click below
click below
Normal Size Small Size show me how
Practice A incorrect
Network +
| Question | Answer | |
|---|---|---|
| Which of the following techniques helps in providing integrity to data transmissions crossing a network? Flood Guard BContent caching CHashing DCaptive portal | Hashing | after calculating the same hash digest, it is found that the data has not been modified in transit and the integrity of the data has been maintained. |
| An organization, running at two sites, has the same company image and has implemented same group policy. Users at one site notice a large amount of malware and virus incidents but hardly any at anothe | Which of the following has most likely been implemented at the site with the least security incidents? AVulnerability analysis BEnd-user awareness training CBusiness continuity measures DConsent to monitoring | End-user awareness training (End-user awareness training is an important aspect when handling network threats. Users should have security awareness training and should have accepted and signed acceptable use policy (AUP) agreements |
| An organization needs a centrally located firewall that can block specific incoming and outgoing traffic and check each packet individually. Which of the following types of firewalls should a network technician install? | A stateless network-based firewall | is used in companies or organizations to protect the private network from public networks. |
| A network technician is setting up a new network. To eliminate single points of failure from the design, he wants to include redundant paths in the network. However, he also wants to prevent performance degradation. | Which of the following should he implement to accomplish this? ALACP BSTP CVLAN DPort mirroring | STP (Spanning Tree Protocol) to prevent performance degradation that could result from redundant paths in the network. |
| Which of the following connectors are used with fiber-optic cables? Each correct answer represents a complete solution. Choose all that apply. | F-Type B SC C ST D MT-RJ | B,C,D |
| Which of the following Application layer protocols is not connection-oriented? | ATelnet BHTTP CTFTP DFTP | trivial File Transfer Protocol (TFTP) works at the Application layer and uses UDP port 69. It is considered unreliable and not connection-oriented. |
| A network technician while troubleshooting a Layer 1 issue finds that two switches connected through a straight-through cable are unable to communicate. What can be the possible cause of this issue? | MDIX is enabled on both the switches | |
| The maximum speed of 802.11b is ___ A54 Mbps B11 Mbps C155.52 Mbps D51.84 Mbps | 11 Mbps | |
| Which of the following firewalls inspects actual contents of packets/traffic?Packet filtering B Stateful inspection C Circuit-level D Application layer | Application layer | An application layer firewall is a computer networking firewall that operates at the application layer of the TCP/IP stack. It is also known as a proxy-based firewall, |
| On which of the following types of cabling is an F-connector used?CAT3 BCAT5 CSingle mode fiber DRG-6 | usually with an RG-6 cable | |
| What is the default port number for SSH? 21 B443 C80 D22 | 22 | |
| In a TCP/IP-based network, you configure the default mask for a host having the IP address 193.100.154.1. What will be the network ID of the host? | 193.100.154 | |
| How does a DHCP reservation work? | It matches a specific MAC address to a specific IP address. | A DHCP reservation works by matching a specific MAC address to a specific IP address. This address will not be assigned to any other network device on the network. It is a static IP address assignment. |
| At which layer of OSI is the Frame Check Sequence for error detection performed? | Layer 2 | |
| What default subnet mask is used with the Class C private IP address range?A 255.0.0.0 B 255.255.255.255 C 255.255.255.0 D 255.255.0.0 | 255.255.0.0 | |
| You work as a network administrator for a company. The company has a TCP/IP-based network. Users on the network are complaining that they're unable to connect to the Web server hosted on the Intranet by using its host name. | You find that users can access the server by using its IP address. What is the most likely cause of the issue? The DNS server is unavailable. BThe DHCP server is unavailable. The domain controller is unavailable. he WINS server is unavailable. | The DNS server is unavailable. |
| Which of the following are common optical carrier levels (OC-x)? Each correct answer represents a complete solution. Choose three. | OC-12 B OC-192 C OC-1 D OC-4 | A OC-12 B OC-192 C OC-1 |
| You need to check the speed and condition of the signal on a copper cable. Which device should you use?Loopback plug BMultimeter COTDR DTDR | A time-domain reflectometer (TDR) is a tool that finds and describes faults in metallic cables like twisted-pair and coax and can provide information regarding the speed and condition of the signal on the wire. | |
| You need to transfer files between two systems. Which of the following protocols can be used? Each correct answer represents a complete solution. Choose two. | SCP B RIP C NTP D FTP E OSPF | scp secure copy protocol ftp file transfer protocol |
| Which of the following are uses of a VPN concentrator? Each correct answer represents a complete solution. Choose all that apply. | Performs authentication for each VPN tunnel BProvides data encryption CAllows remote users to build a VPN tunnel DResolves a domain name into a corresponding IP address | Performs authentication for each VPN tunnel B Provides data encryption C Allows remote users to build a VPN tunnel |
| Which of the following connectors will be used to connect a serial port and an Ethernet port on a switch? Each correct answer represents a part of the solution. Choose all that apply. | AST BLC CDB-9 DRJ-45 | CDB-9 DRJ-45 |
| A network technician has recently installed a new wireless access point on the company's wireless network. All the settings for the new access point were copied from the baseline. Due to this change, the network technician is getting | reports from the sales department that they are having irregular wireless connectivity, while other departments are having no such problem. What can be the possible cause of this issue? | Incorrect AP placement BIncorrect SSID CChannel mismatch DIncorrect WAN standard |
| Incorrect AP placement | Incorrect AP placement can be the possible cause of the issue. Wireless APs should be strategically located in a building to provide sufficient coverage to all desired coverage areas | |
| When would you possibly find Frame Relay being utilized in a corporate network to help save money? Each correct answer represents a complete solution. Choose all that apply. | ans: C When a centralized office needs to communicate with many branch offices D When a full mesh of WAN links is in place | |
| Which of the following devices must be used to have full duplex communication between two host devices? | Firewall BHub CRepeater DSwitch | Switch |
| What are the effects of having a CSMA/CD network that has sustained heavy collisions?Each correct answer represents a complete solution. Choose all that apply. Low throughput Delay Loss of signal strength Congestion | Delay Low throughput Congestion |