Network+ N10-005 Flashcards

(150 cards)

1
Q

Which routing protocol uses a composite metric of bandwidth and delay of the line to find the best path to a remote network

A

EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command determines whether a particular IP host is responding

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You need your IP address, subnet mask, default gateway, and DNS information. What command will you type in from a Windows command prompt

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which utility is used to view TCP/IP configuration for a computer

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command will display the current contents of the ARP cache on the local workstation

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which nbtstat switch displays a list of all the NetBIOS sessions currently active on the local workstation

A

nbtstat -s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network device that is used to connect multiple devices without segmenting a network is a

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Spanning Tree Protocol allows for redundancy of what networking device

A

Bridge (switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following can operate at both layers 2 and 3 of the OSI model
A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP resides at which of the following layers of the OSI model

A

Applicaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user their wireless 802.11g Internet connection is intermittently disrupted. Which of the following is the cause of the problem

A

Cordless phones and/or microwave ovens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which device helps to reduce collision domains

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which logical physical topology does 802.3 utilize
A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless standard has a maximum data rate of 11Mbps

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What functionality does Kerberos provide

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What TCP/IP port numbers does FTP utilize

A

20 and 21. 20 is FTP data or a client, and 21 is an FTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

At what layer of the OSI model does UDP reside

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.0001101

A

192.168.99.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

100Base-TX uses how many pairs of Category 5 Unshielded Twisted Pair (UTP) cables

A

2 pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What device connects computers with wireless adapters to a network

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Converting analog signals to digital signals and digital signals to analog signals can be done using what device

A

Modem. Dial up modems are rarely used today, but cable modems are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The maximum segment length for Ethernet is __________

A

100 meters (328 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the maximum speed of 802.11g

A

54Mbps (megabits per second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following techniques would increase the bandwidth for network transmission by joining multiple connections into one logical connection

A

Bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
True/False: Firewalls are used to prevent packets from entering and leaving a network
True
26
Which device can never run full duplex
Hub
27
A valid Media Access Control (MAC) address is how many bytes long
6
28
What well-known port does Trivial File Transfer Protocol (TFTP) use
69
29
In which OSI layer does a bridge operate
Data Link
30
An IT specialist is going to implement a packet filter on a network for Internet connections. What port must they allow through the firewall for users to connect to the Web
80
31
Which of the following is the point when local exchange carrier responsibility ends
Demarc
32
Which of the following is a utility that translates the IP address to its physical network address
ARP
33
Ethernet networking is known as a physical ______ topology
Bus
34
Which of the following is the default port for HTTPS
443
35
n the Media Access Control (MAC) address 00:B0:D0:6A:F2:B5, what does 00:B0:D0 identify
The manufacturer of the device, known as the OUI
36
Which network segments is located outside the firewall
DMZ
37
A network administrator needs to establish a remote connection to a client machine. Telnet is not secure because everything is sent in the clear. Which protocol and port number should be used instead
Secure Shell (SSH), port 22
38
During certain hours of operation, network performance has noticeably slowed. What utility could be used to track the source of the bottleneck
traceroute/tracert
39
Which command will produce the following output on a Unix box?\nEtho Link encap : Ethernet H\nWaddr: 00 :80 :C8 :D6 :74 :43\nInet adder : 4.150.6.3 Bcast : 4.255.255.255\nMask: 255.0.0.
ifconfig
40
If a new network has just been installed but does not function correctly, and the hosts appear to be configured correctly, what command should be used FIRST to test basic connectivity
ping
41
The following output is from what diagnostic tool?\n 1. Router 1 (192.168.0.1) 2.0 ms 1.0 ms 2.0 ms\n2. Server.net.com (4.150.6.3) 18.0 ms 12.0 ms 32.0ms\n3. Lammle.com (2.12.14.1) 240 ms 120 ms 300 ms
traceroute/tracert
42
What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber
Mechanical Transfer-Registered Jack (MT-RJ)
43
What cable type is used to link together two buildings that are over 10 miles (16.09 kilometers) apart
single-mode fiber (SMF)
44
What is the maximum CAT3 length acceptable for a horizontal cross-connect
100 meters (328 feet)
45
An optical time-domain reflectometer (OTDR) can be used to assess what
Fiber segments.
46
What level of the Open Systems Interconnect (OSI) model does a proxy server operate in
Application
47
What device is used to create a virtual local area network (VLAN)
Switch
48
What utility is being used given the following output?\n Interface: 206.212.36.18 on Interface 1\nInternet Address Physical Address\n206.212.36.8 00-00-21-64-91-f2 Dynamic\n206.212.36.11 00-00-21-1b-4a-a7 Dynamic\n
arp
49
Identify the Windows utility being used given the following output:\n Proto Local Address Foreign Address State\nTCP TLam:epmap TLam.tlam.com:0 Listenin
netstat
50
What protocol creates a secure connection between a web browser and a web server
Secure Sockets Layer (SSL)
51
True/False: If an administrator wants to set up an email server to exchange emails with other servers over the Internet, Simple Mail Transfer Protocol (SMTP) would be utilized
True
52
Which protocol allows usernames and passwords to be transmitted as clear-text
password authentication protocol (PAP), which has been replaced by CHAP.
53
At what layer of the Open Systems Interconnect (OSI) model does a router function
Network
54
Simple Mail Transfer Protocol (SMTP) utilizes what well-known Transmission Control Protocol/Internet Protocol (TCP/IP) port number?
25
55
A technician pings 127.0.0.1 and gets the following result 'Unable to contact IP driver, error code 2.' What should you do now?
reinstall the TCP/IP protocol
56
True/False: 172.192.4.256 is a valid Internet Protocol (IP) address
False
57
What Open Systems Interconnect (OSI) layer converts digital data into electronic signals to be put on a wire
Physical
58
True/False: Internet Control Message Protocol (ICMP) is used for error reporting with Internet Protocol (IP)
True
59
Which of the following WAN technologies uses thirty 64Kpbs channels
E-1
60
What network hardware allows MOST traffic collisions?
Hub
61
Which system detects and reports attempts of unauthorized access to the network
IDS
62
True/False: 32 bit is a valid Wired Equivalent Privacy (WEP) key
False
63
True/False: 1000Mbps is known as 1000 terabytes per second.
False. It means gigabits per second.
64
True/False: One of the purposes of a Virtual Local Area Network (VLAN) is to add more users
False, it is to break up broadcast domains
65
Which device would administer routing in a network
Router, or layer-3 switch
66
Which command line tools would be used to verify DNS functionality
Dig or nslookup
67
True/False: If a network administrator needs to reduce the usage of certain web sites used between the company and the Internet, a proxy server should be implemented
True
68
A technician is terminating a line that was extending an Ethernet jack to a wiring closet. Which hardware tool is necessary to complete the task
Punch-down tool
69
Which is required to pass traffic from one VLAN to another
Router or layer-3 switch
70
After using the nslookup command, which commands is used to determine the IP address of a company A’s mail server
set type=mx
71
At what two layers of the Open Systems Interconnect (OSI) model does a packet-filtering firewall operate?
Network and Transport
72
How many pairs are crossed in a crossover cable
Two
73
True/False: The maximum speed of 802.11b is 54Mbps (megabits per second)
False
74
True/False: The maximum speed of 802.11b is 11Mbps (megabits per second)
True
75
Which documentation would a network administrator need to update if they have just finished upgrading the firmware on all switches within the LAN
Physical network diagram
76
True/False: The number of wireless users will affect the range of an 802.11b Wireless Access Point (WAP)
False. It will affect the throughput but not the distance.
77
True/False: 1000Base-CX is an Institute of Electrical and Electronics Engineers (IEEE) copper cable standard
True
78
True/False: A MESH network has the least collision
True
79
True/False: Mesh network topology uses the MOST cable of any physical topology
True
80
True/False: 100Base-FX runs over Category 5e cable
False
81
True/False: 100Base-FX runs over multimode fiber (MMF) optic cable
True
82
What is the maximum cable type required for 100Base-TX
Category 5 Unshielded Twisted Pair (UTP)
83
True/False: Using a Wireless Access Point (WAP), bridging an 802.3 network to an 802.11 network can be accomplished
True
84
Which type of connector does a 10Base-F network use
Straight tip (ST)
85
True/False: The 802.11b/g frequency band is 2.4GHz (gigahertz)
True
86
Which protocol permits secure polling network devices
SMTPv3
87
Which is a topology used in networks for its scalability
Star
88
Which is part of the IP protocol suite and is used to monitor network managed devices?
SNMP
89
A user is booting a workstation and receives a message that a duplicate IP address is in use on the network. Which command could be used to troubleshoot the problem
arp
90
A technician is extending a data circuit to the other side of the building. Which would the technician set up at the new location
IDF
91
Which is the best encryption protocol that the DoD says is unbreakable
AES
92
Which encryption protocol or standard allows you to create a virtual subnet on an intranet
SSL VPN
93
Which user-authentication method uses a public key and private key pair
PKI
94
True/False: RIPv2 is a hybrid routing protocol
False
95
True/False: RIPv1 is a Link State routing protocol
False
96
Which two software types would be used for identifying an attack
IDS/IPS
97
A client purchases a new wireless printer and wants to be able to bond it their PDA. Which technologies describes the type of wireless printer that was purchased
bluetooth
98
True/False: Internet Protocol version 6 (IPv6) uses 128-bit addresses
True
99
A technician has just finished implementing a solution for a network issue. What steps in should the technician do next?
99. Document the issue and the solution that was implemented
100
True/False: A denial of service (DoS) attack is meant to prevent users from accessing a system
True
101
True/False: IP spoofing is the process of sending a packet with a fake source address, pretending that the packet is coming from within the network the hacker is trying to attack.
True
102
Which routing protocols uses AS-Path as one of the methods to build the routing table
BGP
103
A technician is troubleshooting a switch and has identified the symptoms. Which steps should the technician take next
Escalate the issue
104
What kind of tool could a hacker use to intercept traffic on your network?
Packet sniffer
105
.Remote users are having problems accessing files from a file server. Which should a technician check first?
Connectivity
106
Which type of virus attacks executable application and system program files?
File virus
107
Which monitoring software is used to view network at the frame level?
Packet sniffer
108
A technician needs to truce a wire that is in the wall. Which is the best way for the technician to identify the wire’s location?
Tone Generator
109
Which devices allows segregation of collision domains but not broadcasting domains?
Switches
110
Which is the maximum transmission distance of 10GBase-LR?
6 miles
111
Which layer of the OSI model does IPSec operate in?
Network (Layer 3)
112
Which tools would be used to test the break in a fiber connection on the network?
OTDR
113
True/False: A rogue access point is when a switch has been installed on a network without the administrator’s knowledge.
False. When an AP has been installed without permission.
114
True/False: Phishing/social engineering refers to the act of attempting to illegally obtain sensitive information by pretending to be a credible source.
True
115
What are the three main types of intruder detection and defense?
Active detection, passive detection, proactive defense
116
What defines how security will be implemented in an organization, including physical security, document security, and network security?
Security policy
117
Which authentication methods allows for domain level authentication on a wireless network?
RADIUS
118
A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which is a primary feature to consider when selecting a new switch to support the phones?
PoE
119
True/False: A security procedure defines the appropriate response to a security event on your network.
True
120
What are the three primary LAN topologies?
Bus, ring, and star, but we only use bus in today’s LANs.
121
What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?
Mesh
122
What is the term for a device that shares its resources with other network devices?
Server
123
What network model draws a clear distinction between devices that share their resources and devices that do not?
Client/Server
124
Which network topology or connection type can be implemented with only two endpoints?
Point-to-point
125
Will a computer that shares no resources most likely be connected to the backbone or to a segment?
Segment
126
Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?
Bus
127
True/False: RIP is a vendor-neutral routing protocol that uses very little bandwidth but a lot of memory on a router.
False. Yes, RIP is vendor neutral, but it uses little router processing and a lot of bandwidth to do its job.
128
True/False: OSPF is a hybrid routing protocol.
False
129
True/False: EIGRP is used to update the ARP tables on a router.
False
130
What does the acronym ICMP stand for?
Internet Control Message Protocol
131
True/False: EIGRP is a classful routing protocol.
False
132
True/False: EIGRP has a routing-protocol version that does not support IPv6.
False
133
True/False: OSPF is a link-state protocol that supports VLSM and classless routing.
True
134
True/False: RIPv1 is a Distance Vector protocol that does not support VLSM and supports only classful routing.
True
135
What does the acronym IS-IS stand for?
Intermediate System-to-Intermediate System
136
What does the acronym IDS stand for?
Intrusion Detection System
137
What WAN protocol is described as residing in Layer 2.5 of the OSI model?
MPLS
138
True/False: If you can ping a host, this does not mean it is 100% up and running.
True
139
A network user enters http://www.comptia.org into their Internet web browser. What is the default port number for the Uniform Resource Locator (URL)?
80
140
What is another name for the Media Access Control (MAC) address?
Physical address or hardware address
141
Which LAN connection technology has a full duplex speed of 200Mbps and uses a CAT5e cable?
100Base-T
142
What is the Internet Protocol version 4 (IPv4) loopback address?
127.0.0.1
143
An Ethernet Media Access Control (MAC) address consists of how many bits?
48
144
True/False: EIGRP uses hop count as a metric to determine the best path to a remote network.
False
145
Why would you use dynamic routing over static routing?
Updates routing table automatically and scales to large newtorks
146
True/False: OSPF can be used only on Cisco routers.
False
147
True/False: DSL is used to connect hosts to an Ethernet hub.
False
148
True/False: SDSL means that your download and upload speeds on the line are different.
False
149
True/False: A link light is the small, usually red, LED on the back of a network card.
False
150
True/False: ADSL means that the uplink and download speeds of a DSL link are the same.
False