Term
| What is the purpose of NAT? |
|
Definition
| Allow multiple computers with private addresses to access the internet using a single public address. |
|
|
Term
| A router does not have an entry in its routing table associated with the destination address that is encoded in a pocket. Where will the router send the packet? |
|
Definition
| To its default next router. |
|
|
Term
| Which WLAN security standard supports AES encryption? |
|
Definition
|
|
Term
| Which media type is least susceptible to electromagnetic interference (EMI)? |
|
Definition
|
|
Term
| What is the maximum segment length when wiring a 100BaseT network with Cat 5 cable? |
|
Definition
|
|
Term
| The maximum length of a 100Base-TX segment is? |
|
Definition
|
|
Term
Your Windows computer is configured to automatically receive an IP address and it also has Automatic IP Addressing (APIPA) enable.
You use the ipconfig command to view the TCP/IP settings on your computer and discover that it has an IP address of 0.0.0.0.
What is the most likely wrong? |
|
Definition
| Windows cannot detect a connection to the network media. |
|
|
Term
| Which of the following is an APIPA address? |
|
Definition
|
|
Term
| Which Domain Name System (DNS) resource record type identifies the primary DNS for a DNS zone? |
|
Definition
|
|
Term
| What does a layer 2 switch use to direct packets? |
|
Definition
|
|
Term
| Which protocol operates at the TCP/IP reference model Transport Layer to provide reliable, connection-oriented communication? |
|
Definition
|
|
Term
| A set of interconnected local area networks (LANs) is known as a? |
|
Definition
|
|
Term
| Computers connected to an Ethernet hub is an example of which kind of topology? |
|
Definition
|
|
Term
| A three-homed perimeter network configuration requires? |
|
Definition
|
|
Term
| How does a standard hub differ from a standard switch? |
|
Definition
| A hub sends packets to alll connected computers; a switch directs packets to specific computers. |
|
|
Term
| Which two cable specifications are for coaxial cable? |
|
Definition
|
|
Term
| Which two protocols are TCP/IP reference model Application Layer protocols? |
|
Definition
|
|
Term
|
Definition
|
|
Term
You need to add a device to the network that will allow you to create virtual local area networks (VLANs). You must be able to manage the device remotely.
Which device should you use? |
|
Definition
|
|
Term
Wich type of firewall filtering would you configure to filter traffic based on packet content? |
|
Definition
|
|
Term
| Which is the first step for a host to resolve a fully qualified domain name (FQDN) on a network that includes an authoritative Domain Name System (DNS) server? |
|
Definition
| Check the FQDN against the local host name |
|
|
Term
| What type of connector is used to connect a network interface card (NIC) to the network using UTP cable? |
|
Definition
|
|
Term
| Which two utilies can you use to identify a router that is experiencing problems? |
|
Definition
|
|
Term
| Which WAN carrier uses 23 B channels and one D channel? |
|
Definition
|
|
Term
| What is the role of routing protocols? |
|
Definition
| To dynamically update route information |
|
|
Term
| What is the difference between STP and UTP cable? |
|
Definition
| STP has outer shielding. UTP does not |
|
|
Term
| Packet sequence is managed at which layer of the OSI networking model? |
|
Definition
|
|
Term
| Which command would you use to view detailed TCP/IP configuration information on a computer? |
|
Definition
|
|
Term
| Which two WLAN standards operate at the 2.4 GHz frequency? |
|
Definition
|
|
Term
| Which of the following is a dial-up WAN connection type? |
|
Definition
|
|
Term
| Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmisstion on asingle twisted pair line? |
|
Definition
|
|
Term
| Which media access protocol is used by 802.11 wireless communications? |
|
Definition
|
|
Term
| Which method of configuring a VLAN offers the best scalability? |
|
Definition
|
|
Term
| Which kind of device is used to connect a wireless LAN segment to a wired LAN segment? |
|
Definition
| Wireless Access Point (WAP) |
|
|
Term
| Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails? |
|
Definition
|
|
Term
| The term "intranet" refers to: |
|
Definition
| Your private, internal network |
|
|
Term
| A set of interconnected local area networks (LANs) known as: |
|
Definition
|
|
Term
| Which technology is used to allow a client computer to securely connect to a remote private network across the Internet? |
|
Definition
|
|
Term
| Computers connected to an Ethernet hub is an example of which kind of topology? |
|
Definition
|
|
Term
| Which type of network is only used to connect computers within a single company? |
|
Definition
|
|
Term
You want to set up a subnet from the rest of your local area network (LAN). You want to filter all traffic based on the parameters you define.
Which type of device should you use? |
|
Definition
|
|
Term
| In which of the following situations would you want to configure a virtual private network (VPN)? |
|
Definition
| Home-based telecommuters need intermittent connections over the Internet to the Internal network. |
|
|
Term
| What is the typical communication rate dial-up connections over a standard dial-up analog line in the United States? |
|
Definition
| 56 kilobits per second (kbps) |
|
|
Term
| You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a: |
|
Definition
| virtual local area network (VLAN) |
|
|
Term
| Which access method is defined in the 802.5 specification? |
|
Definition
|
|
Term
| Which DNS record is used to resolve a fully-qualified domain name (9FQDN) to an IPv6 address? |
|
Definition
|
|
Term
What is the role of routing protocols? |
|
Definition
| To dynamically update route information |
|
|
Term
| What is the difference between STP and UTP cable? |
|
Definition
| STP has outer shielding. UTP does not. |
|
|
Term
| A three-home perimeter network configuration requires: |
|
Definition
|
|
Term
| Your network is configured to allow select businesses access to resources on your internal network through virtual private network (VPN) connections. This is an examople of an: |
|
Definition
|
|
Term
| Which of the following is the default class C subnet mask? |
|
Definition
|
|
Term
| How does a hub differ from a standard switch? |
|
Definition
| A hub sends packets to all connected computers; a switch directs packets to specific computers. |
|
|
Term
| What is the typical communication rate for a dial-up connection over a standard dial-up analog line in the United States? |
|
Definition
| 54 kilobits per second (Kbps) |
|
|
Term
| Packet sequence is managed at which layer of the OSI networking model? |
|
Definition
|
|
Term
| Which technology is used to allow a client computer to securely connect to a remote private network accross the internet? |
|
Definition
|
|
Term
| OSPF (Open Shortest Path First) |
|
Definition
| Sends a multicast packet as soon as a change in the network configuration is detected. |
|
|
Term
| A Network Address Translation (NAT) server: |
|
Definition
| Enables local computers with private addresses to connect to the internet. |
|
|
Term
| A layer 2 switch determines which port to send a packet through by examining the: |
|
Definition
| MAC address of the destination |
|
|
Term
| After starting up your computer, it is unable to communicate with any other computers on the network. The computer has an IP of 169.254.19.21 |
|
Definition
| Your computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server. |
|
|
Term
| Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmission on a single twisted pair line? |
|
Definition
|
|
Term
| Which command would you use to view detailed TCP/IP configuration on a computer? |
|
Definition
|
|
Term
| Which method does a DHCP client use to locate a DHCP server? |
|
Definition
|
|
Term
You want to set up subnet that is isolated from the rest of your locakl area network (LAN). You want to filter all traffic base on the parameters you define.
Which type of devicd should you use? |
|
Definition
|
|
Term
| Which two WLAN standards opererate at the 2.4Ghz frequency? |
|
Definition
|
|
Term
| Which type of network is only used to connnect computers within a single company? |
|
Definition
|
|
Term
| Which of the following is a dial-up WAN connection type? |
|
Definition
|
|
Term
| What kind of Domain Name System (DNS) resource is used to contain the IPv6 address of IPv6 nodes? |
|
Definition
|
|
Term
| Which physical topology is often implemented using a logical ring topology? |
|
Definition
|
|
Term
| You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a: |
|
Definition
| Virtual Local Area Network (VLAN) |
|
|
Term
| What is the purpose of CIDR? |
|
Definition
| To allow computers at different geographical locations to be assigned to the same subnet. |
|
|
Term
| What is the highest bit rate supported by 802.11g? |
|
Definition
| 54 megabits per second (Mbps) |
|
|
Term
| Which devices use IP addresses to control network traffic? |
|
Definition
|
|
Term
| Windows Internet Services (WINS) is used to map: |
|
Definition
| NetBIOS names to IP addresses |
|
|
Term
| Which device operates at layer 3 of the OSI model? |
|
Definition
|
|
Term
| You want to allow external users access to a specific Web server, but block access to resources on your intranet. You need to configure a(n): |
|
Definition
|
|
Term
You are using unshielded twisted pair (UTP) to wire a 100BaseT Ethernet network. Which cable type should you use? |
|
Definition
|
|
Term
| The default subnet mask for an IPv4 address is: |
|
Definition
|
|
Term
| Why should you avoid fluorescent lights when running unshielded twisted pair (UTP) cable? |
|
Definition
| Possible signal degradation |
|
|
Term
| Which two of the following are valid private IP addresses? |
|
Definition
|
|
Term
| Which can be used to create a virtual local area network (VLAN)? |
|
Definition
| One or more managed switches |
|
|
Term
You have a routed network with a single DHCP Relay agents on the network. All clients are configured for a dynamic addressing. What do you need to enable on the router? |
|
Definition
|
|
Term
| How many bits are in an IPv6 address? |
|
Definition
|
|
Term
| What is the IPv6 local loopback address? |
|
Definition
|
|
Term
| The nslookup command is used to troubleshoot a: |
|
Definition
|
|
Term
| The primary advantage to using a Layer 2 switch instead of a hub is to: |
|
Definition
|
|
Term
| Which IPv6 address is a link-local unicast address? |
|
Definition
| FE80:1234:03D4:4F83:SABC:1283:0321:ABCD |
|
|
Term
|
Definition
| Allocates more bandwidth for a download traffic than for upload traffic. |
|
|
Term
| Which is used to resolve a fully-qualified domain name (FQDN) to an IP address? |
|
Definition
|
|
Term
| For what purpose is ad hoc networking mode used in wireless networking? |
|
Definition
| To enable wireless computers to form a network when no wireless access point (WAP) is present. |
|
|
Term
| The term Intranet refers to: |
|
Definition
| Your private, internal network. |
|
|
Term
| For what purpose is ad hoc networking mode use in wireless networking? |
|
Definition
| To enable wireless computers to form a network when no wireless access point (WAP) is present. |
|
|
Term
| The term "intranet" refers to: |
|
Definition
| your private, internal network. |
|
|
Term
| Which of the following is a valid private address that supports communication throughout its subnetted network? |
|
Definition
|
|
Term
| What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)? |
|
Definition
|
|
Term
| The Internet security zone includes: |
|
Definition
| all external Web sites that are not listed in the Restricted or Trusted or Trusted Sites zone. |
|
|
Term
You have managed switch with servers connected to ports 1,2,3 and 4. An attacker gains access to the server on port 2 and installs software to monitor and record communications on the network. Which statement describes the impact to network security? |
|
Definition
| The attacker can access traffic to and from the server on port 2 only. |
|
|
Term
| What type of server would you place in a perimeter network? |
|
Definition
| A Web server that must be accessed by external users. |
|
|
Term
| Which protocol is a distance-vector routing protocol? |
|
Definition
|
|
Term
| Modern Ethernet networks are most commonly wired using which topology? |
|
Definition
|
|
Term
A firewall separates a management workstation from a router. You need to manage the router using telnet without specifying a port. Which traffic must the firewall allow? |
|
Definition
|
|
Term
You need to see if your computer has connectivity with a server on the same subnetwork. What coomand should you use? |
|
Definition
|
|
Term
| Which type of network uses CSMA/CD as the access method? |
|
Definition
|
|
Term
| When would you need to deploy Windows Routing and Remote Access (RRAS) services? |
|
Definition
| To configure virtual private network (VPN) site-to-site connections. |
|
|
Term
| Using a switch on an Ethernet network helps to reduce: |
|
Definition
|
|
Term
| Which of the following is provided by IPSec? |
|
Definition
|
|
Term
| Which layer of the OSI model is responsible for the address informationneeded to route data between different networks? |
|
Definition
|
|
Term
| What is the primary reason to implement a VLAN? |
|
Definition
| To manage bandwidth allocation based on the type of user. |
|
|
Term
| An infrastructure model WLAN: |
|
Definition
| Can be used to connect wireless clients to wired network. |
|
|
Term
| The address FE80::5EFE:131.107.4.92 is an example of what kind of IPv6 address? |
|
Definition
| A link-local ISATAP address |
|
|
Term
| Which media access protocol is used by 802.11 wireless communications? |
|
Definition
|
|
Term
| Which network service provides authentication and authorization for VPN clients and dial-up clients? |
|
Definition
|
|
Term
| Which kind of device is used to connect a wireless LAN segment to a wired LAN segment? |
|
Definition
| Wireless Access Point (WAP) |
|
|
Term
| Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails. |
|
Definition
|
|
Term
Router A has a static routing table and is not configured with a default route. What happens when Router A receives a packet that does not match any routes? |
|
Definition
|
|