-
the default subnet mask for class b network is
255.255.0.0
-
internet key exchange (IKE) is responsible for which two functions
negotiation algorithms to use, exchanging key information
-
to which IP configuration does the CIDR notation 192.168.1.1/25 refer
192.168.1.1 255.255.255.128
-
what type of DNS record maps host names to addresses
host (A) DNS record
-
a service that resolves NetBIOS names to IP addresses is
windows internet name service (WINS)
-
which of the following uses a tunneling protocol
VPN
-
which technology can you use to extend an internal network across shared or public networks
VPN
-
computer that has an IP address of 169.254.0.1 can not access the network:: what service should you confirm is available
DHCP
-
which two are published IEEE 802.11 wireless transmission standards
802.11g 802.11n
-
which DNS record type specifies the host that is the authority for a given domain
SOA
-
a cable that meets the 1000BaseT standard has a maximum lenght of
100m
-
which setting is used to determine the Domain Name System (DNS) setting on a client computer
NSLOOKUP
-
a private network that allows members of an organization to exchange data is an
intranet
-
teredo tunneling is a protocol that
allows IPV6 connectivity through IPV4 devices
-
one reason to replace an unmanaged switch with a managed switch is to
support multiple VLANS
-
which of the following is a public IP address
68.24.78.221
-
which of these represent the internet protocol version 6 (IPV6) loopback address
::1
-
which wireless authentication method provides the highest level of security
WI-FI protected access (WPA)
-
the topology of a local area network (LAN) is defined by the
physical and logical characteristics
-
one purpose of a perimeter network is to
make resources available to the internet
-
all session data is __________ while using telnet
not encrypted
-
which of these addresses is a multicast address
224.0.0.1
-
which command is used to verify that a server is connected to the network
PING
-
the ping tool is used to
self-test a hosts own network interface: determine whether a host is reachable
-
in which physical network topology is each computer connected to a central point
star
-
which of the following services masks internal IP addresses from outside the network
NAT
-
you need to divide a network into three subnets- which devices should you use
router
-
in addition to switching multilayer switches also
provide layer 3 routing functions
-
which technology provides the highest bit rate
DS3
-
IPV4 multicast addresses range from
224.0.0.0 to 239.255.255.255
-
a university has a network links between carious locations. where would a T3 connection be appropriate
server to network in the main campus server room
-
the query protocol used to locate resources on a network is
lightweight directory access protocol (LDAP)
-
the service that resolves fully qualified domain names (FQDN) to IP addresses is
Domain Name Service (DNS)
-
the type of connector used on a 100BaseT ethernet cable is
RJ-45
-
a characteristic of the mesh topology is that it
uses redundant paths
-
which type of network covers the broadest area
WAN
-
the default port used for SMTP is
25
-
which of these factors has the biggest impact on data transmission speed in a wireless network
the transmission standard of the equipment used
-
the host name of the fully qualified domain name (FQDN) mail.exchange .corp.nwtraders.com is
mail
-
the command line tool used to list a hosts active incoming connections is
NETSTAT
-
one reason to incorporate VLANs in a network is to
reduce the number of nodes in a broadcast domain
-
VPNs are implemented to provide
a secure connection through public networks
-
security is a concern on wireless networks due to
the radio broadcast access method
-
in which OSI layer does routing occure
network
-
IPsec can be used to secure network communications between two machines: IPsec can be used to secure network communication between two networks
YES to both statements
-
connecting to a private network address from a public network requires
network address translation (NAT)
-
to protect a network when it is connected to the internet, you should use a
firewall
-
which of the following determines the media access method that is used in a network
topology and protocols
-
802.11a
- frequency range:5.1-5.8 Ghz
- data rate:54mbps
-
802.11b
- frequency range:2.4-2.485 Ghz
- data rate: 11mbps
-
802.11g
- frequency range:2.4-2.485 Ghz
- data rate: 54 mbps
-
802.11n
- frequency range: 2.4-2.485 Ghz
- data rate: 65-600 mbps
-
in local area network (LAN) topologies the primary media access methods are
contention, token passing
-
what happens when an 802.11b node starts broadcasting within the range of an 802.11g access point
a connection will be established
-
at what layer in the OSI model are hardware addresses referenced
data link
-
a routers static route is set byt the
network administrator
-
what type of record does DNS use to find a mail service
mail exchange (MX) DNS record
-
which protocol can be used to encrypt packets on the internet
HTTPS
-
which subnet mask is valid
255.255.255.240
-
a network that separates an organizations private network from a public network is a
perimeter
-
a node within a local area network (LAN) must have a network interface device and a
host address
-
what is the default subnet mask for a class c internet network
255.255.255.0
-
what is the minimum cabling requirement for a 100BaseTX network
Category 5 UTP cable
-
what should you do if you can not connect to the network today but you could yesterday
verify that the DHCP service is available
-
if an 802.11g internet connection has connectivity problems what may be the cause
Electromagnetic interference (EMI)
-
how many bits are there in an internet protocol version 6 (IPV6) address
128
-
Tracert is used to
report the route taken by packets across an IP network
-
which two of the following are connectivity options for wide area networks (WANS)
dial up: leased line
-
OSI model by layer
- Layer 1- physical
- Layer 2- data link
- Layer 3- network
- Layer 4- transport
- Layer 5- sessions
- Layer 6- Presentation
- Layer 7- Application
-
you pink a server with FQDN and get no response: then pink with the IP address and receive a response- why
the DNS is not responding
-
which of these is an application layer protocol
FTP
-
the top level domain of www.adventureworks.com is
com
-
in a physical star topology the central device is referred to as a
hub
-
when a clients DHCP issued address expires the client will
attempt to obtain a new address by broadcasting
-
which type of port is used to support VLAN traffic between two switches
trunk port
-
which of the following represents a media access control (MAC) address
05:35:AB:6E:A1:25
-
which protocol is a transport layer protocol
UDP
-
which of the following are features of DHCP
address reservation: IP address exclusion
-
two companies want to share data by using the internet- which type of network provides the solution
extranet
-
the ipconfig command will
display a clients address
-
a media access control (MAC) address identifies a
network interface card (NIC)
-
if a router is installed so that it separates a DHCP server from its clients the clients will
be unable to obtain their leases from the server
-
if a router cannot determine the next hop for a packet, the router will
forward the packet to the default route
-
the process of replicating a zone file to multiple DNS servers is called
zone transfer
-
what are these four IEEE standards 802.11a,b,g,n
WiFi
-
the maximum througput of an 802.11g network is
54Mbps
-
connectionless, message-based protocol with best effort service:
connection-oriented protocol with guarantee service:
resolves IP addresses to MAC addresses
UDP
TCP
ARP
-
IPV4 addresses class
- Class A- 64.123.12.1
- Class B- 133.234.23.2
- Class C- 201.111.22.3
- Class D- 224.100.20.30
-
VPN connections
SSL VPN- allows a remote user to connect to a private network from anywhere on the internet
site-to-site VPN- securely connects two portions of a private network or two private networks
layer 2 tunneling protocol- creates an unencrypted connection between two network devices
-
the default gateway addresses identifies the
device that will connect the computer to a remote network
-
attenuation in a wireless network signal is a result of
distance from the access point
-
a network device that associates a media access control (MAC) address with a port is a
switch
-
the function of a router is to
forward traffic to other networks
-
which network does the IP address 220.100.100.100 belong to
220.100.100.0/24
-
one advantage of dynamic routing is that it
automatically maintains routing tables
-
to directly connect the ethernet network interface cards (NICs) of two computers you should use
crossover cables
-
which type of network is most valuable to intrusion
wireless
-
the protocol that maps IP addresses to a media access control (MAC) address is
address resolution protocol (ARP)
-
which of the following uses pointer records and A records
DNS sever
-
the default port used for telnet is
23
-
a VPN is an
encrypted connection across the internet
-
a layer 2 device that connects multiple computers within a network is a
switch
|
|