Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
108 Cards in this Set
- Front
- Back
Which two routing protocols use bandwidth in their calculation of metric by default?
|
OSPF EIGRP |
|
What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address?
|
Router |
|
What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations?
|
Hub-and-spoke
|
|
In the modern LAN, what type of device is typically used at the center of a star topology?
|
Switch
|
|
What device is known for a large number of interfaces and its ability to create separate collision domains for each end device?
|
Switch
|
|
What device would forward information using the following address as its primary information: 192.168.1.101?
|
Router |
|
What TCP port is used by RDP?
|
3389
|
|
A corporate e-mail service would be classified as belonging to what Layer of the OSI Model?
|
Application
|
|
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials?
|
TFTP
|
|
Which layer of the OSI Model is concerned with how bits are represented on the medium?
|
Physical
|
|
Internet Protocol (IP) resides at what layer of the OSI Model?
|
Layer 3 Network |
|
An Ethernet workgroup switch resides at which layer of the OSI Model?
|
Layer 2
|
|
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion?
|
FTP
|
|
Which of the following are sublayers of the Data Link Layer (that is, Layer 2) of the OSI Model?
|
MAC LLC |
|
What is the common UDP port (that is, "well-known" port) used by a DHCP server?
|
67
|
|
Which of the following manages and interconnects the cables between end user devices and an MDF?
|
Intermediate distribution frames
|
|
A location within a building where network cables terminate is commonly called a(n) __________.
|
wiring closet
|
|
A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages?
|
DHCPDISCOVER
|
|
Which of the following can often be categorized as an encryption device (that is, a device capable of participating in an encrypted session)?
|
Firewall VPN concentrator Router |
|
Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbps (although it can carry data at a maximum rate of 16 Mbps, as seen in some Token Ring networks)?
|
Category 3
|
|
Which of the following network appliances performs the most processor-intensive tasks and is critical in IPSec environments?
|
VPN concentrator
|
|
Which type of fiber optic connector contains two fiber strands in a single connector?
|
MTRJ - media termination recommended jack
|
|
Which of the following copper connector types is most commonly used for cable TV connections?
|
F-connector
|
|
Which of the following standards specifies a type of coaxial cable used for short distance applications, such as carrying composite video between two nearby devices, and has a characteristic impedance of 75 Ohms?
|
RG-59
|
|
What virtual network device allows Microsoft Active Directory (AD) services, UNIX-based web services, and DNS services to be co-resident on the same network device?
|
Virtual server
|
|
Which of the following is a telephony solution that is typically based on a traditional privately-owned telephone system?
|
Hosted PBX
|
|
Consider the fully-qualified domain name (FQDN) http://sample.pearsonitcertification.com. What is the root domain in the FQDN?
|
com
|
|
What variant of Domain Name System (DNS) overcomes the size limitations of the original version of DNS through the use of pseudo-resource-records?
|
EDNS - Extension Mechanisms for DNS
|
|
Identify the purpose of a DHCP scope.
|
A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.
|
|
What is the minimum category of unshielded twisted pair (UTP) cable that can be used for 10GBASE-T networks?
|
Category 6a
|
|
What is the distance limitation of 10GBASE-LR?
|
10 km
|
|
What is a native VLAN?
|
A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added.
|
|
You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many broadcast domains exist on this switch?
|
1
|
|
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE5 Ethernet?
|
Coax/10 Mbps/500 m
|
|
What is the distance limitation of 10GBASE-SW?
|
300 m
|
|
What is the distance limitation of 10GBASE-LW?
|
10 km |
|
You have a class C subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.
Network range: 192.168.7.0/24 Marketing: 57 devices Production: 28 devices IT: 112 devices HR: 9 devices Select the minimum number of addresses using the CIDR notation required for each network |
IT /25 Marketing /26 Production /27 HR /28 A /24 subnet includes 256 IP addresses. Thus, 256-240=16. So the contiguous block of remaining addresses will be /28. |
|
You have a class B subnet to use at a new office location. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.
Network range: 172.16.7.0/16 Sales: 72 devices IT: 128 devices HR: 8 devices |
IT 172.16.7.0/24 Sales 172.16.7.0/25 HR 172.16.7.0/28 |
|
Your company has been assigned the 172.20.0.0/16 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 100 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use?
|
255.255.255.128
|
|
If you need to create at least 58 subnets, how many bits must you use for subnetting?
|
6
|
|
While DHCP is not the only protocol used for dynamically assigning IP addresses to clients, it does offer a more robust set of features. Which of the following is a predecessor to DHCP, offering a reduced feature set?
|
BOOTP
|
|
Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask, to summarize multiple classful networks?
|
CIDR
|
|
There is a special range of addresses reserved for systems that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?
|
169
|
|
What class of IP address is 172.16.1.2?
|
Class B
|
|
Approximately how many addresses are provided by a Class B scheme?
|
65,000
|
|
If you need to create at least 30 subnets, how many bits must you use for subnetting?
|
5
|
|
What is the subnet mask address used in a default static route?
|
0.0.0.0
|
|
What variation of network address translation (NAT) allows you to statically configure the inside global address assigned to a specific device inside your network?
|
SNAT
|
|
What does RIP use for a metric?
|
Hop count
|
|
What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?
|
BGP
|
|
What is the best possible value for administrative distance?
|
0
|
|
Which of the following is a type of network interface device (NID) that includes circuitry to perform such functions as converting between framing formats on a digital circuit?
|
Smart jack
|
|
What is a very common protocol found on dedicated leased lines?
|
PPP
|
|
A T3 connection is an example of which WAN type?
|
Leased line
|
|
How big is the payload of an ATM cell?
|
48 Bytes
|
|
ISDN is an example of which of these WAN types?
|
Circuit switched
|
|
What is the bandwidth of an OC-3?
|
155.52 Mbps
|
|
Mark installs a wireless network for his office. He needs the wireless range to extend up to 300 feet. Which of the following would he recommend?
|
802.11n
|
|
You need to implement a secure WAP so that only authenticated employees can access it. Which of the following standards will you implement?
|
802.1X
|
|
Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN?
|
Disabling SSID broadcast
|
|
If multiple wireless access points exist in a wireless LAN (WLAN), what percentage of coverage overlap should the access points have?
|
10 to 15 percent
|
|
You are configuring a wireless LAN (WLAN) with three wireless access points having overlapping coverage areas. The wireless access points are using the 2.4 GHz frequency band, and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select?
|
1 6 11 |
|
A wireless LAN (WLAN) containing only one access point (AP) is known as what type of WLAN?
|
BSS |
|
The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters?
|
2.4 GHz or 5 GHz / > 300 Mbps
|
|
Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?
|
802.1X
|
|
Which of the following approaches to wireless LAN (WLAN) security uses RC4 as its encryption algorithm?
|
WEP
|
|
What type of antenna radiates power at relatively equal power levels in all directions?
|
Omnidirectional |
|
Identify the antenna type, referred to in wireless LAN (WLAN) design, that is a theoretical antenna that radiates an equal amount of power in all directions (in a spherical pattern), and is said to have a gain of 0 dBi.
|
Isotropic
|
|
Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards support DSSS?
|
802.11b 802.11g |
|
What technology is an IETF version of HSRP?
|
VRRP
|
|
Which of the following are Layer 3 redundancy mechanisms?
|
HSRP CARP |
|
What term defines a variation in the delay of packets in the network?
|
Jitter
|
|
Identify the quality of service (QoS) function that alters bits in a frame, cell, or packet.
|
Marking
|
|
Queuing is another name for which of the following quality of service (QoS) functions?
|
Congestion management
|
|
What is an acceptable one-way latency in a typical VoIP network?
|
150 ms
|
|
Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and can operate in an interactive mode (that is, you enter this command, receive a prompt, and can then give additional commands)?
|
nslookup
|
|
Which of the following is a Microsoft Windows® command that displays what Layer 2 MAC address corresponds to a Layer 3 IP address?
|
arp |
|
What tool would you use to release a DHCP address on a Windows system?
|
ipconfig |
|
Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address?
|
ping
|
|
Andrew finds that the DVD drive installed on the computer is not working. He decides to check the voltage coming to the DVD drive. Which of the following devices will he use?
|
Multimeter
|
|
A company has subscribed to a DSL connection for its network. Which tool will be used to extend the demarc for the new connection?
|
Punch down tool
|
|
Which of the following pieces of equipment can be used to attach an RJ-45 connector to a UTP cable?
|
Crimper
|
|
Which Syslog severity level is a condition where a specific operation failed to complete successfully?
|
4
|
|
Identify the Simple Network Management Protocol (SNMP) component that is a piece of software, which runs on a managed device (for example, a server, router, or a switch).
|
SNMP agent
|
|
Cisco's PPDIOO model is an example of which of the following configuration management (CM) components?
|
Asset management
|
|
Which three of the following are common elements in a set of network documentation?
|
Contact information Policies Network maps |
|
A network administrator can use which of the following to locate a break in a fiber optic cable?
|
OTDR
|
|
Which of the following connects the transmit leads of an Ethernet connector (or the transmit fiber of a fiber optic connector) to the receive leads of the same Ethernet connector (or the receive fiber of a fiber optic connector)?
|
Loop back plug
|
|
If you are working on an isolated test network (that is, a test bed), what piece of equipment can you use to simulate a heavy network load?
|
Throughput tester
|
|
Identify the Simple Network Management Protocol (SNMP) component that is an unsolicited message sent from an SNMP managed device to provide a notification about a significant event occurring on that managed device.
|
SNMP trap
|
|
Which of the following allows a secure communication between a private network and a public network, such as the Internet?
|
Tunneling
|
|
Which two of the following are firewall inspection types?
|
Stateful Packet filtering |
|
A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publicly available corporate servers (for example, an e-mail server or a web server)?
|
DMZ
|
|
Which of the following security attacks occurs when an attacker convinces someone to voluntarily provide information (for example, username and password credentials) to the attacker?
|
Social engineering attack
|
|
Which of the following requires two types of authentication (but no more) from a user seeking admission to a network?
|
TFA
|
|
While an IPsec tunnel is being established, which type of session is initially formed to protect the exchange of parameters used to form the IPsec session?
|
Internet Security Association and Key Management Protocol (ISAKMP) |
|
Which two of the following are true regarding a client-to-site and site-to-site virtual private networks (VPN)?
|
1. A client-to-site VPN (also known as a remote access VPN) interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost. 2. A site-to-site VPN interconnects two locations, as an alternative to a leased line, at a reduced cost. |
|
Which of the following security attacks leverages the PORT command?
|
FTP bounce attack
|
|
Which of the following user authentication technologies uses digital certificates and a certificate authority (CA)?
|
PKI |
|
Which of the following best defines an IDS sensor?
|
An IDS sensor receives a copy of traffic being analyzed and communicate with a security appliance to prevent subsequent attack.
|
|
Which of the following security threats is a program that appears to be for one purpose (for example, a game), but secretly performs another task (for example, collecting a list of contacts from an end-user's e-mail program)?
|
Trojan horse
|
|
Which of the following security attacks occurs when an attacker sends a target system a flood of data or requests that consume the target system's resources?
|
DoS attack
|
|
Which step in a structured troubleshooting methodology can most benefit from your experience and intuition?
|
Hypothesize a probable cause.
|
|
Which of the following conditions can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection?
|
Cross-talk
|
|
What documentation should be generated at the conclusion of a successful troubleshooting effort?
|
Post mortem report |
|
What can you add to a network to mitigate a power failure that might otherwise make an Ethernet switch unusable?
|
UPS
|
|
You have an Ethernet switch with port 1 assigned to VLAN A and port 2 assigned to VLAN B. How can traffic from a device connected to port 1 be forwarded to port 2?
|
Traffic must be routed to flow between VLANs
|
|
What is the measure of a wireless signal's strength?
|
RSSI
|