Shared Flashcard Set

Details

Network + Set 1
Set 1 review cards for Network+
210
Computer Networking
Professional
06/08/2021

Additional Computer Networking Flashcards

 


 

Cards

Term
A group of systems that can receive one another's broadcast messages is known as a __________________.

a.Collision domain
b.Active directory domain
c.Broadcast domain
d.Fully qualified domain name
Definition
Broadcast domain

A broadcast domain is a group of systems that can receive one another's broadcast message. You can break your network into multiple broadcast domains by using routers or VLANs.
Term
A message that is sent out on the network and is destined for a group of systems is known as a ______________ message.

a.Unicast
b.Full duplex
c.Broadcast
d.Multicast
Definition
Multicast

Multicast traffic is traffic that is destined for more than one system, but not all systems
Term
When a client system boots up and requests an IP address, it first must send out which message?

a.DHCP request
b.DHCP discover
c.DHCP response
d.DHCP ACK
Definition
DHCP discover

The DHCP discover message is the first message sent out by a DHCP client to locate a DHCP server on the network. The DHCP discover message is a broadcast message which has a destination MAC address of FF-FF-FF-FF-FF-FF.
Term
What term describes the phenomenon of offering multiple types of communications services on the same network?

a.
Unified communications

b.
Hybrid network topology

c.
Client/server architecture

d.
Convergence
Definition
Convergence

Using the same network to deliver multiple types of communications services is known as convergence. A similar term, unified communications, refers to the centralized management of multiple network-based communications. For example, your company might use one software program to manage intra-office phone calls, long-distance phone calls, cell phone calls, voice mail, faxes, and text messaging for all the users on your network.
Term
Which protocol is used to send email messages?

a.SMTP

b.SSH

c.SNMP

d.SCP
Definition
SMTP

Simple Mail Transfer Protocol (SMTP) is used to send e-mail messages. Simple Network Management Protocol (SNMP) is used to manage network devices. The Secure Shell (SSH) protocol is the recommended protocol for remotely managing a network node. It uses encryption. Secure Copy Protocol (SCP) is used to copy data from one network node to another, using encryption to protect the data transfer
Term
Which protocol should you use if you want to dynamically assign IP addresses to network clients?

a.DNS

b.WINS

c.DHCP

d.CIDR
Definition
DHCP

Dynamic Host Configuration Protocol (DHCP) is a protocol/service that enables a network administrator to assign IP addresses dynamically, without having to configure each machine individually. WINS is an NT protocol/service that maps IP addresses to NetBIOS names. DNS is a protocol/service that maps IP addresses to hostnames. Classless Inter-Domain Routing (CIDR) is also known as supernetting because, unlike subnetting that borrows host bits for a subnet, network bits are borrowed for the host address. The benefit of CIDR is that large numbers of routing table entries can be summarized into a smaller number of entries
Term
Which protocol translates TCP/IP addresses to MAC addresses?

a.ARP

b.DNS

c.RARP

d.WINS
Definition
ARP

Address Resolution Protocol (ARP) translates TCP/IP addresses to MAC addresses. WINS is an NT/2000/2003 protocol/service that maps IP addresses to NetBIOS names. DNS is a protocol/service that maps IP addresses to hostnames. RARP is used to map an IP address to an Ethernet or MAC address.
Term
The purpose of a bridge is to ____________.

a. Amplify a data signal and all accompanying noise

b. Filter data on a network by MAC address

c. Connect network subnets

d. Prepare signals for transmission on a WAN
Definition
Filter data on a network by MAC address

A bridge connects different segments of a network in order to expand the scope of the network. Bridges filter data on a network by MAC address to isolate traffic on a network segment. Bridges are used as a tool on overloaded networks. By filtering data based on MAC address, they efficiently transmit data between sending and receiving devices. Traffic between segments is reduced and network throughput is increased with a bridge. Routers connect network subnets. CSU/DSUs prepare signals for WAN transmission. Repeaters are network devices that amplify data signals and all accompanying noise.
Term
Which layer of the OSI model is concerned with hubs and repeaters?

a.Network

b.Physical

c.Application

d.Data Link
Definition
Physical

The OSI model describes the tasks a protocol suite performs as data moves from node to node on a network. The OSI model consists of seven layers. From layer 1 to layer 7 the layers are Physical, Data Link, Network, Transport, Session, Presentation and Application. Several network devices are associated with layers of the OSI model. Hubs and repeaters are associated with the Physical layer of the OSI model.
Term
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response?

a.3 and 6

b.1 and 2

c.2 and 3

d.5 and 6
Definition
The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and 100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.

The correct answer is: 3 and 6
Term
True or false? A segment is part of a network usually composed of a group of nodes that use the same communications channel for all their traffic.
Definition
True
Term
What is the range of the "Well-known", TCP and UDP ports?
Definition
Below 1024

The well-known port numbers are all below 1024. An example would be HTTPS (Secure WWW) connectivity at port 443.
Term
Which of the following Protocols is used when making a connectionless state link on the Transport Layer?

a.TCP

b.UDP

c.IP

d.Peer-to-Peer

e.H.323
Definition
UDP

User Datagram Protocol (UDP) sacrifices reliability for speed and efficiency in the transport of data.While TCP connections opens a session between nodes to ensure data is transported correctly.
Term
An IP address resides at which layer of the OSI reference model?

a.Network layer

b.Application Layer

c.Transport layer

d.Session layer

e.Data link layer
Definition
Network layer

IP addresses can be a typical component at the network layer (Layer 3) of the OSI model. Routers use these addresses to route traffic across a Network
Term
Windowing is featured at what layer of the OSI reference model?

a.Data-Link

b.Transport

c.Session

d.Application

e.Network
Definition
Transport
Term
Which type of network transmission uses all available frequencies on its medium to transmit/receive data?

a.Baseband

b.Time Division Multiplexing

c.Duplex

d.Cellular

e.Broadband
Definition
Baseband
Term
Of the following physical LAN topologies, which requires the most cabling?

a.Bus

b.Star

c.Ring

d.WLAN
Definition
Star

The star topology is the most common topology used today in switched LANs. It features quite a bit of cabling, as the switches require media to each and every node (wired) that needs to communicate. There are also trunk connections between the switches for an extended star topology, which implies even more cabling
Term
How many WAN links are required to create a full mesh of connections
between five remote sites?

a.20

b.5

c.25

d.10

e.15
Definition
10

The equation for the number of connections required for the full-mesh topology is n(n–1)/2, where n is the number of nodes. So, in this case, 5(5–1)/2 is 5(4)/2 = 10
Term
Which device makes traffic-forwarding decisions based on MAC addresses?

a.Modem

b.Router

c.Hub

d.Access Point

e.Switch
Definition
Switch

Switches make forwarding decisions based on the destination MAC (hardware) address contained in the data frame. As opposed to to a router, which makes forwarding decisions based on the destination IP address
Term
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?


a.255.255.255.0

b.255.255.240.0

c.255.255.255.240

d.255.255.255.128
Definition
255.255.240.0
Term
At which of the following OSI layers does a Layer 3 switch operate?
a. Presentation

b. Data link

c. Session

d. Transport

e. Network
Definition
Data link, network
Term
Which of the following replaces the destination IP address of a packet?

a.DHCP
b.DNS
c.NAT
d.SNAT
Definition
SNAT
Term
Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed?

a.History log

b.System log

c.SNMP agent

d.SNMP trap
Definition
SNMP trap
Term
Which of the following standards provides port authentication?

a.802.1x

b.802.2

c.802.1q

d.802.11
Definition
802.1x
Term
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch panel?

a.Punch down tool

b.Multimeter

c.Toner probe

d.Cable crimper
Definition
Punch down tool
Term
Internet-working devices operate at which OSI layer?
Definition
Layer 3
Term
A network has four switches; each switch has a physical link to all other switches. Which topology is being used?
Definition
Mesh
Term
You are troubleshooting communication to a network by looking at the link light on the switch. What layer of the OSI model are you troubleshooting when looking at a link light?

a.Data link

b.Network

c.Physical

d.Application
Definition
Physical

The physical layer of the OSI model deals with physical aspects of the network, such as the cables and connectors. A displayed link light simply means a connection exists.
Term
What layer of the OSI model is responsible for breaking the data into smaller segments?
Definition
Data Link
Term
Which layer of the OSI model works with packets?
Definition
Layer 3

When the layer-3 header has been added to the message, the message is known as a packet. Layer-3 devices such as routers process packets.
Term
What is the application layer protocol for receiving e-mail over the Internet?

a.POP3

b.FTP

c.SNMP

d.SMTP
Definition
POP3
Term
Which Gigabit Ethernet standard uses UTP cabling to reach 1000 Mbps?


a. 1000BaseTX

b.1000BaseSX

c.1000BaseCX

d.1000BaseLX
Definition
1000BaseTX
Term
Which 10 Gigabit Ethernet standard uses multimode fiber-optic cabling?

a.10GBaseER

b.1000BaseSX

c.10GBaseLR

d.10GBaseSR
Definition
10GBaseSR
Term
Which layer of the OSI model works with frames?

a.Layer 3

b.Layer 1

c.Layer 2

d.Layer 4
Definition
Layer 2

Layer 2 of the OSI model works with frames. This means that devices such as bridges and switches process the frames because they are considered layer-2 devices. Note that at layer 3 the data being processed is called a packet because it has a layer-3 header, and at layer 4 the data is known as a segment.
Term
Which of the following is a secure way to transfer files from one device to another?

a.
TFTP

b.
FTP

c.
SNMPv3

d.
SFTP
Definition
SFTP
Term
Which of the following commands can be used to find the MAC address of a connecting router?

a.ping sweep

b.traceroute

c.ping

d.arp
Definition
arp
Term
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs?

a.10GBase-ER

b.10GBase-SW

c.10GBase-SR

d.100Base-FX
Definition
10GBase-SR
Term
Which of the following ports does IPSec use, by default?

a.8080

b.53

c.500

d.3389
Definition
500
Term
Which of the following can be used to find the location of a cable short?

a.TDR

b.Protocol analyser

c.Multimeter

d.CSU/DSU
Definition
TDR

A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
Term
Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user?


a.Baseband

b.POTS

c.Broadband

d.Satellite
Definition
Broadband
Term
Which of the following is a commonly used protocol for VoIP network communication?

aDNS

b.SNMP

c.RTP

d.DHCP

e.SSH
Definition
RTP
Term
Which of the following protocols uses port 143 by default?

a.POP3

b.NTP

c.SNMP

d.IMAP4
Definition
IMAP4
Term
Which of the following is the GREATEST concern when using an orbital satellite WAN link?

a.Latency

b.Cable length

c.Collisions

d.Duplex
Definition
Latency
Term
VLANs occur at which of the following layers of the OSI model?

a.Layer 3

b.Layer 2

c.Layer 4

d.Layer 1

e.Layer 6
Definition
Layer 2
Term
Which of the following classes is the address 208.177.23.1?

a.Class A

b.Class C

c.Class D

d.Class B
Definition
Class C
Term
Which of the following protocols could be used in a peer-to-peer topology?

a.IGMP

b.NetBIOS

c.TACACS+

d.RADIUS
Definition
IGMP
Term
Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WPA2-PSK? (Select two.)

a. Subnet mask

b. Name servers

c. SSID

d. Shared key
Definition
SSID, Shared Key
Term
Which of the following WAN technologies requires fiber optics?

a.POTS

b.PSTN

c.ADSL

d.SONET
Definition
SONET
Term
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use?

a.Multimode fiber

b.RG-6 copper

c.CAT6 copper

d.Single-mode fiber
Definition
Multimode fiber
Term
Which of the following network protocols is used for sending outbound email from a host?

a.SMTP

b.POP

c.IMAP

d.RTP
Definition
SMTP

Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.
The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails. Both protocols are supported by all modern email clients andweb servers.
Main difference between IMAP and POP3:
The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the IMAP protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your mailbox is about to be managed by multiple users.
Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the Internet. SMTP uses TCP port 25.
Term
A network administrator would MOST likely use a port scanner to do which of the following?

a.Report the link speed and duplex of all ports on a switch

b.Trace a physical network port through a building

c.Remotely test a firewall configuration on a server


d.Capture incoming network packets to port 80 on a workstation
Definition
Remotely test a firewall configuration on a server
Term
Which of the following BEST explains the function of OSI layer 4?


a.Specifying signal timing and amplitude

b.Reliable delivery of packets

c.Routing packets across segments

d.Connecting hosts on the same segment
Definition
Reliable delivery of packets
Term
Which of the following WAN technologies allows for the fastest connection?

a.T1

b.SONET

c.ADSL

d.OC-12
Definition
SONET
Term
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distance


a.DSL

b.ATM

c.WiMAX

d.E3/T3
Definition
WiMAX
Term
Which of the following Internet technologies would provide the GREATEST bandwidth?

a.T1

b.Cable

c.E3/T3

d.OC3
Definition
OC3
Term
A particular route's destination address is referred to as the:

a.Shot vector

b.RIP peer

c.Next hop

d.Link state
Definition
Next hop
Term
Which of the following tools is designed to send an audible signal through one end of a cable, so that it can be found at the other end of the cable?

a.Cable tester

b.Toner probe

c.Voltage event recorder

d.Multimeter
Definition
Toner probe
Term
IGP differs from EGP because IGP is designed for use in which of the following?

a.Single autonomous network

b.Communication between WANs

c.Communication between networks

d.Single non-autonomous network
Definition
Single autonomous network
Term
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?

a.255.255.240.0

b.255.255.255.128

c.255.255.255.0

d.255.255.255.240
Definition
255.255.240.0
Term
Which of the following network cable types is LEAST susceptible to EMI?

a.UTP CAT3

b.Coaxial

c.UTP CAT5

d.Plenum STP CAT5
Definition
Coaxial
Term
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types could be used?

a. CAT 5e

b. CAT 6

c. CAT 5

d. RG 58 coaxial

e. Cat 3
Definition
CAT 5e, CAT 6
Term
CAT 6 Ethernet cabling has a rated maximum transmission capability of?

a.10Mbps

b.10,000 Mbps

c.100 Mbps

d.20,000 Mbps
Definition
10,000 Mbps
Term
An admin has been tasked with running cables from one office to another neighbouring office by running cables over the light fixtures in the ceiling that connects both offices. To prevent interference, which of the following should be used?

a.UTP CAT 5e

b.Multimode Fiber

c.RG58 Coaxial

d.UTP CAT6
Definition
Multimode Fiber
Term
At which of the following places does the telephone company's responsibility cease?

a.MDF

b.66 Block

c.Demarc

d.IDF

e.110 Block
Definition
Demarc
Term
In cable standards, a T always indicates which of the following characteristics? (Choose two.)

a. Maximum distance of 100 meters without repeaters

b. Maximum distance 10,000 feet without repeaters

c. Twisted-pair cable

d. Coaxial cable
Definition
Regardless of the speed of the connection, a T always indicates that twisted pair wire will be used; which will have a maximum segment distance of 100 meters without repeaters
The correct answers are: Twisted-pair cable, Maximum distance of 100 meters without repeaters
Term
In what form is an IPv6 address usually expressed?

a.Hexadecimal

b.Binary

c.Decimal
Definition
Hexadecimal
Term
An Ethernet MAC (Media Access Control) address consists of:

a.64 bits

b.12 bits

c.32 bits

d.48 bits
Definition
48 bits
Term
Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard describes the physical layer for networks that use a ring topology?

a.802.4

b.802.5

c.802.2

d.802.3
Definition
802.5
Term
All of the following IP (Internet Protocol) addresses are routable on the internet EXCEPT:

a.172.16.16.1

b.201.35.44.1

c.126.14.254.1

d.192.10.20.1
Definition
172.16.16.1
Term
Which of the following options are the minimal settings for connecting a computer to a TCP / IP (Transmission Control Protocol / Internet Protocol) LAN (Local Area Network) while accessing the Internet?

a.IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)

b.IP (Internet Protocol) address, DNS (Domain Name Service), and gateway

c.IP (Internet Protocol) address and gateway

d.Subnet mask, IP (Internet Protocol) address, and DNS (Domain Name Service)
Definition
IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)
Term
What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?

a.18,000 feet (5,486.4 meters)

b.12,000 feet (3,657.6 meters)

c.6,000 feet (1,828.8 meters)

d.8,000 feet (2,438.4 meters)
Definition
a.18,000 feet (5,486.4 meters)
Term
Which of the following cable types is used to link together two buildings that are over 10 miles (16.09 kilometers) apart?

a.Category 6 cable

b.MMF (MultiMode Fiber)

c.SMF (Single Mode Fiber)

d.Coaxial cable
Definition
SMF (Single Mode Fiber)
Term
Which of the following connectors are SFF (Small Form Factor) fiber connectors?

a.ST (Straight Tip) and SC (Standard Connector)

b.RJ-45 (Registered Jack) and RJ-11 (Registered Jack)

c.Series-A and Series-B

d.MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector)
Definition
MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector)
Term
Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?

a.3

b.2

c.4

d.1
Definition
b.2
Term
Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses a 1300 nm (nanometer) beam?

a.10 GBASE-ER and 10 GBASE-SR

b.1000BASE-LX and 10 GBASE-LR

c.1000BASE-CX and 1000BASE-T

d.1000BASE-SX and 10 GBASE-SR
Definition
1000BASE-LX and 10 GBASE-LR
Term
At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?

a.Network

b.Transport

c.Session

d.Physical
Definition
Transport
Term
Which one of the following is a purpose for subnetting?

a.To block Internet traffic

b.To decrease network congestion

c.To consolidate several small networks into one large network

d.To increase network bandwidth
Definition
To decrease network congestion
Term
Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?

a.RADIUS (Remote Authentication Dial-In User Service)

b.PPP (Point-to-Point Protocol)

c.TCP / IP (Transmission Control Protocol / Internet Protocol)

d.SLIP (Serial Line Internet Protocol)
Definition
PPP (Point-to-Point Protocol)
Term
All of the following are valid IP (Internet Protocol) addresses EXCEPT:

a.172.192.4.256

b.192.168.0.1

c.156.144.226.123

d.10.24.12.0
Definition
172.192.4.256
Term
True or false? 100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.
Definition
False
Term
A(n) _________ is used to convert LAN signals to WAN signals, and vice versa.

a.Modem

b.NTU

c.Demarc

d.CSU/DSU
Definition
CSU/DSU
Term
True or false? EIGRP is a link state routing protocol.
Definition
False
Term
True or false? Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD.
Definition
False
Term
ST and SC are both types of _________ connectors.

a.Thinnet

b.Bus

c.Fast Ethernet

d.Fiber-optic
Definition
Fiber-optic
Term
RIP and RIPv2 are both __________ routing protocols.

a.Hybrid

b.Link State

c.Distance Vector

d.Static
Definition
Distance Vector
Term
A bus topology requires __________ to prevent signal bounce, which will disrupt the network.

a.End-Caps

b.Terminators

c.Germinator

d.T-ends
Definition
Terminators
Term
A switch controls and segments traffic on your network by learning the ______ addresses of all the components connected to it.
Definition
MAC
Term
Which of the following functions can be performed at layer 6 of the OSI model? (Select all that apply.)


a. Encryption


b. Routing of the message

c. Converting the message to a format that is understood by the destination

d. Compression
Definition
The correct answers are: Compression, Encryption, Converting the message to a format that is understood by the destination
Term
Which of the following protocols are transport-layer protocols? (Choose two.)

a. IP

b. IPX

c. SPX

d. TCP
Definition
The correct answers are: TCP, SPX
Term
Which protocol in the IPX/SPX protocol suite is responsible for logical addressing and delivery?

a.IPX

b.IP

c.arp

d.SPX
Definition
IPX
Term
Which 802 project standard defines Gigabit Ethernet using fiber-optic cabling?

a.802.11g

b.802.5

c.802.3z

d.802.3ab
Definition
802.3z
Term
Which 802 project standard defines 10-Gigabit Ethernet?

a.802.3ab

b.802.11g

c.802.3z

d.802.3ae
Definition
802.3ae
Term
Which of the following protocols is a nonroutable protocol?

a.IPX/SPX

b.AppleTalk

c.TCP/IP

d.NetBEUI
Definition
NetBEUI
Term
When data is sent to a system on a switch, the data is sent to what port(s)?

a.All ports on the immediate switch, but not any uplinked switch

b.The port of the destination system

c.All ports on the immediate switch and any uplinked switches

d.All ports on the uplinked switch
Definition
The port of the destination system
Term
Which layer of the OSI model does a bridge run at?
Definition
Layer 2
Term
Which networking device routes data used by a routable protocol but bridges data for non routable protocols?

a.Brouter

b.Bridge

c.Router

d.Gateway
Definition
Brouter
Term
How many B-channels are in a BRI ISDN connection?
Definition
2
Term
What is a BNC connector?

a.Same as an RJ-45 connector

b.A 9-pin DB male connector

c.A 25-pin D female connector

d.A miniature quick connect/disconnect connector used for coaxial cable
Definition
A miniature quick connect/disconnect connector used for coaxial cable
Term
Which network address class supports 65,534 hosts?

a.Class B

b.Class D

c.Class C

d.Class A
Definition
Class B
Term
Private IP ranges
Definition
Range from 10.0.0.0 to 10.255.255.255 — a 10.0.0.0 network with a 255.0.0.0 or /8 (an 8-bit) mask

Range from 172.16.0.0 to 172.31.255.255 — a 172.16.0.0 network with a 255.240.0.0 or /12


A 192.168.0.0 to 192.168.255.255 range, which is a 192.168.0.0 network masked by 255.255.0.0 or /16

A special range 100.64.0.0 to 100.127.255.255 with a 255.192.0.0 or /10 network mask; this subnet is recommended according to rfc6598 for use as an address pool for CGN (Carrier-Grade NAT)
Term
Which network service is responsible for allowing Microsoft clients access to the file system on a UNIX server?
a.SMB

b.Samba

c.NAT

d.NFS
Definition
Samba
Samba is responsible for allowing Microsoft clients to access resources on the UNIX system because Samba implements the SMB protocol.
Term
Which network service is responsible for allowing Microsoft clients to access the file system on Microsoft servers?

a.SMB

b.NAT

c.Samba

d.NFS
Definition
SMB
SMB is the protocol in Microsoft environments that allows Microsoft clients to connect to the file system of other Microsoft systems.
Term
Which protocol is responsible for error reporting and status information?

a.ICMP

b.UDP

c.TCP

d.IP
Definition
ICMP
ICMP is responsible for reporting errors and sending back status information when communicating over TCP/IP.
Term
Which protocol is responsible for logical addressing and delivery of packets?

a.IP

b.TCP

c.ICMP

d.UDP
Definition
IP
IP is responsible for packet delivery and logical addressing
Term
Which of the following protocols would a tech use to disable switch ports automatically to prevent switching loops?

a.EGP

b.RIP

c.OSPF

d.STP
Definition
STP
Spanning Tree Protocol
Term
How many bits are in an IPv6 address?

a.64

b.128

c.32

d.256
Definition
128
Term
Which of the following has a backbone network topology that uses a router or switch as the single central connection point for multiple subnetworks?

a.Collapsed

b.Distributed

c.Serial

d.Parallel
Definition
Collapsed
Term
What switching technique establishes a connection between two network nodes before transmitting data?

a.Circuit switching
b.MPLS (Multiple Label Switching)
c.Packet switching
d.Message switching
Definition
Circuit switching
Term
Which of the following is a 10-gigabit per second Ethernet fiber-optic standard?

a.10GBase-T

b.100Base-FX

c.10GBase-ER

d.10Base-T
Definition
10GBase-ER
Term
Which routing protocol is commonly used on LANs that use exclusively Cisco routers?

a.EIGRP

b.OSPF

c.BGP

d.RIPv2
Definition
EIGRP
Term
A tech blocks access to ports 25,110 and 143 on the firewall. Which of the applications services will be blocked due to this?

a.Email sending and receiving

b.FTP access to external servers

c.Remote Desktop access

d.Domain Name Service
Definition
Email sending and receiving
Term
Which Layer of the OSI model performs error detection using a Frame Check Sequence?

a.Physical

b.Transport

c.Session

d.Data Link
Definition
Data Link
Term
Which access method do computers use on an Ethernet network?

a.Token passing

b.CSMA/CA

c.TCP/IP

d.CSMA/CD
Definition
CSMA/CD
Term
Which of the following addresses indicate an APIPA address?

a.10.10.10.5

b.172.16.4.2

c.169.254.1.2

d.192.168.2.6
Definition
169.254.1.2

Automatic Private Internet Protocol Addressing (APIPA) addresses have the first and second octet address of 169.254. All the other addresses are nonroutable private addresses.
Term
Which of the following are distance vector routing protocols? (Choose two.)

a. OSPF

b. IS-IS

c. BGP

d. RIPv2
Definition
RIP, RIPv2, EIGRP, and BGP are all distance vector routing protocols. OSPF and IS-IS are link state routing protocols.
The correct answers are: BGP, RIPv2
Term
Which of the following connectors are used for fiber-optic cable? (Choose two.)

a. ST

b. BNC

c. SC

d. RJ-45
Definition
The correct answers are: SC, ST
Term
What type of network connector would you use if you were running fiber-optic cable on your network?

a.BNC

b.RJ-45

c.ST

d.USB
Definition
ST
ST connectors are one type of industry-standard connector for fiber-optic cable. A network that uses coaxial cable as the transmission medium, though considered a legacy network, uses T-connectors to connect the transmission medium to the network interface board installed in each computer. The connectivity device that is used to connect cable to a T-connector is a BNC connector. RJ-45 connectors are used with UTP as the transmission medium. Universal Serial Bus (USB) connectors are used to connect USB-compatible peripherals to a computer or a USB hub.
Term
Which of the following Ethernet cabling schemes should you use to run 10-megabit Ethernet over fiber optic to the desktop?

a.10Base2

b.1000BaseTX

c.10BaseFL

d.10BaseT

e.10Base5
Definition
The correct answer is: 10BaseFL
Term
Which of the following is a connector type used with coaxial cabling?

a.RJ-45

b.MT-R6

c.RJ-11

d.BNC
Definition
BNC
Term
In which of the following situations is full-duplex NOT possible?

a.A connection between a switch and a host

b.A connection between a hub and a host

c.A connection between a host and a host using a crossover cable

d.A connection between a switch and a switch
Definition
A connection between a hub and a host
Term
What is the maximum transmission distance for a network using 10Base5 technology?

a.1,000 meters per segment

b.500 meters per segment

c.185 meters per segment

d.100 meters per segment
Definition
500 meters per segment
When describing Ethernet cabling, there are three components in the name. The first number defines the transmission rate in Mbps. The second term is either Base or Broad, which defines the type of signaling used. The last characters are unique cable identifiers. Thicknet is also known as 10Base5. The last character, 5, indicates that the maximum transmission distance for thicknet is 500 meters.
Term
Your network is connected to the Internet. As the network administrator, you install packet filtering on the router that connects your network to the Internet. After you configure packet filtering, users on the network are no longer able to download files. What did you do to create this problem?

a.You blocked port 80

b.You blocked port 21

c.You blocked port 25

d.You blocked port 110
Definition
You blocked port 21

Packet filtering is the process of filtering (discarding) data based on source address, destination address, port number, or domain name. Packet filtering is a software implementation of a firewall. A port is an address that identifies an application that is associated with data. Some of the well-known port numbers are port 15 for NETSTAT, port 21 for FTP, port 23 for Telnet, port 25 for SMTP, port 53 for DNS, port 80 for HTTP, port 110 for POP3, and port 119 for NNTP.


In this question, the problem is the users can no longer download files. In this question, you have blocked port 21, which is associated with File Transfer Protocol (FTP). FTP is responsible for downloading files over a TCP/IP network. This is the protocol that a user configures in order to download files.

The correct answer is: You blocked port 21
Term
True or false? In IPv6, the loopback address has a value of 0:0:0:0:0:0:0:1, which is abbreviated as ::1
Definition
True
Term
True or false? Most LANs will support both Ethernet and token ring frames.
Definition
False
Term
Which bus type allows an NIC to be attached externally?
a.PCI

b.ISA

c.PCIe

d.PCMCIA
Definition
PCMCIA
Term
If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?

a.AP

b.RFI

c.RSSI

d.Latency
Definition
RFI
Term
A small organisation has just moved into a new office and needs a 100 megabit Ethernet LAN. What is the minimum type of cabling that will support this LAN?

a.Coax (thin net)

b.Category 3

c.Coax (thick net)

d.Category 5
Definition
Category 5
Term
Identify the Quality of Service (QoS) mechanism that can fragment large packets and interleave smaller packets in amongst the packet fragments.

a.Policing

b.CRTP

c.Traffic shaping

d.LFI
Definition
LFI

LFI is the Quality of Service (QoS) mechanism that can fragment large packets and interleave smaller packets in amongst the packet fragments. As a result, the smaller packets can exit a slow-speed interface sooner, and not experience excessive delay.

Link Fragmentation and Interleaving (LFI) and RTP Header Compression (cRTP) are both link efficiency mechanisms, which attempt to make a more efficient use of relatively limited WAN bandwidth.



cRTP can take the Layer 3 and Layer 4 headers of a Real-time Transport Protocol (RTP) packet (used to carry voice over IP traffic), which total 40 Bytes in size, and compress them down to only two or four Bytes (two Bytes without UDP checksums and four Bytes with UDP checksums).


Policing and traffic shaping are both traffic conditioners, each of which can set a bandwidth limit on traffic. However, policing has the ability to drop excess packets, while traffic shaping delays excess traffic.
Term
You visit the supply room in search of a cable that will connect one user's computer directly to another user's computer. What type of cable do you reach for?

a. Null

b.Roll-over

c.Crossover

d.Straight-through
Definition
Crossover

You reach for a crossover cable, which will connect one user's computer directly to another user's computer.

Straight-through cables are used to connect a user to a switch, and a switch to a router.

A roll-over cable is used by network engineers to connect the serial port on a terminal to switch or router to manage and configure the device.

A null cable may be used for testing or terminating a bus.
Term
Your customer is concerned about "bad" storage performance and asks you how to resolve
it. Which two steps should be performed first? (Choose two.)

a. Measure cache hits and processor utilisation

b. Clarify the customer's concerns and expectations

c. Determine LUN response times

d. Establish comprehensive data collection
Definition
Clarify the customer's concerns and expectations
Establish comprehensive data collection
Term
Which three actions will help to reduce the level of Write Pending data in cache during periods of intense random update processing? (Choose three.)

a. Migrate from RAID5 to RAID1

b. Spread the load across more LUNs

c. Spread the load across more ports

d. Switch to faster disk drives

e. Spread the load across more RAID Groups
Definition
Switch to faster disk drives, Migrate from RAID5 to RAID1, Spread the load across more RAID Groups
Term
What are the most common types of virtualisation being implemented? (Select three.)

a. Power

b. Cooling

c. Storage

d. Printing

e. Server

f. Clients
Definition
Clients, Server, Storage
Term
Which third-party vendors offer implementation of VMs with hardware-assisted
virtualisation? (Select two.)

a. Citrix XenServer

b. Red Hat Enterprise Linux

c. SUSE Linux Enterprise

d. Microsoft Hyper-V Server 2016

e. VMware ESX
Definition
Microsoft Hyper-V Server 2016, Citrix XenServer
Term
What is the name of the Microsoft product offering for desktop virtualisation and virtual desktop management?

a.Virtual Enterprise Centralised Desktop (VECD)

b.Microsoft Application Virtualisation (App-V)

c.Virtual Desktop Infrastructure (VDI)

d.Microsoft Enterprise Desktop Virtualisation (MED-V) 2.0
Definition
Microsoft Enterprise Desktop Virtualisation (MED-V) 2.0
Term
Which device acts most like a router?

a.OSI model Layer 2 hub

b.OSI model Layer 3 switch

c.OSI model Layer 1 repeater

d.OSI model Layer 2 bridge
Definition
OSI model Layer 3 switch
Term
Which term identifies a router category that directs data between nodes on an autonomous LAN?


a.Interior router

b.Border router

c.Exterior router

d.Gateway router
Definition
Interior router
Term
Which routing protocol is commonly used on LANs that use exclusively Cisco routers?

a.OSPF

b.RIPv2

c.BGP

d.EIGRP
Definition
EIGRP
Term
A(n) WHAT is the connectivity device that performs the regeneration of a digital signal.
Definition
repeater
Term
A(n) WHAT is a multiport repeater.
Definition
hub
Term
A(n) WHAT is a device that connects two network segments by analysing incoming frames and making decisions about where to direct them based on each frame’s MAC address.
Definition
bridge
Term
A switch running in WHAT mode reads a frame’s header and decides where to forward the data before it receives the entire packet.
Definition
cut-through
Term
WHAT are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Definition
gateways
Term
True or false? All NICs are engineered to work in an older bus regardless of whether a new, faster bus is available on the motherboard.
Definition
false
Term
True or false? A computer’s port is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer’s components, including its memory, processor, hard disk and NIC.
Definition
false
Term
Which is not an area typically targeted by a data loss prevention policy?

a.Cloud level

b.Client level

c.Storage level

d.Server Level

e.Network level
Definition
Cloud level
Term
Which is not a typical best practice found in a password policy?


a.Password uniqueness

b.Write down and keep in a safe place

c.Use of uppercase and lowercase letters only

d.Password expiration

e.No usage of proper names
Definition
Use of uppercase and lowercase letters only
Term
A technician would use a logical network diagram to determine the number of:

a.Users on the network

b.Broadcast domains on the network

c.Switches on the network

d.Cables in the network
Definition
Broadcast domains on the network
Term
Which of the following methods is used in creating an ACL?

a.Content filtering

b.VPNs

c.IP filtering

d.PPPs
Definition
IP filtering
Term
An administrator needs to check the number of active connections on their computer.
Which of the following should the administrator use?

a.dig

b.ping

c.ipconfig

d.netstat
Definition
netstat
Term
You are monitoring network traffic and you notice a number of DHCP discover messages on the network. Which of the following is the destination address of the DHCP discover message?

a.192.168.0.0

b.FF-FF-FF-FF-FF-FF

c.0F-1B-3C-2F-3C-2A

d.192.168.4.5
Definition
FF-FF-FF-FF-FF-FF
Term
You are monitoring network traffic and notice that there is a large number of broadcast messages sent across the wire. You would like to separate your network into multiple broadcast domains. How can you do this? (Select two.)

a. Bridge

b. VLANs
c. Switch

d. Router
Definition
VLANs, Router
Term
Which of the following is a best practice when implementing a basic wireless network?

a.Configuring encryption with a WPA2-PSK key and labeling the key on the WAP

b.Disabling SSID broadcast

c.Adding two access points per area of service

d.Not configuring the ESSID point
Definition
Disabling SSID broadcast
Term
Which of the following can be used to find the location of a cable short?

a.CSU/DSU

b.TDR

c.Multimeter

d.Protocol analyser
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).

The correct answer is: TDR
Term
Which is not a typical best practice found in a password policy?


a.Password uniqueness

b.Write down and keep in a safe place

c.Use of uppercase and lowercase letters only

d.Password expiration

e.No usage of proper names
Definition
Use of uppercase and lowercase letters only
Term
A technician would use a logical network diagram to determine the number of:

a.Users on the network

b.Broadcast domains on the network

c.Switches on the network

d.Cables in the network
Definition
Broadcast domains on the network
Term
Which of the following methods is used in creating an ACL?

a.Content filtering

b.VPNs

c.IP filtering

d.PPPs
Definition
IP filtering
Term
An administrator needs to check the number of active connections on their computer.
Which of the following should the administrator use?

a.dig

b.ping

c.ipconfig

d.netstat
Definition
netstat
Term
You are monitoring network traffic and you notice a number of DHCP discover messages on the network. Which of the following is the destination address of the DHCP discover message?

a.192.168.0.0

b.FF-FF-FF-FF-FF-FF

c.0F-1B-3C-2F-3C-2A

d.192.168.4.5
Definition
FF-FF-FF-FF-FF-FF
Term
You are monitoring network traffic and notice that there is a large number of broadcast messages sent across the wire. You would like to separate your network into multiple broadcast domains. How can you do this? (Select two.)

a. Bridge

b. VLANs
c. Switch

d. Router
Definition
VLANs, Router
Term
Which of the following is a best practice when implementing a basic wireless network?

a.Configuring encryption with a WPA2-PSK key and labeling the key on the WAP

b.Disabling SSID broadcast

c.Adding two access points per area of service

d.Not configuring the ESSID point
Definition
Disabling SSID broadcast
Term
Which of the following can be used to find the location of a cable short?

a.CSU/DSU

b.TDR

c.Multimeter

d.Protocol analyser
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).

The correct answer is: TDR
Term
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?

a.Kerberos
b.RADIUS
c.WPA2-PSK
d.TKIP
e.WEP
Definition
erbe
Term
Which of the following are more secure file transfer alternatives to using FTP? (Select two)

a. SNTP

b. HTTP

c. RCP

d. SFTP

e. SCP
Definition
SFTP, SCP
Term
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?

a.WPA2

b.TKIP

c.802.1ad

d.802.1x
Definition
802.1x
Term
Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?


a.RDP access

b.IPSec VPN

c.SSL VPN

d.Dial-in access
Definition
.SSL VPN
Term
An administrator needs to learn which buildings have multimode or singlemode fiber.
Which of the following configuration management documentation would be the BEST choice to use?


a.Baseline configurations

b.Security policy

c.Physical network diagram

d.CAT5 wiring schematics
Definition
Physical network diagram
Term
Which of the following is used by a company's ISP to troubleshoot network issues?

a. Demarc

b.66 Block

c.Smart Jack

d.110 Block
Definition
Smart Jack
Term
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444?

a.ipconfig /all

b.ifconfig -a

c.netstat -nap

d.netstat -nao
Definition
netstat -nao
Term
XYZ County Schools is a small rural school district. Recently, the CIO was given authorisation to connect the district-office LAN to the Internet. A 56Kbps line was installed in the district office. What two internetworking devices does XYZ County Schools have to install in order to connect the district-office LAN to the Internet? (Choose two.)

a. Router

b. Gateway

c. Repeater

d. CSU/DSU

e. Bridge
Definition
Router, CSU/DSU
Term
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?

a.Kerberos
b.RADIUS
c.WPA2-PSK
d.TKIP
e.WEP
Definition
erbe
Term
Which of the following are more secure file transfer alternatives to using FTP? (Select two)

a. SNTP

b. HTTP

c. RCP

d. SFTP

e. SCP
Definition
SFTP, SCP
Term
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?

a.WPA2

b.TKIP

c.802.1ad

d.802.1x
Definition
802.1x
Term
Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?


a.RDP access

b.IPSec VPN

c.SSL VPN

d.Dial-in access
Definition
.SSL VPN
Term
An administrator needs to learn which buildings have multimode or singlemode fiber.
Which of the following configuration management documentation would be the BEST choice to use?


a.Baseline configurations

b.Security policy

c.Physical network diagram

d.CAT5 wiring schematics
Definition
Physical network diagram
Term
Which of the following is used by a company's ISP to troubleshoot network issues?

a. Demarc

b.66 Block

c.Smart Jack

d.110 Block
Definition
Smart Jack
Term
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444?

a.ipconfig /all

b.ifconfig -a

c.netstat -nap

d.netstat -nao
Definition
netstat -nao
Term
XYZ County Schools is a small rural school district. Recently, the CIO was given authorisation to connect the district-office LAN to the Internet. A 56Kbps line was installed in the district office. What two internetworking devices does XYZ County Schools have to install in order to connect the district-office LAN to the Internet? (Choose two.)

a. Router

b. Gateway

c. Repeater

d. CSU/DSU

e. Bridge
Definition
Router, CSU/DSU
Term
Which of the following commands can be used to find the MAC address of a connecting router?

a.arp

b.traceroute

c.ping sweep

d.ping
Definition
arp
Term
Which of the following can be used to find the location of a cable short?

a.CSU/DSU

b.TDR

c.Protocol analyzer

d.Multimete
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
The correct answer is: TDR
Term
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used?
a.Loopback

b.Straight

c.Crossover

d.Rollover
Definition
Crossover
Term
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem?

Internet Address Physical Address Type
172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic

a.Static ARP entries

b.Reverse ARP failure

c.IP address conflict

d.MAC spoofing
Definition
MAC spoofing
Term
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution?

a.Add a router to connect both networks

b.Change the subnet mask to 255.255.254.0

c.Request another class C IP scope from the ISP.

d.Switch to static IP addressing.
Definition
Change the subnet mask to 255.255.254.0
Term
Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80?

a.netstat -r

b.netstat -p tcp

c.netstat -v

d.netstat -at

e.netstat -aupn
Definition
netstat -p tcp
Term
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?

a.802.11b

b.802.11g

c.802.11n

d.802.11a
Definition
802.11n
Term
Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WPA2-PSK? (Select two.)

a. Name servers

b. Shared key

c. SSID

d. Subnet mask
Definition
b. Shared key

c. SSID
Term
To ensure that VoIP phones are provided with power without using independent power supplies, switches on the network must have which of the following features?

a.PoE

b.PPPoE

c.VLAN tagging

d.Spanning tree
Definition
PoE
Term
A user contacts a technician and states, "The network is down." After further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem?

a.Reboot the core router

b.Have the user ping the default gateway

c.Have the user run netstat

d.Unplug and then plug the network cable back in
Definition
Have the user run netstat
Term
Which of the following describes the loss of signal strength as the signal travels away from its source?

a.Crosstalk

b.Latency

c.Noise

d.Attenuation
Definition
Attenuation
Term
A broken copper strand in a circuit is known as which of the following?

a.Impedance

b.Latency

c.Split Pair

d.Short

e.Open
Definition
The correct answer is: Open
Term
What Ethernet switch feature allows a port to automatically determine which of its leads are used for transmitting data and which of its leads are used for receiving data?

a.UTP

b.MDIX

c.LDAP

d.Convergence

e.STP
Definition
MDIX technology makes it so that wrong cable types create fewer problems.
Term
In the absence of STP, what issues might result from a Layer 2 loop in a network?
(Choose two.)

a. A router interface’s MTU size decreasing

b. MAC address table corruption

c. Broadcast storms

d. Unicast Storm

e. Packet fragmentation
Definition
MAC address table corruption, Broadcast storms
Term
If you successfully ping from host A to host B, what can you conclude about
host A?

a.Its OSI Layers 1–3 are functional.

b.Its OSI Layers 1–4 are functional.

c.Its OSI Layer 7 is functioning

d.You can only conclude that ICMP traffic can reach host B.

e.Its OSI Layers 1–7 are functional.
Definition
The correct answer is: Its OSI Layers 1–3 are functiona
Term
A data packet which is dropped by a router due to an over-sized MTU packet being transferred, and the packets' "Don't Fragment" bit instruction is turned on, is referred to as which of the following?

a.Black-hole router

b.Re-send Bit

c.Null hop

d.Zero-point router

e.Route reflector
Definition
Black-hole router
Term
To what subnet does a host with an IP address of 172.16.155.10/18 belong?

a.172.16.154.0 /18

b.172.16.96.0 /18

c.172.16.0.0 /18

d.172.16.128.0 /18
Definition
172.16.128.0 /18
Term
Which of the following is a value measuring the power of a wireless signal?

a.BSSID

b.SSID

c.RSSI

d.CSMA/CA

e.RFI
Definition
RSSI
Term
Which type of fiber-optic cable is used for long distances such as between buildings on an organisation’s campus?

a.FDDI

b.Single-mode

c.10BASE5

d.Multimode
Definition
Single-mode
Term
In the Network+ troubleshooting model, what should you always do right after you test the result?

a.Identify the affected area

b.Recognise the potential results and effects of the solution

c.Select the most probable cause

d.Document the solution
Definition
Recognise the potential results and effects of the solution
Term
Solas Ecollege wants to have its computers networked. They have decided to use coaxial cable as the transmission medium. Which transmission medium connector would connect each computer to the transmission medium?

a.IBM data connector

b.RJ-45 connector

c.ST connector

d.T-connector
Definition
T-connector
Term
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network devices? (Select two.)
a. Laptop

b. Workstation

c. Hub

d. Printer

e. Server
Definition
The correct answers are: Server, Printer
Term
Which of the following technologies can prevent a department's network broadcast from propagating to another department's network if they are located on the same switch?

a.A firewall

b.A VLAN

c.A hub

d.A trunk
Definition
A VLAN
Term
Which of the following WAN technologies requires fiber optics?

a.ADSL

b.POTS

c.SONET

d.PSTN
Definition
SONET
Term
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use?

a.RG-6 copper

b.CAT6 copper

c.Multimode fiber

d.Single-mode fiber
Definition
Multimode fiber
Term
Which of the following would a technician use to set up a 'building to building' within a campus?

a.IDF

b.MDF

c.ESD

d.EMI
Definition
IDF
Term
Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)?

a.Fiber

b.Serial

c.Ethernet

d.Coaxial
Definition
Ethernet
Term
An administrator needs to learn which buildings have multimode or singlemode fiber.
Which of the following configuration management documentation would be the BEST choice to use?

a.Physical network diagram

b.Baseline configurations

c.CAT5 wiring schematics

d.Security policy
Definition
Physical network diagram
Term
Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed?

a.SNMP agent

b.History log

c.SNMP trap

d.System log
Definition
SNMP trap
Term
Which of the following routing algorithms would provide the fastest convergence time?

a.A static algorithm

b.A link-state algorithm

c.A distance-vector algorithm

d.A path-vector algorithm
Definition
A link-state algorithm
Term
Which of the following WAN technologies allows for the fastest connection?

a.ADSL

b.SONET

cT1

d.OC-12
Definition
SONET
Term
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection. Which of the following network technologies would BEST handle voice traffic prioritisation above all other data?
a.PoE

b.IPSec

c.QoS

d.Load balancing
Definition
QoS
Term
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distances?

a.DSL

b.ATM

c.E3/T3

d.WiMAX
Definition
WiMAX
Supporting users have an ad free experience!