Network+ Midterm

  1. You are designing a network implementation for a startup business. Your Ethernet network design calls for the implementation of VLANs to separate design and development network traffic from administration and human resources traffic. In addition, you need to be able to customize each network port on your network switches to support the manufacturing devices used by the design and development teams. What should you do?




    A. Implement managed Ethernet switches.
  2. Which of the following are valid 48-bit MAC addresses? (Choose TWO.)

    A. 44:87:FC:E2:E5:D3:H0
    B. 44-87-FC-E2-E5-G3
    C. 44-87-FC-E2-E5
    D. 44:87:AA:E2:E5:D3
    E. 44-87-FC-E2-E5-D2
    • D. 44:87:AA:E2:E5:D3
    • E. 44-87-FC-E2-E5-D2
  3. Which interior gateway protocols are distance vector routing protocols? (Choose TWO.)





    • E. Routing Information Protocol (RIP).
    • D. Interior Gateway Routing Protocol (IGRP).
  4. The workstations on your network are unable to reach a Linux-based file and print server on a different network segment. You’ve checked and the server is up and running with a static IP address assignment of 172.18.0.1. Your workstations have been assigned IP addresses from your DHCP server using addresses in the 172.17.8.100 to 172.17.8.253 range with a subnet mask of 255.255.0.0. You are unable to ping the server from any workstation, yet the workstations are able to ping each other. What should you do?




    C. Verify that the workstations have the correct default gateway router address assigned.
  5. You are making a straight-through Gigabit Ethernet drop cable using UTP and RJ-45 connectors that will be used to connect a desktop system to your network switch. Which pin on the switch should be connected to the TX+ pin on the host’s network interface board?




    D. RX+
  6. You’ve decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create fou rseparate subnets. The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest numbered IP address possible tothis system. What should you do?




    D. Assign the system an IP address of 172.17.191.254.
  7. You manage a network within an office suite composed of three Windows 7 workstations configured to work together in a workgroup. Each system is connected to the same network switch using Gigabit Ethernet network interfaces and drop cables. What type of network is this? (Choose TWO.)





    • E. Local area network
    • E. Peer-to-peer network
  8. Your Windows 7 workstation has an IP address of 11001101.00000000.00000000.00000001 (binary) assigned to it. Which class of IP addresses does this address fall within?



    D. Class C
  9. Which functions are provided by the transport layer of the OSI model? (Choose two.)

    A. Ensuring that data on the sending system is formatted correctly for the recipient system
    B. Establishing, managing, and terminating communications between the sender and recipient
    C. Managing segment sequencing
    D. Creating TCP and UDP ports for the IP protocol
    E. Managing logical addressing information for network hosts
    • C. Managing segment sequencing
    • D. Creating TCP and UDP ports for the IP protocol
  10. You are helping a small startup business design its network. The business’s main server will store research and development files as well as a human resources database application that utilizes Microsoft SQL Server. The business will also provide a web server that customers can use to access a knowledge base application for self-support. Where should you place the main server in this scenario?




    C. On the internal network.
  11. Which layer of the TCP/IP model receives packets from upper layers and encapsulates them in a frame prior to transmitting them on the network medium? (Choose two.)





    • C. Network interface
    • E. Link
  12. Which 10 Gigabit Ethernet standards encapsulate Ethernet data within SDH/SONET frames, allowing Ethernet equipment to work with SDH/SONET networking equipment? (Choose three.)






    • A. 10GBase-SW
    • C. 10GBase-LW
    • E. 10GBase-EW
  13. Which link state interior gateway protocols were designed to support VLSM IP addressing? (Choose TWO.)





    • E. Open Shortest Path First (OSPF).
    • E. Intermediate System–to–Intermediate System (IS-IS).
  14. Your workstation needs to copy a file to a server on the same network segment with an IP address of 10.0.0.1. Part of this process involves resolving the server’s IP address into its MAC address using the ARP protocol. ARP has already looked in the ARP cache on your workstation, but it couldn’t find an entry for the server’s IP address. What happens next?




    A. An ARP request packet is broadcast to all the machines on the network segment to determine the MAC address of the host with an IP address of 10.0.0.1.
  15. What functionality does the IP protocol provide at the Internet layer of the TCP/IP
    model? (Choose two.) 

    A.  Ensuring
    that data reaches its destination by retransmitting any packets that are lost
    or corrupted
    B. Resolving logical addresses into physical
    addresses
    C.  Sharing network status and error information
    D.  Decrementing the TTL of network packets as they cross routers
    E.  Providing logical addressing
    • D.  Decrementing the TTL of network packets as they cross routers
    • E.  Providing logical addressing
  16. You are planning the implementation of a new Ethernet network. The layout of the office complex willrequire some runs between workstations and the network switches to be up to 90 meters long. In addition, the client has requested that the network be capable of Gigabit or faster data transfers.Which Ethernet standards could you consider using in your implementation plan? (Choose two.)

    A. 10Base-5
    B. 10Base-T
    C. 1000Base-CX
    D. 1000Base-T
    E. Fast Ethernet
    • C. 1000Base-CX
    • D. 1000Base-T
  17. You are implementing a home network using a DSL connection for Internet access. Your service provider gave you only a single registered IP address for the connection. However, you want to connect several home computers, your DVD player, and your IP phone to the Internet through this connection. What should you do?




    C. Implement internal private IP addressing with a Network Address Translation (NAT) router facing the Internet.
  18. You are working with a Token Ring network, which uses token passing from host to host to controlaccess to the network media. The network uses twisted-pair wires to connect each network host to amultistation access unit (MSAU), which manages the passing of the token. What type of physica ltopology does this network use?




    A. Star
  19. Which block of addresses is defined for use with Automatic Private IP Addressing (APIPA)?




    A. 169.254.0.0/16
  20. Which layer of the OSI model defines rules for accessing the network media?




    D. Data Link
  21. You manage a network for a small architectural consulting firm. The network is composed of three Ethernet switches that have been cascaded together. Two VLANs have been created: one for the firm’s president, treasurer, and administrative assistants and one for architectural development work. FS1, WS1, and WS2 are connected to Switch1; WS3, WS4, and FS2 are connected to Switch2; and WS5, WS6, and WS7 are connected to Switch 3. FS1, WS1, WS2, and WS3 are members of the first VLAN, while WS4, FS2, WS5, WS6, and WS7 are members of the second VLAN. What is the collision domain for the FS1 host?




    D. The network port to which the FS1 server is connected on the switch
  22. Which network protocols are commonly used to implement Voice over IP (VoIP) communications?(Choose two.)





    • D. RTP
    • E. SIP
  23. Which IEEE project standard defines 100 Mbps Ethernet networking?




    A. 802.3u
  24. Which Interior Gateway Protocol does not use advertisements to populate each router’s routing table?




    A. Open Shortest Path First (OSPF)
  25. Users are complaining that they can’t access the company intranet site. You check and find that you can ping the intranet web server by IP address, but not by its DNS name. What should you do?




    D. Verify that users’ workstations have the correct DNS resolver address configured.
  26. You need to connect your 1000Base-FX network switch to a singlemode fiber-optic backbone. Whichtype of media converter should you use?




    B. Singlemode fiber to multimode fiber
  27. You are implementing a Network Address Translation router on your network to translate private IP addresses into a single registered IP address to enable Internet access. Which private IP address ranges could you choose to implement on your network with this router? (Choose two.)?

    A. 137.65.1.1–137.65.2.254
    B. 207.0.0.1–207.0.0.254
    C. 10.0.0.1–10.0.100.254
    D. 172.17.8.1–172.17.9.254
    E. 127.0.0.1–127.0.0.254
    • C. 10.0.0.1–10.0.100.254
    • D. 172.17.8.1–172.17.9.254
  28. You are working with a network that has a dedicated link from each host to every other host on thenetwork. What type of physical topology does this network use?



    C. Mesh
  29. Your organization’s network is composed of four separate physical network segments connected by routers. Your organization uses the 10.0.0.0 private IP addressing scheme. You want to divide the 10.0.0.0 network into four separate networks. What should you do to accomplish this?




    B. Configure the subnet mask to include the first 2 bits of the second octet in the network address to create four subnets.
  30. Which layer of the OSI model ensures the data being sent from the sender is formatted correctly so itcan be interpreted correctly by the recipient system?




    D. Presentation
  31. Which network appliance can be deployed as an intermediary that manages requests from clients seeking resources from servers?




    A. Proxy server
  32. 32. Which protocols are application layer protocols?





    • E. DHCP
    • C. SNMP
  33. You are developing an implementation plan for a network in a startup financial services firm. They are very concerned about security and have asked you to implement the most secure network media available. Which should you choose?




    C. 1000Base-SX
  34. Some routing protocols determine the best route to take based on the bandwidth of network links.Which metric is used by these protocols to determine the bandwidth of a link?




    D. MTU
  35. You’ve just enabled routing on a Cisco router. You need to verify that the appropriate routes exist in the routing table. What should you do?




    D. Enter show ip route at the command prompt of the router.
  36. Which connector is used to connect coaxial cabling for cable TV to your television set?




    B. BNC
  37. A private network uses a dynamic NAT router to connect to the Internet. A workstation on the private network behind the NAT router sends a packet to the Internet, and the NAT router replaces the private IP address of the sender in the source field of the packet header with the NAT router’s public IP address. What happens next?




    D. PAT assigns the connection a port number from a pool of available ports, inserting this port number in the source port field.
  38. Which of the following are characteristics of a client/server network? (Choose three.)?






    • A. All hosts on the network can use a common set of user and group accounts stored on a dedicated host for authentication.
    • D. Files are stored on and shared from a dedicated host on the network.
    • F. All network hosts running a version of Windows are configured to be members of the same domain.
  39. Your Linux workstation has an IP address of 192.168.1.25 assigned with a subnet mask of255.255.255.0. It also has a DNS server address of 137.65.1.10 and a default gateway router address of 192.168.1.254 assigned. Your workstation needs to send a file to a server that has an IP address of 192.168.2.1 and a subnet mask of 255.255.255.0 assigned. Where will the packets be sent next?




    C. To the default gateway router
  40. You’ve opened a web browser on your workstation and have entered a URL in the Location field.Which layer of the OSI model initiates the HTTP request to the web server?




    B. Application
  41. A network administrator has installed and connected a new VoIP phone to a network jack. The phone is currently powered off. Which of the following allows the phone to power on when the network administrator enable its switch port?




    B. PoE
  42. A network administrator is monitoring switches on a network. Which of the following protocols isgenerating this traffic?




    A. SNMP
  43. Which of the following connector types is associated with RS-232?




    A. DB-9
  44. Which of the following is used to share traffic between multiple network connections?




    A. Load balancer
  45. Which of the following OSI model layers is located between the data link and the transport layers?




    C. Network
  46. Which of the following applications is extremely sensitive to latency? Choose TWO.





    • D. Video Conferencing
    • E. VoIP systems
  47. A network technician has setup three VLANs on two of the company switches, enabled all the ports as access ports and assigned the ports to VLANs. How many connections will be needed to connect the two switches together?




    C. 3
  48. Which of the following is considered an Exterior Gateway Protocol?




    D. BGP
  49. An administrator notices that the local network, which handles both voice and data traffic, is extremely congested causing broken audio streams during phone conversations. Configuration of which of the following will MOST likely correct this issue?




    A. VLANs
  50. Which of the following Ethernet technologies has the LONGEST distance possible?




    C. 1000BaseLX
  51. Which of the following is BEST to use to transfer files to/from a web server?




    B. FTP
  52. Which of the following BEST describes the purpose of DHCP?




    D. DHCP is used to assign IP addresses to clients upon request.
  53. A company wants to implement VLANs and is upgrading their networking equipment to accommodatethis. Which of the following should be purchased to allow for the VLANs?




    D. Layer 3 switches
  54. Which of the following would BEST be described as a central connection point for secured clientaccess to a private network from a public network?




    C. VPN concentrator
  55. A distribution layer switch with an SC GBIC that has a fiber connection back to the core has gone bad and needs to be replaced with a newer model and an LC GBIC. The fiber patch cable was replaced with a known good LC patch cable. After replacing the switch the fiber connection shows no link.Which is the MOST likely cause of the problem?




    D. TXRX reversed
  56. Which of the following provides a device with an IP address that does not remain the same each timethe lease is renewed?




    A. Dynamic IP address
  57. Redundant network devices are used to provide which of the following performance optimizations?(Select TWO)

    A. Load balancing
    B. High Availability
    C. QoS
    D. Traffic Shaping
    E. Content filtering
    • A. Load balancing
    • B. High Availability
  58. How many pairs of CAT5e wires are used for data with 1000BaseT?




    B. 4
  59. A senior technician is inspecting a junior technician’s patch cables. There is a visible space between the copper wiring and the top of the plastic at each end of the cables. Which of the following is the reason these cables cannot be used?




    B. Bad connectors
  60. Which of the following best describes the operation of a VLAN?




    B. A VLAN allows for multiple logical subnets to coexist on a single physical switch
  61. While troubleshooting network connectivity, a technician notices a computer has assigned itself an APIPA IP address of 169.254.0.1. Assuming the DNS servers have been properly configured, which of the following tools should the technician use to verify the DHCP server is reachable?




    A. tracert
  62. Which of the following has a MAXIMUM speed of 100Mbps




    D. CAT6
  63. A network technician has configured a new firewall to accept all TCP port 80 traffic and deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies by attempting to access a popular website. Which of the following will MOST likely correct the error?




    A. HTTP uses UDP
  64. A customer reports a network patch cable was unplugged from a switch and plugged back into an available switch port. The switch’s activity lights have been lit up constantly and network response times are extremely slow. Which of the following is most likely occurring?




    A. Switching Loop
  65. A technician notices that the application server’s resources are momentary at full capacity for the amount of incoming and outgoing packets outside the LAN. Which of the following tools would be used to find out what IPs are connecting to the server and in active mode?




    B. netstat
  66. Which of the following is used to separate external untrusted hosts and internal trusted hosts?




    C. Firewall
  67. Which of the following port numbers is used by HTTP?




    D. 80
  68. A network administrator added a new workstation using CAT6 UTP cable to a new area of the office.The cable was run across the ceiling tiles to the new workstation. The workstation is 50 meters (164 feet) from the switch and is having problems connecting to the network. Which of the following is the MOST likely the problem?




    D. EMI is being emitted from the fluorescent lights.
  69. A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?




    B. Demarc
  70. A technician needs to connect a laptop to configure a switch. Which of the following would work BEST for the connection?




    C. Console port
  71. Which of the following ports does DHCP use? (Select TWO)

    A. 22
    B. 23
    C. 67
    D. 68
    E. 69
    • C. 67
    • D. 68
  72. Some of the computers connected to switches with CAT6 cables have slow performance. The cable runs were tested and the lengths were found to be between 30 meters (98 feet) to 160 meters (524 feet). Which of the following is the cause of the issue?




    B. DB loss
  73. Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors; however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?




    D. Allow TCP port 443
  74. A technician needs to add an additional cable run. Which of the following hardware tools would a technician use to BEST connect cabling to a patch panel?




    D. Punch down tool
  75. A customer has recently implemented a VoIP system on a flat network. The customer reports issues with call clarity during business hours. Which of the following would a technician configure on the customer’s network to help alleviate this problem? (Select TWO)

    A. NAT
    B. Full duplex
    C. QoS
    D. VLANs
    E. MAC filtering
    • C. QoS
    • D. VLANs
  76. A network administrator is setting up an internal IIS server with a static IP address. When the user types the IP address for the IIS server into a web browser, it opens up to the printer configuration page. Which of the following is MOST likely the cause?




    A. Duplicate IP address
  77. A user reports incredibly slow network connectivity speeds. The technician determines the computer has a properly configured Gigbit NIC connected to the wall outlet with a CAT5 cable. Which of the following should the technician replace next to BEST improve performance?




    C. Cable
  78. Karen, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Karen has permission to the server and the workstation is able to get to other network resources. What is the MOST likely cause?




    D. Karen’s workstation is a part of the wrong VLAN
  79. Joe, a user, reports getting a “This page cannot be displayed” error message in his web browser. However, Joe can ping the default gateway. Which of the following is the MOST likely cause of theproblem?




    D. Incorrect DNS settings
  80. At which of the following layers does the CSU/DSU operate?




    C. Physical
  81. Which of the following cables would require a punch down tool to attach a cable to it?




    A. 110 block
  82. A technician installing a new switch notices that users on the switch can communicate with other devices on the network but not the Internet. Which of the following is the MOST likely cause?




    D. Wrong VLAN configuration
  83. An administrator has been asked to connect an analog phone cabling in a server room. Which of the following should the administrator use?




    D. 66-block
  84. Which of the following does SNMPv3 BEST provide over previous versions?




    C. Increased security
  85. At which of the following layers of the OSI model does an unmanaged switch operate?




    A. Layer 2
  86. Which of the following ports would need to be disabled to block TFTP traffic?




    A. 69
  87. Lisa a technician is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason?




    A. Distance
  88. Which of the following OSI model layers is responsible for the transmission of bits?




    B. Layer 1
  89. In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?




    A. 25
  90. An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?




    A. Allow TCP port 3389 inbound
Author
a2k2d2
ID
237011
Card Set
Network+ Midterm
Description
Network+ Midterm
Updated