Front | Back |
QUESTION NO: 1 Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?A. BaselinesB. RegulationsC. Logical network diagramsD. Wiring schematic |
C. Logical network diagram The logical network diagram shows information about a network. This information contains details that tell users how domain names are assigned, which servers perform specific tasks, and how all network components communicate with each other, frequently taking into consideration security and reliability. Domain names andInternet protocol (IP) addresses give individual components their identification. A physical network diagram shows the physical connections of network components, while a logical network diagram shows how they relate and communicate with each other. VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on something other than physical location. VLANs can span multiple switches, and you can have more than one VLAN on each switch. For multiple VLANs on multiple switches to be able to communicate via a single link between the switches, you must use a process called trunking -- trunking is the technology that allows information from multiple VLANs to be carried over a single link between switches You can create a VLAN using most switches simply by logging into the switch via Telnet and entering the parameters for the VLAN (name, domain and port assignments). After you have created the VLAN, any network segments connected to the assigned ports will become part of that VLAN. |
QUESTION NO: 2 Keyword and blacklist filtering would be handled at which level in a network?A. Layer 2 managed switchB. DHCP serverC. Hardware firewallD. Bridge |
C. Hardware firewal Most Web filters use two main techniques to block content: Blacklists and keyword blocking. A blacklist is a list of Web sites that the Web filter's creators have designated as undesirable. Blacklists change over time, and most companies offer updated lists for free. Any attempt to visit a site on a blacklist fails. With keyword blocking, the software scans a Web page as the user tries to visit it. The program analyzes the page to see if it contains certain keywords. If the program determines the Web page isn't appropriate, it blocks access to the page.Another option for parents is to install a firewall. A computer firewall provides protection from dangerous or undesirable content. Firewalls can be software or hardware. They act as a barrier between the Internet and your computer network. |
QUESTION NO: 3 A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port.A. spanningB. address translationC. mirroringD. authentication |
D. authentication |
QUESTION NO: 4 When installing two 802.11g access points in the same building, which of the following channelswill MOST likely be used to minimize interference?A. 5 and 6B. 1 and 6C. 6 and 10D. 2 and 6
|
B. 1 and 6
Wireless routers can broadcast on several different channels, similar to the way radio stations use different channels. In the United States and Canada, these channels are 1, 6, and 11 |
QUESTION NO: 5 Which of the following devices transmits timed broadcasts onto an active network?A. BridgeB. Unmanaged switchC. DHCP clientD. Firewal |
C. DHCP client When a DHCP-configured client (a computer or any other network-aware device) connects to a network, the DHCP client sends a broadcast query requesting necessary information from a DHCP server. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, domain name, the name servers, other servers such as time servers, and so forth. On receiving a valid request, the server assigns the computer an IP address, a lease (length of time the allocation is valid), and other IP configuration parameters, such as the subnet mask and the default gateway |
QUESTION NO: 6 Users are unable to stay connected to the company's wireless network. Several times throughoutthe day the users' signals are dropped and they are forced to reconnect to the network. Atechnician determines the network cabling that supplies the WAP has been run inside with severalpower lines. Which of the following is the MOST likely cause of the network issue?A. A shortB. Open pairsC. ESDD. EMI |
D. EMI |
QUESTION NO: 7 Which of the following describes the location where an administrator would terminate a bundle ofCAT5e cables?A. SwitchB. Smart jackC. RouterD. Patch panel |
D. Patch panel A patch panel separates the hardwiring of your network from your networking equipment. Each run of cable that goes throughout the house or building is punched down on the back of the patch panel. |
QUESTION NO: 8 Which of the following can be an STP cable?A. RG-6B. CAT5eC. FiberD. RG-59 |
B. CAT5e A. RG-6 is a coaxial cableC. Fiber is not twisted cablingD. RG-59 is also coaxial cabling |
QUESTION NO: 9 Which of the following is used to identify active hosts along with their network addresses?A. Port scanB. Ping sweepC. IDSD. NIP |
B. Ping sweep A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Whereas a singleping will tell you whether one specified host computer exists on the network, a ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. Ping sweeps are among the older and slower methods used to scan a network.There are a number of tools that can be used to do a ping sweep, such as fping, gping, andnmap for UNIX systems, and the Pinger software from Rhino9 and Ping Sweep from SolarWinds for Windows systems. Both Pinger and Ping Sweep send multiple packets at the same time and allow the user to resolve host names and save output to a file.To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and Address Mask Requests can be used in a similar manner |
QUESTION NO: 10 A section of the building has been having intermittent connectivity problems lately. An action planand solution has been created. Which of the following steps would an administrator performNEXT?A. Document the solution and process.B. Establish the most probable cause.C. Implement and test the solution.D. Identify additional symptoms and problems
|
C. Implement and test the solution.
|
QUESTION NO: 11 A web server is running correctly but sending a RST packet to any client trying to connect usingHTTP on TCP port 80.Which of the following tools should be used to determine the listening port of the web server?A. RouteB. IfconfigC. NetstatD. Nslookup |
C. Netstat
netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems.It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement |
QUESTION NO: 12 Which of the following utilities can be used to list the routing table?A. ipconficjB. nslookupC. netstatD. dig |
C. netstat
command-line tool netstat lists routing tables |
QUESTION NO: 13 Which of the following is a multifunction device in a SOHO network?A. Bandwidth shaperB. Proxy serverC. Wireless routerD. Load balancer |
C. Wireless router
|
QUESTION NO: 14 At which of the following layers does the TFTP protocol operate?A. Layer 1B. Layer 4C. Layer 5D. Layer 7
|
D. Layer In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layerprotocols to establish host-to-host connections.
|
QUESTION NO: 15 Which of the following is an EGP routing protocol?A. IGPB. OSPFC. BGPD. RIP |
C. BGP
The Exterior Gateway Protocol (EGP) is a now obsolete routing protocol for the Internet. BGP was created to replace the Exterior Gateway Protocol (EGP) protocol |