Ethernet network uses a star topology, which means that only the one computer using the severed cable could be disconnected from the network. An FDDI double ring network can survive a single cable break without any workstations being affected.
Which of the following best describes the function of the network medium?
A. The network medium provides the physical connection between networked computers.
B. The network medium provides the protocol used to transmit data between end systems.
C. The network medium passes data between two routers.
D. The network medium processes electrical or light signals and converts them to data.
A. The network medium provides the physical connection between networked computers.
The network medium provides the physical connection between networked computers. This connection can be made through a copper-based, fiber-optic, or wireless medium. The network medium is not a protocol, and it does pass data; it only carries signals. The network medium does not process electrical or light pulses and convert them to data; it carries only the signals generated by transceivers.
Which of the following technologies can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud?
A. E-1s
B. Frame relay
C. ATM
D. PPP
B. Frame relay
Frame relay is a packet switching service that uses a single leased line to replace multiple leased lines by multiplexing traffic through a cloud. The service can create virtual circuits connecting the subscriber’s network to multiple destinations, eliminating the need for a dedicated leased line to each remote site. An E-1 is the European equivalent to a T-1 leased line, which does not replace multiple T-1s. Asynchronous Transfer Mode (ATM) is a cell-switching WAN technology, and Point-to-Point Protocol (PPP) is a protocol that provides a data link layer connection between two end systems. Neither is a replacement for multiple T-1s.
Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph’s proposed Internet access solution is true?
A. The proposal fails to satisfy both the primary and secondary objectives.
B. The proposal satisfies the primary objective but neither of the secondary objectives.
C. The proposal satisfies the primary objective and one of the secondary objectives.
D. The proposal satisfies the primary objective and both of the secondary objectives.
C. The proposal satisfies the primary objective and one of the secondary objectives.
Proxy servers provide network users with access to Internet services, and the unregistered IP addresses on the client computers protect them from unauthorized access by users on the Internet, which satisfies the first objective. The proxy servers also make it possible for network administrators to regulate users’ access to the Internet, which satisfies one of the two secondary objectives. However, the proxy servers cannot assign IP addresses to the client computers, and the plan makes no mention of DHCP or another automatic TCP/IP configuration mechanism. Therefore, the plan does not satisfy the other secondary objective.
Ed has been hired by a private company to connect two remote sites with a wide area network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?
A. A standard modem-to-modem connection
B. A T-3 dedicated leased line
C. An ISDN (Integrated Services Digital Network) Primary Rate Interface (PRI) connection
D. An ADSL (Asymmetrical Digital Subscriber Line) connection
B. A T-3 dedicated leased line
For this scenario, the best solution is a dedicated leased line connection. This is because the bandwidth requirements are constant and the data transfer rates are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated leased line, running at 44.735 Mbps. Standard modem connections, ADSL, and an ISDN PRI connection are all too slow.
A load balancer is a type of which of the following devices?
A. Switch
B. Router
C. Gateway
D. Firewall
B. Router
A load balancer is a type of router that forwards traffic with a single IP address to multiple servers in turn. In most cases, a load balancing router works by processing incoming traffic based on rules set by the administrator. Because a load balancer works with IP addresses, it is a network layer device. Load balancers are not switches, gateways, or firewalls.
In its primary functionality, a network attached storage (NAS) device is most closely associated with which of the following devices?
A. Failover cluster
B. File server
C. JBOD
D. RAID
B. File server
A NAS device is essentially a file server that connects to a network and provides users with access to shared files. A NAS is a single computer, so it cannot be associated with failover clustering. Just a Bunch of Disks (JBOD) is a simple storage array that provides block-level access to data, whereas NAS devices provide file-level access. Redundant Array of Independent Disks (RAID) is a fault tolerance technology that might be implemented in NAS devices, but it is not the device’s primary function.
Which of the following signal types is carried by copper cable?
A. Fiber optic
B. Microwave
C. Infrared
D. Electrical
D. Electrical
Copper cables use electrical signals to transmit data. Fiber optic is a cable type, not a signal type. Microwave signals can’t be transmitted over copper cable. Infrared signals are used only for wireless networks.
Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?
A. Ethernet
B. IP
C. Fibre Channel
D. iSCSI
A. Ethernet
Ethernet uses jumbo frames to transfer large amounts of data more efficiently. On a packet-switched network, each packet requires header data, which adds to the network’s transmission overhead. Splitting large files into a great many small packets can lead to so much overhead that network efficiency is impaired. Ethernet typically restricts frame size to 1,500 bytes, but jumbo frames enable Ethernet systems to create frames up to 9,000 bytes. Frames are data link layer protocol data units, so Internet Protocol (IP), operating at the network layer, is not involved in creating them. Fibre Channel and iSCSI are specialized storage area networking protocols that do not use jumbo frames.
The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?
A. Anywhere on the private internetwork, as long as the Internet is accessible
B. Between the Internet access router and the Internet service provider’s (ISP’s) network
C. At the ISP’s network site
D. Between the Internet access router and the rest of the private internetwork
D. Between the Internet access router and the rest of the private internetwork
The firewall is a conduit between the private network and the ISP’s network (which provides access to the Internet), through which all traffic must pass. This ensures that the firewall has the opportunity to examine every packet that passes between the private network and the Internet and filter out those that are not authorized. If the firewall was located in the midst of the private internetwork, it would be possible for Internet computers to bypass the firewall and communicate directly with the private systems. Placing the firewall on the far side of the router would put it on the ISP’s network, causing it to filter all of the ISP’s traffic and not just that destined for the private network. Installing the firewall at the ISP’s site would have the same effect as installing it on the far side of the router at the private network site.
Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?
A. 66 block
B. 110 block
C. Patch panel
D. Smart jack
A. 66 block
A 66 block is a type of punchdown block for telephone systems that was first introduced in 1962. By the year 2000, nearly all commercial telephone installations had begun using 110 blocks instead; 110 blocks are still in use, as are patch panels and fiber distribution panels, both of which are termination points for network cable runs.
Which of the following devices is used to physically connect computers in the same VLAN?
A. A bridge
B. A hub
C. A switch
D. A router
C. A switch
Replacing routers with switches turns an internetwork into a single large subnet, and VLANs exist as logical elements on top of the switching fabric. Although VLANs are the functional equivalent of network layer subnets, the systems in a single VLAN are still connected by switches, not routers. Bridges connect network segments at the data link layer and selectively forward traffic between the segments. However, bridges do not provide a dedicated connection between two systems like a switch does, and they do not make it possible to convert a large routed internetwork into a single switched network. Therefore, they have no role in implementing VLANs. Hubs are physical layer devices that propagate all incoming traffic out through all of their ports. Replacing the routers on an internetwork with hubs would create a single shared network with huge amounts of traffic and collisions. Hubs, therefore, do not connect the computers in a VLAN.
Which of the following connector types was typically associated with a T-connector attached to the computer?
A. RJ45
B. MTRJ
C. 8P8C
D. BNC
E. F-type
D. BNC
Thin Ethernet networks use a type of coaxial cable that runs from each computer to the next one, forming a bus topology. To connect the cable to the network computers, each network interface adapter has a T-connector attached to it, with two additional male BNC connectors, to which you connect two lengths of network cabling.
Which of the following wide area network (WAN) services uses uniformly sized, 53-byte packets called cells?
A. ATM
B. Frame relay
C. T-1
D. PPPoE
A. ATM
Asynchronous Transfer Mode (ATM) transfers data using uniformly sized cells rather than same-sized packets. Frame relay uses variable-sized packets, and Point-to-Point Protocol over Ethernet (PPPoE) uses variable-sized Ethernet frames. A T-1 is a circuit-switched connection that does not use packets or cells.
Which of the following statements about Internet access through a proxy server accounts for the security against outside intrusion that a proxy provides?
A. The proxy server uses a public IP address and the client computers use private addresses.
B. The proxy server uses a private IP address and the client computers use public addresses.
C. Both the proxy server and the client computers use private IP addresses.
D. Both the proxy server and the client computers use public IP addresses.
A. The proxy server uses a public IP address and the client computers use private addresses.
Because the client computers use private IP addresses, they are invisible to the Internet, so users outside the private network cannot see or access them. The proxy server has a public IP address so it can participate in service transactions with Internet servers. If the proxy server used a private IP address, it would not be able to access the Internet directly. If the clients used public IP addresses, they would be visible to the Internet and vulnerable to intrusion.
Which of the following statements explains the purpose of the twists in twisted pair cabling?
A. The twists prevent collisions.
B. The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.
C. The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
D. The twists extend the bend radius allowance of the cable.
C. The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
The twists in a twisted pair cable prevent the signals on the different wires from interfering with each other (which is called crosstalk) and also provide resistance to outside electromagnetic interference. The twists have no effect on collisions. The twists can’t completely eliminate the effects of EMI. Twists have nothing to do with the bend radius allowance for the cable.