Network Design State test 2023

Here are the questions numbered and formatted, along with the answers:

1. Which of the following authentication protocols supports the use of smart cards?

- SPAP

- MS-CHAP

- MS-CHAP2

- EAP

Answer: EAP

2. The network cable end most often confused with a telephone plug is known as:

- RJ17

- RJ35

- R11

- RJ45

Answer: RJ45

3. __ is a type of computer security vulnerability typically found in web applications.

- A virus

- Spam

- A worm

- Cross-site scripting

Answer: Cross-site scripting

4. Which one of the following terms describes a single packet sent from a source to a destination on a network?

- polli

- multicast

- broadcast

- unicast

Answer: unicast

5. You are creating a network design for Ample Flowers. Currently they are outsourcing much of the IT technical support and management responsibilities for the company.

- this may impact your network design so you should include the outsourcing company in your report

- this will impact your network design so you should meet with the outsourcing company to determine the impact on the network and ensure that their company can support your design

- this should not impact your network design and can be disregarded

- this will impact your network design so you should try to convince Ample Flowers to discontinue outsourcing and take care of their IT issues themselves

Answer: this will impact your network design so you should meet with the outsourcing company to determine the impact on the network and ensure that their company can support your design

6. Which client/server file-sharing protocol establishes long-term connections to a server which allows the client to access resources on a server as if the resource is local?

- TFTP

- QOS

- SMB

- FTP

Answer: SMB

7. Which of the following eliminates switching loops?

- hold-down timers

- spanning tree protocol

- split horizon

- poison reverse

Answer: spanning tree protocol

8. __ is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks.

- SOAP

- Flash

- Java

- JavaScript

Answer: SOAP

9. Network __ is an important area of network measurement, which deals with monitoring the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network/Internet.

- Topography

- Tomography

- Security

- Reliability

Answer: Reliability

10. If you have more than ten workstations on a network, you should be using a __ network model.

- workgroup

- peer-to-peer

- domain

- paternal

Answer: domain

11. What is the name given to the reflective material surrounding the glass or plastic core of a fiber optic cable?

- cladding

- sheath

- buffer

- kevlar

Answer: cladding

12. Given the IP address and subnet mask of 192.168.134.56 and 255.255.255.224, on which subnet does this address reside?

- 192.168.134.48

- 192.168.134.32

- 192.168.0.0

- 192.168.134.0

Answer: 192.168.134.32

13. Which statement is true regarding OSPF DR and BDR elections?

- The router with the highest MAC address is elected as the DR when the default priority values are used.

- The router with the highest OSPF priority setting wins the election for DR.

- The default priority value for a router connected to a multi-access network is 0.

- A new DR/BDR election occurs each time a new OSPF neighbor is added.

Answer: The router with the highest OSPF priority setting wins the election for DR.

14. In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a:

- subnet

- DNS

- VPN

- VLAN

Answer: VLAN

15. Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems?

- FTP

- SMTP

- IMAP

Answer: SMTP

16. To display the current state of the routing table, use the command in EXEC mode on a Cisco router.

- show table

- show BGP route

- route

- show ip route

Answer: show ip route

17. HTTP communication traffic is on what TCP port?

- 23

- 443

- 21

- 80

Answer: 80

18. The typical software agreement is referred to as the:

- EULA

- LUEA

- SULA

- PULA

Answer: EULA

19. Where is a hub specified in the OSI model?

- Data link layer

- Application layer

- Physical layer

- Session layer

Answer: Physical layer

20. You cannot make a connection on a serial link that uses PPP protocol and suspect authentication is the problem. Which one of the following is a process that allows you to monitor the establishment of the connection?

- sniffing

- polling

- debugging

- listening

Answer: debugging

21. An unplugged network cable is an example of a problem at the __ layer of the OSI model.

- data link

- network

- session

- physical

Answer: physical

22. To keep your hardware running effectively, manufactures will release upgrade and patches from time to time.

- firmware

- software

- IP Address configuration

- system

Answer: firmware

23. Which of the following is a Linux or UNIX specific command-line tool?

- pconfig

- dig

- ping

- traceroute

Answer: traceroute

24. When designing a firewall, what is the recommended approach for opening and closing ports?

- Close all ports; open only ports required by applications inside the DMZ.

- Open all ports; close ports that expose common network attacks.

- Open all ports; close ports that show improper traffic or attacks in progress.

- Close all ports.

Answer: Close all ports; open only ports required by applications inside the DMZ.

25. The maximum recommended length for a single run of Cat 5 cable is approximately __ feet.

- 20

- 30

- 300

- 200

Answer: 300

26. A small network is showing an increase in network traffic. Due to budget limitations, the administrator seeks an inexpensive way to reduce traffic and increase network performance. Which of the following would be an inexpensive way to reduce network traffic for the short term?

- decrease the length of DHCP leases

- install a router to subnet the network, isolating heavy users from the rest of the network

- increase the number of IP addresses available in the scope

- increase the length of DHCP leases

Answer: install a router to subnet the network, isolating heavy users from the rest of the network

27. Which one of the following technologies reduces latency caused by traditional routing techniques and is useful on networks offering voice and video services that require fast packet delivery by modifying data streams at the network layer with a label that contains information which tells the router where to forward the packet?

- MSG

- MPLS

- FECN

- TILS

Answer: MPLS

28. Which feature could be used in a network design to increase the bandwidth by combining multiple physical links into a single logical link?

- VLANs

- Ether Channel

- subinterfaces

- trunk ports

Answer: Ether Channel

29. You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to your workstation, not other devices. Which feature should you configure?

- mirroring

- promiscuous mode

- spanning tree

- bonding

Answer: promiscuous mode

30. __ is a tool to measure bandwidth and response times between two hosts using Internet Control Message Protocol (ICMP) echo request/echo reply mechanism.

- Ipconfig

- Ifconfig

- BwPing

- Ip

Answer: BwPing

31. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?

- A network needs to be available 99.999 percent of the time.

- A downtime of .

00001 percent is unacceptable.

- Five percent of all network expense covers 99 percent of user requirements.

Answer: A network needs to be available 99.999 percent of the time.

32. __ is a Web server application and set of feature extension modules created by Microsoft for use with Microsoft Windows.

- Sendmail

- Apache

- Exchange

- IIS

Answer: IIS

33. Which of the following is not a task normally performed by a Computer Incident Response Team (CIRT)?

- Mitigate risk to the enterprise.

- Coordinate the distribution of information pertaining to the incident to the appropriate parties.

- Develop an information security policy.

- Assemble teams to investigate the potential vulnerabilities.

Answer: Develop an information security policy.

34. Which subnet mask will divide a class C network into two equal subnets?

- 255.255.255.255

- 255.255.255.128

- 255.255.0.0

- 255.255.255.0

Answer: 255.255.255.128

35. What TCP/IP protocol governs the outbound and gross in-bound delivery of e-mail messages?

- SMTP

- TCP

- TFTP

- POP3

Answer: SMTP

36. __ is a Unix based web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a website.

- BIND

- cPanel

- MySQL

- Perl

Answer: cPanel

37. An older wireless encryption strategy that is susceptible to brute force attacks is called:

- EPA1

- WEP

- SHA1

- WPA2

Answer: WEP

38. After testing procedures have been completed, an initial of the plan is performed by conducting a structured walk-through test.

- recording

- planning

- dry-run

- coding

Answer: dry-run

39. You are trying to help a co-worker order a UPS for each PC in her remote office location. What rating is used to specify the size of a UPS?

- watts

- VA

- volts

- volt/ohm

Answer: VA

40. Stripe sets with parity are which RAID level?

- RAID 10

- RAID 5

- RAID 0

- RAID 1

Answer: RAID 5

41. The software utility __ is a time-based job scheduler in Unix-like computer operating systems.

- Anachron

- Crontab

- Chron

- Cron

Answer: Cron

42. In business continuity planning, what is the primary focus of the scope?

- Company assets

- Recovery time objective

- Business processes

- Human life and safety

Answer: Business processes

43. Which of the following statements pertaining to PPTP (Point-to-Point Tunneling Protocol) is incorrect?

- PPTP does not provide strong encryption.

- PPTP is able to only handle IP networks.

- PPTP is derived from L2TP.

- PPTP does not support any token-based authentication method for users.

Answer: PPTP is derived from L2TP.

44. During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?

- WPA2, SSID hidden, and 802.11a

- WEP, SSID hidden, and 802.11g

- WPA2, SSID visible, and 802.11n

- WEP, SSID visible, and 802.11b

Answer: WPA2, SSID visible, and 802.11n

45. A(n) __ system is a system which enables an authority to control access to areas and resources in a given facility.

- completely secure

- confidential

- integrity

- access control

Answer: access control

46. Where does Linux get its name?

- Franklin Huxby

- John Linux

- Bill Gates

- Linus Torvalds

Answer: Linus Torvalds

47. __ term

- MAC

- SUPERPAC

- PAC

- DAC

Answer: MAC

48. What type of firewall applies security mechanisms to specific applications such as FTP and Telnet servers and is effective but can degrade performance?

- Circuit-level gateway

- Proxy server

- Application gateway

- Packet security

Answer: Application gateway

49. Why would you use a loopback address when you are using the OSPF routing protocol?

- to activate the OSPF neighboring process

- to streamline and speed up the convergence process

- to provide a backdoor for connectivity during the convergence process

- to ensure a consistent router ID for the OSPF process

Answer: to ensure a consistent router ID for the OSPF process

50. Once you activate a DHCP server you must configure the client information and settings called the:

- NetAddr

- scope

- zone

- host

Answer: scope

Sure, let's continue with more questions:

51. Which of the following is not a characteristic of a peer-to-peer network?

- Centralized authentication

- Decentralized administration

- Shared resources

- Easy to set up

Answer: Centralized authentication

52. __ is a set of rules governing the way that data is transmitted over the Internet.

- FTP

- TCP/IP

- IPX/SPX

- HTTP

Answer: TCP/IP

53. What does RAID stand for?

- Redundant Array of Independent Disks

- Remote Access Internet Delivery

- Random Access Interconnected Devices

- Read and Implement Disk

Answer: Redundant Array of Independent Disks

54. A protocol used for secure data communication, especially over an insecure network like the Internet, is called:

- SSL

- FTP

- SMTP

- ICMP

Answer: SSL

55. Which type of cable is used to connect similar devices in a network, such as a computer to a switch or a switch to a router?

- Crossover cable

- Straight-through cable

- Coaxial cable

- Fiber-optic cable

Answer: Crossover cable

56. Which of the following is not a valid IP address?

- 192.168.1.256

- 10.0.0.1

- 172.16.0.1

- 192.168.0.1

Answer: 192.168.1.256

57. What does NAT stand for in networking?

- Network Action Translation

- Network Address Translation

- National Automated Tasking

- Network Authentication Token

Answer: Network Address Translation

58. Which network device is used to segment a network into smaller collision domains but is also a form of security that prevents packets from crossing between segments?

- Router

- Bridge

- Hub

- Gateway

Answer: Bridge

59. A technology used to establish a secure connection between a remote user and an internal network is called:

- VLAN

- VPN

- VOIP

- VNC

Answer: VPN

60. Which of the following protocols is used to retrieve email from a remote server to a local client?

- SMTP

- POP3

- HTTP

- FTP

Answer: POP3

61. Which of the following is not a type of firewall?

- Packet filtering firewall

- Circuit-level gateway

- Application-level gateway

- Secure gateway

Answer: Secure gateway

62. Which of the following is true about a DMZ (Demilitarized Zone) in network security?

- It is used to isolate a network segment from the rest of the network.

- It contains only external-facing servers and services.

- It provides the highest level of security within a network.

- It is typically located within a private network.

Answer: It contains only external-facing servers and services.

63. A client wants to securely connect to a remote network using a tunneling protocol. Which protocol should be used?

- FTP

- Telnet

- SSH

- VPN

Answer: VPN

64. Which of the following is not a valid topology in networking?

- Ring

- Star

- Linear

- Diamond

Answer: Diamond

65. Which OSI layer is responsible for logical addressing?

- Physical layer

- Data link layer

- Network layer

- Transport layer

Answer: Network layer

66. Which of the following is a wireless encryption protocol that provides strong security?

- WEP

- WPA

- SSL

- FTP

Answer: WPA

67. Which device connects multiple network segments and makes forwarding decisions based on MAC addresses?

- Switch

- Router

- Hub

- Bridge

Answer: Switch

68. Which of the following is not a feature of IPv6?

- Larger address space

- Improved security

- Backward compatibility with IPv4

- Automatic configuration

Answer: Backward compatibility with IPv4

69. Which of the following IP address ranges is reserved for private networks?

- 10.0.0.0 - 10.255.255.255

- 172.16.0.0 - 172.31.255.255

- 192.168.0.0 - 192.168.255.255

- All of the above

Answer: All of the above

70. Which of the following commands is used to test connectivity between two devices in a network?

- ping

- traceroute

- ipconfig

- nslookup

Answer: ping