1/98
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have?
Client Server
You have a small network that uses a switch to connect to multiple devices. Which physical topology are you using?
Star
Which OSI model layer is responsible for guaranteeing reliable message delivery?
Transport
Which of the following protocols stores email on the mail server and allows users to access messages from various client device without having to download the emails?
IMAP4
Which of the following connectors is used with Ethernet 100BaseT networks?
RJ45
You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?
F-Type
Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?
Single-Mode
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
Crimping tool
You want to measure the voltage, amps, and ohms, of various device. Which tool should you use?
Multimeter
Which device sends signals from a computer onto a network?
Transceiver
At which OSI layer does a router operate to forward network messages?
Network
Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning.
Data Link
At which layer of the OSI model do hubs operate
Physical
Which of the following hardware devices links multiple networks and directs traffic between networks?
Router
The media access control method of all Ethernet networks is
CSMA/CD
Ethernet 100BaseFx networks use what type of cabling
Fiber Optic
You need to connect two switches using their uplink ports. The switches do not support auto-MDI. What type of cable should you use?
Crossover
Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic. Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and allow future growth.
Switch
Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network
166.70.255.254
Which of the following IP ranges is reserved for automatic private IP addressing
169.254.255.254
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?
DHCP server
You have a Windows Server 2016 system that you want to use as a DHCP relay agent. Which Windows Server 2016 service would you use to do this?
Routing and Remote Access
You want to implement a protocol on your network that allows computer to find the IP address of a host from a logical name. Which protocol should you implement?
DNS
You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment is being used?
Stateless autoconfiguration
Which type of IP address is 232.111.255.250
Multicast
You work in an office that uses Linux servers and Windows servers. The network uses the TCP/IP protocol. You are sitting at a workstation that uses Windows 10. An application you are using is unable to contact a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?
ping
Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the Server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?
nslookup
What does the ip address dhcp command allow you to do to?
Configure the switch to obtain an IP address from a DHCP server
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF. What will the switch do with the frame?
Send it out to all ports except the port it was received on.
You can create a virtual LAN using which of the following?
Switch
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches.
Trunking
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?
Spanning Tree
You manage a network with a single switch, On each switch port, a hub connects multiple devices to the switch. Which conditions are you most likely to experience on the network?
Collisions
When multiple routes to a destination exist, what is used to select the best possible route?
Metric
Which of the following routing protocols uses relative link cost as the metric?
OSPF
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
Port forwarding
Which of the following utilities would you use to view the routing table?
route
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Circuit-level
An all-in-one security appliance is best suited for which type of implementation?
A remote office with no on-site technician
Which firewall implementation creates a buffer network that can be used to host email or web servers?
DMZ
You want to maintain tight security on your internal network, so you restrict the access to the network through certain port numbers. If you wan to allow users to continue using DNS, which port should you enable?
53
In a SAN implementation, the servers that connect to shared storage devices are called
initiators
Which VoIP device helps establish the connection between two VoIP phones?
VoIP server
Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call?
SIP
Which type of virtualization completely simulates a real physical host.
Full virtualization
Which component is most likely to allow physical and virtual machines to communicate with each other?
Virtual switch
What key advantage does a virtual router have over a physical router?
Multiple networks can be connected to a single interface.
Which of the following cloud computing solutions will deliver software applications to client over the internet over the internet or on a local are network?
SaaS
An access point that conforms to the IEEE 802.11b standard behaves similarly to what other networking devices?
Hub
Which wireless networking component is used to connect multiple APs together?
DS
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
CSMA/CA
What is the frequency of 802.11a networking?
5.75GHz
How many total channels are available for 802.11a wireless networks
23
How many total channels are available for 802.11g networks
11
Which IEEE standard describes wireless communication
802.11b
Which data transmission rate is defined by the IEEE 802.11b wireless standard
11 Mbps
You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use?
Network bridge
Which protocol is well known for its use in the home security and home automation industry, uses a mesh technology, makes devices act as repeaters, and has a low data transfer rate?
Z-Wave
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
802.11n
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On a RADIUS server
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
What is the speed of an OC-3 connection?
155 Mbps
To access the internet through the PSTN, what kind of connectivity device must you use?
Modem
Your client has acquired several small companies and would like to connect them together into one network. Not all of the router are Cisco devices, and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?
PPP
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal
PSTN
Which type of internet servicer uses the DOCSIS specification
Cable internet service providers
You are configuring your computer to dial up to the internet. What protocol should you use
PPP
Which type of device is required to implement port authentication through a switch
RADIUS server
You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic
Baseline
Which type of documentation would you consult to find the location of Rj45 wall jacks and their endpoints in the intermediate distribution closet
Wiring schematic
You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?
Regulation
When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?
Network diagram
You want to make sure that the correct ports on a firewall are open or closed which document should you check?
Configuration documentation
What is the greatest threat to theft of data in most organizations?
USB devices
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
Negiligence
Purchasing insurance is what type of response to risk?
Transference
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?
Residual Risk
In business continuity planning, what is the primary focus of the scope.
Business process
When analyzing assets, which analysis method assigns financial values to assets?
Quantitative
You plane to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
You want to use CCTV to increase the physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
PTZ
What is the primary countermeasure to social engineering?
Awareness
A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?
Whaling
An attacker sets up 100 drones that flood a DNS server with invalid requests. This is an example of what type of attack?
DDoS
When you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is. Later, you find out that the window has installed spyware on your system. What type of attack has occurred?
Drive-by download
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
EAP
Which protocol does HTTPS use to offer greater security in web transactions?
SSL
A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?
VPN concentrator
Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer?
ARP poisoning
As the victim of a Smurf attack, what protection measure is the most effective during the attack?
Communicating with your upstream provider
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
IDS
What is the primary purpose of penetration testing?
Test the effectiveness of your security perimeter
Which type of security uses MAC addresses to identify devices that are allowed or denied a connection to a switch?
Port security
In addition to performing regular backups, what must you do protect your system from data loss?
Regularly test restoration procedures
You are considering using WIFI triangulation to track the location of wireless devices within your organization. However, you have read on the internet that this type of tracking can produce inaccurate results.
What is the most important consideration for getting reliable results when implementing this type of system?
Signal strength
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the network.
Which tool should you use?
Packet sniffer
Which protocol uses traps to send notifications from network devices?
SNMP
Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?
Multilayer switch