Frage 1
Frage
72.257.126.11 is a valid A class host address.
Frage 2
Frage
In CIDR, conventional network class distinctions do not exist.
Frage 3
Frage
Some software errors point to a physical connectivity problem.
Frage 4
Frage
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems
Frage 5
Frage
193.255.126.255 is a valid C class host address.
Frage 6
Frage
In a star topology, a single connection failure will halt all traffic between all sites.
Frage 7
Frage
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
Frage 8
Frage
Standards assist in network design.
Frage 9
Frage
Not all Transport layer protocols are concerned with reliability.
Frage 10
Frage
Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Frage 11
Frage
All protocols are routable.
Frage 12
Frage
The command used to view IP information on a Windows workstation is ipconfig.
Frage 13
Frage
Cut-through switches can detect corrupt packets.
Frage 14
Frage
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
Frage 15
Frage
A physical topology ____.
Antworten
-
a. specifies device types
-
b. depicts a network in broad scope
-
c. specifies connectivity methods
-
d. specifies addressing schemes
Frage 16
Frage
In which OSI model layer does TCP operate?
Antworten
-
Physical
-
b. Transport
-
c. Network
-
d. Data Link
Frage 17
Frage
Transport layer protocols break large data units into ____.
Antworten
-
PDUs
-
b. segments
-
c. frames
-
d. block IDs
Frage 18
Frage
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
Antworten
-
ARP
-
b. PING
-
c. Telnet
-
d. FTP
Frage 19
Frage
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
Antworten
-
a. collision domain
-
b. broadcast domain
-
c. interference domain
-
d. duplicate domain
Frage 20
Frage
1000Base-SX has a maximum throughput of ____.
Antworten
-
a. 1 Gbps
-
b. 10 Gbps
-
c. 100 Gbps
-
d. 1000 Gbps
Frage 21
Frage
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
Antworten
-
a. proxy
-
b. core
-
c. Internet
-
d. default
Frage 22
Frage
How is reliability achieved in TCP?
Frage 23
Frage
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Antworten
-
a. 0
-
b. 1
-
c. first eight
-
d. last eight
Frage 24
Frage
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
Antworten
-
a. dash ( - )
-
b. underscore ( _ )
-
c. backward slash ( \ )
-
d. forward slash ( / )
Frage 25
Frage
A(n) ____ is a graphical representation of a network’s devices and connections.
Frage 26
Frage
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Antworten
-
a. Performance
-
b. Fault
-
c. Network
-
d. Configuration
Frage 27
Frage
28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Antworten
-
a. Traffic monitoring
-
b. Traffic routing
-
c. Traffic polling
-
d. Traffic shaping
Frage 28
Frage
The most common type of caching is ____ caching.
Antworten
-
a. online
-
b. Web
-
c. Internet
-
d. device
Frage 29
Frage
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Antworten
-
a. network monitor
-
b. sniffer
-
c. protocol analyzer
-
d. multimeter
Frage 30
Frage
The ____ utility allows you to view a host’s routing table.
Antworten
-
a. nbstat
-
b. pathping
-
c. nslookup
-
d. route
Frage 31
Frage
Which of the following is a valid IP public address for use by a host on a LAN?
Antworten
-
a. 10.2.256.5
-
b. 200.0.0.1
-
c. 192.168.10.5
-
d. 127.0.0.1
Frage 32
Frage
The result from ANDing 11110101 with 10111100 is ____.
Antworten
-
a. 11111101
-
b. 10111101
-
c. 10110100
-
d. 01001010
Frage 33
Frage
What is the default administrative distance of static routes?
Frage 34
Frage
What is an Autonomous System in the context of internetworking?
Antworten
-
a. A system that functions independently without external intervention
-
b. A group of routers under a common administration
-
c. A group of routers that have routes to every member of the group
-
d. A group of routers that can be configured by simply changing the settings in any one member
Frage 35
Frage
What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?
Antworten
-
a. Forwards it to all the other hosts connected to the switch
-
b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch
-
c. Discards it
-
d. A and B
Frage 36
Frage
When would static NAT be used over dynamic NAT?
Antworten
-
a. When there is only a single public IP address available
-
b. When a router does not support NAT
-
c. When a server requires a fixed Global IP address
-
d. To assign an IP address from an IP address pool
Frage 37
Frage
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
Antworten
-
a. open
-
b. standard
-
c. routable
-
d. nonroutable
Frage 38
Frage
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
Frage 39
Frage
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
Frage 40
Frage
Repeaters operate in the ____ layer of the OSI model.
Antworten
-
a. Physical
-
b. Network
-
c. Transport
-
d. Session
Frage 41
Frage
A ____ can interpret physical addressing information.
Antworten
-
a. repeater
-
b. tranciever
-
c. hub
-
d. bridge
Frage 42
Frage
Switches can create ____ by grouping a number of ports into a broadcast domain.
Antworten
-
a. trunks
-
b. spanning trees
-
c. gateways
-
d. VLANs
Frage 43
Frage
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Antworten
-
a. Static
-
b. Dynamic
-
c. Best path
-
d. Link-state
Frage 44
Frage
A complex combination of topologies is known as a ____ topology.
Antworten
-
a. mixed
-
b. hybrid
-
c. compound
-
d. mulitpart
Frage 45
Frage
The most common logical topologies are ____ and ring.
Antworten
-
a. bus
-
b. star
-
c. wired
-
d. hybrid
Frage 46
Frage
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
Antworten
-
a. FCS
-
b. header
-
c. preamble
-
d. frame
Frage 47
Frage
In a ____ attack, a person redirects or captures secure transmissions as they occur.
Antworten
-
a. denial-of service
-
b. man-in-the-middle
-
c. war driving
-
d. phishing
Frage 48
Frage
____ software searches a node for open ports.
Antworten
-
a. Phishing
-
b. Sniffing
-
c. Authentication
-
d. Port scanner
Frage 49
Frage
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Antworten
-
a. switch’s
-
b. gateway’s
-
c. router’s
-
d. proxy server’s
Frage 50
Frage
____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Antworten
-
a. flashing
-
b. denial-of-service
-
c. dictionary
-
d. brute force
Frage 51
Frage
The combination of a public key and a private key is known as a ____.
Antworten
-
a. key lock
-
b. key frame
-
c. key pair
-
d. key set
Frage 52
Frage
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Antworten
-
a. access, authorization, and accounting
-
b. authentication, authorization, and accounting
-
c. authentication, authorization, and authority
-
d. authentication, authorization, and access
Frage 53
Frage
Standards define the ____ performance of a product or service.
Antworten
-
a. ideal
-
b. most acceptable
-
c. minimum acceptable
-
d. maximum acceptable
Frage 54
Frage
In which OSI model layer(s) do NICs operate?
Frage 55
Frage
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.
Antworten
-
a. port
-
b. source
-
c. destination
-
d. sequence
Frage 56
Frage
The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.
Antworten
-
a. TCP
-
b. ICMP
-
c. UDP
-
d. IP
Frage 57
Frage
In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.
Antworten
-
a. Variable Prefix
-
b. Address Prefix
-
c. Format Prefix
-
d. Field Prefix
Frage 58
Frage
In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.
Frage 59
Frage
Which of the following best describes the definition of administrative distance?
Antworten
-
a. Measure of the trustworthiness of the source of a route update
-
b. The number of hops to a destination node recorded in the routing table
-
c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet
-
d. Distance to the closest network administrator
Frage 60
Frage
Which of the following statements is true regarding CSMA/CD after a collision has occurred?
Antworten
-
a. Each device waits for a random backoff period before attempting to retransmit
-
b. Both stations stop transmitting immediately
-
c. The devices involved in the collision have priority to transmit data
-
d. The device with the highest priority will attempt to retransmit first
Frage 61
Frage
The decimal number 782 converted to binary is
Antworten
-
a. 1010001000
-
b. 10000000110
-
c. 11100011100
-
d. 1100001110
Frage 62
Frage
64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.
Antworten
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Frage 63
Frage
Which network model ensures that no computer on the network has more authority than another?
Antworten
-
a. client/server
-
b. stand alone
-
c. peer-to-peer
-
d. distributed
Frage 64
Frage
____ networks are the most popular type of network for medium- and large-scale organizations.
Antworten
-
a. Client/server
-
b. Peer-to-peer
-
c. Stand-alone
-
d. Stationary
Frage 65
Frage
A ____ network is confined to a relatively small space.
Antworten
-
a. NAN
-
b. MAN
-
c. WAN
-
d. LAN
Frage 66
Frage
Which network topology is the most common?
Antworten
-
a. ring
-
b. star
-
c. hybrid
-
d. Ethernet
Frage 67
Frage
Which OSI model layer initiates the flow of information?
Antworten
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Frage 68
Frage
Which OSI model layer manages data encryption?
Antworten
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Frage 69
Frage
Which type of protocol is useful when data must be transferred quickly?
Antworten
-
a. connection-oriented
-
b. connectionless
-
c. TCP
-
d. IP
Frage 70
Frage
____ is the process of reconstructing segmented data.
Antworten
-
a. Reassembly
-
b. Reengineering
-
c. Resegmenting
-
d. Realigning
Frage 71
Frage
The process of determining the best path from Point A on one network to Point B on another is known as ____.
Antworten
-
a. mapping
-
b. enhancing
-
c. reconfiguring
-
d. routing
Frage 72
Frage
In which OSI model layer does IP operate?
Antworten
-
a. Physical
-
b. Transport
-
c. Network
-
d. Data Link
Frage 73
Frage
Which Data Link sublayer manages flow control?
Antworten
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Frage 74
Frage
Which Data Link sublayer manages access to the physical medium?
Antworten
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Frage 75
Frage
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.
Antworten
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Frage 76
Frage
When signals may travel in only one direction over a medium, the transmission is considered ____.
Antworten
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Frage 77
Frage
The most significant factor in choosing a transmission method is its ____.
Antworten
-
a. noise
-
b. attenuation
-
c. throughput
-
d. latency
Frage 78
Frage
The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
Antworten
-
a. throughput
-
b. attenuation
-
c. cross talk
-
d. latency
Frage 79
Frage
TCP is a(n) ____ protocol.
Antworten
-
a. open-ended
-
b. indiscriminating
-
c. connection-oriented
-
d. connectionless
Frage 80
Frage
____ is more efficient than TCP for carrying messages that fit within one data packet.
Antworten
-
a. IP
-
b. UDP
-
c. ICMP
-
d. IGMP
Frage 81
Frage
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
Antworten
-
a. TCP
-
b. UDP
-
c. IP
-
d. ARP
Frage 82
Frage
In IPv4 addressing, each public IP address is a unique ____ number.
Antworten
-
a. 12-bit
-
b. 32-bit
-
c. 64-bit
-
d. 128-bit
Frage 83
Frage
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
Frage 84
Frage
In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.
Frage 85
Frage
The default subnet mask for a Class B network is ____.
Antworten
-
a. 255.0.0.0
-
b. 255.255.0.0
-
c. 255.255.255.0
-
d. 255.255.255.255
Frage 86
Frage
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
Antworten
-
a. anycast
-
b. unicast
-
c. multicast
-
d. singlecast
Frage 87
Frage
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
Antworten
-
a. CSMA
-
b. CSMA/DC
-
c. CSAM/CD
-
d. CSMA/CD
Frage 88
Frage
A ____ occurs when two transmissions interfere with each other.
Antworten
-
a. jam
-
b. collision
-
c. carrier sense
-
d. multiple access event
Frage 89
Frage
Together, the FCS and the header make up the ____-byte “frame” for the data.
Frage 90
Frage
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
Antworten
-
a. simple commands
-
b. special clients
-
c. special switches
-
d. special software
Frage 91
Frage
Traditional switches operate at the ____ layer of the OSI model.
Antworten
-
a. Physical
-
b. Data link
-
c. Network
-
d. Session
Frage 92
Frage
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Antworten
-
a. Routers
-
b. Switches
-
c. Gateways
-
d. Broadcast domains
Frage 93
Frage
The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.
Antworten
-
a. SLIP
-
b. POTS
-
c. PPP
-
d. PSTN
Frage 94
Frage
____ means that a telephone company connects residential users to its network with fiber-optic cable.
Antworten
-
a. OLT
-
b. FITL
-
c. PON
-
d. FITH
Frage 95
Frage
A class ____ network class is reserved for special purposes.
Frage 96
Frage
In classful addressing, the Class B IPv4 address network ID is located in the ____.
Antworten
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Frage 97
Frage
In classful addressing, Class C IPv4 address host information is located in the ____.
Antworten
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Frage 98
Frage
Within a classful addressing, ____ is the default subnet mask for a Class C address.
Antworten
-
a. 255.255.255.255
-
b. 255.255.255.0
-
c. 255.255.0.0
-
d. 255.0.0.0
Frage 99
Frage
The result from ANDing 11001111 with 10010001 is ____.
Antworten
-
a. 11001111
-
b. 10010001
-
c. 10000001
-
d. 00000001
Frage 100
Frage
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Antworten
-
a. Cracking
-
b. Hacking
-
c. War driving
-
d. Phishing
Frage 101
Frage
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
Antworten
-
a. flashing
-
b. denial-of-service
-
c. war driving
-
d. phishing
Frage 102
Frage
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Antworten
-
a. packet-filtering
-
b. gateway
-
c. proxy
-
d. selective
Frage 103
Frage
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Antworten
-
a. intensity
-
b. background
-
c. scope
-
d. focus
Frage 104
Frage
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
Antworten
-
a. open
-
b. static
-
c. promiscuous
-
d. continuous
Frage 105
Frage
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Antworten
-
a. Jabbers
-
b. Ghosts
-
c. Giants
-
d. Runts
Frage 106
Frage
A ____ usually results from a bad NIC.
Antworten
-
a. jabber
-
b. ghost
-
c. giant
-
d. runt
Frage 107
Frage
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously
Frage 108
Frage
110. Which of the following is a valid IP address for use by a host on a LAN?
Antworten
-
a. 10.2.257.5
-
b. 127.0.0.1
-
c. 192.168.10.5
-
d. 227.125.5.25
Frage 109
Frage
Which of the following is a valid IP address for use by a host on a LAN?
Antworten
-
a. 10.256.255.5
-
b. 127.0.0.1
-
c. 227.125.5.25
-
d. None of the above