Exam questions Flashcards

(100 cards)

1
Q

Which subnet mask is valid?

A: 255.255.255.240
B: 255.255.255.228
C: 255.255.255.164
D: 255.255.255.245

A

255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A service that resolves NetBIOS names to IP addresses is:

A

Windows Internet Name Service (WINS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of DNS record maps host names to addresses?

A

Host (A) DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Teredo tunneling is a protocol that:

A

Allows IPv6 connectivity through IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the default subnet mask for a Class C Internet network?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The default port used for telnet is:

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a client’s DHCP-issues address expires, the client will:

A

Attempt to obtain a new address by broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.

Why do you receive a response on the second attempt but not on the first attempt?

A

The DNS is not resolving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Media Access Control (MAC) address identifies a/an:

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two companies want to share data by using the Internet.

What type of network provides the solution?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPNs are implemented to provide:

A

A secure connection through public networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an 802.IIg Internet connection has connectivity problems, what may be the cause?

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these factors has the biggest impact on data transmission speed in a wireless network?

A

The transmission standard of the equipment used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following used a tunnelling protocol?

A: Internet
B: VPN
C: Extranet
D: VLAN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network that separates an organisations private network from a public network is a/an:

A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of network is most vulnerable to intrusion?

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attenuation in a wireless network signal is a result of:

A

Distance from the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of network covers the broadest area?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In local area network (LAN) topologies, the primary media access methods are:

A

Contention and Token passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens wen an 802.11b node starts broadcasting within the range of ab 802IIg access point?

A

A connection will be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which technology provides the highest bit rate?

A

DS3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A VPN is a/an:

A

Encrypted protection across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What determines the media access method that is used in a network?

A

Topology and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which wireless authentication method provides the highest level of security?

A

WI-FI protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The topology of a local area network (LAN) is defined by the:
Psychical and logical characteristics
26
The maximum output of an 802.IIg network is:
54 Mpbs
27
A node within a local area network (LAN) must have a network interface device and a:
Host address
28
Which is Layer 2 WAN protocol?
Point-to-Point Protocol (PPP)
29
Which type of port is used ti support VLANs traffic between two switches?
Trunk port
30
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Address Resolution Protocol (ARP)
31
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
mail
32
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
33
Which command is used to verify that a server is connection to the network?
PING
34
What represents the Internet Protocol versos 6 (PIv6) loopback address?
::1
35
What is the range of multicast addresses?
244.0.0.0 to 239.255.255.255.255
36
What uses pointer record and A records?
DNS Server
37
The ipconfig command will:
Display a client's address
38
One reason to incorporate VLANs in a network is to:
Reduce the number of nodes in a broadcast domain
39
To directly connect the Ethernet network interface cards (NICs) of two computers you should use a:
Crossover cable
40
The function of a router is to:
Forward traffic to other networks
41
If a router cannot determine the next hop for a packet, the router will:
Forward the packet to the default route
42
One purpose of a perimeter network is to:
Make resourced available to the internet
43
Which protocol can be used to encrypt packets on the Internet?
HTTPS
44
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Domain Name Service (DNS)
45
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Be unable to obtain their leases from the server
46
Which service masks internal IP addresses from outside the world?
NAT
47
The query protocol used to locate resourced on a network is:
Lightweight Directory Access Protocol (LDAP)
48
Tracert is used to:
Report the route taken by packets across an IP network
49
In which OSI layer does routing occur?
Network
50
What type of record does DNS use to find a mail service?
Mail Exchanger (MX) DNS record
51
The default gateway address identifies the:
Device that will connect the computer to a remote network
52
How many are there in an Internet Protocol version 6 (IPv6)?
128
53
Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101
B
54
What is the minus cabling requirement for a 100BaseTX network?
Category 5 UTP cable
55
Internet Key Exchange (IKE) is responsible for which two functions?
Negotiating algorithms to use and exchanging key information
56
Which protocol is a transport layer protocol?
UDP and TCP
57
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router?
Network Policy and Access Services Routing and Remote Access Sertvices
58
What are two characteristics of fiber optic cable?
Supports splicing and requires a polish for end connectors
59
A node within a local area network (LAN) must have?
NIC and IP address
60
What is the bit rate for a North American T3 circuit?
44.736 Mbit/s
61
Which feature of Category %e STP cable reduces external interferences?
Twisting
62
What are thee advantages of VLANs?
The retiree a router to connect to VLANs on another switch They compartmentalise a network and isolate traffic The act although that are on the same LAN regardless o physical location
63
What is an example of a network device that associates a network address with a port?
Router
64
Which wireless communication problem is caused by electromagnetic waves?
Interference
65
An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall?
Port 80 and port 443
66
What are two advantages of using star topology rather than ring topology in a computer lab workgroup?
A central connection point allows for flexibility and scalability A cable problem within the group affects two nodes, at most
67
What are three characteristics of Ethernet network topology?
Can use coaxial, twisted pair and fiber optic media Compromises the largest share of the networks in place today Can negotiate different transmission speeds
68
Your home computer is having problems accessing the Internet. You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address. Which address indicates that your router's DHCP service is NOT functioning?
196.254.1.15
69
What are two characteristics of the CSMA/CD access method?
It checks to see if a collision has been detected It waits until the transmission medium is idle
70
What are two characteristics of a mesh network topology?
It is fault tolerant because of redundant connections Every node connects to every other node on the network
71
Which protocol is responsible for automatically assigning IP addresses?
HTTP
72
The default subnet mask for a Class B network is:
255.255.0.0
73
The default port used for SMTP is:
25
74
Which are two features of DHCP?
Address reservation and IP address exclusion
75
The command line tool used to list a host's active incoming connections is?
NETSTAT
76
Attenuation in a wireless network single is a result of :
Distance from the access point
77
In a physical star topology, the central device is referred to as a:
Hub
78
Which technology can you use to extend an internal network across shared or public folders?
VPN
79
Which are published IEEE 802.11 wireless transmission standards?
802.11g and 802.11n
80
What is an application layer protocol?
FTP
81
The top-level domain of www.adventureworks.com is:
com
82
In addition to switching, multilayer switches also:
Provide Layer 3 routing functions
83
One reason to replace an unmanned switch with a managed switch is to:
Support multiple VLANs
84
In which physical network topology is each computer connected to a central point?
Star
85
What are two connectivity options for wide area networks (WANs)?
Dial-up an leased line
86
A private network that allows multiple members of an organisation to exchange data is an:
Intranet
87
Security is a concern on wireless networks due to:
The radio broadcast access method
88
A characteristic of the mesh topology is that it:
Uses redundant paths
89
What are the layers of the OSI Model?
1. Physical 2. Data link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
90
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Be unable to obtain their leases form the server
91
The default gateway identifies the:
Device that will connect the computer to a remote network
92
What is the loopback address of your computer?
127.0.0.1
93
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
802.11n
94
For which two reasons should you use IPsec between computers?
Data integrity and data confidentiality
95
How do you protect the Internal network from intrusion?
Set the webserver in a perimeter network
96
Which protocol is responsible for automatically assigning IP addresses?
HTTP
97
What is the maximum cable length for a single Cat5 UTP cable run?
328 feet / 99.97 meters
98
Which cable type transmits data the greatest distance?
Single-mode fiber
99
Which routing is fault tolerant?
Dynamic routing
100
The ping tool is used to:
Self-test a host's own network interface and determine whether a host is reachable