CIS 3230 EXAM 1, MSU DENVER

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

CIS 3230Exam 1, MSU DENVER

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Which of the following OSI model layers would allow a user to access and download files from a remote computer?

Application (Layer 7)

2
New cards

A network administrator is troubleshooting the communication between two Layer 2 switches that are reporting a very high runt count. After trying multiple ports on both switches, the issue persists. What should the network administrator perform to resolve the issue?

Increase the MTU size on both switches. 

3
New cards

A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

10.1.2.31

4
New cards

An example of an application layer address is www.indiana.edu ? (True or False)

True

5
New cards

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: ✑ Device ✑ LC/LC patch cable ✑ Patch panel ✑ Cross-connect fiber cable ✑ Patch panel ✑ LC/LC patch cable ✑ Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

TX/RX is reversed 

6
New cards

A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?

Disable port security

7
New cards

A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?

RG-6 (Radio Guide 6)

8
New cards

Which of the following records can be used to track the number of changes on a DNS zone?

SOA (Start of Authority)

9
New cards

While troubleshooting a network outage, a technician discovers symptoms that indicate a patch cable is connecting the core switch to the router. A network engineer confirms the theory is plausible, and the technician tests the cable. The cable passes the test, and the technician properly plugs the cable back into the correct network ports. However, the network outage continues. Which of the following is the NEXT step the technician should take to troubleshoot the network outage?

Establish a new theory.

10
New cards

An IT administrator received an assignment with the following objectives: ✑ Conduct a total scan within the company's network for all connected hosts. ✑ Detect all the types of operating systems running on all devices. ✑ Discover all services offered by hosts on the network. ✑ Find open ports and detect security risks. Which of the following command-line tools can be used to achieve these objectives?

nmap

11
New cards

A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?

netstat -a

12
New cards

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?

23

13
New cards

A technician is setting up a new router, configuring ports, and allowing access to the Internet. However, none of the users connected to this new router are able to connect to the Internet. Which of the following does the technician need to configure?

Network address translation (NAT)

14
New cards

Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?

MPLS

15
New cards

Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network?

Layer 6 (Presentation)

16
New cards

A network administrator is troubleshooting the communication between two Layer 2 switches that are reporting a very high runt count. After trying multiple ports on both switches, the issue persists. Which of the following should the network administrator perform to resolve the issue?

Increase the MTU (Maximum Transmission Unit) size on both switches.

17
New cards

A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information? (Hint: a type of DNS record that maps a domain name to an IPv6 address)

AAAA (quad-A)

18
New cards

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use? (Hint: /20 = 240)

255.255.240.0 

19
New cards

Which of the following ports is commonly used by VoIP phones?

5060

20
New cards

An organization purchased an allocation of public IPv4 addresses. Instead of receiving the network address and subnet mask, the purchase paperwork indicates the allocation is a /28. This type of notation is referred to as:

CIDR (Classless Inter-Domain Routing)

21
New cards

A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?

ARP Table

22
New cards

A network administrator is configuring Neighbor Discovery Protocol in an IPv6 network to ensure an attacker cannot spoof link-layer addresses of network devices. Which of the following should the administrator implement?

Router Advertisement Guard

23
New cards

At which of the following OSI model layers does a MAC filter list for a wireless infrastructure operate?

Data Link (Layer 2)

24
New cards

Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?

ipconfig /all

25
New cards

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?

Reduce the lease time.

26
New cards

A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks. Which of the following would be BEST for the administrator to purchase?

A Layer 3 Switch

27
New cards

A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?

The network gateway is configured to send router advertisements.

28
New cards

A technician is connecting DSL for a new customer. After installing and connecting the on-premises equipment, the technician verifies DSL synchronization. When connecting to a workstation, however, the link LEDs on the workstation and modem do not light up. Which of the following should the technician perform during troubleshooting?

Replace the cable connecting the modem and the workstation. 

29
New cards

Domain Name Servers provide the resolution of application layer addresses to their corresponding network layer address. (True or False)

True

30
New cards

The standard port number for Telnet is 53.

False

31
New cards

A network architect is developing documentation for an upcoming IPv4/IPv6 dual-stack implementation. The architect wants to shorten the following IPv6 address: ef82:0000:0000:0000:0000:1ab1:1234:1bc2. Which of the following is the MOST appropriate shortened version?

ef82::1ab1:1234:1bc2

32
New cards

A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause?

CPU Usage

33
New cards

A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an APIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing?

DHCP exhaustion

34
New cards

TCP/IP is a data link protocol that is used on the Internet. (True or False)

False

35
New cards

Which of the following ports are associated with IMAP?

993 and 143

36
New cards

A network administrator is reviewing the network device logs on a syslog server. The messages are normal, but the time stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?

Change the NTP settings on the network device.

37
New cards

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the MOST likely reason the users cannot connect to the network?

An incorrect pinout on the patch cable is being used. 

38
New cards

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

Neighbor Discovery Protocol 

39
New cards

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?

23

40
New cards

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

MDIX

41
New cards

Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?

Fiber

42
New cards

Which of the following layers is where TCP/IP port numbers identify which network application is receiving the packet and where it is applied?

Layer 4 (Transport)

43
New cards

Which of the following TCP ports is used by the Windows OS for file sharing?

445 (SMB)

44
New cards

An infrastructure company is implementing a cabling solution to connect sites on multiple continents. Which of the following cable types should the company use for this project?

Single-mode

45
New cards

Which of the following systems would MOST likely be found in a screened subnet?

FTP

46
New cards

A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue?

Jitter, and QoS Misconfiguration

47
New cards

A client moving into a new office wants the IP network set up to accommodate 412 network-connected devices that are all on the same subnet.

The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result?

255.255.254.0