| Term 
 
        |  which two utilities can you use to identify a router that is  expeirencing problems ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       In Wich of the following situations would you want to configure a VPN ? |  | Definition 
 
        |       Home-based telecommuters need intermittent connections over the internet to the internal network |  | 
        |  | 
        
        | Term 
 
        |     Which two cable specifications are for coaxial cable ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       The internet scurity zone includes ? |  | Definition 
 
        |   All external web sites that are not listed  in the restricted or trusted site zones. |  | 
        |  | 
        
        | Term 
 
        |   A firewall seperates a management workstation from a router.   You need to manage the router using telnet without specifying a port.   wich traffic must the firewall allow ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which method does a DHCP client use to locate a DHCP server ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |         What is the role of routing protocals ? |  | Definition 
 
        |       To dynamically update route information |  | 
        |  | 
        
        | Term 
 
        |     You want to allow external users access to a specific web server, but block access to recources on your intranet. you need to  configure a(n) ?   |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |     Which type of network isonly used to connect computers within a single company ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which two of the following are valid private IP addresses ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |     You need to see if your computer with a server on the same subnetwork. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       The term "intranet" refers to ? |  | Definition 
 
        |       Your private, internal network. |  | 
        |  | 
        
        | Term 
 
        |     Why should you avoid flouresent lights  when running unshielded twisted pair (UTP) cable ? |  | Definition 
 
        |         Possible signal degradation |  | 
        |  | 
        
        | Term 
 
        |       You have a managed switch with servers connected to ports 1,2,3, and 4. An attacker gains access to the server on port 2 and installs software to monitorand record communications on the network. |  | Definition 
 
        |       An attacker can access trafficto and from the server on port 2 only. |  | 
        |  | 
        
        | Term 
 
        | A set of interconnected local area networks (LANs) is known as ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |     You need to add a device to the network which will allow you to create virtual area network (VLANs). You must be able to manage the device remotely. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Your windows computer is configured to automatically recieve Private IP Addressing (APIPA) enabled.     You use the ipconfig command to view the TCP/IP settings on your computer and discover that it has an IP address of 0.0.0.0.     What is most likely wrong ? |  | Definition 
 
        |         Windows cannot detect a connection to the network media |  | 
        |  | 
        
        | Term 
 
        |         which DNS record is used to allow a server to resolve  an IP address to a fully-qualified domain name (FQDN)? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which WLAN security standard supports AES encryption |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |         The TCP/IP arp command can be used to: |  | Definition 
 
        |         resolve IP addresses to media access control (MAC) addresses |  | 
        |  | 
        
        | Term 
 
        |   You are configuring virtual private network (VPN) access for home based users.     Communication security can be provided through which of the following ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which of the following is a dial-up WAN connection type ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       A layer 2 switch determines which port to send a packet through by examining the ? |  | Definition 
 
        |         MAC address of the destination. |  | 
        |  | 
        
        | Term 
 
        |       Which kind of device is used to connect a wireless LAN segment to a wired LAN segment ? |  | Definition 
 
        |       Wireless access point (WAP) |  | 
        |  | 
        
        | Term 
 
        |       Which of the following is implemented at  the Application layer of the TCP model ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |         Which of the following is implemental at the application layer of the TCP model ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |         Which can be used to create a virtual local area network (VLAN) ? |  | Definition 
 
        |       One or more managed switches |  | 
        |  | 
        
        | Term 
 
        |       What is the highest bit rate supported by 802.11g ? |  | Definition 
 
        |       54 megabits per second (Mbps) |  | 
        |  | 
        
        | Term 
 
        |       Which media type is least susceptible to electromagnetic interference (EMI) ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |     You are using unshielded twisted pair (UTP) to wire a 100 BaseT ethernet network.     Which cable type should you use ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |         What is the IPv6 local lookback address ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       What is the IPv6 address prefix for a link-local unicast address ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which physical topology is often implemented using a logical ring topology ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        |       Which command would you use to view detailed TCP/IP configuration information on a computer ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is provided by IPSec ? |  | Definition 
 
        | Encryption an authentication |  | 
        |  | 
        
        | Term 
 
        | After starting up your computer, it is unable to communicatewith any other computers on th network. the computer has an IP address of 169.254.19.21.     what is most likely wrong ? |  | Definition 
 
        |       Your computer cannot locate a dynamic host protocal (DHCP) server. |  | 
        |  | 
        
        | Term 
 
        | The nslookup command is used to troubleshoot a: |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Windows internet name service (WINS) is used to map : |  | Definition 
 
        | NetBIOS names to IP addresses. |  | 
        |  | 
        
        | Term 
 
        | Which media access protocal is used by 802.11 wireless communications ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which is used to ressolve a fully-qualified  domain name (FQDN) to anIp addresses ? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The addresses FE80::5EFE:131.107.4.92 is an example ofwhat kind of IPv6 address ? |  | Definition 
 
        | A link-local ISATAP address |  | 
        |  | 
        
        | Term 
 
        | Which type of network uses CSMA/CD as the access method? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A set of interconnected locsl ares networks is known as a |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | alllow multiple comouter with private adr3essess to access public adress |  | 
        |  | 
        
        | Term 
 
        | an IPv6 is sihgn to mulitple nodes, when a message is sent to the adress. it is sent to only one node |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | the speed in which packet are transfered between the modules in a modulers switch is know as |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | windows internet name service is used to map |  | Definition 
 
        | NEtbiosnames to IP adressess |  | 
        |  | 
        
        | Term 
 
        | whic of the following is  a IPv4 mulitcast |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | an infrstructure modeWLAN : |  | Definition 
 
        | can be used to connect wireless clients to a wired network |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | sends a multicast packet as soon as a change in the network configuration is detected. |  | 
        |  |