Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
83 Cards in this Set
- Front
- Back
What device operates at Layer 3 of the OSI model?
|
Router
|
|
What topology is seen in WAN networks and was designed to increase the redundancy of the communications?
|
Dual ring
|
|
Which of the following devices creates a separate broadcast domain for each of its active interfaces by default?
|
Router
|
|
What topology aims to balance redundancy with easier management and cost-effectiveness?
|
Partial mesh
|
|
A router resides at which layer of the OSI Model?
|
Layer 3
|
|
Which of the following protocols is used to send e-mail to an e-mail server?
|
SMTP
|
|
Which two of the following protocols are used to connect to a remote host via a terminal emulator?
|
SSH Telnet |
|
What are the two primary protocols found at the Transport Layer of the TCP/IP Stack?
|
TCP UDP |
|
Which of the following specifies a type of fiber optic cable that has a core whose diameter is large enough to transport light arriving at a variety of angles (that is, more than one mode of propagation)?
|
MMF
|
|
Which of the following is a technology that allows a service provider to offer networking services to customers?
|
NaaS
|
|
Cables in wiring closets commonly terminate on what?
|
Patch panel
|
|
Which of the following network appliances is also known as a content switch?
|
Load balancer
|
|
Which of the following connects to multiple intermediate distribution frames?
|
MDF
|
|
Which of the following DNS record types is used to map a hostname to an IPv4 address?
|
A
|
|
What virtual network component allows virtual servers located on the same physical server to be logically separated into different VLANs?
|
Virtual switch
|
|
Which of the following are valid DHCP message types used during a DHCP reservation?
|
DHCPDISCOVER DHCPREQUEST DHCPACK |
|
What is a DHCP lease?
|
A DHCP lease is a temporary assignment of IP address information to a DHCP client
|
|
Most DHCP client devices on a network are dynamically assigned an IP address from a DHCP server (that is, dynamic addressing). However, some devices (for example, servers) might need to be assigned a specific IP address. What DHCP feature allows a static IP address to MAC address mapping?
|
Reservation
|
|
Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often made of relatively thick conductors (for example, 22 gauge or 23 gauge wire) and thick insulation?
|
Category 6
|
|
Which of the following copper connector types is an eight-pin connector found in most Ethernet networks?
|
RJ-45
|
|
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE-T Ethernet?
|
Cat 3 (or higher) UTP/10 Mbps/100 m
|
|
Which Ethernet switch feature allows an Ethernet switch to make a copy of frames seen on one switch port and send those copies out of another Ethernet switch port? (NOTE: This feature is often used to allow a network analyzer connected to one switch port to see traffic present on a different switch port.)
|
Port mirroring
|
|
What media type is used by 1000BASE-ZX?
|
SMF
|
|
Which of the following standards specifies a method for sending traffic for multiple VLANs across a single link?
|
IEEE 802.1Q
|
|
You have a class B subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.Network range: 172.16.0.0/23Marketing: 20 devicesProduction: 18 devicesTraining: 33 devicesDesigning: 89 devicesSelect the minimum number of addresses using the CIDR notation required for each network
|
Designing /25 Training /26 Marketing, Production /27 A /23 subnet includes 512 IP addresses. Thus, 512-256=256. So, the contiguous block of remaining addresses will be /24 |
|
Which of the following address ranges is not routable?
|
169.254.0.0 – 169.254.255.255
|
|
A Microsoft Windows® PC is configured to obtain its IP address via DHCP. If the PC is unable to contact a DHCP server, the PC automatically assigns itself an IP address in what range?
|
169.254.0.0 – 169.254.255.255
|
|
An IP version 6 (IPv6) address contains how many bits?
|
128
|
|
Your company has been assigned the 172.16.0.0/16 network for use at one of its sites. You need to use a subnet mask that will accommodate 42 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use?
|
/22
|
|
What loop-prevention mechanism is an override of another loop-prevention mechanism?
|
Poison reverse
|
|
What variation of network address translation (NAT) automatically assigns an inside global address from a pool of available addresses?
|
DNAT
|
|
In cable modem technologies, the frequencies dedicated to data transmission are specified by what?
|
DOCSIS
|
|
What does the term asymmetric mean in DSL?
|
The upload speed and the download speed differ
|
|
What specification identifies the cable television frequencies dedicated to data transmission?
|
DOCSIS
|
|
What device terminates the DSL signal coming from a customer?
|
DSLAM
|
|
What technology operates in the 3 kHz through 300 GHz range?
|
Radio
|
|
A technician needs to install a wireless network in Joe's Coffee shop. Joe wants to provide free Internet service to his customers. Which of the following will help him?
|
Install an omnidirectional antenna
|
|
Mark is managing a small organization with 20 employees. He has enabled WEP, disabled SSID broadcast, and selected the channel mode as auto. He wants to secure WAP from being accessed by any unauthorized users. Which of the following steps will Mark take?
|
Configure WPA2 encryption Configure MAC filtering |
|
What is the maximum range of the IEEE 802.11g wireless standard?
|
32 m indoors / 140 m outdoors
|
|
Orthogonal Frequency Division Multiplexing (OFDM) is a wireless LAN (WLAN) transmission method. Which three of the following WLAN standards support OFDM?
|
802.11a 802.11g 802.11n |
|
What is the maximum bandwidth of an 802.11b wireless LAN (WLAN)?
|
11 Mbps
|
|
Which of the following approaches to wireless LAN (WLAN) security uses TKIP for encryption?
|
WPA
|
|
A wireless LAN (WLAN) configured to work in an ad hoc fashion (that is, without requiring the use of an access point) is known as what type of WLAN?
|
IBSS
|
|
What wireless technology allows the IEEE 802.11n standard to achieve higher throughput than other standards (that is, IEEE 802.11 a/b/g) by using multiple antennas for transmission and reception?
|
MIMO
|
|
Which wireless LAN (WLAN) standards can operate in the 5 GHz frequency band?
|
802.11a 802.11n |
|
Which of the following (QoS) functions places traffic into different categories?
|
Classification
|
|
Which of the following technologies is not typically considered for an increase in redundancy?
|
PAT
|
|
Which of the following mechanisms is considered a link-efficiency tool in QoS?
|
LFI
|
|
What term refers to the weakening of a signal as it travels in the network?
|
Attenuation
|
|
What is an acceptable one-way latency in a typical VoIP network?
|
150 ms
|
|
A technician wants to get the protocol statistics and the active TCP/IP network connections of his computer. Which of the following will he use?
|
netstat
|
|
You want to add the IP address 200.200.10.10 and its corresponding MAC address 08-00-8b-20-9a-ff to an ARP table for IP-to-physical address translation. Which commands will you use to accomplish this?
|
arp -s 200.200.10.10 08-00-8b-20-9a-ff
|
|
Which of the following is a Microsoft Windows® command that can display a listing of NetBIOS device names learned by a PC?
|
nbtstat
|
|
What command enables you to refresh DHCP lease information?
|
ipconfig
|
|
Which of the following UNIX commands can be used to configure the IP address of a UNIX host's Ethernet interface?
|
ifconfig
|
|
Which tool enables you to test basic connectivity to a remote system?
|
ping
|
|
What tool will you use to trace cables in multiple-pair wiring?
|
Toner probe
|
|
Which of the following can be used to measure the amount of current (in Amps) flowing through a circuit?
|
Multimeter
|
|
Which of the following tools should be used to connect wires to a 110 block?
|
Punch down tool
|
|
Which if the following configuration management (CM) elements involves collecting network statistics during normal network operation?
|
Baselining
|
|
Which of the following is a Microsoft Windows® log that would report events related to software applications running on the underlying operating system?
|
Application
|
|
Which of the following protocols can be used to remotely connect to and control the desktop of a Microsoft Windows® computer?
|
RDP
|
|
Which of the following pieces of equipment can be used to determine the supported frequency range of a cable?
|
Cable certifier
|
|
Even though two of the following virtual private network (VPN) protocols support HTTPS, which one is most commonly used today?
|
TLS
|
|
What type of firewall filters traffic based on a set of rules specifying what traffic is allowed to enter or exit an interface, without inspecting that traffic?
|
Packet filtering
|
|
Which of the following is a system designed to appear as an attractive attack target?
|
Honey pot Honey net |
|
Which of the following best defines a firewall?
|
A firewall defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface
|
|
Which two of the following protocols are commonly used to communicate with an AAA server?
|
RADIUS TACACS+ |
|
A host that can protect itself by inspecting traffic flowing into its network interface is called a ________.
|
HIPS
|
|
Which of the following allows a user to authenticate only once in order to gain access to multiple systems, without requiring the user to independently authenticate with each system?
|
SSO
|
|
Which of the following remote access technologies is a Citrix Systems® proprietary protocol that allows applications running on one platform (for example, Microsoft Windows®) to be seen and controlled from a remote client, independent of the client platform (for example, UNIX)?
|
ICA
|
|
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client, where the three-way handshake allows a client to be authenticated without sending credential information across a network?
|
CHAP
|
|
Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?
|
DoS attack
|
|
Which of the following security attacks occurs when an attacker exploits a known vulnerability in an application (for example, an error in an application that allowed that application to write to an area of memory dedicated to a different application), which could cause another application to crash?
|
Buffer overflow attack
|
|
Which of the following user authentication technologies uses a supplicant, an authenticator, and an authentication server?
|
802.1X
|
|
Adam has installed a small network in an office. All computers have Gigabit Ethernet NICs. The router on the network works at 1000 Mbps. On his routine checkup, Adam found that the Internet speed is at a max of 100 Mbps. What will he do to fix this problem?
|
Replace the cable with a Category 6 cable
|
|
A technician has installed WAP in an open warehouse environment. He notices varying signal strengths throughout the warehouse. What will he do to improve the signal strength?
|
Change the antenna placement
|
|
Which of the following is a modular switch port, allowing you quickly remove and insert a port in a modular switch you are troubleshooting?
|
GBIC
|
|
Which of the following conditions would most likely result in corrupted data?
|
Bad cables or connectors
|
|
Of the steps listed, which one occurs first in a structured troubleshooting model?
|
Hypothesize a probable cause
|
|
Which of the following parameters must match between a wireless LAN (WLAN) client and a WLAN access point (AP) in order for the client to associate with the AP?
|
Encryption type SSID Channel |
|
While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. From this, where can you conclude the issue resides?
|
Above OSI Layer 3
|
|
What wireless LAN (WLAN) device interconnects a wired LAN with wireless devices?
|
AP
|