Book-Cards-Pt1 - Sheet 1 Flashcards

1
Q

qtext

A

answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False: Virtual local area networks (VLANs) create broadcast domains.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You notice that a user is sending usernames and passwords in clear text. What network monitoring utility was used?

A

Packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a remote office with very few users. Which WAN technology would be sufficient?

A

Cable modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What versions of SNMP are susceptible to a packet sniffer?

A

V1 and V2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to establish a connection on a wall jack to connect to the desktop. What tool will you use?

A

Snips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which wireless standard is in the 5Ghz frequency range?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless users said they are having intermittent problems. All the wired users are fine. What should you check?

A

The antenna location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Users are calling and complaining that they cannot get to the Internet. You check and none of them have an IP address. What device do you check?

A

DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the US Department of Defense standard for individual computers?

A

Trusted computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A wireless network with two hosts and no access point is called what?

A

Ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does port mirroring provide?

A

Allows you to see frames sent to all or some of the ports on the switch with your analyzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which device filters packets based on rules that have been configured for it?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have no money in your budget, but your boss wants smaller broadcast domains. What do you do?

A

Create VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of security threat allows an attacker to learn your password through the use of an email or phone call?

A

Social engineering or phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What device do you need to route packets over a wireless network?

A

A wireless access point. Don’t get confused by the word route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the default administrative distance of RIP?

A

120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the default administrative distance of EIGRP?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default administrative distance of RIPv2?

A

120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the default administrative distance of a static route?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the version or name of RIP that is used with IPv6?

A

RIPng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the version or name of OSPF that is used with IPv6?

A

OSPFv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the version or name of EIGRP that is used with IPv6?

A

EIGRPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is BGP considered link state or distance vector?

A

Distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True/False: A bit is one digit, either a 1 or a 0.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True/False: The Class C private address range is 172.16.0.0 through 172.31.255.255.

A

False. That is the Class B range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True/False: The Class C private address range is 192.168.0.0 through 192.168.255.255.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the 127.0.0.1 address used for?

A

Loopback; testing of your local IP stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which layer of the OSI model chooses and determines the availability of communicating partners along with the resources necessary to make the connection?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which layer of the OSI model defines how data is formatted, presented, encoded, and converted?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which layer of the OSI model is responsible for creating, managing, and terminating sessions between applications?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Name the protocol that uses both TCP ports 20 and 21.

A

FTP

33
Q

Which Network layer protocol dynamically reports errors to source hosts by using IP directly to build packets?

A

ICMP

34
Q

Which terminal emulation program is used in the same way Telnet is used but is encrypted?

A

Secure Shell (SSH)

35
Q

Which Transport layer protocol does a TFTP client use to transfer files over the network?

A

UDP

36
Q

Which destination port number does a TFTP client use to transfer files over the network?

A

69

37
Q

The lowest level of QoS is called .

A

Best effort

38
Q

If you need to connect two PCs directly together using their network adapters, what type of cable do you need?

A

Crossover

39
Q

Which network performance optimization technique uses a contract to determine which data can get on to the network?

A

Traffic shaping

40
Q

Spreading network traffic across multiple connections is called .

A

Load balancing

41
Q

True/False: A cache is a collection of data duplicating some original data.

A

TRUE

42
Q

What is the broadcast address of 192.168.192.10/29?

A

A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnet is 192.168.192.8. Therefore the broadcast address is 192.168.192.15.

43
Q

True/False: A /27 has a block size of 16.

A

False. It is a block of 32.

44
Q

True/False: A /28 has a block size of 16.

A

TRUE

45
Q

True/False: The /30 mask will provide you with only two hosts.

A

TRUE

46
Q

When should you use plenum-rated cable?

A

When installing cable in ceilings.

47
Q

True/False: SNAT is a type of Network Address Translation (NAT).

A

TRUE

48
Q

True/False: Addresses used after NAT translations are called global addresses.

A

TRUE

49
Q

True/False: A Class C has a default subnet mask of 255.255.0.0.

A

FALSE

50
Q

True/False: Bridges are hardware based, whereas switches are software based because they use ASIC chips to help make filtering decisions.

A

FALSE

51
Q

True/False: Bridges and switches learn MAC addresses by examining the source address of each frame received.

A

TRUE

52
Q

VLANs break up domains in a Layer 2 switched network.

A

Broadcast

53
Q

Switches, by default, only break up domains.

A

Collision

54
Q

Which port configuration of a switch allows two switches to pass VLAN information?

A

Trunking

55
Q

What is used at Layer 2 to prevent switching loops?

A

Spanning Tree Protocol (STP)

56
Q

Which switching technology reduces the size of a broadcast domain?

A

VLAN

57
Q

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz?

A

Category 6

58
Q

The point at which the operational control or ownership changes from your company to a service provider is referred to as the .

A

Demarcation point or demarc

59
Q

True/False: Crossover cable is used to connect switches together.

A

TRUE

60
Q

Which RG rating of coax is used for cable modems?

A

RG-6

61
Q

True/False: A straight-through cable uses only pins 1 to 3 and 2 to 6.

A

FALSE

62
Q

You want to connect a host to a switch port. What type of Ethernet cable will you use?

A

Straight-through

63
Q

Which UTP uses four twisted wire pairs (eight wires), is rated for 100MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?

A

Category 5e

64
Q

True/False: Unshielded twisted-pair (UTP) is commonly used in twisted-pair Ethernet (10BaseT, 100BaseTX, 1000BaseTx, and so on).

A

TRUE

65
Q

True/False: Fiber-optic cable uses a serial connector.

A

FALSE

66
Q

The maximum segment length of twisted-pair cable is .

A

100 meters (328 feet)

67
Q

True/False: Straight-through cable is used to connect a host to a switch or hub or a router to a switch or hub.

A

TRUE

68
Q

True/False: Eight wires are used in straight-through cable to connect Ethernet devices.

A

FALSE

69
Q

Which type of cable is used to connect a hub to switch?

A

Crossover

70
Q

Which type of cable is used to connect switch to switch?

A

Crossover

71
Q

Which type of cable should be used to connect to the console port on a router?

A

Rolled (console)

72
Q

True/False: A patch panel is typically a rack- or wall-mounted structure that houses cable connections.

A

TRUE

73
Q

Which type of cable can transmit up to 40 kilometers (25 miles)?

A

Fiber-optic

74
Q

True/False: Full-duplex requires point-to-point communication.

A

TRUE

75
Q

What is the highest level of encryption you can implement on a wireless network?

A

WPA2-AES

76
Q

The 110-block termination point is what category compliant?

A

CAT 5 compliant

77
Q

What is the best reason to implement QoS when real-time applications are in use in the network?

A

To prioritize delay sensitive traffic

78
Q

What device would you use a punch-down tool on?

A

110 block