72.257.126.11 is a valid A class host address.
In CIDR, conventional network class distinctions do not exist.
Some software errors point to a physical connectivity problem.
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems
193.255.126.255 is a valid C class host address.
In a star topology, a single connection failure will halt all traffic between all sites.
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
Standards assist in network design.
Not all Transport layer protocols are concerned with reliability.
Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
All protocols are routable.
The command used to view IP information on a Windows workstation is ipconfig.
Cut-through switches can detect corrupt packets.
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
A physical topology ____.
a. specifies device types
b. depicts a network in broad scope
c. specifies connectivity methods
d. specifies addressing schemes
In which OSI model layer does TCP operate?
Physical
b. Transport
c. Network
d. Data Link
Transport layer protocols break large data units into ____.
PDUs
b. segments
c. frames
d. block IDs
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
ARP
b. PING
c. Telnet
d. FTP
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
a. collision domain
b. broadcast domain
c. interference domain
d. duplicate domain
1000Base-SX has a maximum throughput of ____.
a. 1 Gbps
b. 10 Gbps
c. 100 Gbps
d. 1000 Gbps
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
a. proxy
b. core
c. Internet
d. default
How is reliability achieved in TCP?
a. Routing
b. Sliding windows
c. Sequence numbers and acknowledgements
d. Port numbers
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
a. 0
b. 1
c. first eight
d. last eight
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
a. dash ( - )
b. underscore ( _ )
c. backward slash ( \ )
d. forward slash ( / )
A(n) ____ is a graphical representation of a network’s devices and connections.
a. Multi Router Traffic Grapher
b. network diagram
c. wiring schematic
d. event viewer
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
a. Performance
b. Fault
d. Configuration
28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
a. Traffic monitoring
b. Traffic routing
c. Traffic polling
d. Traffic shaping
The most common type of caching is ____ caching.
a. online
b. Web
d. device
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
a. network monitor
b. sniffer
c. protocol analyzer
d. multimeter
The ____ utility allows you to view a host’s routing table.
a. nbstat
b. pathping
c. nslookup
d. route
Which of the following is a valid IP public address for use by a host on a LAN?
a. 10.2.256.5
b. 200.0.0.1
c. 192.168.10.5
d. 127.0.0.1
The result from ANDing 11110101 with 10111100 is ____.
a. 11111101
b. 10111101
c. 10110100
d. 01001010
What is the default administrative distance of static routes?
a. 120
b. 0
c. 90
d. 1
What is an Autonomous System in the context of internetworking?
a. A system that functions independently without external intervention
b. A group of routers under a common administration
c. A group of routers that have routes to every member of the group
d. A group of routers that can be configured by simply changing the settings in any one member
What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?
a. Forwards it to all the other hosts connected to the switch
b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch
c. Discards it
d. A and B
When would static NAT be used over dynamic NAT?
a. When there is only a single public IP address available
b. When a router does not support NAT
c. When a server requires a fixed Global IP address
d. To assign an IP address from an IP address pool
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
a. open
b. standard
c. routable
d. nonroutable
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
a. CO
b. EO
c. DO
d. TO
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
a. demarcation point
b. NIU (Network Interface Unit)
c. local loop
d. central office
Repeaters operate in the ____ layer of the OSI model.
a. Physical
b. Network
c. Transport
d. Session
A ____ can interpret physical addressing information.
a. repeater
b. tranciever
c. hub
d. bridge
Switches can create ____ by grouping a number of ports into a broadcast domain.
a. trunks
b. spanning trees
c. gateways
d. VLANs
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
a. Static
b. Dynamic
c. Best path
d. Link-state
A complex combination of topologies is known as a ____ topology.
a. mixed
b. hybrid
c. compound
d. mulitpart
The most common logical topologies are ____ and ring.
a. bus
b. star
c. wired
d. hybrid
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
a. FCS
b. header
c. preamble
d. frame
In a ____ attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service
b. man-in-the-middle
c. war driving
d. phishing
____ software searches a node for open ports.
a. Phishing
b. Sniffing
c. Authentication
d. Port scanner
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a. switch’s
b. gateway’s
c. router’s
d. proxy server’s
____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
a. flashing
b. denial-of-service
c. dictionary
d. brute force
The combination of a public key and a private key is known as a ____.
a. key lock
b. key frame
c. key pair
d. key set
RADIUS and TACACS belong to a category of protocols known as AAA (____).
a. access, authorization, and accounting
b. authentication, authorization, and accounting
c. authentication, authorization, and authority
d. authentication, authorization, and access
Standards define the ____ performance of a product or service.
a. ideal
b. most acceptable
c. minimum acceptable
d. maximum acceptable
In which OSI model layer(s) do NICs operate?
b. Network and Physical
c. Data Link
d. Physical and Data Link
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.
a. port
b. source
c. destination
d. sequence
The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.
a. TCP
b. ICMP
c. UDP
d. IP
In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.
a. Variable Prefix
b. Address Prefix
c. Format Prefix
d. Field Prefix
In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.
a. A
b. B
c. C
d. D
Which of the following best describes the definition of administrative distance?
a. Measure of the trustworthiness of the source of a route update
b. The number of hops to a destination node recorded in the routing table
c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet
d. Distance to the closest network administrator
Which of the following statements is true regarding CSMA/CD after a collision has occurred?
a. Each device waits for a random backoff period before attempting to retransmit
b. Both stations stop transmitting immediately
c. The devices involved in the collision have priority to transmit data
d. The device with the highest priority will attempt to retransmit first
The decimal number 782 converted to binary is
a. 1010001000
b. 10000000110
c. 11100011100
d. 1100001110
64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.
a. simplex
b. multiplex
c. half-duplex
d. full-duplex
Which network model ensures that no computer on the network has more authority than another?
a. client/server
b. stand alone
c. peer-to-peer
d. distributed
____ networks are the most popular type of network for medium- and large-scale organizations.
a. Client/server
b. Peer-to-peer
c. Stand-alone
d. Stationary
A ____ network is confined to a relatively small space.
a. NAN
b. MAN
c. WAN
d. LAN
Which network topology is the most common?
a. ring
c. hybrid
d. Ethernet
Which OSI model layer initiates the flow of information?
b. Session
c. Application
d. Presentation
Which OSI model layer manages data encryption?
Which type of protocol is useful when data must be transferred quickly?
a. connection-oriented
b. connectionless
c. TCP
____ is the process of reconstructing segmented data.
a. Reassembly
b. Reengineering
c. Resegmenting
d. Realigning
The process of determining the best path from Point A on one network to Point B on another is known as ____.
a. mapping
b. enhancing
c. reconfiguring
d. routing
In which OSI model layer does IP operate?
Which Data Link sublayer manages flow control?
a. LLC
b. MAC
c. Management layer
d. Addressing layer
Which Data Link sublayer manages access to the physical medium?
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.
When signals may travel in only one direction over a medium, the transmission is considered ____.
The most significant factor in choosing a transmission method is its ____.
a. noise
b. attenuation
c. throughput
d. latency
The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
a. throughput
c. cross talk
TCP is a(n) ____ protocol.
a. open-ended
b. indiscriminating
c. connection-oriented
d. connectionless
____ is more efficient than TCP for carrying messages that fit within one data packet.
a. IP
b. UDP
c. ICMP
d. IGMP
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
c. IP
d. ARP
In IPv4 addressing, each public IP address is a unique ____ number.
a. 12-bit
b. 32-bit
c. 64-bit
d. 128-bit
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.
The default subnet mask for a Class B network is ____.
a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. 255.255.255.255
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
a. anycast
b. unicast
c. multicast
d. singlecast
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
a. CSMA
b. CSMA/DC
c. CSAM/CD
d. CSMA/CD
A ____ occurs when two transmissions interfere with each other.
a. jam
b. collision
c. carrier sense
d. multiple access event
Together, the FCS and the header make up the ____-byte “frame” for the data.
a. 15
b. 18
c. 21
d. 24
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
a. simple commands
b. special clients
c. special switches
d. special software
Traditional switches operate at the ____ layer of the OSI model.
b. Data link
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
a. Routers
b. Switches
c. Gateways
d. Broadcast domains
The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.
a. SLIP
b. POTS
c. PPP
d. PSTN
____ means that a telephone company connects residential users to its network with fiber-optic cable.
a. OLT
b. FITL
c. PON
d. FITH
A class ____ network class is reserved for special purposes.
In classful addressing, the Class B IPv4 address network ID is located in the ____.
a. last 8 bits
b. last 16 bits
c. first 8 bits
d. first 16 bits
In classful addressing, Class C IPv4 address host information is located in the ____.
Within a classful addressing, ____ is the default subnet mask for a Class C address.
a. 255.255.255.255
b. 255.255.255.0
c. 255.255.0.0
d. 255.0.0.0
The result from ANDing 11001111 with 10010001 is ____.
a. 11001111
b. 10010001
c. 10000001
d. 00000001
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
a. Cracking
b. Hacking
c. War driving
d. Phishing
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a. packet-filtering
b. gateway
c. proxy
d. selective
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
a. intensity
b. background
c. scope
d. focus
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
b. static
c. promiscuous
d. continuous
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
a. Jabbers
b. Ghosts
c. Giants
d. Runts
A ____ usually results from a bad NIC.
a. jabber
b. ghost
c. giant
d. runt
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously
. a. multimeter
b. cable performance tester
c. network monitor
d. protocol analyzer
110. Which of the following is a valid IP address for use by a host on a LAN?
a. 10.2.257.5
b. 127.0.0.1
d. 227.125.5.25
Which of the following is a valid IP address for use by a host on a LAN?
a. 10.256.255.5
c. 227.125.5.25
d. None of the above