Pregunta 1
Pregunta
72.257.126.11 is a valid A class host address.
Pregunta 2
Pregunta
In CIDR, conventional network class distinctions do not exist.
Pregunta 3
Pregunta
Some software errors point to a physical connectivity problem.
Pregunta 4
Pregunta
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems
Pregunta 5
Pregunta
193.255.126.255 is a valid C class host address.
Pregunta 6
Pregunta
In a star topology, a single connection failure will halt all traffic between all sites.
Pregunta 7
Pregunta
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
Pregunta 8
Pregunta
Standards assist in network design.
Pregunta 9
Pregunta
Not all Transport layer protocols are concerned with reliability.
Pregunta 10
Pregunta
Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Pregunta 11
Pregunta
All protocols are routable.
Pregunta 12
Pregunta
The command used to view IP information on a Windows workstation is ipconfig.
Pregunta 13
Pregunta
Cut-through switches can detect corrupt packets.
Pregunta 14
Pregunta
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
Pregunta 15
Pregunta
A physical topology ____.
Respuesta
-
a. specifies device types
-
b. depicts a network in broad scope
-
c. specifies connectivity methods
-
d. specifies addressing schemes
Pregunta 16
Pregunta
In which OSI model layer does TCP operate?
Respuesta
-
Physical
-
b. Transport
-
c. Network
-
d. Data Link
Pregunta 17
Pregunta
Transport layer protocols break large data units into ____.
Respuesta
-
PDUs
-
b. segments
-
c. frames
-
d. block IDs
Pregunta 18
Pregunta
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
Respuesta
-
ARP
-
b. PING
-
c. Telnet
-
d. FTP
Pregunta 19
Pregunta
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
Respuesta
-
a. collision domain
-
b. broadcast domain
-
c. interference domain
-
d. duplicate domain
Pregunta 20
Pregunta
1000Base-SX has a maximum throughput of ____.
Respuesta
-
a. 1 Gbps
-
b. 10 Gbps
-
c. 100 Gbps
-
d. 1000 Gbps
Pregunta 21
Pregunta
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
Respuesta
-
a. proxy
-
b. core
-
c. Internet
-
d. default
Pregunta 22
Pregunta
How is reliability achieved in TCP?
Pregunta 23
Pregunta
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Respuesta
-
a. 0
-
b. 1
-
c. first eight
-
d. last eight
Pregunta 24
Pregunta
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
Respuesta
-
a. dash ( - )
-
b. underscore ( _ )
-
c. backward slash ( \ )
-
d. forward slash ( / )
Pregunta 25
Pregunta
A(n) ____ is a graphical representation of a network’s devices and connections.
Pregunta 26
Pregunta
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Respuesta
-
a. Performance
-
b. Fault
-
c. Network
-
d. Configuration
Pregunta 27
Pregunta
28. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Respuesta
-
a. Traffic monitoring
-
b. Traffic routing
-
c. Traffic polling
-
d. Traffic shaping
Pregunta 28
Pregunta
The most common type of caching is ____ caching.
Respuesta
-
a. online
-
b. Web
-
c. Internet
-
d. device
Pregunta 29
Pregunta
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Respuesta
-
a. network monitor
-
b. sniffer
-
c. protocol analyzer
-
d. multimeter
Pregunta 30
Pregunta
The ____ utility allows you to view a host’s routing table.
Respuesta
-
a. nbstat
-
b. pathping
-
c. nslookup
-
d. route
Pregunta 31
Pregunta
Which of the following is a valid IP public address for use by a host on a LAN?
Respuesta
-
a. 10.2.256.5
-
b. 200.0.0.1
-
c. 192.168.10.5
-
d. 127.0.0.1
Pregunta 32
Pregunta
The result from ANDing 11110101 with 10111100 is ____.
Respuesta
-
a. 11111101
-
b. 10111101
-
c. 10110100
-
d. 01001010
Pregunta 33
Pregunta
What is the default administrative distance of static routes?
Pregunta 34
Pregunta
What is an Autonomous System in the context of internetworking?
Respuesta
-
a. A system that functions independently without external intervention
-
b. A group of routers under a common administration
-
c. A group of routers that have routes to every member of the group
-
d. A group of routers that can be configured by simply changing the settings in any one member
Pregunta 35
Pregunta
What does a layer 2 switch do when it receives a broadcast frame from one of the hosts connected to it?
Respuesta
-
a. Forwards it to all the other hosts connected to the switch
-
b. Examines the TTL field in the header and if the value is not 0, forwards it to all the other hosts on the switch
-
c. Discards it
-
d. A and B
Pregunta 36
Pregunta
When would static NAT be used over dynamic NAT?
Respuesta
-
a. When there is only a single public IP address available
-
b. When a router does not support NAT
-
c. When a server requires a fixed Global IP address
-
d. To assign an IP address from an IP address pool
Pregunta 37
Pregunta
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
Respuesta
-
a. open
-
b. standard
-
c. routable
-
d. nonroutable
Pregunta 38
Pregunta
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
Pregunta 39
Pregunta
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
Pregunta 40
Pregunta
Repeaters operate in the ____ layer of the OSI model.
Respuesta
-
a. Physical
-
b. Network
-
c. Transport
-
d. Session
Pregunta 41
Pregunta
A ____ can interpret physical addressing information.
Respuesta
-
a. repeater
-
b. tranciever
-
c. hub
-
d. bridge
Pregunta 42
Pregunta
Switches can create ____ by grouping a number of ports into a broadcast domain.
Respuesta
-
a. trunks
-
b. spanning trees
-
c. gateways
-
d. VLANs
Pregunta 43
Pregunta
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Respuesta
-
a. Static
-
b. Dynamic
-
c. Best path
-
d. Link-state
Pregunta 44
Pregunta
A complex combination of topologies is known as a ____ topology.
Respuesta
-
a. mixed
-
b. hybrid
-
c. compound
-
d. mulitpart
Pregunta 45
Pregunta
The most common logical topologies are ____ and ring.
Respuesta
-
a. bus
-
b. star
-
c. wired
-
d. hybrid
Pregunta 46
Pregunta
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
Respuesta
-
a. FCS
-
b. header
-
c. preamble
-
d. frame
Pregunta 47
Pregunta
In a ____ attack, a person redirects or captures secure transmissions as they occur.
Respuesta
-
a. denial-of service
-
b. man-in-the-middle
-
c. war driving
-
d. phishing
Pregunta 48
Pregunta
____ software searches a node for open ports.
Respuesta
-
a. Phishing
-
b. Sniffing
-
c. Authentication
-
d. Port scanner
Pregunta 49
Pregunta
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Respuesta
-
a. switch’s
-
b. gateway’s
-
c. router’s
-
d. proxy server’s
Pregunta 50
Pregunta
____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Respuesta
-
a. flashing
-
b. denial-of-service
-
c. dictionary
-
d. brute force
Pregunta 51
Pregunta
The combination of a public key and a private key is known as a ____.
Respuesta
-
a. key lock
-
b. key frame
-
c. key pair
-
d. key set
Pregunta 52
Pregunta
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Respuesta
-
a. access, authorization, and accounting
-
b. authentication, authorization, and accounting
-
c. authentication, authorization, and authority
-
d. authentication, authorization, and access
Pregunta 53
Pregunta
Standards define the ____ performance of a product or service.
Respuesta
-
a. ideal
-
b. most acceptable
-
c. minimum acceptable
-
d. maximum acceptable
Pregunta 54
Pregunta
In which OSI model layer(s) do NICs operate?
Pregunta 55
Pregunta
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data.
Respuesta
-
a. port
-
b. source
-
c. destination
-
d. sequence
Pregunta 56
Pregunta
The protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____.
Respuesta
-
a. TCP
-
b. ICMP
-
c. UDP
-
d. IP
Pregunta 57
Pregunta
In IPv6, each address contains a(n) ____, or a variable-length field at the beginning of the address that indicates what type of address it is.
Respuesta
-
a. Variable Prefix
-
b. Address Prefix
-
c. Format Prefix
-
d. Field Prefix
Pregunta 58
Pregunta
In IPv4 addressing, a node with an IP address of 128.64.88.20 belongs to a Class ____ network.
Pregunta 59
Pregunta
Which of the following best describes the definition of administrative distance?
Respuesta
-
a. Measure of the trustworthiness of the source of a route update
-
b. The number of hops to a destination node recorded in the routing table
-
c. The maximum number of hops for a routing protocol which is used to set the TTL value in an IP packet
-
d. Distance to the closest network administrator
Pregunta 60
Pregunta
Which of the following statements is true regarding CSMA/CD after a collision has occurred?
Respuesta
-
a. Each device waits for a random backoff period before attempting to retransmit
-
b. Both stations stop transmitting immediately
-
c. The devices involved in the collision have priority to transmit data
-
d. The device with the highest priority will attempt to retransmit first
Pregunta 61
Pregunta
The decimal number 782 converted to binary is
Respuesta
-
a. 1010001000
-
b. 10000000110
-
c. 11100011100
-
d. 1100001110
Pregunta 62
Pregunta
64. When signals may travel in both directions over a medium but only in one direction at a time, the transmission is considered ____.
Respuesta
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Pregunta 63
Pregunta
Which network model ensures that no computer on the network has more authority than another?
Respuesta
-
a. client/server
-
b. stand alone
-
c. peer-to-peer
-
d. distributed
Pregunta 64
Pregunta
____ networks are the most popular type of network for medium- and large-scale organizations.
Respuesta
-
a. Client/server
-
b. Peer-to-peer
-
c. Stand-alone
-
d. Stationary
Pregunta 65
Pregunta
A ____ network is confined to a relatively small space.
Respuesta
-
a. NAN
-
b. MAN
-
c. WAN
-
d. LAN
Pregunta 66
Pregunta
Which network topology is the most common?
Respuesta
-
a. ring
-
b. star
-
c. hybrid
-
d. Ethernet
Pregunta 67
Pregunta
Which OSI model layer initiates the flow of information?
Respuesta
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Pregunta 68
Pregunta
Which OSI model layer manages data encryption?
Respuesta
-
a. Physical
-
b. Session
-
c. Application
-
d. Presentation
Pregunta 69
Pregunta
Which type of protocol is useful when data must be transferred quickly?
Respuesta
-
a. connection-oriented
-
b. connectionless
-
c. TCP
-
d. IP
Pregunta 70
Pregunta
____ is the process of reconstructing segmented data.
Respuesta
-
a. Reassembly
-
b. Reengineering
-
c. Resegmenting
-
d. Realigning
Pregunta 71
Pregunta
The process of determining the best path from Point A on one network to Point B on another is known as ____.
Respuesta
-
a. mapping
-
b. enhancing
-
c. reconfiguring
-
d. routing
Pregunta 72
Pregunta
In which OSI model layer does IP operate?
Respuesta
-
a. Physical
-
b. Transport
-
c. Network
-
d. Data Link
Pregunta 73
Pregunta
Which Data Link sublayer manages flow control?
Respuesta
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Pregunta 74
Pregunta
Which Data Link sublayer manages access to the physical medium?
Respuesta
-
a. LLC
-
b. MAC
-
c. Management layer
-
d. Addressing layer
Pregunta 75
Pregunta
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered ____.
Respuesta
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Pregunta 76
Pregunta
When signals may travel in only one direction over a medium, the transmission is considered ____.
Respuesta
-
a. simplex
-
b. multiplex
-
c. half-duplex
-
d. full-duplex
Pregunta 77
Pregunta
The most significant factor in choosing a transmission method is its ____.
Respuesta
-
a. noise
-
b. attenuation
-
c. throughput
-
d. latency
Pregunta 78
Pregunta
The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
Respuesta
-
a. throughput
-
b. attenuation
-
c. cross talk
-
d. latency
Pregunta 79
Pregunta
TCP is a(n) ____ protocol.
Respuesta
-
a. open-ended
-
b. indiscriminating
-
c. connection-oriented
-
d. connectionless
Pregunta 80
Pregunta
____ is more efficient than TCP for carrying messages that fit within one data packet.
Respuesta
-
a. IP
-
b. UDP
-
c. ICMP
-
d. IGMP
Pregunta 81
Pregunta
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
Respuesta
-
a. TCP
-
b. UDP
-
c. IP
-
d. ARP
Pregunta 82
Pregunta
In IPv4 addressing, each public IP address is a unique ____ number.
Respuesta
-
a. 12-bit
-
b. 32-bit
-
c. 64-bit
-
d. 128-bit
Pregunta 83
Pregunta
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
Pregunta 84
Pregunta
In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a Class ____ network.
Pregunta 85
Pregunta
The default subnet mask for a Class B network is ____.
Respuesta
-
a. 255.0.0.0
-
b. 255.255.0.0
-
c. 255.255.255.0
-
d. 255.255.255.255
Pregunta 86
Pregunta
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
Respuesta
-
a. anycast
-
b. unicast
-
c. multicast
-
d. singlecast
Pregunta 87
Pregunta
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
Respuesta
-
a. CSMA
-
b. CSMA/DC
-
c. CSAM/CD
-
d. CSMA/CD
Pregunta 88
Pregunta
A ____ occurs when two transmissions interfere with each other.
Respuesta
-
a. jam
-
b. collision
-
c. carrier sense
-
d. multiple access event
Pregunta 89
Pregunta
Together, the FCS and the header make up the ____-byte “frame” for the data.
Pregunta 90
Pregunta
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
Respuesta
-
a. simple commands
-
b. special clients
-
c. special switches
-
d. special software
Pregunta 91
Pregunta
Traditional switches operate at the ____ layer of the OSI model.
Respuesta
-
a. Physical
-
b. Data link
-
c. Network
-
d. Session
Pregunta 92
Pregunta
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Respuesta
-
a. Routers
-
b. Switches
-
c. Gateways
-
d. Broadcast domains
Pregunta 93
Pregunta
The ____ encompasses the entire telephone system, from the wires that enter homes and businesses to the network centers that connect different regions of a country.
Respuesta
-
a. SLIP
-
b. POTS
-
c. PPP
-
d. PSTN
Pregunta 94
Pregunta
____ means that a telephone company connects residential users to its network with fiber-optic cable.
Respuesta
-
a. OLT
-
b. FITL
-
c. PON
-
d. FITH
Pregunta 95
Pregunta
A class ____ network class is reserved for special purposes.
Pregunta 96
Pregunta
In classful addressing, the Class B IPv4 address network ID is located in the ____.
Respuesta
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Pregunta 97
Pregunta
In classful addressing, Class C IPv4 address host information is located in the ____.
Respuesta
-
a. last 8 bits
-
b. last 16 bits
-
c. first 8 bits
-
d. first 16 bits
Pregunta 98
Pregunta
Within a classful addressing, ____ is the default subnet mask for a Class C address.
Respuesta
-
a. 255.255.255.255
-
b. 255.255.255.0
-
c. 255.255.0.0
-
d. 255.0.0.0
Pregunta 99
Pregunta
The result from ANDing 11001111 with 10010001 is ____.
Respuesta
-
a. 11001111
-
b. 10010001
-
c. 10000001
-
d. 00000001
Pregunta 100
Pregunta
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Respuesta
-
a. Cracking
-
b. Hacking
-
c. War driving
-
d. Phishing
Pregunta 101
Pregunta
A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can’t respond to any of them.
Respuesta
-
a. flashing
-
b. denial-of-service
-
c. war driving
-
d. phishing
Pregunta 102
Pregunta
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Respuesta
-
a. packet-filtering
-
b. gateway
-
c. proxy
-
d. selective
Pregunta 103
Pregunta
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Respuesta
-
a. intensity
-
b. background
-
c. scope
-
d. focus
Pregunta 104
Pregunta
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
Respuesta
-
a. open
-
b. static
-
c. promiscuous
-
d. continuous
Pregunta 105
Pregunta
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Respuesta
-
a. Jabbers
-
b. Ghosts
-
c. Giants
-
d. Runts
Pregunta 106
Pregunta
A ____ usually results from a bad NIC.
Respuesta
-
a. jabber
-
b. ghost
-
c. giant
-
d. runt
Pregunta 107
Pregunta
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously
Pregunta 108
Pregunta
110. Which of the following is a valid IP address for use by a host on a LAN?
Respuesta
-
a. 10.2.257.5
-
b. 127.0.0.1
-
c. 192.168.10.5
-
d. 227.125.5.25
Pregunta 109
Pregunta
Which of the following is a valid IP address for use by a host on a LAN?
Respuesta
-
a. 10.256.255.5
-
b. 127.0.0.1
-
c. 227.125.5.25
-
d. None of the above