• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/83

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

83 Cards in this Set

  • Front
  • Back
What device operates at Layer 3 of the OSI model?
Router
What topology is seen in WAN networks and was designed to increase the redundancy of the communications?
Dual ring
Which of the following devices creates a separate broadcast domain for each of its active interfaces by default?
Router
What topology aims to balance redundancy with easier management and cost-effectiveness?
Partial mesh
A router resides at which layer of the OSI Model?
Layer 3
Which of the following protocols is used to send e-mail to an e-mail server?
SMTP
Which two of the following protocols are used to connect to a remote host via a terminal emulator?

SSH


Telnet

What are the two primary protocols found at the Transport Layer of the TCP/IP Stack?

TCP


UDP

Which of the following specifies a type of fiber optic cable that has a core whose diameter is large enough to transport light arriving at a variety of angles (that is, more than one mode of propagation)?
MMF
Which of the following is a technology that allows a service provider to offer networking services to customers?
NaaS
Cables in wiring closets commonly terminate on what?
Patch panel
Which of the following network appliances is also known as a content switch?
Load balancer
Which of the following connects to multiple intermediate distribution frames?
MDF
Which of the following DNS record types is used to map a hostname to an IPv4 address?
A
What virtual network component allows virtual servers located on the same physical server to be logically separated into different VLANs?
Virtual switch
Which of the following are valid DHCP message types used during a DHCP reservation?

DHCPDISCOVER


DHCPREQUEST


DHCPACK

What is a DHCP lease?
A DHCP lease is a temporary assignment of IP address information to a DHCP client
Most DHCP client devices on a network are dynamically assigned an IP address from a DHCP server (that is, dynamic addressing). However, some devices (for example, servers) might need to be assigned a specific IP address. What DHCP feature allows a static IP address to MAC address mapping?
Reservation
Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often made of relatively thick conductors (for example, 22 gauge or 23 gauge wire) and thick insulation?
Category 6
Which of the following copper connector types is an eight-pin connector found in most Ethernet networks?
RJ-45
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE-T Ethernet?
Cat 3 (or higher) UTP/10 Mbps/100 m
Which Ethernet switch feature allows an Ethernet switch to make a copy of frames seen on one switch port and send those copies out of another Ethernet switch port? (NOTE: This feature is often used to allow a network analyzer connected to one switch port to see traffic present on a different switch port.)
Port mirroring
What media type is used by 1000BASE-ZX?
SMF
Which of the following standards specifies a method for sending traffic for multiple VLANs across a single link?
IEEE 802.1Q
You have a class B subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.Network range: 172.16.0.0/23Marketing: 20 devicesProduction: 18 devicesTraining: 33 devicesDesigning: 89 devicesSelect the minimum number of addresses using the CIDR notation required for each network

Designing /25


Training /26


Marketing, Production /27


A /23 subnet includes 512 IP addresses. Thus, 512-256=256. So, the contiguous block of remaining addresses will be /24

Which of the following address ranges is not routable?
169.254.0.0 – 169.254.255.255
A Microsoft Windows® PC is configured to obtain its IP address via DHCP. If the PC is unable to contact a DHCP server, the PC automatically assigns itself an IP address in what range?
169.254.0.0 – 169.254.255.255
An IP version 6 (IPv6) address contains how many bits?
128
Your company has been assigned the 172.16.0.0/16 network for use at one of its sites. You need to use a subnet mask that will accommodate 42 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use?
/22
What loop-prevention mechanism is an override of another loop-prevention mechanism?
Poison reverse
What variation of network address translation (NAT) automatically assigns an inside global address from a pool of available addresses?
DNAT
In cable modem technologies, the frequencies dedicated to data transmission are specified by what?
DOCSIS
What does the term asymmetric mean in DSL?
The upload speed and the download speed differ
What specification identifies the cable television frequencies dedicated to data transmission?
DOCSIS
What device terminates the DSL signal coming from a customer?
DSLAM
What technology operates in the 3 kHz through 300 GHz range?
Radio
A technician needs to install a wireless network in Joe's Coffee shop. Joe wants to provide free Internet service to his customers. Which of the following will help him?
Install an omnidirectional antenna
Mark is managing a small organization with 20 employees. He has enabled WEP, disabled SSID broadcast, and selected the channel mode as auto. He wants to secure WAP from being accessed by any unauthorized users. Which of the following steps will Mark take?

Configure WPA2 encryption


Configure MAC filtering

What is the maximum range of the IEEE 802.11g wireless standard?
32 m indoors / 140 m outdoors
Orthogonal Frequency Division Multiplexing (OFDM) is a wireless LAN (WLAN) transmission method. Which three of the following WLAN standards support OFDM?

802.11a


802.11g


802.11n

What is the maximum bandwidth of an 802.11b wireless LAN (WLAN)?
11 Mbps
Which of the following approaches to wireless LAN (WLAN) security uses TKIP for encryption?
WPA
A wireless LAN (WLAN) configured to work in an ad hoc fashion (that is, without requiring the use of an access point) is known as what type of WLAN?
IBSS
What wireless technology allows the IEEE 802.11n standard to achieve higher throughput than other standards (that is, IEEE 802.11 a/b/g) by using multiple antennas for transmission and reception?
MIMO
Which wireless LAN (WLAN) standards can operate in the 5 GHz frequency band?

802.11a


802.11n

Which of the following (QoS) functions places traffic into different categories?
Classification
Which of the following technologies is not typically considered for an increase in redundancy?
PAT
Which of the following mechanisms is considered a link-efficiency tool in QoS?
LFI
What term refers to the weakening of a signal as it travels in the network?
Attenuation
What is an acceptable one-way latency in a typical VoIP network?
150 ms
A technician wants to get the protocol statistics and the active TCP/IP network connections of his computer. Which of the following will he use?
netstat
You want to add the IP address 200.200.10.10 and its corresponding MAC address 08-00-8b-20-9a-ff to an ARP table for IP-to-physical address translation. Which commands will you use to accomplish this?
arp -s 200.200.10.10 08-00-8b-20-9a-ff
Which of the following is a Microsoft Windows® command that can display a listing of NetBIOS device names learned by a PC?
nbtstat
What command enables you to refresh DHCP lease information?
ipconfig
Which of the following UNIX commands can be used to configure the IP address of a UNIX host's Ethernet interface?
ifconfig
Which tool enables you to test basic connectivity to a remote system?
ping
What tool will you use to trace cables in multiple-pair wiring?
Toner probe
Which of the following can be used to measure the amount of current (in Amps) flowing through a circuit?
Multimeter
Which of the following tools should be used to connect wires to a 110 block?
Punch down tool
Which if the following configuration management (CM) elements involves collecting network statistics during normal network operation?
Baselining
Which of the following is a Microsoft Windows® log that would report events related to software applications running on the underlying operating system?
Application
Which of the following protocols can be used to remotely connect to and control the desktop of a Microsoft Windows® computer?
RDP
Which of the following pieces of equipment can be used to determine the supported frequency range of a cable?
Cable certifier
Even though two of the following virtual private network (VPN) protocols support HTTPS, which one is most commonly used today?
TLS
What type of firewall filters traffic based on a set of rules specifying what traffic is allowed to enter or exit an interface, without inspecting that traffic?
Packet filtering
Which of the following is a system designed to appear as an attractive attack target?

Honey pot


Honey net

Which of the following best defines a firewall?
A firewall defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface
Which two of the following protocols are commonly used to communicate with an AAA server?

RADIUS


TACACS+

A host that can protect itself by inspecting traffic flowing into its network interface is called a ________.
HIPS
Which of the following allows a user to authenticate only once in order to gain access to multiple systems, without requiring the user to independently authenticate with each system?
SSO
Which of the following remote access technologies is a Citrix Systems® proprietary protocol that allows applications running on one platform (for example, Microsoft Windows®) to be seen and controlled from a remote client, independent of the client platform (for example, UNIX)?
ICA
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client, where the three-way handshake allows a client to be authenticated without sending credential information across a network?
CHAP
Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?
DoS attack
Which of the following security attacks occurs when an attacker exploits a known vulnerability in an application (for example, an error in an application that allowed that application to write to an area of memory dedicated to a different application), which could cause another application to crash?
Buffer overflow attack
Which of the following user authentication technologies uses a supplicant, an authenticator, and an authentication server?
802.1X
Adam has installed a small network in an office. All computers have Gigabit Ethernet NICs. The router on the network works at 1000 Mbps. On his routine checkup, Adam found that the Internet speed is at a max of 100 Mbps. What will he do to fix this problem?
Replace the cable with a Category 6 cable
A technician has installed WAP in an open warehouse environment. He notices varying signal strengths throughout the warehouse. What will he do to improve the signal strength?
Change the antenna placement
Which of the following is a modular switch port, allowing you quickly remove and insert a port in a modular switch you are troubleshooting?
GBIC
Which of the following conditions would most likely result in corrupted data?
Bad cables or connectors
Of the steps listed, which one occurs first in a structured troubleshooting model?
Hypothesize a probable cause
Which of the following parameters must match between a wireless LAN (WLAN) client and a WLAN access point (AP) in order for the client to associate with the AP?

Encryption type


SSID


Channel

While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. From this, where can you conclude the issue resides?
Above OSI Layer 3
What wireless LAN (WLAN) device interconnects a wired LAN with wireless devices?
AP