Networking Practice Test Flashcards

1
Q

Cheryl is in charge of maintaining her company’s website accessibility. Upon inspection, she finds that too much traffic is being directed to one web server while other web servers are sitting idle. What internet appliance could Cheryl use to resolve this issue?

A

Explanation:
A load balancer is an internet appliance designed to spread requests over multiple servers to evenly distribute the demand and balance a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which sets of connectors are used for twisted pair cabling?

A

RJ11 and RJ45 are used in twisted pair cabling, commonly for phone lines and ethernet, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of IP address is 192.168.15.211?

A

A private IPv4 address
IPv4 addresses follow the format of four decimal octets. IPv6 format is eight hexadecimal quartets. IP addresses that begin with 192.168 are in the RFC1918 set of private addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

William is publishing his company’s website to the internet and wants to ensure a secure connection. Which of these protocols should William use?

A

Hypertext Transfer Protocol Secure (HTTPS) is the secure version of the HTTP protocol. HTTPS is run on port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hannah’s new clothing business is experiencing rapid growth, and she has planned to open 300 new retail locations within the next 5 years. All of these locations will need multiple public IP addresses per store, but, currently, they only have four public addresses. She would like to implement a new scheme, where she would not have to worry about being limited by IP addresses in the foreseeable future. What addressing scheme would you recommend?

A

IPv6 addressing
Explanation:
The public IPv4 address space has been exhausted for quite some time now, meaning that all of these addresses have been purchased or allocated, usually by an Internet Service Provider (ISP). Many technical savvy companies have already begun the transition to using IPv6, which contains a possible 340 undecillion addresses, or 2 to the 128th power (yes, a lot of addresses). Many, if not all, ISPs have IPv6 enabled equipment already in operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

David is installing a new Web server at the office, but doesn’t want DHCP giving it a new IP address every time he has to reboot it during maintenance. What kind of address should David assign to the new Web server?

A

Static addresses are those that are manually assigned and entered on a device. This will effectively disable DHCP. He should also reserve the IP address in the DHCP pool as good practice to prevent it from being leased to another device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a Windows environment, this protocol is often associated with Active Directory for central management of a user database. What is this protocol called?

A

LDAP (Lightweight Directory Access Protocol) often works in conjunction with Active Directory to provide user authentication and management in a network. It is the successor to the DAP (Directory Access Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bob is implementing a new wireless network in his home office and needs assistance in selecting his equipment. He needs something that won’t interfere with his 2.4 GHz phones and that has speed that can reach at least 54 Mbps. Which wireless standard would you suggest to Bob?

A

802.11n is the only option listed that can operate at either 2.4 or 5 GHz and has a theoretical maximum speed of 600 Mbps; it would also provide the least amount of interference if using the 5 GHz band. 802.11b/g both operate at 2.4 GHz only which could possibly interfere with any other devices in that frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Robert is able to configure port assignments through his switch. What type of switch is Robert using?

A

A managed switch is a device that the end-user is able to configure manually. Configurable aspects include port assignments, traffic management, and traffic monitoring. A managed switch also offers quality of service (QoS), redundancy, VLANs, and port mirroring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order for devices on our local home IPv4 network to communicate with other devices on the Internet, our SOHO router must perform what?

A

NAT (Network Address Translation) allows our private local network IPv4 addresses to be translated into a public IP address capable of connecting over the Internet. This can also be used with IPv6, due to security advantages, although it is less likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gavin has been notified that a potential breach may have occurred through the use of a stolen employee login credential. He needs to look at past login information. Which server should Gavin access to find this information?

A

A syslog server is a central repository for system messages and data, including login events and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Internet connection type is limited to an area near the central office and can make use of existing wiring infrastructure?

A

Digital Subscriber Line (DSL) is limited by the distance from the central office for communication and can make use of existing phone lines already in place at your home or business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Peggy needs to implement a spam management system that authenticates using encryption and a public-private key pair as well as the IP address. Which spam management tool would be the best option to fulfill the requirements?

A

Domain-based Message Authentication, Reporting, and Conformance (DMARC) would be the best option to fulfill all of the spam management requirements. DMARC combines both DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) in a single framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sophie’s company requires the fastest possible internet connection publicly available. Her supervisor has asked Sophie to recommend an internet connection type by dragging and dropping one of the following into a space in an email form. Which type of internet connection should Sophie drag to this space?

A

A fiber internet connection uses light to send data and currently offers the fastest connection speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network that connects two states would commonly be known as a ____ network?

A

Wide Area Networks, also known as WAN’s, are networks that are connected across long distances, such as state to state or coast to coast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network of devices used in your car, such as connecting your cell phone to the car via Bluetooth, is known as what kind of network?

A

PAN (Personal Area Networks ) are networks designed just for you, typically in a very short range. Connecting your cell phone to your car via Bluetooth, or connecting a set of Bluetooth speakers to your cell phone, would both qualify as a PAN.

17
Q

Maddie works at a headend site and has been tasked with ensuring that traffic is flowing properly through the network. She must be able to view and copy network traffic without interfering with the traffic. What hardware tool should Maddie use?

A

A network test access port (TAP) would be the best tool for this scenario. The network TAP is able to view and copy network traffic without interfering with the traffic. A network TAP is also easily moved from one location within the headend to another.

18
Q

Switches that are configured to participate in routing decisions are commonly known as what?

A

Layer 3 switch
Explanation:
This is commonly referred to as a Layer 3 switch, as routing decisions work at Layer 3 of the OSI model (network layer). Standard switches in general (or very basic environments) are normally considered Layer 2 devices, and work primarily as plug and play with no way to change any settings (unmanaged switch).

19
Q

What tool would help you secure the RJ45 connector to the wiring used for an ethernet connection?

A

Crimper A connector is typically crimped as the last step in the process after creating an ethernet cable. This securely tightens down the wiring to the correct spots inside the connector for electrical signals to pass.

20
Q

After running 100 ethernet cables for your new office, you find that one of the computers you connected them to is showing as if there is nothing connected. You need to find where the other end connects in the data closet, but you forgot to label the cables. What could you use to help you find the other end of the cable?

A

Toner probe Explanation:
By plugging in a tone generator at the jack of one end of the cable, you can find the other end by waving a toner probe around the area you think it could be. A loud tone noise will generate when you have found the end of the cable.