WHERE DOES A HUB SEND DATA?
A)only to the receiving system
B)ONLY TO THE SENDING SYSTEM
C)TO ALL THE SYSTEM CONNECTED TO THE HUB
D)ONLY TO THE SEVRVER
C)DATA COMES INTO A HUB THROUGH ONE WIRE AND IS THEN SENT OUT THROUGH ALL THE OTHER WIRES. A HUB SENDS DATA TO ALL SYSTEMS CONNECTED TO IT
WHAT UNIQUELY IDENTIFIES EVERY NIC?
A)IP ADDRESS
B)MEDIA ACCESS CONTROL ADDRESS
C)ISO NUMBER
D)PACKET ID NUMBER
B) THE UNIQUE IDENTIFIER ON A NETWORK INTERFACE CARD IS CALLED THE MEDIA ACCESS CONTROL THE MAC ADDRESS
WHAT WINDOWS UTILITY DO YOU USE TO FIND THE MAC ADDRESS FOR A SYSTEM?
A)IPCONFIG/ALL
B)IPCFG/ALL
C)PING
D)MAC
A)ALL VERSIONS OF WINDOWS USE IPCONFIG/ALL FROM THE COMMAND LINE TO DETERMINE THE MAC ADDRESS
A MAC ADRESS IS KNOWN AS ____________ ADDRESS
A)IP
B)LOGICAL
C)PHYSICAL
D)OEM
C)THE MAC ADDRESS IS A PHYSICAL ADDRESS
A NIC SENDS DATA IN DISCRETE CHUNKS CALLED
A)SEGMENTS
B)SECTIONS
C)FRAMES
D)LAYERS
C) THE MAC ADDRESS IS A PHYSICAL ADDRESS
THE MAC ADDRESS OF WHICH OF THE FOLLOWING BEGINS A FRAME?
A)RECEIVING SYSTEM
B)SENDING SYSTEM
C)NETWORK
D)ROUTER
A)THE FRAME BEGINS WITH THE MACC ADDRESS OF THE RECEIVING NIC FOLLOWED BY, THE MAC ADDRESS OF THE SENDING NIC, FOLLOWED, IN TURN, BY TYPE OF ENCAPSULATED DATA, AND FCS
A FRAME ENDS WITH A SPEACIAL BIT CALLED THE FRAME CHECK SEQUENCES. WHAT DOES THE FCS DO?
A)CYCLES DATA ACROSS THE NETWORK
B)VERIFIES THAT THE MAC ADDRESS ARE CORRECT
C)VERIFIES THAT THE DATA ARRIVED CORRECTLY
D)VERIFIES THAT THE IP ADDRESS IS CORRECT
C) THE DATA IS FOLLOWED BY A SPEACIAL BIT OF CHECKING INFORMATION CALLED THE FRAME CHECK SEQUENCE, WHICH THE RECEIVING NIC USES TO VERIFY THAT THE DATA ARRIVED CORRECTLY
WHICH OF THE FOLLOWING IS AN EXAMPLE OF A MAC ADDRESS?
A)0-255
B)00-50-56-A3-04-0C
C)SBY3M7
D)192.168.4.13
MAC- ADDRESS IS A BIT VALUE, AND NO TWO NIC EVER SHARE THE SAME MACC ADDRESS-- EVER 00-50-56-A3-04-0C IS A MAC ADDRESS THE ANSWER IS D
WHICH LAYER OF THE OSI MODEL CONTROLS THE SEGMENTATION AND REASSEMBLY OF DATE?
A)APPLICATION LAYER
B)PRESENTAIO LAYER
C)SESSION LAYER
D)TRANSPORTATION LAYER
THE TRANSPORT LAYER CONTROLS THE SEGMENTAION AND REASSEMBLY OF DATA
WHICH LAYER OF THE OSI MODEL CONTROLS THE SEGMENTATION AND REASSEMBLY OF DATE?
A)APPLICATION LAYER
B)PRESENTAIO LAYER
C)SESSION LAYER
D)TRANSPORTATION LAYER
C)THE SESSION LAYER KEEPS TRACK OF A SYSTEM CONNECTIONS TO ENSURE THAT SENDS THE RIGHT RESPONSE TO THE RIGHT COMPUTER
CABLING AND TOPOLOGY
CABLING AND TOPOLOGY
WHICH OF THE FOLLOWING TOPOLOGIES REQUIRED TERMINATION?
A)STAR
B)BUS
C)MESH
D)RING
B) IN ABUS TOPOLOGY ALL COMPUTERS CONNECTED TO THE NETWORK VIA MAIN LINE. THE CABLE HAD TO BE TERMINATED AT BOTH END TO PREVENT SIGNAL REFLECTION
STAR- BUS IS AN EXAMPLE OF A ___________TOPOLOGY
A)TRANSITIONAL
B)SYSTEM
C)HYBRID
D)RAMPANT
C)STAR-BUS IS HYBRID TOPOLOGY BECAUSE IT USES A STAR PHYSICAL TOPOLOGY AND A BUS SIGNAL TOPOLOGY
OF THE TOPOLOGIES LISTED, WHICH ONE IS THE MOST FAULT TOLERANT?
A)POINT TO POINT
B)BUS
C)STAR
D)RING
C) OF THE CHOICES LISTED ONLY STAR TOPOLOGY HAS ANY FAULT TOLERANCE
WHAT TERM IS USED TO DESCRIBE THE INTERCONNECTVITY OF NETWORK COMPONENETS?
A)SEGMENTATION
B)MAP
C)TOPOLOGY
D)PROTOCOL
C) TOPOLOGY IS THE TERM USED TO DESCRIBE THE INTERCONNECTIVITY OF NETWORK COMPONENTS
COXIAL CABLES ALL HAVE AN_____ RATING
A)RESISTANCE
B)WATT
C)SPEED
D)OHM
D) ALL COAXIAL CABLES HAVE AN OHM RATING RG_59 AND rG-6 BOTH ARE RATED AT 75 OHMS
WHICH OF THE FOLLOWING IS A TYPE OF COXIAL CABLE?
A)RJ-45
B)RG-6
C)BNC
D)BARREL
B) RG-6 IS A TYPE OF COXIAL CABLE
WHICH NETWORK TOPLOGY CONNECTED NODES WITH A RING OF CABLES?
A)STAR
B)BUS
C)RING
D)MESH
C) THE APPTLY NAMED RING TOPOLOGY CONNECTED NODES WITH A CENTRAL RING OF A CABLE.
WHICH NETWORK TOPOLOGY IS MOST COMMONLY SEEN ONLY IN WIRELESS NETWORKS?
A)STAR
B)BUS
C)RING
D)MESH
D) MESH IS, FOR THE MOST PART, UNIQUE TO WIRELES NETWORK
WHICH OF THE FOLLOWING IS A DUPLEX FIBER OPTIC CONNECTIONS?
A)LC
B)RJ-45
C)ST
D)SC
A) OF THE OPTIONS GIVEN , ONLY THE LC CONNECTORIS DESIGNED FOR DUPLEX FIBER OPTIC
WHAT IS THE MOST COMMON CATEGORY OF UTP USED IN NEW CABLING INSTALLATIONS?
A)CAT 3
B)CAT 5E
C)CAT 6
D)CAT 7
C) CAT 6 IS THE MOST CMMON CABLING CATERGORY INSTALLED TODAY ALTHOUGH CAT6A AND CAT 7 ARE GAINING IN POPULARITY
ETHERNET BASICS
ETHERNET BASICS
ETHERNET HUBS TOOKS AND INCOMING PACKET AND __________ IT OUT TO THE OTHER CONNECTED PORTS
A)AMPLIFIED
B)REPEATED
C)FILTERED
D)DISTORTED
B ) HUBS WERE NOTHING MORE THAN MULTIPORT REPEATERS
WHAT IS AT THE BEGINING OF THE ETHERNET FRAME?
A)MAC ADDRESS
B)LENGTH
C)PREAMBLE
D)CRC
C) AT THE FRONT OF THE ETHERNET FRAMES IS PREAMBLE
WHAT TYPE OF BUS DID 10 BASE T USE ?
A)BUS
B)RING
C)STAR
D)BUS RING
C) 10BASE-T USED STAR BUS TOPOLOGY
WHAT WAS THE MAXIUM DISTANCE THAT COULD SEPERATE 10-bASE T NODE FROM IT HUB?
A)50 METERS
B)100 METER
C)185 METERS
D)200
B) THE MAXIUM DISTANCE BETWEEN A 10BASE-T NODE AND IT HUB WAS 100 METERS
WHEN USED FOR ETHERNET UNSHIELDED TWISTED PAIR USUES WHAT TYPE OF CONNECTOR?
A)RG 58
B)RJ-45
C)RJ-11
D)RS-232
B) UTP CABLES USES AN RJ-45 CONNECTOR WHEN USED FOR ETHERNET. rG -58 IS THE TYPE OF COXIAL CABLED USED WITH 10BASE-2. RJ-11 IS THE STANDARD FOUR WIRE CONNECTOR USED FOR REGULAR PHONE LINES. RS-232 IS A STANDARD SERIAL CONNECTOR
WHAT WAS THE MAXIUM NUMBER OF NODES THAT COULD BE CONNECTED TO A 10 BASE- T HUB?
A) 1024
B)500
C)100
D)185
A) 10 BASE T HUB COULD CONNECT NO MORE THAN 1024 NODES
WHICH OF THE FOLLOEING IS NOT TRUE OF CROSSOVER CABLES?
A)THEY ARE A TYPE OF TWISTED PAIR CABLING
B)THEY REVERSE THE SENDING AND RECEIVING WIRE PAIRS
C)THEY ARE USED TO CONNECT SWITCHES
D)BOTH ENDS OF A CROSSOVER CABLE WIRE ACCORDING TO THE TIA/EIA 568B STANDARD
D) ONE END OF A CROSSOVER CABLE IS WIRED ACCORDING TO THE TIA /EIA 568B STANDARD. THE OTHER IS WIRED ACORDING TO THE TIA/EIA 568A STANDARD. THIS IS WHAT CROSSES THE WIRE PAIRS AND ENABLES TWO SWITCHES IN EARLY ETHERNET TO COMMUNICATE
WHICH OF THE FOLLOWING CONNECTORS WREE USED BY 10 BASE- FL CABLE? SELECT TWO
A)SC
B)RJ 45
C)RJ-11
D)ST
AD) 10 BASE -FL USED TWO TYPES OF FIBER OPTIC CONNECTOR CALLED SC AND ST CONNECTORS
WHICH NETWORKING DEVICES CAN USE THE SPANNING TREE PROTOCOL STP?
A)HUBS
B)MEDIA CONVERTERS
C)UTP CABLES
D)SWITCHES
D) THE SPANNING TREE PROTOCOL IS UNIQUE TO SWITCHES
WHAT DEVICE DIRECTS PACKETS BASES ON MAC ADDRESS?
A)ROUTER
B)HUB
C)REPEATER
D)SWITCH
D) A SWITCH USES MAC ADDRESSES O DIRECT TRAFFIC ONLY TOT THE APPROPRIATE RECIPEIENT
ETHERNET STANDARDS
ETHERNET STANDARDS
WITH 100BASE-T, WHAT IS THE MAXIUM DISTANCE BETWEEN THE SWITCH AND THE NODE?
A)1000 METTERS
B)400 METERS
C)100 METERS
D150 METERS
C)THE MAXIUM DISTANCE IS 100 METERS
WHAT TYPE OF CABLE AND CONNECTOR DOES 100BASE-FX USE?
A)MULTIMODE FIBER WITH ST OR SC CONNECTORS
B)STP CAT 6 WITH RJ 45 CONNECTORS
C)SINGLE-MODE FIBER WITH MT-RJ CONNECTORS
D)UTP CAT 5E WITH RJ -45 CONNECTORS
A) 100BASE-FX USESE MULTIMODE FIBER WITH EITHER ST OR SC CONNECTORS
WHICH OF THE FOLLOWING CONNECTOR WOULD YOU TYPICALLY FIND WITH A 40 GBE INSTALLATION?
A)LC
B)SFP
C)QSFP
DXSFP
C) 40 GBE INSTALLATIONS OVER FIBER TYPICALLY USE QSFP CONNECTORS
WHAT STANDARD DOES IEE 802.3AB DESCRIBE?
A)1000 BASE-LX
B)1000 BASE-T
C)100 BASE-T
D1000 BASE-SX
B) IEEE 802.3AB IS THE 100 BASE T STANDARD
WHAT IS THE BIG PHYSICAL DIFFERENCE BETWEEN 1000BASE-SXAND 100 BASE-FX
A)1000BASE-SX COMMONLY USES THE LC CONNECTOR, WHEREAS 100 BASE-FX FREQUENTLY USES THE SC CONECTOR
B)1000BASE-SX IS SINGLE MODE, WHEREAS 100 BASE-FX IS MULTIMODE
C)1000BASE-SX USES THE ST CONNECTOR EXCLUSIVELY
D) THERE IS NO DIFFERENCE
A) WHILE 1000 BASE-SX LOOK SIMILIAR TO 100BASE-FX THE FORMER OMMONLY USES THE LC CONNECTOR THE LATTER FREQUENTLY USES THE SC CONNECTOR
WHAT IS THE MAXIUM DISTANCE FOR 1000BASE-LX WITHOUT REPEATERS?
A)1 MILE
B)2500 METERS
C)20000 feet
D5000 metters
D)1000BASE-LX CAN GO FOR 5000 METERS KILOMETERS
what is a big advantages to using fiber optic cable?
A)fiber is common glass; therefore it less expensive
B)fiber is not affected by emi
C)making custom cable lengths is easier with fiber
Dall that orange fiber looks impressive in the network closet
B) BECAUSE FIBER USES GLASS AND LIGHT IT IS NOT AFFECTED BY EMI
HOW MANY WIRE PAIRS DOES 1000bASE-T USE?
A)1
B)2
C)3
D4
D) 1000 BASE-TUSES ALL FOUR PAIRS OF WIRES
WHAT IS THE STANDARD CONNECTOR FOR THE 10 GBE FIBER STANDARD?
A)ST
B)SC
C)MT-RJ
DTHERE IS NO STANDARD
D) THERE IS NO STANDARD CONNECTOR THE 10 GBE COMMITEE HAS LEFT THIS UP TO THE MANFUCATURERS
WHAT IS THE MAXIMUM CABLE LENGTH OF 10G bASE-T ON CAT6?
A)55METERS
B)100METERS
C)20 METERS
D70 METERS
A) WITH CAT 6 CABLE 10GBASE-T IS LIMITED TO 55 METERS
INSTALLING A PHYSICAL NETWORK
INSTALLING A PHYSICAL NETWORK
ASIDE FROM OUTRIGHT BREAKAGE WHAT THE PRIMARY WORRY WITH BENDING A FIBER OPTICC CABLE TOO MUCH
A)ATTENUATION
B)BONDING
C)LIGHT LEAKAGE
D)NEAR END CROSSTALK
C) BENDING A FIBER OPTIC CABLE TOO MUCH CAN CAUSE LIGHT LEAKAGE AND THUS LOSS OR DEGRADATION
WHICH OF THE FOLLOWING ENABLES YOU TO USE MULTIPLE NIC IN A COMPUTER TO ACHIEEVE A MUCH BETTER NETWORK BANDWIDTH?
A)LINKING
B)PORT AGGREGATION
C)SLI
D)XING
B PORT AGGREGATION IS THE PROCESS OF USING MULTIPLE NIC AS A SINGLE CONNECTION THIS INCREASING BANDWITDTH
HOW MANY PAIRS OF WIRES ARE IN A CAT 6 RATED CABLE?
A)2
B)4
C)8
D IT DOESNT SPECIFY
B) THE CAT 6 RATINGS REQUIRES FOUR PAIRS OF WIRES
AN ORGANIZES AND PROTECTS THE HORIZONTAL CABLING IN THE TELECOMMUNICATION ROOM
A)RACK
B)PATCH PANEL
C)OUTLET
D)110 JACK
B)PATCH PANEL ORGANIZES AND PROCESS THE HORIZONTAL CABLING IN THE TELECOMMUNICATION ROOM
WHICH OF THE FOLLOWING WOULD NEVER BE SEEN IN AN EQUIPMENT?
A)PATCH PANEL
B)UPS
C)PC
D)ALL OF THE ABOVE MAY BE SEEN IN AN EQUIPMENT RACK
D) ALL THESE DEVICES MAY BE FOUND IN EQUIPMENT RACKS
WHAT ARE PATCH CABLES USED FOR?
A)TO CONNECT DIFFERENT TELECOMMUNICATIONS ROOMS
B)TO CONNECT THE PATCH PANEL TO THE SWITCH
C)THEY ARE USED AS CROSSOVER TABLES
D)TO CONNECT PC TO OUTLET BOXES
b&D PATCH CABLES ARE USED TO CONNECT THE PATCH PANEL TO THE SWITCH AND THE PC TO THE OUTLET BOXES
WHICH OF THE FOLLOWING NETWORK TECHNOLOGIES USE UTP CABLING IN A STAR TOPOLOGY?
A)CROSSTALK
B)FIBER OPTICS
C)1000 BASE-SX
D)1000BASE-T
D)1000 BASE-T USES UTP CABLING IN A STAR TOPOLOGY
YOUR FIRST DAY ON THE JOB YOU GET A CALL FROM THE OWNE COMPLAINIG THAT HER NETWORK CONNECTION IS DOWN. A QUICK CHECK OF THE CENTRAL SWITCH VERIFIES THAT IT IN GOOD WORKING ORDER. AS IS THE BOSS PC. AS LUCK WOULD HAVE IT YOUR SUPERVISOR CALLS AT JUST THAT TIME AND TELLS YOU NOT TO WORRY SHELL BE BY IN A JIFFY WITH HER TDR TO HELP ROOT OUT THE PROBLEM. WHAT IS SHE TALKING ABOUT
A)TUNE DOAMIN RESONATOR HER NETWORK TONE GENERATOR
B)TIME DETUNING RESONATOR HER NETWORK TESTER
C)TIME DOMAIN REFLECTOMETER HER NETWORK TESTER
D)TIME DETAIL RESOURCE HER NETWORK SCHEMATIC
C)TDR STANDS FOR TIME DOMAIN REFLECTOMETER, THE GENERIC TERM FOR A DECENT NETWORK TESTER THAT CAN DETERMINE LOCATIONS OF CABLE BREAKS AMONG OTHER THINGS
WHAT TWO DEVICES TOGETHER ENABLE YOU TO PICK ASINGLE CABLE OUT OF A STACK OF CABLES?
A)TONE AGGREGATOR
B)TONE BINDER
C)TONE GENERATOR
D) TONE PROBE
C AN D A TONE GENERATOR AND TONE PROBE WORK TOGETHER TO ENABLE YOUT TO PICK A SINGLE CABLE OUT OF A STACK CABLES
RACK MOUNTED EQUIPMENT HAS HEIGHT MEASURED IN WHAT UNITS?
A)MbPS
B)MBps
C)INCHES
D)U
RACK MOUNTED EQUIPMENT USES A HEIGHT MEASUREMENT KNOWN AS A UNIT
TCP /IP BASICS
TCP /IP BASICS
1WHAT IS A ROUTER ?
A)A PIECE OF HARDAWARE THAT FORWARDS PACKETS BASED ON IP ADDRESS
B)A DEVICE THAT SEPERATES YOUR COMPUTERS FROM THE INTERNET
C)A PIECE OF HARDWARE THAT DISTRIBUTES A SINGLE INTERNET CONNECTION TO MULTIPLE COMPUTERS
D)A SYNONYM FOR A FIREWALL
A) A ROUTER IS A PIECE OF HARDWARE THAT FORWARD PACKETS BASED ON IP ADDRESS
2ROUTERS MUST USE THE SAME TYPE OF CONNECTION FOR ALLR OUTES SUCH AS ETHERNET TO ETHERNET OR DOCSIS TO DOCSIS
A)TRUE
B)FALSE
B) FALSE A ROUTER CAN INTERCONNECT DIFFERENT LAYER 2 TECHNOLOGIES
3WHAT TECHNOLOGY ALLOWS YOU TO SHARE A SINGLE PUBLIC IP ADDRESS WITH MANY COMPUTERS?
A)STATIC ADDRESS TRANSLATION
B)NATURAL ADDRESS TRANSLATION
C)COMPUTED PUBLIC ADDRESS TRANSLATION
D) PORT ADDRESS TRANSLATION
D) PORT ADDRESS TRANSLATION, COMMONLY KNOW AS PAT, ENABLE YOU TO SHARE A SINGLE PUBLIC IP ADDRESS WITH MANY COMPUTERS
5) WHICH OF THE FOLLOWING IS AN EGP?
A)BGP
B)IGP
C)EIGRP
D)IS-IS
A) BORDER GATEWAY PROTOCOL (BGP) IS AN EXTERIOR GATEWAY PROTOCOL
6WHAT DYNAMIC ROUTING PROTOCOL USES LINK STATE ADVERTISEMENT TO EXCHANGE INFORMATION ABOUT NETWORKS?
A)BGP
B)OSPF
C)EIGRP
D)IS-IS
B OPEN SHORTEST PATH FIRST USES LINK STATE ADVERTISEMENT (LSA) PACKETS TO EXCHANGE INFORMATION ABOUT NETWORKS
7WHAT IS AREA 0 CALLED IN OSPF?
A)LOCAL AREA
B)PRIMARY ZONE
C)TRUNK
D)BACKBONE
D) AREA 0 IS CALLED THE BACKBONE AREA
8WHICH OF THE FOLLOWING IS NOT A NAME FOR A SERIAL CABLE THAT YOU USE TO CONFIGURE A ROUTER?
A)CONSOLE CABLE
B)YOST CABLE
C)ROLLOVER CABLE
D)NULL MODEM CABLE
D) THE YOST CABLE WHICH WAS INVENTED TO STANDARDIZE THE SERIAL CONSOLE INTERFACE TO CONNECT TO THE ROUTER CONSOLE PORT IS ALSO KNOWN AS THE ROLLOVER OR CONSOLE CABLE
9WHEN YOU ARE FIRST SETTING UP A NEW ROUTER YOU SHOULD NEVER PLUG IT INTO AN EXISITING NETWORK
A)TRUE
B)FALSE
TRUE NEVER PLUG A NEW ROUTER INTO AN EXISTING NETWORK
10THE TRACEROUTE UTILITY IS USEFUL FOR WHICH PURPOSE?
A)CONFIGURING ROUTERS REMOTELY
B)SHOWING THE PHYSICAL LOCATION OF THE ROUTE BETWEEN
C)DISCOVERING INFORMATION ABOUT THE ROUTERS BETWEEN YOU AND THE DESTINATION ADDRESS
D)FIXING THE COMPUTERS LOCAL ROUTING
C) THE TRACEROUTE UTILITY IS USEFUL FOR DISCOVERING INFORMATION ABOUT THE ROUTERS BETWEEN YOU AND THE DESTINATION ADDRESS
TCP/IP APPLICATIONS
TCP/IP APPLICATIONS
WHAT IS THE SESSION INFORMATION -IP ADDRESS, PORT NUMBER, AND LAYER 4 PROTOCOL- HELD IN MEMORY CALLED?
A)END POINT
B)PORT
C)SEGMENT
D)SESSION
E)SOCKET
A&E THE SESSION INFORMATION HELD IN MEMEORY IS CALLED AND ENEDPOOINT OR SOCKET
WHICH OF THE FOLLWOING ARE KEY BENEFITS OF WEB BASED MAIL?
A)YOU CAN USE A THIRD PARTY APPLICATION LIKE MICROSOFT OUTLOOK, TO DOWNLOAD YOUR EMAIL
B)YOU CAN ACCESS YOUR ENAIL FROM ANYWHERE IN THE WORLD USING A WEB BROWSER AND INTERNET CONNECTION
C)IT IS COMPLETELY SPAM - FREE
D) IT IS GREAT FOR CREATING THROW AWAY ACCOUNTS
B&D YOU CAN ACCESS A WEB BASED E MAIL ACCOUNT FROM ANY BROWSER ON ANY MACHINE CONNECTED TO THE INTERNET . THE ACCOUNTS ARE GREAT FOR CREATING THROWING AWAY EMAIL ADDRESSES
A TLS URL CONNECTION STARTS WITH WHICH PREFIX?
A)HTTP
B)WWW
C)FTP
D)HTTPS
D) URL THAT USE USE A TLS CONNECTION START WITH HTTPS INSTEAD OF HTTP
WHICH STATEMENTS ABOUT SSH AND TELNET ARE TRUE?(SLECT TWO)
A)WINDOWS COMES WITH PREINSTALLED SSH AND TELENT CLIENTS
B)SSH IS MORE SECURE THAN TELENET BECAUSE IT ENCRYPTS DATA
C)TELENET IS A COMMAND LINE TOOL WHEREAS SSH IS A GUI TOOL
D)SSH USES PORT 22, AND TELENET USES PORT 23
B&D SSH ENCRYPTS DATA AND IS MORE SECURE THAN TELENET.ALSO, SSH USESE PORT 22, WHERE AS TELENET USE PORT 23
WHY MIGHT YOU USE THE NETSTAT UTILITY?
A)TO SEE THE ROUTE AN IP PACKET TAKES ACROOS MULTIPLE ROUTERS
B)TO SEE YOUR IP ADDRESS AND CONFIGURATION DETAILS
C)TO SEE THE ENDPOINTS OF YOUR SESSIONS
D)TO ISSUE COMMANDS TO A REMOTE SERVER
C) USE NETSTAT TO SEE ENDPOINTS OF YOUR SESSION
WHICH PROTOCOLENABLES SYNCHRONIZATION OF COMMUNICATION AMONG CONNECTED COMPUTING DEVICES?
A)FTP
B)IMAP4
C)NTP
D)TFFTP
C) NETWORK TIME PROOTOCOL ENABLES SYNCHRONIZATION OF COMMUNICATION
PORT 143 (IMAP4) IS WHAT KIND OF PORT?
A)WELL KNOWN
B)REGISTERED
C)EPHEMERAL
D)RESERVED
A) PORTS 0-1023 ARE WELL KNOWN PORTS
what port does passive ftp use?
A)20
B)21
C)23
D)25
B) PASSIVE FTP ONLY USUES PORT 21 AND A RANDOM PORT ACTIVE FTP USES PORT 20
which of the following protocols are used to retrieve email from servors/
A)imap4
B)icmp
C)igmp
D)pop3
A&D IMAP4 AND POP3 ARE USED TO RETIEVE EMAIL
which statements about netstat switches (in windows) are true? select three
A)-a shows all used ports
B)-n shows port numbers and ip addresses
C)-o shows the process id
D)- s shows the application name
AB C = -A SHOWS ALL USED PORTS _N SHOWS PORT NUMBER AND IP ADDRESSES AND -o SHOW THE PROCESS ID
NETWORK NAMING
NETWORK NAMING
1)WHICH DNS COMPONENT PERFORM A RECURSIVE LOOKUP TO DETERMENIN AN IP ADDRESS?
A)FQDN
B)ICANN
C)NAME SERVER
D)RESOLVER
D) THE RESOLVER PERFORMS A RECURSIVE LOOKUP DETERMINE AN IP ADDRESS
WHICH RECORD TYPE DEFINES THE PRIMARY NAME ON SERVER IN CHARGE OF A ZONE?
A)PING/SHOWDNS
B)IPCONFIG/ SHOWDNS
C)IPCONFIG/DISPLAYDNS
D)PING/ DISPLAYDNS
D) THE SOA RECORD DEFIENS THE PRIMARY NAME SERVER IN A CHARGE OF A ZONE
WHATS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG NAME SERVERS?
A)HOST FILES
B)RECURSISVE TRANSFER
C)RESOLVER CACHE
D)ZONE TRANSFER
C) TO SEE THIS DNS CACHE ON A WINDOWS SYSTEM, RUN THE COMMAND IPCONFIG DISPLAYING AT A COMMAND PROMPT
WHATS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG THE NAME SERVERS?
A)HOST FILE
B)RECURSIVE TRANSFER
C)RESOLVER CACHE
D)ZONE TRANSFER
D) A ZONE TRANSFER IS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG NAME SERVERS
WHICH RECORD TYPE HOLDS THE IPV6 ADDRESS FOR A HOST?
A)A
B)AAAA
C)A6
D)SOA
B) AAAA RECORDS HOLD IPV6 ADDRESSES FOR HOST
WHICH RECORD TYPE ACTS LIKE AN ALIAS RETURNING AN FQDN RATHER THAN IP ADDRESS?
A)A
B)CNAME
C)MX
D)SOA
B) A CNAME RECORDS ACTS LIKE AN ALIAS, RETURNING AN fqdn RATHER THAN AN IP ADDRESS
which type of DNS record is used by mail servers to determine where to send e-mail/
A) A record
B)cname record
C)mx record
D)smtp record
C) THE MX RECORD IS USED BY MAIL SERVERS TO DETERMINE WHERE TO SEND EMAIL
running which command enables you to clear the dns cache?
A)IPCONFIG
B)IPCONFIG / ALL
C)IPCONFIG/DNS
D)IPCONFIG/FLUSHDNS
D) RUNNING THE COMMAND IPCONFIG/FLUSHDNS CLEARS THE DNS CACHE
RUNNING WHICH COMMAND ENABLES YOU TO QUERY THE ZONE OF A DNS SERVER?
A)IPCONFIG
B)NS LOOK UP
C)PING
D)XDNS
B) THE TOOL USE FOR QUERYING DNS SERVER ZONE IS NS LOOKUP
WHERE DOES A DNS SERVER STORE THE IP ADDRESSES AND FQDNFOR THE COMPUTERS WITHIN A DOMAIN?
A)FORWARD LOOKUP ZONE
B)CANONICAL ZONE
C)MX RECORD
D)SMTP RECORD
A) A DNS SERVER STORES THE IP ADDRESS AND FQDN FOR THE COMPUTERS WITHIN A DOMAIN IN THE FORWARD LOOK UP ZONE
SECURING TCP/IP
SECURING TCP/IP
ANY ENCRYPTION THAT USES THE SAME KEY FOR ENCRYPTION AND DECRYPTION IS CALLED?
A)ENCODED KEY
B)SYMMETRIC KEY
C)SINGLE KEY
D)SYNTHEIC KEY
B) SYMMETRIC KEY ENCRYPTION USES THE SAME KEY
AN CIPHER ENCRYPTS THE PLIAN TEXT ONE BIT AT A TIME
A)BLOCK
B)FORWARDING
C)STREAM
D)ASYMMETRIC
C) A STREAM CIPHER ENCRYPTS ONE BIT A TIME
IN A PKI ENCRYPTION METHOD WHICH KEY ENCRYPTS THE DATA?
A)PUBLIC
B)PRIVATE
C)BOTH
D)DEPENDS ON WHO SEND THE DATA
A) YOU SEND SOMEONE A PUBLIC KEY THAT HE OR SHE IN TURN ENCRYPT THE PRIVATE KEY DECRIPTS IT
THE PROCESS OF VERIFYING WITH A HIGH DEGREE OF CONFIDENCE THAT THE SENDER IS WHO THE RECIEVER THINKS HE OR SHE SHOULD BE IS CALLED
A)PKI
B)AUTHENTICATION
C)LOCKING
D)NONREPUDIATION
D) THIS IS THE DEFINITION OF NONREPUDIATION
A HASH FUNCTION IS BY DEFINITION?
A)COMPLEX FUNCTION
B)PKI FUNCTION
C)ONE WAY FUNCTION
D)SYSTEMATIC FUNCTION
C) hash functions must be one way they should be complex but complexity is not a requirement
WHICH OF THE FOLLOWING IS A HASH FUNCTION?
A)SHA-256
B)RC4
C)AES
D)BMX
A) Of the choices listed only sha 256 is a hash function
IN ORDER TO HAVE A PKI YOU MUST HAVE?
A)WEB SERVER
B)WEB OF TRUST
C)ROOT AUTHORITY
D)UNSIGNED CERTIFICATE
C) a public key infrastructure pki must have a root authority
WHICH TYPE OF ACCESS CONTROL REQUIRES A LABEL TO DEFINE ITS SENSITIVITY?
A)MAC
D)DAC
C) RBAC
D) VAC
A) mandatory access control must use a label to define sensitivity
IF YOU SEE SOME TRAFFIC RUNNING ON UDP PORTS 1812 AND 1813 WHAT AAA STANDARD IS RUNNING?
A)PPP
B)RADIUS
C)MS CHAP
D)TACACS
...
WHICH AUTHENTICATION STANDARD IS HIGHLY TIME SENSITIVE?
A)PAP
B)RADIUS
C)802.1X
D)KERBEROS
...
A)
B)
C)
D)
...