Network+ Final

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?
Click the card to flip 👆
1 / 335
Terms in this set (335)
When would you typically use an RJ11 connector?When connecting a phone to a phone lineYou have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?F-type813Firewalls can be used to ______________ information in and out of your network.encryptSQL SlammerComputer worm that caused a denial of service on internet hosts and dramatically slowed down internet traffic. Infected approx 75,000 victims within 10 minutes of being active.Provides for protocol specific outbound trafficProxy ServerPerimeter network traffic cannot pass through directly. Everything behind it is invisible to the outside network.Demilitarized Zone (DMZ)A way of attempting to acquire personal information by masquerading as a trustworthy entity in an electronic communication.PhishingIn which step of the troubleshooting process would you ask detailed questions of the user?Step 1A type of network that makes use of existing private or public network infrastucture to provide a secured network connection.VPNPunchdown toolPlaces UTP wires into a 66 or 110 blockWhich of the following terms are often synonymous with or made possible with CIDR? (Select two.)- Classless - VLSMYou want to use the T568A standard to add connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?White/green, green, white/orange, blue, white/blue, orange, white/brown, brownYou have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed.Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation?1000BaseCXConvert Decimal number to a Binary number 3503Given the following routing table: Images where would a packet with the address 64.165.5.34 be sent?To the 64.165.5.0/24 network on interface WAN.Metamorphic virusCreates different varieties of the same virus.Perimeter network traffic cannot pass through directly. Everything behind it is invisible to the outside network.Demilitarized Zone (DMZ)Host computer that is physically separated from any other networkAir GapCreates different varieties of the same virus.Metamorphic virusNetwork troubleshooting tools are a necessity for every network administrator. How can ipconfig utility help you?Finds the IP configuration informationCovers short distances. Is used for a office building, home, hospital or school.LANSome switches also provide power - for example, to plug in a voice over IP phone.TrueButt SetType of handset that can be connected to an analog line wherever there is a telecom connection point and is used to identify problems with voice lines.Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends, and the customer's responsibility begins?DemarcWhich of the following cables offers the best protection against EMI?RG-6What are two big advantages to using OSPF over RIP? (Select two.)- OSPF sends only routing table changes, reducing network traffic. - OSPF chooses routes based on link speed, not hop countWhich of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select two.)- Install a DHCP server on the network. - Use Automatic Private IP Addressing.In which step of the troubleshooting process would you document findings, actions and outcomes?Step 6KeyloggingCaptures the key strokes that the user presses. Used to capture passwords and login information.Prevents viruses or trojans infecting computers, block spam, and restrict web use to authorized sites.Web ProxySoftware based firewall running under a network server softwareNetwork Operating System (NOS) FirewallPrevents users from accessing a part of the network or a website by flooding the network with useless traffic.Denial of Service attackRouters must use the same type of connection for all routes, such as Ethernet to Ethernet or ATM to ATM.FalseWhy is a firewall used on a network?For SecurityToner probeCan help you locate a particular cableWhich pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network? (Select two.)- Pin 2 - Pin 1Which of the following connectors is used with fiber optic cables and requires that you use a twisting motion to connect it?STYou have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. Which mask should you use?255.0.0.0Covers a smaller area. Used in places such as hospitals, schools or any organization that has multiple LANs and buildings that need to share resources.CANWhen you are connected to a hub, you are connected with a ________________ mode.half-duplexStand alone hardware firewall that preforms only the function of a firewall.Appliance FirewallPrevents viruses or trojans infecting computers, block spam, and restrict web use to authorized sites.Web ProxyAttaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.Computer VirusIn which step of the troubleshooting process would you implement a solution?Step 4PhishingA way of attempting to acquire personal information by masquerading as a trustworthy entity in an electronic communication.Storage Area Network (SAN)Constructed to provide the purpose of transmitting stored dataProtocol AnalyzerUsed to capture and analyze signals and data traffic over a communication channel.Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.)- LC - MTRJWhich of the following connectors is used with fiber optic cables and requires that you use a twisting motion to connect it?Use the T568A standard on one connector and the T568B standard on the other connector.Which of the following protocols has a limit of 15 hops between any two networks?RIPYou've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)- 172.17.0.0 - 172.17.128.0BotnetComputer controlled externally to perform malicious attacksNetwork of semi -trusted hosts, such as business partners, suppliers, or customersExtranetUsing software tools to provide real time analysis of either network traffic or system and application logsIntrusion Detection System (IDS)Computer connected tot he internet that has be hijacked by a computer virus or trojan horse and can now be used to perform malicious tasks under remote direction.Zombie ComputerIn which step of the troubleshooting process would you test your theory?Step 3Metropolitan Area Network (MAN)Covers a large geographical area and may serve as an ISP (Internet Service Provider)A switch is a smart device - traffic destined for a particular ___________ is sent only to that ___________ on a switch.interface, interfaceCrimping toolUsed to firmly connect TJ-45 connectors to Cat cablesYou have a small home network connected to the internet using an RG-6 cable. You need to move the router connecting the network to the internet, but can't find any RG-6 cable.Which cable types could you use instead?RG-59You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience?EchoWhat does Enhanced Interior Gateway Routing Protocol (EIGRP) do in dynamic routing?Used on a computer network for automating routing decisions and configurationAssuming the network is indicated by the default portion of the IP address, which three of the following IP addresses belong to the Class A network 114.0.0.0? (Select three.)- 114.122.66.12 - 114.58.12.0 - 114.0.0.15Cable modems don't work exactly like modulator/demodulator -they provide bridging functionality that allows us to connect from our Ethernet network onto the cable modem network.TrueBrute Force attackGains information by cracking passwords through trial and errorProvides for protocol specific outbound trafficProxy ServerHacker monitors data traveling on a network and intercepts sensitive informationPassive AttackNetwork troubleshooting tools are a necessity for every network administrator. How can netstat utility help you?determines which services on a host are associated with specific active portsSoftware based firewall running under a network server softwareNetwork Operating System (NOS) FirewallWireless Local Area Network (WLAN)Allows user to roam with their mobile devices and maintain network connectivityWhich of the following connector types are used with UTP cables? (Select two.)- RJ45 - RJ11Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports?Patch panelYou have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. You are using a Windows server for DHCP, and the default lease time is eight days. What impact, if any, will this have on the network?Increased network trafficWhat does Interior Gateway Protocol (IGP) do?Routes traffic within an Autonomous System (AS)Time Domain Reflectometer (TDR)Used to determine the characteristics of electrical lines by observing reflected waveforms.Network troubleshooting tools are a necessity for every network administrator. How can Ping utility help you?provides a basic connectivity test between the requesting host and a destination hostAdwareAutomatically renders advertisements in order to generate revenue.Set of rules stored in the firewall for it to make decisionsACLStand alone hardware firewall that preforms only the function of a firewall.Appliance FirewallComputer worm that caused a denial of service on internet hosts and dramatically slowed down internet traffic. Infected approx 75,000 victims within 10 minutes of being active.SQL SlammerWide Area Network (WAN)Extends over a large geographical area, although it might be confined within the bounds of a state or country.A wireless access point (WAP) is used to provide a wireless network inside a building.TrueCable TesterCan indicate if there is continuity between the two ends of a wireYou are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now you need to cut off the excess end of each wire.Which tool should you use?Punch down toolWhich of the following are characteristics of an MTRJ fiber optic connector? They use metal guide pins to ensure accurate alignment.They can be used with multi-mode fiber optic cables.Distance vector routing protocols such as RIP rely on what metric to determine the best route?Hop count.Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?166.70.255.254In which step of the troubleshooting process would you question the obvious?Step 2Passive AttackHacker monitors data traveling on a network and intercepts sensitive informationNetwork of trusted hosts owned and controlled by an organizationIntranetNetwork of semi -trusted hosts, such as business partners, suppliers, or customersExtranetAutomatically renders advertisements in order to generate revenue.AdwarePersonal Area Network (PAN)Range is typically limited to just a few meters.A router is designed to send information between different _____________ or segments of a network.subnetsMultimeterCan tell you how much voltage is on the lineYou are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFLhubs, cabling, and network interface cards.What is the maximum length for the network cable between a workstation and a hub?2,000 metersWhy might you use an RJ11 connector?You want to connect your computer to the internet with a DSL modem.Which of the following tasks do routers perform? (Select two.)- Route data based on logical network addresses. - Maintain information about paths through an internetwork.You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?DHCP serverStep 1Identify the problem.Insider attackEmployee exploits their network access to steal informationHost computer that is physically separated from any other networkAir GapSet of rules stored in the firewall for it to make decisionsACLHacker attacks network with malware or other planned attackActive attackCampus Area Network (CAN)Network used in a university or industrial/business parkWhat is device type A and B in the following exhibit?Device A is a switch, and device B is a router.Wire StripperRemoves the insulation from a cable, exposing the conductorYou use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable so that a signal sent on pin 1 arrives on the cable connected to pin 7. Which term describes this condition?Short circuitYou are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?2,000 metersWhat does Enhanced Interior Gateway Routing Protocol (EIGRP) do?Hybrid for routing within an AS. Uses a composite number for the metric that indicates bandwidth and delay . The higher the bandwidth, the lower the metric.You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type?ClasslessStep 2Establish a theory of probable cause.Using software tools to provide real time analysis of either network traffic or system and application logsIntrusion Detection System (IDS)Multiple private IP addresses to be mapped onto a single public addressPort Address Translation (PAT)Captures the key strokes that the user presses. Used to capture passwords and login information.KeyloggingWhich of the following are advantages of using fiber optic cabling for a network?Immunity to electromagnetic interference, Greater cable distances without a repeaterWhich of the following does a modem not use?Standard phone linesF-type connectors are typically used with which of the following cable standards? (Select two.)- RG-6 - RG-59You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use?IGPConsider the following IP addresses. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44 Which list represents the IP address class of each listed IP address?Class A, Class B, Class B, Class CTemperature MonitorCan be used to monitor and ensure the temperature levelStep 3Test probable cause theory to determine actual cause.Provides a more secure addressing method for private networks connected to the internetNetwork Address Translation (NAT)Provides a more secure addressing method for private networks connected to the internetNetwork Address Translation (NAT)Computer program designed to provide continued privileged access to a computer while hiding its presence.RootkitCertifierUsed to verify that a cable meets its specifications such as the bandwidth and frequency.A router can only connect computers within the same network.FalseYou manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network?CertifierWhich of the following Ethernet standards uses fiber-optic cabling?100BaseFX 1000BaseLXA router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?Drop the packet.Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?211.70.0.254is the Windows command that will show you MAC address.ipconfig /allComputer controlled externally to perform malicious attacksBotnetThis device is called a multi-port repeater, which means that any traffic going into one port on a hub is automatically sent to all of the other interfaces on that hub as well.TrueStep 4Establish an action plan and execute the plan.Which of the following connector types would you most likely use to connect to a T1 WAN service?RJ48cWhich of the following routing protocols are classified as link state routing protocols? (Select two.)- IS-IS - OSPFYour network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network?- 179.113.89.0 - 179.113.0.118 - 179.113.65.12Your network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment length allowed?412 metersOn a Windows machine, to see all routers in between you and a destination, you'd use AnswertracertStep 5Verify full system functionality.Once this hardware was introduced, we quickly moved to it instead of hubs.switchesGains information by cracking passwords through trial and errorBrute Force attackYour network follows the 100BaseTX specifications for Fast Ethernet. What is the maximum cable segment lengthallowed?100 MetersWhich of the following tests can be performed by a TDR?Measure the length of a cable. Identify the location of a fault on a cable.Which of the following statements about RIP is true?RIP uses hop counts as the cost metric.Which of the following IP addresses are Class C addresses? (Select three.)- 223.16.5.0 - 222.55.0.0 - 192.15.5.55What is the network address and subnet mask used by APIPA? (Select two.)- 169.254.0.0 - 255.255.0.0Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?OSPFWhat type of cabling is used with 100BaseTX Fast Ethernet networks?Cat5 or higherYou have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings,some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use theexisting cabling.Which Ethernet standard meets these guidelines? (Choose two.)- 10GBaseSR - 1000BaseSXA ____________ is responsible for testing a cable to ensure that it can handle its rated capacity.certifierIt is the link that interconnects networks.WAN linkStep 6Verify full system functionality.Code intentionally inserted into software system that will set off a malicious function with conditions are met.Logic BombSoftware that gathers information about you, your browsing habits, as well as data.SpywareThis serves up resources to a network.ServerPort 110 (POP) is what kind of port?Well-knownWhich of the following routing protocols is used by routers on the internet for learning and sharing routes?BGP____ is used to query DNS servers.nslookupCorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other, but you are having trouble configuring Internet access. What is the likely cause of the problem?Private addresses cannot directly communicate to hosts outside the local subnet.You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for theimplementation? (Select two.)- Single-mode fiber - 10GBaseLR standardsWhich of the following connectors are used with fiber optic cables and include both cables in a single connector?MTRJ, LCIt might be a workstation, laptop, smartphone with wireless capabilities, or a variety of other end-user terminal devices.ClientWhich of the following IP address ranges is reserved for automatic private IP addressing?169.254.0.1 - 169.254.255.254In transport protocols, RTP provides...end-to-end delivery services of real-time audio and videoMalware that appears to perform some useful task but which does something with negative consequences.Trojan HorseIf you want to analyze a remote system for open ports that may allow for security breaches, you can use a (n)port scannerYou are connecting Cat 5e cables to a 110 block. What order should you connect the wires in to follow standard wiring conventions?White/blue, blue, white/orange, orange, white/green, green, white/brown, brownYou want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectorsConnect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?If the network is connected to the Internet using multiple ISPs.Which of the following IP addresses are Class B addresses? (Select three.)- 129.0.0.0 - 132.12.0.0 - 190.65.2.0What does Routing Information Protocol (RIP) do?Distance vector used within an autonomous system. Uses hop count as the metric.Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network?Pin1 Pin 2What tool should you use to extend network services beyond the demarc?Punch down toolIt is an older technology that interconnects network components such as clients and servers. It has variable number of available ports.HubIn transport protocols, TCP provides...reliable connection-oriented delivery of packetsWhich of the following connectors usually require polishing as part of the assembly process? (Select two.)- ST - SCIt is a device which makes its forwarding decisions based on logical network addresses.RouterThe protocol developed by Netscape for transmitting private documents over the Internet is known as:Secure Sockets Layer (SSL)You are connecting Cat 5e cables to a 110 block. What order should you connect the wires to follow standard wiring conventions?White/blue, blue, white/orange, orange, white/green, green, white/brown, brownWhen multiple routes to a destination exist, what is used to select the best possible route?MetricWhich organization is responsible for allocating public IP addresses?IANAYou have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?Peer-to-peerWhich of the following best describes OSPF?OSPF is a classless link state routing protocol.Which of the following are the requirements of the 1000BaseT Ethernet standards?Cat 5e cabling, The cable length must be less than or equal to 100m, RJ45 connectorsYou have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes? Select one:CrosstalkThis device can be copper or fiber-optic cable.MediaWhy might you use a Telnet client?To issue commands to a remote serverIn transport protocols, SCTP provides...more reliability by better means of flow control, buffering, retransmission, and multiple streamsIt interconnects network components, and it has a variety of port densities. It does not simply take traffic in on one port and blast that traffic out all other ports. Rather, it learns which devices reside off of which ports.SwitchWhich of the following connectors usually require polishing as part of the assembly process?ST SCWhy might you use an RJ11 connector?You want to connect your computer to the internet with a DSL modem.Which of the following routing protocols is classified as a hybrid routing protocol?EIGRPAfter installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and using the ipconfig /all command, receive the following information: Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . . : Intel(R) Ethernet Connection Physical Address. . . . . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Autoconfiguration IPv4 Address. . : 169.254.25.129 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : Which of the following statements are true? (Select two).- The client system is unable to reach the DHCP server. - The client system is configured to use DHCP.Which of the following is a valid IPv4 address? (Select two.)- 172.16.1.26 - 2.2.2.2What is the main difference between RIP and RIPv2?RIP is a classful protocol, while RIPv2 is a classless protocol.You want to create a loopback plug using a single RJ45 connector. How should you connect the wires in the connector?Connect pin 1 to pin 3 and pin 2 to pin 6.You are working with an older 10Base2 Ethernet network.Which of the following connector types will you most likely encounter?BNCWhat ports does FTP use traditionally?20, 21Which statements about netstat switches (in Windows) are true?-n shows raw port numbers and IP addresses.,-a shows all used ports,-o shows the process ID.You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You use a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?AttenuationWhich recommendation should you follow while using 110 blocks for connecting Cat 5 and higher data cables?Keep wire pairs twisted up to within one-half of an inch of the connector.What does Interior Gateway Routing Protocol (IGRP) do in dynamic routing?Recognizes assignment of different autonomous systems and automatically summarizes at network class boundaries.Which of the following is not a reason to use subnets on a network?Combine different media type on to the same subnet.What is the binary format for the following decimal IP address? 131.9.202.11110000011.00001001.11001010.01101111What does Distance Vector Protocols do in dynamic routing?Calculates the total cost to get to a particular network ID and compare that cost to the total cost of all the other routes to get to that same network ID.F-type connectors are typically used with which of the following cable standards?RG-6 RG-59You are working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls.Which tool should you use?OTDRWhich of the following protocols are used to receive e-mail from servers?POP, IMAPYour network has been assigned the Class C network address 200.78.151.0. Which of the following addresses can be assigned to hosts on your network? (Select three.)- 200.78.151.111 - 200.78.151.252 - 200.78.151.12What does Border Gateway Protocol (BGP) do?Used on the Internet to identify routes between ASsYou want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?White/orange, orange, white/green, blue, white/blue, green, white/brown, brownWhich of the following are advantages of using fiber optic cabling for a network? (Select two.)- Greater cable distances without a repeater - Immunity to electromagnetic interferenceWhich of the following are key benefits of Web-based mail?You can access your e-mail from anywhere in the world using a Web browser and an Internet connection., It is great for creating throw-away accounts.What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011206.58.170.67What is Area 0 called in OSPF?BackboneWhich of the following uses metal clips placed over plastic slots to connect individual copper wires?110 blockWhich of the following uses metal clips placed over plastic slots to connect individual copper wires?110 blockAn SSL/TLS URL connection starts with which prefix?HttpsWhy might you use the netstat utility?To see the endpoints of your sessionsEthernet 100BaseFX networks use what type of cabling?Fiber opticYou have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?RolloverWhich of the following is a characteristic of static routing when compared to dynamic routing?All routes must be manually updated on the router.A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation?129.11.99.78/16Which two of the following statements about the dynamic host configuration protocol (DHCP) are true?- It can deliver other configuration information in addition to IP addresses. - A DHCP server assigns addresses to requesting hosts.What are the main differences between the OSPF and IS-IS routing protocols?OSPF requires an area 0, while IS-IS does not.What is the minimum cable specification that supports 1000 Mbps Ethernet?Cat 5eYour network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment lengthallowed?412 MetersWhich statements about SSH and Telnet are true?SSH is more secure than Telnet because it encrypts data., SSH uses port 22, and Telnet uses port 23.You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the internet. How can you resolve this problem?You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06)What topology is used with 100BaseTX Fast Ethernet networks? (Select two.)- Physical star/logical bus - Physical star/logical starEthernet 100BaseFX networks use what type of cabling?Fiber opticWhich of the following routing protocols uses relative link cost as the metric?OSPFWhich of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?166.70.0.1You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem?Implement an IP helper address on the router.What is the name of the cable that you use to connect to the console port on Cisco routers?Yost cableFalseA router can only connect computers within the same network.You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?White/orange, orange, white/green, blue, white/blue, green, white/brown, brownDNS stand forDomain Name SystemWhen a range of IP addresses is set aside for clients devices, and one of these IPs is issued to these devices when they request one, this is known asDynamic AllocationWhich of the following are characteristics of coaxial network cable? (Select three.)- It has a conductor made from copper in the center of the cable. - It uses two concentric metallic conductors. - The ends of the cable must be terminated.What technology allows you to share a single public IP address with many computers?Port Address TranslationFor securityWhy is a firewall used on a network?What is the default subnet mask for the IP address 203.111.3.3?255.255.255.0Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.)- 168.16.5.1 - 191.168.2.15 - 129.0.0.1What does Open Shortest Path First (OSPF) Protocols do in dynamic routing?Finds the best path for packets as they pass through a set of connected networks.half-duplexWhen you are connected to a hub, you are connected with a ________________ mode.You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it.Which polish grade should you use to replace the existing cable?Angled Physical Contact polishThis server is managed by the Internet Service Provider (ISP) or the IT department. Manages both incoming and outgoing mail.Mail serverYou are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?255.255.0.0When you are first setting up a new router, you should never plug it into an existing network.Trueinterface, interfaceA switch is a smart device - traffic destined for a particular ___________ is sent only to that ___________ on a switch.What type of cabling is used with 100BaseTX Fast Ethernet networks?Cat5 or higherWhen is POP3 used?Allows an email client to download an email from an email server.A host has the address 100.55.177.99/16. Which of the following is the broadcast address for the subnet?100.55.255.255What is a router?A piece of hardware that forwards packets based on IP addressTrueSome switches also provide power - for example, to plug in a voice over IP phone.Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?Single-modeIf dynamic DNS is being used, which of the following events will cause a dynamic update of the host records?The ipconfig /registerdns command is entered on a workstation. The DHCP server renews an IP address lease.Which VoIP device helps establish the connection between two VoIP phones?VoIP serverYou want to measure the voltage, amps, and ohms of various devices.Which tool should you use?MultimeterHubIt is an older technology that interconnects network components such as clients and servers. It has variable number of available ports. →Which of the following best describes the purpose of using subnets?Subnets divide an IP network address into multiple network addresses.A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?Wait for convergence to take place.In an IP addressing scheme that uses default subnet masks, which of the following IP addresses can you assign to a host?132.70.254.15The traceroute utility is useful for?Showing the physical location of the route between you and the destinationWAN linkIt is the link that interconnects networks.→Which recommendation should you follow while using 110 blocks for connecting Cat 5 and higher data cables?Keep wire pairs twisted up to within one-half of an inch of the connector.You administer a network with Windows Server 2016 and UNIX servers and Windows 10 Professional, Windows 7, and Macintosh clients. A Windows 7 computer user calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 Ethernet adapter: IP address. . . . . . . . . : 169.254.1.17 Subnet Mask . . . . . . . . : 255.255.0.0 Default Gateway . . . . . .: You also check your NIC and see the link light on. What might the problem be?An unavailable DHCP server.You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon investigation, it appears very similar to Cat 5e wiring.Should you use Cat 3 cabling as a substitute for Cat 5e cabling to finish the project?No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates.What are other names for a VoIP server?VoIP PBX, IP-PBXWhat does Link State Protocols do in dynamic routing?Floods the network with advertisements to all neighbor routers per area in an attempt to converge the network with new route information.MediaThis device can be copper or fiber-optic cable. →Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network?130.16.61.3Which of the following are not valid IP addresses? (Select three.)- 145.8.260.7 - 257.0.122.55 - 45.22.156.256What does Exterior Gateway Protocol (EGP) do?Routes traffic between Autonomous Systems (AS)ServerThis serves up resources to a network. →Which of the following is true about single-mode fiber optic network cabling?The central core is smaller than standard multi-mode fiber optic cabling core.A DNS record that's used to redirect traffic from one domain name to another is known asCNAME recordYou have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?F-typeTracks the performance of some aspect of a system over time and lets you know when things aren't normal.Performance monitorClientIt might be a workstation, laptop, smartphone with wireless capabilities, or a variety of other end-user terminal devices. →You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?Manually reconfigure the default route to point to the new next hop router.RouterIt is a device which makes its forwarding decisions based on logical network addresses. →Which of the following terms identifies the wiring closet in the basement or a ground floor that typically includes the demarcation point?MDFA program that queries a network interface and collects packets in a file called a 'capture file' Connect to an interface in 'promiscuous mode', or if in the case of a switch, a mirrored port.Packet snifferSwitchIt interconnects network components, and it has a variety of port densities. It does not simply take traffic in on one port and blast that traffic out all other ports. Rather, it learns which devices reside off of which ports. →You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed.Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling.Which Ethernet standard could you implement in this situation?1000BaseCXTrack the bandwidth and utilization of one or more interfaces on one or more devices.Interface monitorsCombines security information management and security event management functions into one security management system.SIEMYou have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?TDRTrueCable modems don't work exactly like modulator/demodulator -they provide bridging functionality that allows us to connect from our Ethernet network onto the cable modem network.encryptFirewalls can be used to ______________ information in and out of your network.Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet is not working properly.Which of the following allows the service provider to remotely test the local loop?SmartjackWhat is a record of data about your system?LogFiber optic linesWhich of the following does a modem not use?Which of the following tests can be performed by a TDR? (Select two.)- Identify the location of a fault on a cable. - Measure the length of a cable.How can you ensure that your servers will continue to run during a blackout?Install a backup generatorsubnetsA router is designed to send information between different _____________ or segments of a network.You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires.Which tool should you use?Cable stripperA program that reads or captures files and analyzes them based on your monitoring needs.Packet AnalyzerJohn wants to analyze the procedure for adding a new file server on his network. What should he do?Check the change management documentationWhich of the following methods would you use to create a crossover cable?Use the T568A standard on one connector and the T568B standard on the other connector.SwitchesOnce this hardware was introduced, we quickly moved to it instead of hubs.TrueThis device is called a multi-port repeater, which means that any traffic going into one port on a hub is automatically sent to all of the other interfaces on that hub as well.TrueA wireless access point (WAP) is used to provide a wireless network inside a building.Which of the following are requirements of the 1000BaseT Ethernet standards? (Select three.)- RJ45 connectors - The cable length must be less than or equal to 100m - CAT 5 cablingConfiguration management can be divided into two subsystems which are _______.Management and configurationVertical cross connectYou have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?What is the minimum cable specification that supports 1000 Mbps Ethernet?Cat 5eAn application-level protocol in which a few manager stations control a set of agents is known asSNMPUse a tone generator to locate the correct wiring.You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labeled poorly, and you are unable to tell which wires go to the user's office. What should you do?You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch.Which type of cable should you use?Crossover1000BaseLXWhich Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single-mode fiber optic cable?EIPNA type of network that is designed for private communication within an organization.CANCovers a smaller area. Used in places such as hospitals, schools or any organization that has multiple LANs and buildings that need to share resources.MANCovers a large geographical area. Confined to a state or countyLANCovers short distances. Is used for a office building, home, hospital or school.VPNA type of network that makes use of existing private or public network infrastucture to provide a secured network connection.Wireless Local Area Network (WLAN)Allows user to roam with their mobile devices and maintain network connectivityWide Area Network (WAN)Extends over a large geographical area, although it might be confined within the bounds of a state or country.Personal Area Network (PAN)Range is typically limited to just a few meters.Campus Area Network (CAN)Network used in a university or industrial/business park