Term
| Which 3 bytes of the MAC address F3-B2-CD-E4-F4-42 designate the organizationally unique identifier? |
|
Definition
|
|
Term
| What is the well-knwon port number for SMTP? |
|
Definition
|
|
Term
| What WAN technology uses 32 (64 Kbps) channels? |
|
Definition
|
|
Term
| What is the default port number for HTTPS? |
|
Definition
|
|
Term
| Which wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens? |
|
Definition
|
|
Term
| You work as a network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. The network is configured on the ring topology. What will happen if a cable break occurs? |
|
Definition
| The whole network will collapse |
|
|
Term
| You work as a technician for Peach Tree Inc. Rick, a sales manager, has a laptop that is compatible with 802.11b and 802.11g wireless networks. He complains that his home network is slower than his office network. Which of the following steps will you take to resolve the issue? |
|
Definition
| Replace his home network router with one that is 802.11g compatible. |
|
|
Term
| What IP address represents the APIPA address range? |
|
Definition
|
|
Term
| How many hosts per subnet are provided by a subnet mask of 255.255.255.192 |
|
Definition
|
|
Term
| A company has just implemented VoIP. The users are complaining about call chopping and call dropping. What could be the likely problem? |
|
Definition
|
|
Term
| What technique could be used to increase the bandwidth transmission by joining multiple connections together into one logical connection? |
|
Definition
|
|
Term
| Joe, a network tech wants to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. What should Joe do to meet these requirements? |
|
Definition
| Add a layer 3 switch and create a VLAN. |
|
|
Term
| SMTP works at which layer of the OSI model? |
|
Definition
|
|
Term
| Which WAN technology uses cell switching? |
|
Definition
|
|
Term
| What is the default port number for SSH? |
|
Definition
|
|
Term
| In what attack does an attacker connect to an unused VoIP phone port to gain unauthorized access to a network? |
|
Definition
|
|
Term
| What network device must be used to have full duplex communication between two host devices? |
|
Definition
|
|
Term
| What are the functions of the presentation layer of the OSI model? |
|
Definition
| Data Encryption / Data Compression / Character-code translation |
|
|
Term
| At which layer of the OSI model does UDP operate? |
|
Definition
|
|
Term
| You are a network administrator and currently planning for LAN cabling for a new area of your office building. The cable will run between the structural and drop-down ceilings. Which of the following cables will be best suited in this environment> |
|
Definition
|
|
Term
| An org. needs a centrally located firewall that can block specific incoming and outgoing traffic and check each packet individually. Which of the following types of firewalls should a network technician install? |
|
Definition
| A stateless network-based firewall |
|
|
Term
| In an STP topology, a switch has multiple paths to reach the root bridge. Into which of the following states is the port with the least desirable path placed by the STP? |
|
Definition
|
|
Term
| What are the effects of having a CSMA/CD network that has sustained heavy collisions? |
|
Definition
| Delay, Low throughput, Congestion |
|
|
Term
| The maximum speed of 802.11b is _____ |
|
Definition
|
|
Term
| At which layer of OSI is the Frame Check Sequence for error detection performed? |
|
Definition
|
|
Term
| A network tech while fixing a layer 1 issue finds that two switches connected through a straight-through cable are unable to communicate. What can be the possible cause of this issue> |
|
Definition
| MDIX is enabled on both switches |
|
|
Term
| What is the distance limitation of a Category 5 horizontal cross-connect cable? |
|
Definition
|
|
Term
| Which routing protocol used only hop count as a metric? |
|
Definition
|
|
Term
| A newly appointed network admin wants to check the services of the company that are exposed to the outside world. What tool should the network admin use? |
|
Definition
|
|
Term
| What routing protocol is typically used of the internet and allows routing information to be passed from one autonomous system to another? |
|
Definition
| Border Gateway Protocol (BGP) |
|
|
Term
| While diagnosing a company's network, a network technician finds that the computers on the company's network are vulnerable to smurf attack. Which of the following describes a smurf attack? |
|
Definition
| Attack on a target using spoofed ICMP packets to flood it |
|
|
Term
| A network admin is configuring a VLAN across multiple switches. What changes do VLANs have on a switch port in the existing network? |
|
Definition
| Create separate broadcast domains, Increase flexibility |
|
|
Term
| A network tech is setting up a new network. To eliminate single points of failure from the design, he wants to include redundant paths in the network. However, he also wants to prevent performance degradation. What should he implement to accomplish this? |
|
Definition
| Spanning Tree Protocol (STP) |
|
|
Term
| You have a user that still uses Windows 98. He complains that he can't get onto the internet and refuses to upgrade the OS. You asked the user to open the Command Prompt and ping 127.0.0.1. He receives a message that says,"Unable to contact IP driver, error code 2." How can you resolve this issues without upgrading the OS? |
|
Definition
| Reinstall the TCP/IP protocol stack. |
|
|
Term
| What protocol from the Internet Protocol (IP) stack is used for diagnostics and error messages? |
|
Definition
| Internet Control Message Protocol (ICMP) |
|
|