98-366

  1. the default subnet mask for class b network is
    255.255.0.0
  2. internet key exchange (IKE) is responsible for which two functions
    negotiation algorithms to use, exchanging key information
  3. to which IP configuration does the CIDR notation 192.168.1.1/25 refer
    192.168.1.1    255.255.255.128
  4. what type of DNS record maps host names to addresses
    host (A) DNS record
  5. a service that resolves NetBIOS names to IP addresses is
    windows internet name service (WINS)
  6. which of the following uses a tunneling protocol
    VPN
  7. which technology can you use to extend an internal network across shared or public networks
    VPN
  8. computer that has an IP address of 169.254.0.1 can not access the network:: what service should you confirm is available
    DHCP
  9. which two are published IEEE 802.11 wireless transmission standards
    802.11g 802.11n
  10. which DNS record type specifies the host that is the authority for a given domain
    SOA
  11. a cable that meets the 1000BaseT standard has a maximum lenght of
    100m
  12. which setting is used to determine the Domain Name System (DNS) setting on a client computer
    NSLOOKUP
  13. a private network that allows members of an organization to exchange data is an
    intranet
  14. teredo tunneling is a protocol that
    allows IPV6 connectivity through IPV4 devices
  15. one reason to replace an unmanaged switch with a managed switch is to
    support multiple VLANS
  16. which of the following is a public IP address
    68.24.78.221
  17. which of these represent the internet protocol version 6 (IPV6) loopback address
    ::1
  18. which wireless authentication method provides the highest level of security
    WI-FI protected access (WPA)
  19. the topology of a local area network (LAN) is defined by the
    physical and logical characteristics
  20. one purpose of a perimeter network is to
    make resources available to the internet
  21. all session data is __________ while using telnet
    not encrypted
  22. which of these addresses is a multicast address
    224.0.0.1
  23. which command is used to verify that a server is connected to the network
    PING
  24. the ping tool is used to
    self-test a hosts own network interface: determine whether a host is reachable
  25. in which physical network topology is each computer connected to a central point
    star
  26. which of the following services masks internal IP addresses from outside the network
    NAT
  27. you need to divide a network into three subnets- which devices should you use
    router
  28. in addition to switching multilayer switches also
    provide layer 3 routing functions
  29. which technology provides the highest bit rate
    DS3
  30. IPV4 multicast addresses range from
    224.0.0.0 to 239.255.255.255
  31. a university has a network links between carious locations. where would a T3 connection be appropriate
    server to network in the main campus server room
  32. the query protocol used to locate resources on a network is
    lightweight directory access protocol (LDAP)
  33. the service that resolves fully qualified domain names (FQDN) to IP addresses is
    Domain Name Service (DNS)
  34. the type of connector used on a 100BaseT ethernet cable is
    RJ-45
  35. a characteristic of the mesh topology is that it
    uses redundant paths
  36. which type of network covers the broadest area
    WAN
  37. the default port used for SMTP is
    25
  38. which of these factors has the biggest impact on data transmission speed in a wireless network
    the transmission standard of the equipment used
  39. the host name of the fully qualified domain name  (FQDN) mail.exchange .corp.nwtraders.com is
    mail
  40. the command line tool used to list a hosts active incoming connections is
    NETSTAT
  41. one reason to incorporate VLANs in a network is to
    reduce the number of nodes in a broadcast domain
  42. VPNs are implemented to provide
    a secure connection through public networks
  43. security is a concern on wireless networks due to
    the radio broadcast access method
  44. in which OSI layer does routing occure
    network
  45. IPsec can be used to secure network communications between two machines: IPsec can be used to secure network communication between two networks
    YES to both statements
  46. connecting to a private network address from a public network requires
    network address translation (NAT)
  47. to protect a network when it is connected to the internet, you should use a
    firewall
  48. which of the following determines the media access method that is used in a network
    topology and protocols
  49. 802.11a
    • frequency range:5.1-5.8 Ghz
    • data rate:54mbps
  50. 802.11b
    • frequency range:2.4-2.485 Ghz
    • data rate: 11mbps
  51. 802.11g
    • frequency range:2.4-2.485 Ghz
    • data rate: 54 mbps
  52. 802.11n
    • frequency range: 2.4-2.485 Ghz
    • data rate: 65-600 mbps
  53. in local area network (LAN) topologies the primary media access methods are
    contention, token passing
  54. what happens when an 802.11b node starts broadcasting within the range of an 802.11g access point
    a connection will be established
  55. at what layer in the OSI model are hardware addresses referenced
    data link
  56. a routers static route is set byt the
    network administrator
  57. what type of record does DNS use to find a mail service
    mail exchange (MX) DNS record
  58. which protocol can be used to encrypt packets on the internet
    HTTPS
  59. which subnet mask is valid
    255.255.255.240
  60. a network that separates an organizations private network from a public network is a
    perimeter
  61. a node within a local area network (LAN) must have a network interface device and a
    host address
  62. what is the default subnet mask for a class c internet network
    255.255.255.0
  63. what is the minimum cabling requirement for a 100BaseTX network
    Category 5 UTP cable
  64. what should you do if you can not connect to the network today but you could yesterday
    verify that the DHCP service is available
  65. if an 802.11g internet connection has connectivity problems what may be the cause
    Electromagnetic interference (EMI)
  66. how many bits are there in an internet protocol version 6 (IPV6) address
    128
  67. Tracert is used to
    report the route taken by packets across an IP network
  68. which two of the following are connectivity options for wide area networks (WANS)
    dial up: leased line
  69. OSI model by layer
    • Layer 1- physical 
    • Layer 2- data link 
    • Layer 3- network
    • Layer 4- transport 
    • Layer 5- sessions 
    • Layer 6- Presentation 
    • Layer 7- Application
  70. you pink a server with FQDN and get no response: then pink with the IP address and receive a response- why
    the DNS is not responding
  71. which of these is an application layer protocol
    FTP
  72. the top level domain of www.adventureworks.com is
    com
  73. in a physical star topology the central device is referred to as a
    hub
  74. when a clients DHCP issued address expires the client will
    attempt to obtain a new address by broadcasting
  75. which type of port is used to support VLAN traffic between two switches
    trunk port
  76. which of the following represents a media access control (MAC) address
    05:35:AB:6E:A1:25
  77. which protocol is a transport layer protocol
    UDP
  78. which of the following are features of DHCP
    address reservation: IP address exclusion
  79. two companies want to share data by using the internet- which type of network provides the solution
    extranet
  80. the ipconfig command will
    display a clients address
  81. a media access control (MAC) address identifies a
    network interface card (NIC)
  82. if a router is installed so that it separates a DHCP server from its clients the clients will
    be unable to obtain their leases from the server
  83. if a router cannot determine the next hop for a packet, the router will
    forward the packet to the default route
  84. the process of replicating a zone file to multiple DNS servers is called
    zone transfer
  85. what are these four IEEE standards 802.11a,b,g,n
    WiFi
  86. the maximum througput of an 802.11g network is
    54Mbps
  87. connectionless, message-based protocol with best effort service:

    connection-oriented protocol with guarantee service:

    resolves IP addresses to MAC addresses
    UDP

    TCP

    ARP
  88. IPV4 addresses class
    • Class A- 64.123.12.1
    • Class B- 133.234.23.2
    • Class C- 201.111.22.3
    • Class D- 224.100.20.30
  89. VPN connections
    SSL VPN- allows a remote user to connect to a private network from anywhere on the internet

    site-to-site VPN- securely connects two portions of a private network or two private networks 

    layer 2 tunneling protocol- creates an unencrypted connection between two network devices
  90. the default gateway addresses identifies the
    device that will connect the computer to a remote network
  91. attenuation in a wireless network signal is a result of
    distance from the access point
  92. a network device that associates a media access control (MAC) address with a port is a
    switch
  93. the function of a router is to
    forward traffic to other networks
  94. which network does the IP address 220.100.100.100 belong to
    220.100.100.0/24
  95. one advantage of dynamic routing is that it
    automatically maintains routing tables
  96. to directly connect the ethernet network interface cards (NICs) of two computers you should use
    crossover cables
  97. which type of network is most valuable to intrusion
    wireless
  98. the protocol that maps IP addresses to a media access control (MAC) address is
    address resolution protocol (ARP)
  99. which of the following uses pointer records and A records
    DNS sever
  100. the default port used for telnet is
    23
  101. a VPN is an
    encrypted connection across the internet
  102. a layer 2 device that connects multiple computers within a network is a
    switch
Author
tffnyhghs
ID
347306
Card Set
98-366
Description
98-366
Updated