click below
click below
Normal Size Small Size show me how
ITS Networking
Review Certification Flashcards
| Question | Answer |
|---|---|
| Which media type is least susceptible to external interference including EMI and RFI? | Fiber Optic |
| In which class does this IPv4 address belong? 64.123.12.1 | Class A |
| In which class does this IPv4 address belong? 133.234.23.2 | Class B |
| In which class does this IPv4 address belong? 201.111.22.3 | Class C |
| In which class does this IPv4 address belong? 224.100.20.3 | Class D |
| On a wireless router, what is an SSID? | Broadcast ID |
| What is a reason to incorporate VLANs into a network? | To reduce the number of broadcast domains. |
| What are two characteristics of VLANs? | 1. A VLAN compartmentalizes a network and isolates traffic. 2. VLANs act as though they are on the same LAN regardless. |
| The fiber network connection between Building A and Building B is 550 meters. There is attenuation on the line. Which tool should you use to test this? | Optical Time-Domain Reflectometer (OTDR) |
| Which network element uses a tunneling protocol to encapsulate data for transmission? | VPN |
| You are a network administrator at a small business. At the start of business, no employees can access external websites. They are all connected to the same intranet by a single router. You need to troubleshoot the problem by which two actions? | 1. Check the router for proper physical connectivity. 2. Contact the internet service provider. |
| A client-server network has centralized administration. | True |
| A client-server network requires each computer to share its resources. | False |
| A client-server network requires users to have a user account on every computer they need to use. | False |
| Protocols developed by organizations who have control over their definition and operation. | Proprietary protocols |
| What is an advantage of dynamic routing? | It automatically maintains routing tables. |
| Which type of port supports VLAN traffic between two switches? | Trunk port |
| What is a justification for using ST cable instead of UT cable to wire a network expansion? | You are routing cables through an area with high external interference. |
| What are two characteristics of mesh network topology? | 1. It works best for networks with a large number of nodes. 2. It is fault tolerant because of redundant connections. |
| A computer is connected to a switch through a network patch panel by using copper cable. The computer is getting lower than expected data speeds. Which two actions should you perform to identify the issue? | 1. Search for broken wires in the cable by using a cable tester. 2. Test the data speed of the cable. |
| A Type 1 hypervisor runs directly on system hardware. | True |
| A Type 2 hypervisor runs directly on system hardware. | False |
| A Type 1 hypervisor is also know as a bare-metal hypervisor. | True |
| You ping a server by using the fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on first attempt? | The DNS is not resolving. |
| A secure connection over a private network. | VPN |
| What service is provided by Internet Messenger? | An application that allows real-time chatting among remote users. |
| CompanyPro plans to migrate several servers to cloud based virtual machines. You need to identify the administrative responsibilities that will be reduced after the planned migration. Which two responsilities will be reduced? | 1. Updating server operating system. 2. Replacing failed server hardware. |
| Which routing option is fault tolerant? | Dynamic Routing |
| Your home computer is having problems accessing the internet. You suspect that your internet router's DHCP service is not functioning, so you check your computer's IP address. Which address indicates that your router's DHCP service is not functioning? | 169.254.1.15 |
| Which physical network topology provides fault-tolerant communication by providing redundant communication paths? | Mesh |
| What is the primary purpose of a perimeter network? | To provide a buffer area between a private intranet and the public internet. |
| How is a router's static routing table updated? | Through direct action by the network administrator. |
| What happens when a client's DHCP-issued address expires? | The client attempts to renew its lease on the address. |
| Which service uses PTR and A records? | DNS |
| A switch sends unicast frames to only one destination port. | True |
| A switch floods ports if it does not know where to send a frame. | False |
| A switch sends broadcast frames to only the uplink port. | False |
| You are trying to access a music-sharing service on the internet. The service is located at the IP address 173.194.75.105. You experience problems connecting. You ran a trace route to the IP address. | 1. Each hop in the trace route is a router. 2. The trace route completed successfully. |
| What is a cause of concern about wireless network security? | Inability to encrypt transmission. |
| What kind of address type is this? 132.168.0.0 - 192.168.255.255 | Private Network Addresses |
| What kind of address type is this? 224.0.0.0 - 239.255.255.255 | Multicast Addresses |
| What kind of address type is this? 127.0.0.0 - 172.255.255.255 | Loopback addresses |
| In Linux, which command-line tool should you use to list a host's active incoming connections? | netstat |
| On a Windows computer, which utility tool should you use to determine whether your Domain Name System (DNS) service is properly resolving fully qualified domainn (FODNS) to IP Addresses | ns/lookup |
| 224.0.0.0 - 239.255.255.255 | IPv4 Multicast Addresses |
| You work for a small office that has 15 computers. Your local ISP provides you with one public IP address. You need to enable internet access for all 15 computers. Which routing function should you enable? | NAT |
| Connectionless, message-based protocol with best effort service. | UDP |
| Connection-oriented protocol with guaranteed service. | TCP |
| Resolves a MAC Address to an IP Address. | ARP |
| Slow access to the internet. When you connect to the network by using an Ethernet cable, you can no longer access the internet. You run the ipconfig /all command. | 1. The IP address of the wireless adapter is configured DHCP. 2. The IP address of the Ethernet adapter is configured APIPA. |
| Allows a remote user to connect to a private network from anywhere on the internet. | SSL VPN |
| Securely connects two portions of a private network or two. | Site-to-Site VPN |
| Creates an unencrypted connection between two network devices. | Layer 2 Tunneling |
| The Internet is a WAN. | True |
| All intranet is a WAN. | False |
| All devices connected to a WAN must be located within the same city. | False |
| Commands that display the ports that your computer is listening for. | netstat |
| Which wireless authentication method provides the highest level of security? | WPA 2 |
| What is the top level domain of ftp.sunsetweb.org | org |
| What are two characteristics of a wired Ethernet network topology? | 1. It can negotiate different transmission needs. 2. It is typically employed by using twisted pair or fiber optic media. |
| Port number 21 | FTP |
| Port number 25 | SMTP |
| Port number 443 | HTTPS |
| IoT devices have IP addresses | True |
| IoT devices require human interaction to communicate to a network. | False |
| A smart thermostat and a lightbulb that can be switched on by using an app are examples of IoT devices. | True |
| You are helping a friend set up a public-facing web server in their home office. Your friend wants to protect the internet network from intrusion. What should you do? | Deploy the web server in the perimeter network (Also known as DMZ). |
| What are the purpose of ping utility? | 1. To determine whether a host is reachable. 2. To self-test a host own network interface. |
| If you reboot one virtual machine, all the other virtual machines on the server reboot at the same time. | False |
| You can reboot the host machines without it having any effect on the virtual machine. | False |
| If you need to reboot one virtual machine, you must first reboot the physical server. | False |
| You can use a VPN to enable users to make a secure connection to your network through the internet. | True |
| If users connect to the internet through the dial-up connections, the server must also connect through a dial-up connection. | False |
| You can use RAS Gateway to configure a VPN connection for Windows 10 clients that is active whenever the client connects on the internet. | True |
| Which network device interconnects computers in a workgroup, can be remotely configured, and provides the best throughput? | Managed Switch |
| Which protocol does the ping utility use to test communication with a remote host? | ICMP |
| You need to install a network cable between two locations that are approximately six miles/ten kilometers from each other. Which cable should you use? | Single-mode fiber |
| Which wireless encryption type is the most susceptible to interception and decryption? | WEP |
| In addition to switching, which layer is specific to a multilayer switch? | Provides Layer 3 routing functions |
| What technology can you use to extend and internal network across shared or public networks? | VPN |
| What does each IPv4 address consist of? | A network ID and a host ID |
| What is a feature of a Teredo tunneling protocol? | It translates IPv4 traffic into IPv6 traffic. |
| Your company's computers exchange data through a set of routed private Wi-Fi networks at a single geographical location. What type of network is in the example? | Intranet |