• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/75

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

75 Cards in this Set

  • Front
  • Back
A network has multiple computers and servers. You want to implement a system in the network that provides data access to heterogeneous clients using SMB/CIFS. Which of the following will you use?
Network-attached storage
What device is used to create many different collisions domains, thus helping to eliminate collisions in the modern network?
Switch
What device is a Layer 2 device that uses MAC address learning to intelligently forward traffic?
Switch
In the modern LAN, what topology is often used with LAN switches and Ethernet connections?
Star
A network administrator has configured a firewall on the network. A filter has been applied to block all ports. He wants to enable sending and receiving of emails on the network. Which of the following ports will he open?

25


110

A TCP packet is not received successfully at its destination. Which of the following OSI layers will retransmit the TCP packet?
Transport layer
American Standard Code for Information Interchange (ASCII) would be classified at which layer of the OSI Model?
Layer 6
What is the common TCP port (that is, "well-known" port) used by Telnet?
23
Which two of the following protocols are used to retrieve e-mail from an e-mail server?

IMAP4


POP3

Which of the following cables will help you to prevent toxic gas from burning the PVC cable coating if any event of a fire occurs?
Plenum-rated
An administrator configured a network that will include 1000BASE-T network interface cards in servers and computers. What is the maximum segment length that a 1000BASE-T network supports?
100 meters
Mark, a network consultant, is designing a network for the company and wants that the cable must support a speed of data transfer up to 50 Mbps. He also needs to ensure that the cost is as low as possible. Which of the following cables will Mark use?
CAT5e
A host with an IP address of 10.0.0.126/25 needs to establish connectivity to another host with an IP address of 10.0.0.129/25. What device will be required?
A router
Users on a network are able to ping resources using IP addresses. However, they're unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?
DNS
Your company needs to purchase a cloud service that provides an easy-to-configure operating system and on-demand computing for its users. Which of the following services will you suggest?
PaaS - Platform as a Service
An enterprise has decided to leverage the Web conferencing services and solutions provided by the service provider over the Internet. The application revisions or upgrades are managed by the service provider. This scenario is an example of which of the following cloud delivery models?
SaaS - Software as a Service
You are concerned about outside attackers penetrating your network via your company Web server. You want to place your Web server between two firewalls. One firewall is placed between the Web server and the outside world and another between the Web server and your network. The arrangement of this type of network is called?
DMZ
Which type of fiber optic connector connects to a terminating device by pushing the connector into the terminating device and can be removed by depressing the tab on the connector and pulling it out of the terminating device?
LC - A Lucent connector (LC) connects to a terminating device by pushing the connector into the terminating device, and it can be removed by depressing the tab on the connector and pulling it out of the terminating device.
Which type of twisted pair cable has an insulator that is fire retardant and minimizes the emission of dangerous fumes in the event of fire?
Plenum
Which of the following DNS record types is an IPv6 address record?
AAAA
You have configured a Gigabit Ethernet Switch with a speed of 100 and set duplex to auto on all interfaces. You have also connected another Gigabit Ethernet Switch with the interface 4 of this switch. The Gigabit Ethernet Switch connected to the interface 4 will be used for all departments and interface 1 will be used only for Sales department.For this, you want to configure the following parameters:•Prevent switching loops•Configure 192.168.5.120/24 IP address for management•Configure interface 1 to accept and receive up to 100 Mbps data at the same time

1. Switch(config)#vlan 12


2. Switch(config-vlan)#ip address 192.168.5.120 255.255.255.0


3. Switch(config)#interface gig0/1


4. Switch(config-if)#speed 100


5. Switch(config-if)#duplex full


6. Switch(config-if)#switchport mode access


7. Switch(config-if)#switchport access vlan 12

You need to troubleshoot a network. For this, you want to inspect all the traffic flow over the network in real-time. What will you implement?
Port mirroring
A network administrator has configured an 802.11g WAP in a network for Internet access. Employees complain that they are unable to access the Internet when a microwave oven in their cafeteria is on. What is the most likely cause of this issue?
Radio frequency interference is occurred
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 Watts of power to an attached device?
802.3af
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 25.5 Watts of power to an attached device?
802.3at
You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many collision domains exist on this switch?
5
Mark has created a DHCP scope to automatically assign IP addresses to the computers. He found that multiple servers already have the IP addresses that fall within this DHCP scope. Mark wants to make sure that the addresses used by the servers are not assigned to any computer. What will be the best choice for him?
Create the exclusion range of the servers' IP addresses
Which of the following addresses will you use as a loop-back address to verify that TCP/IP is installed and configured correctly on a new computer?
127.0.0.1
On a network, which subnet mask should you use on point-to-point WAN links to reduce the wastage of IP addresses?
/30
You have a class A subnet to use at a new office location. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.Network range: 10.3.8.0/16Sales: 68 devicesIT: 75 devicesHR: 10 devicesFinance: 39 devices

Sales, IT 10.3.8.0/25, 10.3.8.128/25 (Sales and IT can use any of these)


Finance 10.3.8.0/26


HR 10.3.8.128/28

You have a class C subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.Network range: 192.168.4.0/24Marketing: 53 devicesProduction: 30 devicesTraining: 3 devicesDesigning: 88 devices

Designing /25


Marketing /26


Production /27


Training /29

You have a class B subnet for your office networks. Allocate the minimum number of addresses required to accommodate each department to maximize the number of available subnets.Network range: 172.30.3.0/25Marketing: 6 devicesSales: 4 devicesHR: 12 devicesIT: 18 devicesSelect the minimum number of addresses using the CIDR notation required for each network from the lists

IT /27


HR /28


Sales, Marketing /29


A /25 subnet includes 64 IP addresses. Thus, 128-64=64. So the contiguous block of remaining addresses will be /26

A network comprises 34 servers and 175 client computers. All systems on the network are using the 10.0.0.0/8 addressing scheme. Rick, a network administrator, decides to place all servers into a separate subnet that uses the 192.168.1.0 addressing scheme while maximizing the number of subnets. Rick wants to configure a new subnet mask that must be capable of providing IP addresses to 34 servers. Which of the following subnet masks will Rick use to accomplish this?
255.255.255.192
What class of address is used for experimental purposes?
Class E
Given a subnet mask of 255.255.192.0, what is the corresponding prefix notation?
/18
Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?
DHCP
What routing protocol allows routing information to be passed from one autonomous system to another?
BGP
What is the administrative distance of RIP in a Cisco network?
120
What is the administrative distance of OSPF in a Cisco network?
110
Which of the following are ways routes can be injected into a router's IP routing table?

A route is directly connected


A route is statically configured


A route is dynamically learned


A route is redistributed from one routing source into a dynamic routing protocol

A service provider has set up its smart jack outside your company premises. You find that your company's CPE is around 50 meters away from the smart jack. Which of the following will you use to connect the smart jack to the CPE?
Use the demarc extension
What is the leased line technology that has a bandwidth capacity of 44.7 Mbps?
T3
What is the bandwidth of a T1 digital circuit?
1.544 Mbps
ATM can be considered in which of the following WAN categories?
Packet switched
Rick has a laptop that is compatible with 802.11b and 802.11g wireless networks. He found that whenever he connects to his home wireless network, he gets the maximum speed of 11Mbps. However, when he connects his computer to the office wireless network, he gets much better speed. Which of the following steps will he take to resolve the issue?
Replace his home network router with one that is 802.11g compatible
Several WAPs are located around the office to provide a strong signal, but still users are facing the intermittent connectivity issues. Which of the following is the most likely cause of this issue?
Channel overlap
Mark needs to implement a wireless network in the office premises that contains two buildings. He installs a point-to-point connection using wireless bridge and omni directional antenna between the buildings. While testing, he found that the throughput is low. What will he do to improve the throughput?
Replace the omni directional antenna with Yagi
A technician wants to limit the war driving on the office network. Which of the following will he change?
Signal strength - To limit the war driving, a technician will change the signal strength of AP. Because in war driving, the attacker searches for Wi-Fi networks by simply moving around it with a portable computer, smartphone or personal digital assistant (PDA) and hence he can connect to the network and create a database comprising of the network name, signal strength, location, IP address, and namespace.
A technician wants to connect a new host to his company's wireless network. When he tries to connect it to the network, it fails. He then verified that the host configuration and WPA2 key are correct. What is the most likely cause of this issue?
MAC filtering is enabled on the AP
You want to secure WAPs of your company's network from unauthorized access. Which of the following is the most secure encryption method?
WPA2
A network administrator would like to examine all traffic flowing over the network. What tool will you use?
Packet sniffer
You're concerned about war driving. You don't want to bring the hacker's attention to your wireless network. What will you do to mitigate this risk?
Disable broadcast of SSID
Which of the following wireless LAN (WLAN) security threats involves mathematical algorithms that can determine a pre-shared key value?
WEP and WPA security cracking
You are configuring a wireless access point (AP). You specify a wireless standard of 802.11n operating in the 2.4 GHz band. You also select an option to make it operate in a "backwards compatible" mode. Therefore, what additional 802.11 standards are supported?

802.11b


802.11g

In a wireless LAN (WLAN) operating in the 2.4 GHz band, access points (APs) with adjacent coverage areas should have how many channels of separation to avoid interfering with one another?
5
Identify the quality of service (QoS) mechanism that can fragment large packets and interleave smaller packets in amongst the packet fragments.
LFI
You are designing a small office/home office (SOHO) network, and you wish to have four subnets, while maximizing the number of hosts per subnet. The network you need to subnet is 192.168.5.0/24. Which of the following is one of the four subnets you should create?
192.168.5.64/26
What term defines a delay of packets in the network?
Latency
Martha found the host name resolution problems on the network. What command will she use to diagnose and troubleshoot the issue?
nslookup
Which command will you use to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date on a Windows system?
ipconfig
Jack configures a new Linux computer and installs it in the network. He wants to determine if the network interface is working properly. Which of the following commands will Jack use to accomplish the task?
ifconfig
What command enables you to view the NetBIOS name cache on your Windows workstation?
nbtstat
For security reasons, a network administrator is performing a penetration test on your network. Which network tool will he use to see if remote connections are susceptible to eavesdropping or session hijacking?
Protocol analyzer
A user complains about his computer's performance for the past few weeks. Which document will a network administrator use to verify the actual status of his computer?
Baseline
Identify the Simple Network Management Protocol (SNMP) component that defines the structure of SNMP management objects.
MIB - Information about a managed device's resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device's Management Information Base (MIB).
What are the three levels of security associated with events appearing in Microsoft Windows® application logs?

Information


Warning


Error

Identify the three broad categories of SNMP message types

GET


SET


Trap

Which of the following will you use to verify the integrity of data if a security breach is occurred?
Chain of custody
Which of the following security threats is a program that runs in the background of a computer and keeps a record of what a user types on their keyboard?
Keylogger
Which of the following is a vulnerability scanner product from Tenable Network Security®?
Nessus®
Which two of the following virtual private network (VPN) tunneling protocols can be used to provide security for HTTPS?

SSL


TLS

Mark, a network administrator, found that one of the workers cut the network cable that goes from the modem to the WAP and nothing else has been changed. What would be the Mark's next step to troubleshoot the problem faced, according to the network troubleshooting methodology?
Establish a plan of action
A company has an 802.11a wireless network. On the network, WEP is enabled, SSID is set as uCertify, and channel mode as auto. Martha, a Sales Manager, purchases a new laptop that has an 802.11n wireless network card. When she tries to connect to the network, she is unable to do so. What is the most likely cause?
Standard mismatch
You are troubleshooting an issue where a PC cannot reach a web server (with a DNS name of pearsonitcertification.com) on the Internet. From the PC you can Ping the IP addresses of devices on your local subnet. You cannot Ping the DNS name of the web server. However, you have previously noted the IP address of the web server's IP address, and you notice that you can Ping the IP address of the web server. Of the following potential troubleshooting issues, what is most likely causing the problem?
Incorrect DNS configuration on the PC
If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?
RFI - radio frequency interference