• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/115

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

115 Cards in this Set

  • Front
  • Back
"In the modern LAN, what topology is often used with LAN switches and Ethernet connections?"
Star
What topology could result in a lack of all communication capabilities with a single connection break?
Ring
What device would forward information using the following address as its primary information: 192.168.1.101?
Router
"What type of network has a dedicated file server, which provides shared access to files?"
Client-Server
What device would forward traffic based on an address such as 00:0a:95:9d:68:16?
Switch
What WAN topology permits the highest degree of failover and redundancy?
Full mesh
"What is the common TCP port (that is, ""well-known"" port) used by HTTPS?"
443
Which layer of the OSI Model is concerned with logical addressing?
Network
What is the name of Layer 6 in the OSI Model?
Presentation
An Ethernet hub resides at which layer of the OSI Model?
Layer 1
"What is the common TCP port (that is, ""well-known"" port) used by Telnet?"
23
Which two of the following protocols are used to retrieve e-mail from an e-mail server?
"IMAP4, POP3"
"What are the common TCP ports (that is, ""well-known"" ports) used by FTP?"
"20, 21"
What protocol is used to synchronize a network device's clock with a time server?
NTP
A DHCP server uses a pool of addresses (which typically corresponds to a single subnet) to assign IP address to DHCP clients on a specific network segment. What is a common name for this pool of addresses?
scope
Which of the following DNS record types is used for an e-mail server?
MX
"A building might have multiple patch panels (for example, on different floors of a building). These common locations, where cables from nearby office home back to, are often called what?"
intermediate distribution frames
"What virtual network service stores user data and the GUI in a data center, as opposed to the hard drive in a user's computer?"
virtual desktop
Which of the following technologies is used by an application service provider (ASP) to give subscribers access to application software?
SaaS
Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network?
RG-6
Why might a network using DHCP for IP address assignment need a DHCP relay agent?
A router reside between a DHCP client and a DHCP Server
"Which of the following is a primary benefit of a proxy server, assuming the proxy server is only performing proxy services?"
It hides inside addresses from the public internet.
What is the primary difference between the TIA/EIA-568-A and TIA/EIA-568-B wiring standards?
the color coding
Which type of fiber optic connector is often referred to as a bayonet connector?
ST
Which of the following network appliances is used to restrict clients from accessing certain URLs on the Internet?
proxy server
Which of the following copper connector types is commonly used to connect the serial port on a computer to an external modem?
DB-9
Which of the following DNS record types is an IPv6 address record?
AAAA
"Which of the following is a voice over IP (VoIP) signaling protocol used to setup, maintain, and tear down VoIP phone calls?"
SIP
"Which type of unshielded twisted pair (UTP) cable uses 24 gauge wiring and is commonly used in Ethernet 100BASE-TX networks, which carry data at a rate of 100 Mbps, although it is capable of carrying traffic at a rate of 155 Mbps on older implementations of ATM networks? (NOTE: This type of UTP should not be used for networks running at speeds of 1 Gbps or higher.)"
Category 5
What is a DHCP reservation?
A DHCP reservation is a static mapping of an IP address to a specific MAC address.
What technology is used on a modern Ethernet network to permit multiple systems to access and transmit and receive data on the infrastructure?
CSMA/CD
Which of the following statements are true of an Ethernet hub?
1) CSMA/CD needs to run on all attached devices. 2) All connections need to be half-duplex.
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 Watts of power to an attached device?
802.3af
Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches?
VTP
What is the distance limitation of 10GBASE-LW?
10 km
What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port?
port mirroring
"Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10BASE2 Ethernet?"
coax/10 Mbps/185 m
What service is typically used to resolve a FQDN?
DNS
What class of address is used for multicast in IP?
Class D
"If you need to create at least 30 subnets, how many bits must you use for subnetting?"
5
"Given a subnet mask of /19, what is the corresponding dotted decimal notation?"
255.255.224.0
"Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?"
DHCP
Which of the following are examples of interior gateway protocols?
"OSPF, RIP, IS-IS"
What loop-prevention mechanism will prevent a route from being advertised out an interface from which it was learned?
Split Horizon
OSPF uses cost as a metric value. What is this cost value based on?
Bandwidth
What is the administrative distance of RIP in a Cisco network?
120
What is the IP address used in a default static route?
0.0.0.0
Which of the following are ways routes can be injected into a router's IP routing table?
1) A route is directly connected. 2) A route is staically configured. 3) A route is redistrbuted from one routing source into a dynamic routing protocol. 4) A route is dynamically learned.
What metric is used by the OSPF routing protocol?
cost
Which type of DSL usually offers the highest bandwidth?
VDSL
What option is perfect for remote locations that do not have many WAN connectivity possibilities?
Satellite
ATM can be considered in which of the following WAN categories?
Packet switched
Where is PPPoE typically used in a DSL environment?
Between the home and a service provider
What is the bandwidth of an OC-3?
155.52 Mbps
Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber (unless the subscriber has purchased inside wiring maintenance)?
demarc
What is the name of the device that terminates a dedicated leased line circuit?
CSU/DSU
"In a wireless LAN (WLAN) operating in the 2.4 GHz band, access points (APs) with adjacent coverage areas should have how many channels of separation to avoid interfering with one another?"
5
Which two of the following are common wireless security standards?
1) WEP 2) WPA
What is the maximum range of the IEEE 802.11b wireless standard?
32 m indoors / 140 m outdoors
"Which of the following approaches to wireless LAN (WLAN) security requires users to authenticate against an authentication server's database, rather than a client being configured with a PSK?"
WPA Enterprise
"Which of the following wireless LAN (WLAN) security threats involves a user writing a symbol in a public place, letting other users know about the existence of a WLAN, and possibly information about how to access that WLAN?"
warchalking
What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)?
to better conceal the SSID of a WLAN
Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards support DSSS?
1) 802.11b 2) 802.11g
The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters?
5 GHz / 54 Mbps
Which of the following approaches to wireless LAN (WLAN) security restricts access to a WLAN based on a computer's wireless interface card?
MAC address filtering
What is the maximum bandwidth of an 802.11a wireless LAN (WLAN)?
54 Mbps
Which wireless LAN (WLAN) standards can operate in the 2.4 GHz frequency band?
802.11 b/g/n
"Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and delays packets, rather than drops packets, attempting to exceed that bandwidth limit."
traffic shaping
What technology permits the bundling of links together to increase bandwidth and redundancy?
LACP
What is an acceptable one-way latency in a typical VoIP network?
150 ms
"If a network has ""five nines"" of availability, what is its maximum downtime per year?"
approximately five minutes
Which of the following is an open standard variant of HSRP?
CARP
Random Early Detection (RED) is an example of which of the following (QoS) functions?
congestion avoidance
What term defines a delay of packets in the network?
Latency
What command would you use to verify the DNS server to be used by your Windows workstation?
ipconfig /all
Which of the following is a Microsoft Windows® command that can be used release and renew a DHCP lease on a PC?
ipconfig
What command enables you to view the ARP cache entries on a Windows workstation?
arp -a
"Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and lacks an interactivity mode (that is, the entire command and all of the appropriate parameters are entered with a single command)?"
dig
What is the most likely command you would be using to verify your DNS configuration is functioning properly?
nslookup
Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address?
ping
What command enables you to view the NetBIOS name cache on your Windows workstation?
nbtstat
"Which of the following pieces of equipment can be used to check the wires in a cable for continuity (that is, check to make sure there are no opens, or breaks, in a conductor)?"
cable tester
Which of the following is a Microsoft Windows® log that would report events such as a failed login attempt?
security
A network administrator can use which of the following to locate a break in a copper cable?
TDR
"Which of the following pieces of test equipment is sometimes called a ""fox and hound?"""
toner probe
Identify the three broad categories of SNMP message types.
1) get 2) set 3) trap
"Which Syslog severity level produces highly detailed information, often used for troubleshooting?"
7
Which of the following tools best helps you determine which wires on a punch down block connect back to a specific user's office?
toner probe
Identify the Simple Network Management Protocol (SNMP) component that is also known as an NMS.
SNMP manager
Which of the following is a publicly available network security scanner?
Nmap
"Firewalls can be categorized based on their platform or based on the way they inspect traffic. Which two of the following are two categories of firewalls, based on a firewall's platform?"
1) hardware 2) software
A dedicated network device that acts as an intrusion prevention system (IPS) sensor is called a ________.
NIPS
"While an IPsec tunnel is being established, which of the following securely establishes a shared secret key, over the unsecured medium?"
Diffie-Helman (DH)
Which of the following requires two or more types of authentication from a user seeking admission to a network?
multifactor authentication
"Which of the following remote access security technologies is a UDP-based protocol used to communicate with an AAA server and does not encrypt an entire authentication packet, but only encrypts the password?"
RADIUS
Which of the following user authentication technologies is used by Microsoft Windows® clients to remotely access a Microsoft Windows® network?
RAS
"Which of the following security threats is a piece of code (for example, a program or a script) that infects a system, because an end-user executed a program?"
virus
"Which of the following security attacks uses Internet Control Message Protocol (ICMP) traffic, directed to a subnet, to flood a target system with Ping replies?"
Smurf attack
Which of the following remote access technologies is a Microsoft protocol that allows a user to view and control the desktop of a remote Microsoft Windows® computer?
RDP
Which three of the following are features of IPsec?
1) integrity 2) confidentiality 3) authentication
Which two of the following virtual private network (VPN) protocols lack native security features?
1) l2tp 2) pptp
Which of the following security attacks occurs when an attacker causes traffic flowing between two devices on a network to flow through the attacker's device?
man-in-the-middle attack
What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?
stateful
"Which of the following IDS/IPS detection methods could trigger an alarm if a certain string of bytes, in a certain context, is observed?"
signature-based detection
Which of the following is mostly likely to cause EMI?
cable placement
Which of the following conditions would most likely result in corrupted data?
exceeding the distance limitation of a cable
"If a packet cannot be forwarded by a router interface due to the packet's size exceeding the interface's maximum transmission unit (MTU), the router attempts to fragment the packet, unless the packet's header has the don't fragment (DF) bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is that router called?"
black hole router
"If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?"
RFI
Which of the following features allows an Ethernet switch port to automatically detect which of its pins should be used for transmitting and which pins should be used for receiving?
MDIX
"You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?"
incorrect (or missing) routes in a router's routing table
"Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)"
All devices have valid ip addresses
What term is used to describe a loss of signal power?
dB loss
"When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid?"
Hypothesize another probable cause of the issue.
A wireless client running IEEE 802.1a is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?"
802.11 standards
"The process of troubleshooting can be simplified into three basic phases: (1) Problem report, (2) Problem diagnosis, and (3) Problem resolution. The majority of a troubleshooter's efforts are spent in which of these three phases?"
Problem diagnosis