front 1 WHERE DOES A HUB SEND DATA? A)only to the receiving system B)ONLY TO THE SENDING SYSTEM C)TO ALL THE SYSTEM CONNECTED TO THE HUB D)ONLY TO THE SEVRVER | back 1 C)DATA COMES INTO A HUB THROUGH ONE WIRE AND IS THEN SENT OUT THROUGH ALL THE OTHER WIRES. A HUB SENDS DATA TO ALL SYSTEMS CONNECTED TO IT |
front 2 WHAT UNIQUELY IDENTIFIES EVERY NIC? A)IP ADDRESS B)MEDIA ACCESS CONTROL ADDRESS C)ISO NUMBER D)PACKET ID NUMBER | back 2 B) THE UNIQUE IDENTIFIER ON A NETWORK INTERFACE CARD IS CALLED THE MEDIA ACCESS CONTROL THE MAC ADDRESS |
front 3 WHAT WINDOWS UTILITY DO YOU USE TO FIND THE MAC ADDRESS FOR A SYSTEM? A)IPCONFIG/ALL B)IPCFG/ALL C)PING D)MAC | back 3 A)ALL VERSIONS OF WINDOWS USE IPCONFIG/ALL FROM THE COMMAND LINE TO DETERMINE THE MAC ADDRESS |
front 4 A MAC ADRESS IS KNOWN AS ____________ ADDRESS A)IP B)LOGICAL C)PHYSICAL D)OEM | back 4 C)THE MAC ADDRESS IS A PHYSICAL ADDRESS |
front 5 A NIC SENDS DATA IN DISCRETE CHUNKS CALLED A)SEGMENTS B)SECTIONS C)FRAMES D)LAYERS | back 5 C) THE MAC ADDRESS IS A PHYSICAL ADDRESS |
front 6 THE MAC ADDRESS OF WHICH OF THE FOLLOWING BEGINS A FRAME? A)RECEIVING SYSTEM B)SENDING SYSTEM C)NETWORK D)ROUTER | back 6 A)THE FRAME BEGINS WITH THE MACC ADDRESS OF THE RECEIVING NIC FOLLOWED BY, THE MAC ADDRESS OF THE SENDING NIC, FOLLOWED, IN TURN, BY TYPE OF ENCAPSULATED DATA, AND FCS |
front 7 A FRAME ENDS WITH A SPEACIAL BIT CALLED THE FRAME CHECK SEQUENCES. WHAT DOES THE FCS DO? A)CYCLES DATA ACROSS THE NETWORK B)VERIFIES THAT THE MAC ADDRESS ARE CORRECT C)VERIFIES THAT THE DATA ARRIVED CORRECTLY D)VERIFIES THAT THE IP ADDRESS IS CORRECT | back 7 C) THE DATA IS FOLLOWED BY A SPEACIAL BIT OF CHECKING INFORMATION CALLED THE FRAME CHECK SEQUENCE, WHICH THE RECEIVING NIC USES TO VERIFY THAT THE DATA ARRIVED CORRECTLY |
front 8 WHICH OF THE FOLLOWING IS AN EXAMPLE OF A MAC ADDRESS? A)0-255 B)00-50-56-A3-04-0C C)SBY3M7 D)192.168.4.13 | back 8 MAC- ADDRESS IS A BIT VALUE, AND NO TWO NIC EVER SHARE THE SAME MACC ADDRESS-- EVER 00-50-56-A3-04-0C IS A MAC ADDRESS THE ANSWER IS D |
front 9 WHICH LAYER OF THE OSI MODEL CONTROLS THE SEGMENTATION AND REASSEMBLY OF DATE? A)APPLICATION LAYER B)PRESENTAIO LAYER C)SESSION LAYER D)TRANSPORTATION LAYER | back 9 THE TRANSPORT LAYER CONTROLS THE SEGMENTAION AND REASSEMBLY OF DATA |
front 10 WHICH LAYER OF THE OSI MODEL CONTROLS THE SEGMENTATION AND REASSEMBLY OF DATE? A)APPLICATION LAYER B)PRESENTAIO LAYER C)SESSION LAYER D)TRANSPORTATION LAYER | back 10 C)THE SESSION LAYER KEEPS TRACK OF A SYSTEM CONNECTIONS TO ENSURE THAT SENDS THE RIGHT RESPONSE TO THE RIGHT COMPUTER |
front 11 CABLING AND TOPOLOGY | back 11 CABLING AND TOPOLOGY |
front 12 WHICH OF THE FOLLOWING TOPOLOGIES REQUIRED TERMINATION? A)STAR B)BUS C)MESH D)RING | back 12 B) IN ABUS TOPOLOGY ALL COMPUTERS CONNECTED TO THE NETWORK VIA MAIN LINE. THE CABLE HAD TO BE TERMINATED AT BOTH END TO PREVENT SIGNAL REFLECTION |
front 13 STAR- BUS IS AN EXAMPLE OF A ___________TOPOLOGY A)TRANSITIONAL B)SYSTEM C)HYBRID D)RAMPANT | back 13 C)STAR-BUS IS HYBRID TOPOLOGY BECAUSE IT USES A STAR PHYSICAL TOPOLOGY AND A BUS SIGNAL TOPOLOGY |
front 14 OF THE TOPOLOGIES LISTED, WHICH ONE IS THE MOST FAULT TOLERANT? A)POINT TO POINT B)BUS C)STAR D)RING | back 14 C) OF THE CHOICES LISTED ONLY STAR TOPOLOGY HAS ANY FAULT TOLERANCE |
front 15 WHAT TERM IS USED TO DESCRIBE THE INTERCONNECTVITY OF NETWORK COMPONENETS? A)SEGMENTATION B)MAP C)TOPOLOGY D)PROTOCOL | back 15 C) TOPOLOGY IS THE TERM USED TO DESCRIBE THE INTERCONNECTIVITY OF NETWORK COMPONENTS |
front 16 COXIAL CABLES ALL HAVE AN_____ RATING A)RESISTANCE B)WATT C)SPEED D)OHM | back 16 D) ALL COAXIAL CABLES HAVE AN OHM RATING RG_59 AND rG-6 BOTH ARE RATED AT 75 OHMS |
front 17 WHICH OF THE FOLLOWING IS A TYPE OF COXIAL CABLE? A)RJ-45 B)RG-6 C)BNC D)BARREL | back 17 B) RG-6 IS A TYPE OF COXIAL CABLE |
front 18 WHICH NETWORK TOPLOGY CONNECTED NODES WITH A RING OF CABLES? A)STAR B)BUS C)RING D)MESH | back 18 C) THE APPTLY NAMED RING TOPOLOGY CONNECTED NODES WITH A CENTRAL RING OF A CABLE. |
front 19 WHICH NETWORK TOPOLOGY IS MOST COMMONLY SEEN ONLY IN WIRELESS NETWORKS? A)STAR B)BUS C)RING D)MESH | back 19 D) MESH IS, FOR THE MOST PART, UNIQUE TO WIRELES NETWORK |
front 20 WHICH OF THE FOLLOWING IS A DUPLEX FIBER OPTIC CONNECTIONS? A)LC B)RJ-45 C)ST D)SC | back 20 A) OF THE OPTIONS GIVEN , ONLY THE LC CONNECTORIS DESIGNED FOR DUPLEX FIBER OPTIC |
front 21 WHAT IS THE MOST COMMON CATEGORY OF UTP USED IN NEW CABLING INSTALLATIONS? A)CAT 3 B)CAT 5E C)CAT 6 D)CAT 7 | back 21 C) CAT 6 IS THE MOST CMMON CABLING CATERGORY INSTALLED TODAY ALTHOUGH CAT6A AND CAT 7 ARE GAINING IN POPULARITY |
front 22 ETHERNET BASICS | back 22 ETHERNET BASICS |
front 23 ETHERNET HUBS TOOKS AND INCOMING PACKET AND __________ IT OUT TO THE OTHER CONNECTED PORTS A)AMPLIFIED B)REPEATED C)FILTERED D)DISTORTED | back 23 B ) HUBS WERE NOTHING MORE THAN MULTIPORT REPEATERS |
front 24 WHAT IS AT THE BEGINING OF THE ETHERNET FRAME? A)MAC ADDRESS B)LENGTH C)PREAMBLE D)CRC | back 24 C) AT THE FRONT OF THE ETHERNET FRAMES IS PREAMBLE |
front 25 WHAT TYPE OF BUS DID 10 BASE T USE ? A)BUS B)RING C)STAR D)BUS RING | back 25 C) 10BASE-T USED STAR BUS TOPOLOGY |
front 26 WHAT WAS THE MAXIUM DISTANCE THAT COULD SEPERATE 10-bASE T NODE FROM IT HUB? A)50 METERS B)100 METER C)185 METERS D)200 | back 26 B) THE MAXIUM DISTANCE BETWEEN A 10BASE-T NODE AND IT HUB WAS 100 METERS |
front 27 WHEN USED FOR ETHERNET UNSHIELDED TWISTED PAIR USUES WHAT TYPE OF CONNECTOR? A)RG 58 B)RJ-45 C)RJ-11 D)RS-232 | back 27 B) UTP CABLES USES AN RJ-45 CONNECTOR WHEN USED FOR ETHERNET. rG -58 IS THE TYPE OF COXIAL CABLED USED WITH 10BASE-2. RJ-11 IS THE STANDARD FOUR WIRE CONNECTOR USED FOR REGULAR PHONE LINES. RS-232 IS A STANDARD SERIAL CONNECTOR |
front 28 WHAT WAS THE MAXIUM NUMBER OF NODES THAT COULD BE CONNECTED TO A 10 BASE- T HUB? A) 1024 B)500 C)100 D)185 | back 28 A) 10 BASE T HUB COULD CONNECT NO MORE THAN 1024 NODES |
front 29 WHICH OF THE FOLLOEING IS NOT TRUE OF CROSSOVER CABLES? A)THEY ARE A TYPE OF TWISTED PAIR CABLING B)THEY REVERSE THE SENDING AND RECEIVING WIRE PAIRS C)THEY ARE USED TO CONNECT SWITCHES D)BOTH ENDS OF A CROSSOVER CABLE WIRE ACCORDING TO THE TIA/EIA 568B STANDARD | back 29 D) ONE END OF A CROSSOVER CABLE IS WIRED ACCORDING TO THE TIA /EIA 568B STANDARD. THE OTHER IS WIRED ACORDING TO THE TIA/EIA 568A STANDARD. THIS IS WHAT CROSSES THE WIRE PAIRS AND ENABLES TWO SWITCHES IN EARLY ETHERNET TO COMMUNICATE |
front 30 WHICH OF THE FOLLOWING CONNECTORS WREE USED BY 10 BASE- FL CABLE? SELECT TWO A)SC B)RJ 45 C)RJ-11 D)ST | back 30 AD) 10 BASE -FL USED TWO TYPES OF FIBER OPTIC CONNECTOR CALLED SC AND ST CONNECTORS |
front 31 WHICH NETWORKING DEVICES CAN USE THE SPANNING TREE PROTOCOL STP? A)HUBS B)MEDIA CONVERTERS C)UTP CABLES D)SWITCHES | back 31 D) THE SPANNING TREE PROTOCOL IS UNIQUE TO SWITCHES |
front 32 WHAT DEVICE DIRECTS PACKETS BASES ON MAC ADDRESS? A)ROUTER B)HUB C)REPEATER D)SWITCH | back 32 D) A SWITCH USES MAC ADDRESSES O DIRECT TRAFFIC ONLY TOT THE APPROPRIATE RECIPEIENT |
front 33 ETHERNET STANDARDS | back 33 ETHERNET STANDARDS |
front 34 WITH 100BASE-T, WHAT IS THE MAXIUM DISTANCE BETWEEN THE SWITCH AND THE NODE? A)1000 METTERS B)400 METERS C)100 METERS D150 METERS | back 34 C)THE MAXIUM DISTANCE IS 100 METERS |
front 35 WHAT TYPE OF CABLE AND CONNECTOR DOES 100BASE-FX USE? A)MULTIMODE FIBER WITH ST OR SC CONNECTORS B)STP CAT 6 WITH RJ 45 CONNECTORS C)SINGLE-MODE FIBER WITH MT-RJ CONNECTORS D)UTP CAT 5E WITH RJ -45 CONNECTORS | back 35 A) 100BASE-FX USESE MULTIMODE FIBER WITH EITHER ST OR SC CONNECTORS |
front 36 WHICH OF THE FOLLOWING CONNECTOR WOULD YOU TYPICALLY FIND WITH A 40 GBE INSTALLATION? A)LC B)SFP C)QSFP DXSFP | back 36 C) 40 GBE INSTALLATIONS OVER FIBER TYPICALLY USE QSFP CONNECTORS |
front 37 WHAT STANDARD DOES IEE 802.3AB DESCRIBE? A)1000 BASE-LX B)1000 BASE-T C)100 BASE-T D1000 BASE-SX | back 37 B) IEEE 802.3AB IS THE 100 BASE T STANDARD |
front 38 WHAT IS THE BIG PHYSICAL DIFFERENCE BETWEEN 1000BASE-SXAND 100 BASE-FX A)1000BASE-SX COMMONLY USES THE LC CONNECTOR, WHEREAS 100 BASE-FX FREQUENTLY USES THE SC CONECTOR B)1000BASE-SX IS SINGLE MODE, WHEREAS 100 BASE-FX IS MULTIMODE C)1000BASE-SX USES THE ST CONNECTOR EXCLUSIVELY D) THERE IS NO DIFFERENCE | back 38 A) WHILE 1000 BASE-SX LOOK SIMILIAR TO 100BASE-FX THE FORMER OMMONLY USES THE LC CONNECTOR THE LATTER FREQUENTLY USES THE SC CONNECTOR |
front 39 WHAT IS THE MAXIUM DISTANCE FOR 1000BASE-LX WITHOUT REPEATERS? A)1 MILE B)2500 METERS C)20000 feet D5000 metters | back 39 D)1000BASE-LX CAN GO FOR 5000 METERS KILOMETERS |
front 40 what is a big advantages to using fiber optic cable? A)fiber is common glass; therefore it less expensive B)fiber is not affected by emi C)making custom cable lengths is easier with fiber Dall that orange fiber looks impressive in the network closet | back 40 B) BECAUSE FIBER USES GLASS AND LIGHT IT IS NOT AFFECTED BY EMI |
front 41 HOW MANY WIRE PAIRS DOES 1000bASE-T USE? A)1 B)2 C)3 D4 | back 41 D) 1000 BASE-TUSES ALL FOUR PAIRS OF WIRES |
front 42 WHAT IS THE STANDARD CONNECTOR FOR THE 10 GBE FIBER STANDARD? A)ST B)SC C)MT-RJ DTHERE IS NO STANDARD | back 42 D) THERE IS NO STANDARD CONNECTOR THE 10 GBE COMMITEE HAS LEFT THIS UP TO THE MANFUCATURERS |
front 43 WHAT IS THE MAXIMUM CABLE LENGTH OF 10G bASE-T ON CAT6? A)55METERS B)100METERS C)20 METERS D70 METERS | back 43 A) WITH CAT 6 CABLE 10GBASE-T IS LIMITED TO 55 METERS |
front 44 INSTALLING A PHYSICAL NETWORK | back 44 INSTALLING A PHYSICAL NETWORK |
front 45 ASIDE FROM OUTRIGHT BREAKAGE WHAT THE PRIMARY WORRY WITH BENDING A FIBER OPTICC CABLE TOO MUCH A)ATTENUATION B)BONDING C)LIGHT LEAKAGE D)NEAR END CROSSTALK | back 45 C) BENDING A FIBER OPTIC CABLE TOO MUCH CAN CAUSE LIGHT LEAKAGE AND THUS LOSS OR DEGRADATION |
front 46 WHICH OF THE FOLLOWING ENABLES YOU TO USE MULTIPLE NIC IN A COMPUTER TO ACHIEEVE A MUCH BETTER NETWORK BANDWIDTH? A)LINKING B)PORT AGGREGATION C)SLI D)XING | back 46 B PORT AGGREGATION IS THE PROCESS OF USING MULTIPLE NIC AS A SINGLE CONNECTION THIS INCREASING BANDWITDTH |
front 47 HOW MANY PAIRS OF WIRES ARE IN A CAT 6 RATED CABLE? A)2 B)4 C)8 D IT DOESNT SPECIFY | back 47 B) THE CAT 6 RATINGS REQUIRES FOUR PAIRS OF WIRES |
front 48 AN ORGANIZES AND PROTECTS THE HORIZONTAL CABLING IN THE TELECOMMUNICATION ROOM A)RACK B)PATCH PANEL C)OUTLET D)110 JACK | back 48 B)PATCH PANEL ORGANIZES AND PROCESS THE HORIZONTAL CABLING IN THE TELECOMMUNICATION ROOM |
front 49 WHICH OF THE FOLLOWING WOULD NEVER BE SEEN IN AN EQUIPMENT? A)PATCH PANEL B)UPS C)PC D)ALL OF THE ABOVE MAY BE SEEN IN AN EQUIPMENT RACK | back 49 D) ALL THESE DEVICES MAY BE FOUND IN EQUIPMENT RACKS |
front 50 WHAT ARE PATCH CABLES USED FOR? A)TO CONNECT DIFFERENT TELECOMMUNICATIONS ROOMS B)TO CONNECT THE PATCH PANEL TO THE SWITCH C)THEY ARE USED AS CROSSOVER TABLES D)TO CONNECT PC TO OUTLET BOXES | back 50 b&D PATCH CABLES ARE USED TO CONNECT THE PATCH PANEL TO THE SWITCH AND THE PC TO THE OUTLET BOXES |
front 51 WHICH OF THE FOLLOWING NETWORK TECHNOLOGIES USE UTP CABLING IN A STAR TOPOLOGY? A)CROSSTALK B)FIBER OPTICS C)1000 BASE-SX D)1000BASE-T | back 51 D)1000 BASE-T USES UTP CABLING IN A STAR TOPOLOGY |
front 52 YOUR FIRST DAY ON THE JOB YOU GET A CALL FROM THE OWNE COMPLAINIG THAT HER NETWORK CONNECTION IS DOWN. A QUICK CHECK OF THE CENTRAL SWITCH VERIFIES THAT IT IN GOOD WORKING ORDER. AS IS THE BOSS PC. AS LUCK WOULD HAVE IT YOUR SUPERVISOR CALLS AT JUST THAT TIME AND TELLS YOU NOT TO WORRY SHELL BE BY IN A JIFFY WITH HER TDR TO HELP ROOT OUT THE PROBLEM. WHAT IS SHE TALKING ABOUT A)TUNE DOAMIN RESONATOR HER NETWORK TONE GENERATOR B)TIME DETUNING RESONATOR HER NETWORK TESTER C)TIME DOMAIN REFLECTOMETER HER NETWORK TESTER D)TIME DETAIL RESOURCE HER NETWORK SCHEMATIC | back 52 C)TDR STANDS FOR TIME DOMAIN REFLECTOMETER, THE GENERIC TERM FOR A DECENT NETWORK TESTER THAT CAN DETERMINE LOCATIONS OF CABLE BREAKS AMONG OTHER THINGS |
front 53 WHAT TWO DEVICES TOGETHER ENABLE YOU TO PICK ASINGLE CABLE OUT OF A STACK OF CABLES? A)TONE AGGREGATOR B)TONE BINDER C)TONE GENERATOR D) TONE PROBE | back 53 C AN D A TONE GENERATOR AND TONE PROBE WORK TOGETHER TO ENABLE YOUT TO PICK A SINGLE CABLE OUT OF A STACK CABLES |
front 54 RACK MOUNTED EQUIPMENT HAS HEIGHT MEASURED IN WHAT UNITS? A)MbPS B)MBps C)INCHES D)U | back 54 RACK MOUNTED EQUIPMENT USES A HEIGHT MEASUREMENT KNOWN AS A UNIT |
front 55 TCP /IP BASICS | back 55 TCP /IP BASICS |
front 56 1WHAT IS A ROUTER ? A)A PIECE OF HARDAWARE THAT FORWARDS PACKETS BASED ON IP ADDRESS B)A DEVICE THAT SEPERATES YOUR COMPUTERS FROM THE INTERNET C)A PIECE OF HARDWARE THAT DISTRIBUTES A SINGLE INTERNET CONNECTION TO MULTIPLE COMPUTERS D)A SYNONYM FOR A FIREWALL | back 56 A) A ROUTER IS A PIECE OF HARDWARE THAT FORWARD PACKETS BASED ON IP ADDRESS |
front 57 2ROUTERS MUST USE THE SAME TYPE OF CONNECTION FOR ALLR OUTES SUCH AS ETHERNET TO ETHERNET OR DOCSIS TO DOCSIS A)TRUE B)FALSE | back 57 B) FALSE A ROUTER CAN INTERCONNECT DIFFERENT LAYER 2 TECHNOLOGIES |
front 58 3WHAT TECHNOLOGY ALLOWS YOU TO SHARE A SINGLE PUBLIC IP ADDRESS WITH MANY COMPUTERS? A)STATIC ADDRESS TRANSLATION B)NATURAL ADDRESS TRANSLATION C)COMPUTED PUBLIC ADDRESS TRANSLATION D) PORT ADDRESS TRANSLATION | back 58 D) PORT ADDRESS TRANSLATION, COMMONLY KNOW AS PAT, ENABLE YOU TO SHARE A SINGLE PUBLIC IP ADDRESS WITH MANY COMPUTERS |
front 59 5) WHICH OF THE FOLLOWING IS AN EGP? A)BGP B)IGP C)EIGRP D)IS-IS | back 59 A) BORDER GATEWAY PROTOCOL (BGP) IS AN EXTERIOR GATEWAY PROTOCOL |
front 60 6WHAT DYNAMIC ROUTING PROTOCOL USES LINK STATE ADVERTISEMENT TO EXCHANGE INFORMATION ABOUT NETWORKS? A)BGP B)OSPF C)EIGRP D)IS-IS | back 60 B OPEN SHORTEST PATH FIRST USES LINK STATE ADVERTISEMENT (LSA) PACKETS TO EXCHANGE INFORMATION ABOUT NETWORKS |
front 61 7WHAT IS AREA 0 CALLED IN OSPF? A)LOCAL AREA B)PRIMARY ZONE C)TRUNK D)BACKBONE | back 61 D) AREA 0 IS CALLED THE BACKBONE AREA |
front 62 8WHICH OF THE FOLLOWING IS NOT A NAME FOR A SERIAL CABLE THAT YOU USE TO CONFIGURE A ROUTER? A)CONSOLE CABLE B)YOST CABLE C)ROLLOVER CABLE D)NULL MODEM CABLE | back 62 D) THE YOST CABLE WHICH WAS INVENTED TO STANDARDIZE THE SERIAL CONSOLE INTERFACE TO CONNECT TO THE ROUTER CONSOLE PORT IS ALSO KNOWN AS THE ROLLOVER OR CONSOLE CABLE |
front 63 9WHEN YOU ARE FIRST SETTING UP A NEW ROUTER YOU SHOULD NEVER PLUG IT INTO AN EXISITING NETWORK A)TRUE B)FALSE | back 63 TRUE NEVER PLUG A NEW ROUTER INTO AN EXISTING NETWORK |
front 64 10THE TRACEROUTE UTILITY IS USEFUL FOR WHICH PURPOSE? A)CONFIGURING ROUTERS REMOTELY B)SHOWING THE PHYSICAL LOCATION OF THE ROUTE BETWEEN C)DISCOVERING INFORMATION ABOUT THE ROUTERS BETWEEN YOU AND THE DESTINATION ADDRESS D)FIXING THE COMPUTERS LOCAL ROUTING | back 64 C) THE TRACEROUTE UTILITY IS USEFUL FOR DISCOVERING INFORMATION ABOUT THE ROUTERS BETWEEN YOU AND THE DESTINATION ADDRESS |
front 65 TCP/IP APPLICATIONS | back 65 TCP/IP APPLICATIONS |
front 66 WHAT IS THE SESSION INFORMATION -IP ADDRESS, PORT NUMBER, AND LAYER 4 PROTOCOL- HELD IN MEMORY CALLED? A)END POINT B)PORT C)SEGMENT D)SESSION E)SOCKET | back 66 A&E THE SESSION INFORMATION HELD IN MEMEORY IS CALLED AND ENEDPOOINT OR SOCKET |
front 67 WHICH OF THE FOLLWOING ARE KEY BENEFITS OF WEB BASED MAIL? A)YOU CAN USE A THIRD PARTY APPLICATION LIKE MICROSOFT OUTLOOK, TO DOWNLOAD YOUR EMAIL B)YOU CAN ACCESS YOUR ENAIL FROM ANYWHERE IN THE WORLD USING A WEB BROWSER AND INTERNET CONNECTION C)IT IS COMPLETELY SPAM - FREE D) IT IS GREAT FOR CREATING THROW AWAY ACCOUNTS | back 67 B&D YOU CAN ACCESS A WEB BASED E MAIL ACCOUNT FROM ANY BROWSER ON ANY MACHINE CONNECTED TO THE INTERNET . THE ACCOUNTS ARE GREAT FOR CREATING THROWING AWAY EMAIL ADDRESSES |
front 68 A TLS URL CONNECTION STARTS WITH WHICH PREFIX? A)HTTP B)WWW C)FTP D)HTTPS | back 68 D) URL THAT USE USE A TLS CONNECTION START WITH HTTPS INSTEAD OF HTTP |
front 69 WHICH STATEMENTS ABOUT SSH AND TELNET ARE TRUE?(SLECT TWO) A)WINDOWS COMES WITH PREINSTALLED SSH AND TELENT CLIENTS B)SSH IS MORE SECURE THAN TELENET BECAUSE IT ENCRYPTS DATA C)TELENET IS A COMMAND LINE TOOL WHEREAS SSH IS A GUI TOOL D)SSH USES PORT 22, AND TELENET USES PORT 23 | back 69 B&D SSH ENCRYPTS DATA AND IS MORE SECURE THAN TELENET.ALSO, SSH USESE PORT 22, WHERE AS TELENET USE PORT 23 |
front 70 WHY MIGHT YOU USE THE NETSTAT UTILITY? A)TO SEE THE ROUTE AN IP PACKET TAKES ACROOS MULTIPLE ROUTERS B)TO SEE YOUR IP ADDRESS AND CONFIGURATION DETAILS C)TO SEE THE ENDPOINTS OF YOUR SESSIONS D)TO ISSUE COMMANDS TO A REMOTE SERVER | back 70 C) USE NETSTAT TO SEE ENDPOINTS OF YOUR SESSION |
front 71 WHICH PROTOCOLENABLES SYNCHRONIZATION OF COMMUNICATION AMONG CONNECTED COMPUTING DEVICES? A)FTP B)IMAP4 C)NTP D)TFFTP | back 71 C) NETWORK TIME PROOTOCOL ENABLES SYNCHRONIZATION OF COMMUNICATION |
front 72 PORT 143 (IMAP4) IS WHAT KIND OF PORT? A)WELL KNOWN B)REGISTERED C)EPHEMERAL D)RESERVED | back 72 A) PORTS 0-1023 ARE WELL KNOWN PORTS |
front 73 what port does passive ftp use? A)20 B)21 C)23 D)25 | back 73 B) PASSIVE FTP ONLY USUES PORT 21 AND A RANDOM PORT ACTIVE FTP USES PORT 20 |
front 74 which of the following protocols are used to retrieve email from servors/ A)imap4 B)icmp C)igmp D)pop3 | back 74 A&D IMAP4 AND POP3 ARE USED TO RETIEVE EMAIL |
front 75 which statements about netstat switches (in windows) are true? select three A)-a shows all used ports B)-n shows port numbers and ip addresses C)-o shows the process id D)- s shows the application name | back 75 AB C = -A SHOWS ALL USED PORTS _N SHOWS PORT NUMBER AND IP ADDRESSES AND -o SHOW THE PROCESS ID |
front 76 NETWORK NAMING | back 76 NETWORK NAMING |
front 77 1)WHICH DNS COMPONENT PERFORM A RECURSIVE LOOKUP TO DETERMENIN AN IP ADDRESS? A)FQDN B)ICANN C)NAME SERVER D)RESOLVER | back 77 D) THE RESOLVER PERFORMS A RECURSIVE LOOKUP DETERMINE AN IP ADDRESS |
front 78 WHICH RECORD TYPE DEFINES THE PRIMARY NAME ON SERVER IN CHARGE OF A ZONE? A)PING/SHOWDNS B)IPCONFIG/ SHOWDNS C)IPCONFIG/DISPLAYDNS D)PING/ DISPLAYDNS | back 78 D) THE SOA RECORD DEFIENS THE PRIMARY NAME SERVER IN A CHARGE OF A ZONE |
front 79 WHATS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG NAME SERVERS? A)HOST FILES B)RECURSISVE TRANSFER C)RESOLVER CACHE D)ZONE TRANSFER | back 79 C) TO SEE THIS DNS CACHE ON A WINDOWS SYSTEM, RUN THE COMMAND IPCONFIG DISPLAYING AT A COMMAND PROMPT |
front 80 WHATS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG THE NAME SERVERS? A)HOST FILE B)RECURSIVE TRANSFER C)RESOLVER CACHE D)ZONE TRANSFER | back 80 D) A ZONE TRANSFER IS THE PROCESS THROUGH WHICH RECORDS PROPAGATE AMONG NAME SERVERS |
front 81 WHICH RECORD TYPE HOLDS THE IPV6 ADDRESS FOR A HOST? A)A B)AAAA C)A6 D)SOA | back 81 B) AAAA RECORDS HOLD IPV6 ADDRESSES FOR HOST |
front 82 WHICH RECORD TYPE ACTS LIKE AN ALIAS RETURNING AN FQDN RATHER THAN IP ADDRESS? A)A B)CNAME C)MX D)SOA | back 82 B) A CNAME RECORDS ACTS LIKE AN ALIAS, RETURNING AN fqdn RATHER THAN AN IP ADDRESS |
front 83 which type of DNS record is used by mail servers to determine where to send e-mail/ A) A record B)cname record C)mx record D)smtp record | back 83 C) THE MX RECORD IS USED BY MAIL SERVERS TO DETERMINE WHERE TO SEND EMAIL |
front 84 running which command enables you to clear the dns cache? A)IPCONFIG B)IPCONFIG / ALL C)IPCONFIG/DNS D)IPCONFIG/FLUSHDNS | back 84 D) RUNNING THE COMMAND IPCONFIG/FLUSHDNS CLEARS THE DNS CACHE |
front 85 RUNNING WHICH COMMAND ENABLES YOU TO QUERY THE ZONE OF A DNS SERVER? A)IPCONFIG B)NS LOOK UP C)PING D)XDNS | back 85 B) THE TOOL USE FOR QUERYING DNS SERVER ZONE IS NS LOOKUP |
front 86 WHERE DOES A DNS SERVER STORE THE IP ADDRESSES AND FQDNFOR THE COMPUTERS WITHIN A DOMAIN? A)FORWARD LOOKUP ZONE B)CANONICAL ZONE C)MX RECORD D)SMTP RECORD | back 86 A) A DNS SERVER STORES THE IP ADDRESS AND FQDN FOR THE COMPUTERS WITHIN A DOMAIN IN THE FORWARD LOOK UP ZONE |
front 87 SECURING TCP/IP | back 87 SECURING TCP/IP |
front 88 ANY ENCRYPTION THAT USES THE SAME KEY FOR ENCRYPTION AND DECRYPTION IS CALLED? A)ENCODED KEY B)SYMMETRIC KEY C)SINGLE KEY D)SYNTHEIC KEY | back 88 B) SYMMETRIC KEY ENCRYPTION USES THE SAME KEY |
front 89 AN CIPHER ENCRYPTS THE PLIAN TEXT ONE BIT AT A TIME A)BLOCK B)FORWARDING C)STREAM D)ASYMMETRIC | back 89 C) A STREAM CIPHER ENCRYPTS ONE BIT A TIME |
front 90 IN A PKI ENCRYPTION METHOD WHICH KEY ENCRYPTS THE DATA? A)PUBLIC B)PRIVATE C)BOTH D)DEPENDS ON WHO SEND THE DATA | back 90 A) YOU SEND SOMEONE A PUBLIC KEY THAT HE OR SHE IN TURN ENCRYPT THE PRIVATE KEY DECRIPTS IT |
front 91 THE PROCESS OF VERIFYING WITH A HIGH DEGREE OF CONFIDENCE THAT THE SENDER IS WHO THE RECIEVER THINKS HE OR SHE SHOULD BE IS CALLED A)PKI B)AUTHENTICATION C)LOCKING D)NONREPUDIATION | back 91 D) THIS IS THE DEFINITION OF NONREPUDIATION |
front 92 A HASH FUNCTION IS BY DEFINITION? A)COMPLEX FUNCTION B)PKI FUNCTION C)ONE WAY FUNCTION D)SYSTEMATIC FUNCTION | back 92 C) hash functions must be one way they should be complex but complexity is not a requirement |
front 93 WHICH OF THE FOLLOWING IS A HASH FUNCTION? A)SHA-256 B)RC4 C)AES D)BMX | back 93 A) Of the choices listed only sha 256 is a hash function |
front 94 IN ORDER TO HAVE A PKI YOU MUST HAVE? A)WEB SERVER B)WEB OF TRUST C)ROOT AUTHORITY D)UNSIGNED CERTIFICATE | back 94 C) a public key infrastructure pki must have a root authority |
front 95 WHICH TYPE OF ACCESS CONTROL REQUIRES A LABEL TO DEFINE ITS SENSITIVITY? A)MAC D)DAC C) RBAC D) VAC | back 95 A) mandatory access control must use a label to define sensitivity |
front 96 IF YOU SEE SOME TRAFFIC RUNNING ON UDP PORTS 1812 AND 1813 WHAT AAA STANDARD IS RUNNING? A)PPP B)RADIUS C)MS CHAP D)TACACS | back 96 no data |
front 97 WHICH AUTHENTICATION STANDARD IS HIGHLY TIME SENSITIVE? A)PAP B)RADIUS C)802.1X D)KERBEROS | back 97 no data |
front 98 A) B) C) D) | back 98 no data |