• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/108

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

108 Cards in this Set

  • Front
  • Back
Which two routing protocols use bandwidth in their calculation of metric by default?

OSPF


EIGRP

What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address?

Router

What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations?
Hub-and-spoke
In the modern LAN, what type of device is typically used at the center of a star topology?
Switch
What device is known for a large number of interfaces and its ability to create separate collision domains for each end device?
Switch
What device would forward information using the following address as its primary information: 192.168.1.101?

Router

What TCP port is used by RDP?
3389
A corporate e-mail service would be classified as belonging to what Layer of the OSI Model?
Application
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials?
TFTP
Which layer of the OSI Model is concerned with how bits are represented on the medium?
Physical
Internet Protocol (IP) resides at what layer of the OSI Model?

Layer 3


Network

An Ethernet workgroup switch resides at which layer of the OSI Model?
Layer 2
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion?
FTP
Which of the following are sublayers of the Data Link Layer (that is, Layer 2) of the OSI Model?

MAC




LLC

What is the common UDP port (that is, "well-known" port) used by a DHCP server?
67
Which of the following manages and interconnects the cables between end user devices and an MDF?
Intermediate distribution frames
A location within a building where network cables terminate is commonly called a(n) __________.
wiring closet
A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages?
DHCPDISCOVER
Which of the following can often be categorized as an encryption device (that is, a device capable of participating in an encrypted session)?

Firewall


VPN concentrator


Router

Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbps (although it can carry data at a maximum rate of 16 Mbps, as seen in some Token Ring networks)?
Category 3
Which of the following network appliances performs the most processor-intensive tasks and is critical in IPSec environments?
VPN concentrator
Which type of fiber optic connector contains two fiber strands in a single connector?
MTRJ - media termination recommended jack
Which of the following copper connector types is most commonly used for cable TV connections?
F-connector
Which of the following standards specifies a type of coaxial cable used for short distance applications, such as carrying composite video between two nearby devices, and has a characteristic impedance of 75 Ohms?
RG-59
What virtual network device allows Microsoft Active Directory (AD) services, UNIX-based web services, and DNS services to be co-resident on the same network device?
Virtual server
Which of the following is a telephony solution that is typically based on a traditional privately-owned telephone system?
Hosted PBX
Consider the fully-qualified domain name (FQDN) http://sample.pearsonitcertification.com. What is the root domain in the FQDN?
com
What variant of Domain Name System (DNS) overcomes the size limitations of the original version of DNS through the use of pseudo-resource-records?
EDNS - Extension Mechanisms for DNS
Identify the purpose of a DHCP scope.
A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.
What is the minimum category of unshielded twisted pair (UTP) cable that can be used for 10GBASE-T networks?
Category 6a
What is the distance limitation of 10GBASE-LR?
10 km
What is a native VLAN?
A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added.
You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many broadcast domains exist on this switch?
1
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE5 Ethernet?
Coax/10 Mbps/500 m
What is the distance limitation of 10GBASE-SW?
300 m
What is the distance limitation of 10GBASE-LW?

10 km

You have a class C subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.

Network range: 192.168.7.0/24

Marketing: 57 devices
Production: 28 devices
IT: 112 devices
HR: 9 devices

Select the minimum number of addresses using the CIDR notation required for each network

IT /25


Marketing /26


Production /27


HR /28


A /24 subnet includes 256 IP addresses. Thus, 256-240=16. So the contiguous block of remaining addresses will be /28.

You have a class B subnet to use at a new office location. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.

Network range: 172.16.7.0/16

Sales: 72 devices
IT: 128 devices
HR: 8 devices

IT 172.16.7.0/24


Sales 172.16.7.0/25


HR 172.16.7.0/28

Your company has been assigned the 172.20.0.0/16 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 100 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use?
255.255.255.128
If you need to create at least 58 subnets, how many bits must you use for subnetting?
6
While DHCP is not the only protocol used for dynamically assigning IP addresses to clients, it does offer a more robust set of features. Which of the following is a predecessor to DHCP, offering a reduced feature set?
BOOTP
Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask, to summarize multiple classful networks?
CIDR
There is a special range of addresses reserved for systems that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?
169
What class of IP address is 172.16.1.2?
Class B
Approximately how many addresses are provided by a Class B scheme?
65,000
If you need to create at least 30 subnets, how many bits must you use for subnetting?
5
What is the subnet mask address used in a default static route?
0.0.0.0
What variation of network address translation (NAT) allows you to statically configure the inside global address assigned to a specific device inside your network?
SNAT
What does RIP use for a metric?
Hop count
What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?
BGP
What is the best possible value for administrative distance?
0
Which of the following is a type of network interface device (NID) that includes circuitry to perform such functions as converting between framing formats on a digital circuit?
Smart jack
What is a very common protocol found on dedicated leased lines?
PPP
A T3 connection is an example of which WAN type?
Leased line
How big is the payload of an ATM cell?
48 Bytes
ISDN is an example of which of these WAN types?
Circuit switched
What is the bandwidth of an OC-3?
155.52 Mbps
Mark installs a wireless network for his office. He needs the wireless range to extend up to 300 feet. Which of the following would he recommend?
802.11n
You need to implement a secure WAP so that only authenticated employees can access it. Which of the following standards will you implement?
802.1X
Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN?
Disabling SSID broadcast
If multiple wireless access points exist in a wireless LAN (WLAN), what percentage of coverage overlap should the access points have?
10 to 15 percent
You are configuring a wireless LAN (WLAN) with three wireless access points having overlapping coverage areas. The wireless access points are using the 2.4 GHz frequency band, and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select?

1


6


11

A wireless LAN (WLAN) containing only one access point (AP) is known as what type of WLAN?

BSS

The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters?
2.4 GHz or 5 GHz / > 300 Mbps
Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?
802.1X
Which of the following approaches to wireless LAN (WLAN) security uses RC4 as its encryption algorithm?
WEP
What type of antenna radiates power at relatively equal power levels in all directions?

Omnidirectional

Identify the antenna type, referred to in wireless LAN (WLAN) design, that is a theoretical antenna that radiates an equal amount of power in all directions (in a spherical pattern), and is said to have a gain of 0 dBi.
Isotropic
Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards support DSSS?

802.11b


802.11g

What technology is an IETF version of HSRP?
VRRP
Which of the following are Layer 3 redundancy mechanisms?

HSRP


CARP

What term defines a variation in the delay of packets in the network?
Jitter
Identify the quality of service (QoS) function that alters bits in a frame, cell, or packet.
Marking
Queuing is another name for which of the following quality of service (QoS) functions?
Congestion management
What is an acceptable one-way latency in a typical VoIP network?
150 ms
Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and can operate in an interactive mode (that is, you enter this command, receive a prompt, and can then give additional commands)?
nslookup
Which of the following is a Microsoft Windows® command that displays what Layer 2 MAC address corresponds to a Layer 3 IP address?

arp

What tool would you use to release a DHCP address on a Windows system?

ipconfig

Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address?
ping
Andrew finds that the DVD drive installed on the computer is not working. He decides to check the voltage coming to the DVD drive. Which of the following devices will he use?
Multimeter
A company has subscribed to a DSL connection for its network. Which tool will be used to extend the demarc for the new connection?
Punch down tool
Which of the following pieces of equipment can be used to attach an RJ-45 connector to a UTP cable?
Crimper
Which Syslog severity level is a condition where a specific operation failed to complete successfully?
4
Identify the Simple Network Management Protocol (SNMP) component that is a piece of software, which runs on a managed device (for example, a server, router, or a switch).
SNMP agent
Cisco's PPDIOO model is an example of which of the following configuration management (CM) components?
Asset management
Which three of the following are common elements in a set of network documentation?

Contact information


Policies


Network maps

A network administrator can use which of the following to locate a break in a fiber optic cable?
OTDR
Which of the following connects the transmit leads of an Ethernet connector (or the transmit fiber of a fiber optic connector) to the receive leads of the same Ethernet connector (or the receive fiber of a fiber optic connector)?
Loop back plug
If you are working on an isolated test network (that is, a test bed), what piece of equipment can you use to simulate a heavy network load?
Throughput tester
Identify the Simple Network Management Protocol (SNMP) component that is an unsolicited message sent from an SNMP managed device to provide a notification about a significant event occurring on that managed device.
SNMP trap
Which of the following allows a secure communication between a private network and a public network, such as the Internet?
Tunneling
Which two of the following are firewall inspection types?

Stateful


Packet filtering

A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publicly available corporate servers (for example, an e-mail server or a web server)?
DMZ
Which of the following security attacks occurs when an attacker convinces someone to voluntarily provide information (for example, username and password credentials) to the attacker?
Social engineering attack
Which of the following requires two types of authentication (but no more) from a user seeking admission to a network?
TFA
While an IPsec tunnel is being established, which type of session is initially formed to protect the exchange of parameters used to form the IPsec session?

Internet Security Association and Key Management Protocol (ISAKMP)

Which two of the following are true regarding a client-to-site and site-to-site virtual private networks (VPN)?

1. A client-to-site VPN (also known as a remote access VPN) interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost.


2.


A site-to-site VPN interconnects two locations, as an alternative to a leased line, at a reduced cost.

Which of the following security attacks leverages the PORT command?
FTP bounce attack
Which of the following user authentication technologies uses digital certificates and a certificate authority (CA)?

PKI

Which of the following best defines an IDS sensor?
An IDS sensor receives a copy of traffic being analyzed and communicate with a security appliance to prevent subsequent attack.
Which of the following security threats is a program that appears to be for one purpose (for example, a game), but secretly performs another task (for example, collecting a list of contacts from an end-user's e-mail program)?
Trojan horse
Which of the following security attacks occurs when an attacker sends a target system a flood of data or requests that consume the target system's resources?
DoS attack
Which step in a structured troubleshooting methodology can most benefit from your experience and intuition?
Hypothesize a probable cause.
Which of the following conditions can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection?
Cross-talk
What documentation should be generated at the conclusion of a successful troubleshooting effort?

Post mortem report

What can you add to a network to mitigate a power failure that might otherwise make an Ethernet switch unusable?
UPS
You have an Ethernet switch with port 1 assigned to VLAN A and port 2 assigned to VLAN B. How can traffic from a device connected to port 1 be forwarded to port 2?
Traffic must be routed to flow between VLANs
What is the measure of a wireless signal's strength?
RSSI