Chapter 1
Networking Fundamentals

  1. At which of the following layers of the Open Systems Interconnection (OSI) model do the protocols on a typical local area network (LAN) use media access control (MAC) addresses to identify other computers on the network?
    1. Physical
    2. Data link
    3. Network
    4. Transport
  2. Which of the following organizations developed the Open Systems Interconnection (OSI) model?
    1. International Telecommunication Union (ITU-T)
    2. Comité Consultatif International Télégraphique et Téléphonique (CCITT)
    3. American National Standards Institute (ANSI)
    4. Institute of Electrical and Electronics Engineers (IEEE)
    5. International Organization for Standardization (ISO)
  3. Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  4. On a TCP/IP network, which layers of the Open Systems Interconnection (OSI) model contain protocols that are responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network? (Choose all that apply.)
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  5. What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  6. Which of the following devices typically operates at the network layer of the Open Systems Interconnection (OSI) model?
    1. Proxy server
    2. Hub
    3. Network interface adapter
    4. Router
  7. Which layer of the Open Systems Interconnection (OSI) model provides an entrance point to the protocol stack for applications?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  8. Which layer of the Open Systems Interconnection (OSI) model is responsible for dialogue control between two communicating end systems?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  9. Some switches can perform functions associated with two layers of the Open Systems Interconnection (OSI) model. Which two of the following layers are often associated with network switching? (Choose all that apply.)
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  10. At which layer of the Open Systems Interconnection (OSI) model are there TCP/IP protocols than can provide either connectionless or connection-oriented services to applications?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  11. Which of the following layers of the Open Systems Interconnection (OSI) model typically have dedicated physical hardware devices associated with them? (Choose all that apply.)
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  12. At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  13. Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.
    1. Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
    2. Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
    3. Data link layer; CSMA/CD
    4. Data link layer; CSMA/CA
  14. At which layer of the OSI model do you find the protocol responsible for the delivery of data to its ultimate destination on an internetwork?
    1. Data link
    2. Network
    3. Session
    4. Application
  15. Which of the following is not a protocol operating at the network layer of the OSI model?
    1. IP
    2. ICMP
    3. IGMP
    4. IMAP
  16. Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the Open Systems Interconnection (OSI) model does the protocol that provides the guaranteed delivery run, and what type of protocol must Ed use?
    1. Data link layer; connectionless
    2. Network layer; connection-oriented
    3. Transport layer; connection-oriented
    4. Application layer; connectionless
  17. Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?
    1. Hub
    2. Bridge
    3. Switch
    4. Router
  18. Alice is a network administrator designing a new Local Area Network (LAN). She needs to determine the type of cabling and the network topology to implement. Which layers of the Open Systems Interconnection (OSI) model apply to cabling and topology elements?
    1. Physical and data link layers
    2. Data link and network layers
    3. Network and transport layers
    4. Transport and application layers
  19. Which layers of the Open Systems Interconnection (OSI) model do not have protocols in the TCP/IP suite exclusively dedicated to them? (Choose all that apply.)
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  20. The protocols at which layer of the Open Systems Interconnection (OSI) model use port numbers to identify the applications that are the source and the destination of the data in the packets?
    1. Application
    2. Presentation
    3. Transport
    4. Network
  21. Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?
    1. Physical, data link, transport, network, session presentation, application
    2. Application, session, presentation, transport, network, data link, physical
    3. Presentation, application, transport, session, network, physical, data link
    4. Session, application, presentation, transport, data link, network, physical
    5. Application, presentation, session, transport, network, data link, physical
  22. At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?
    1. Physical
    2. Data link
    3. Network
    4. Transport
  23. On a TCP/IP network, flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?
    1. Presentation
    2. Session
    3. Transport
    4. Network
  24. Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  25. Which of the OSI model layers is responsible for syntax translation and compression or encryption?
    1. Data link
    2. Network
    3. Session
    4. Presentation
    5. Application
  26. Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
  27. Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.
    1. Network; connection-oriented
    2. Network; connectionless
    3. Transport; connection-oriented
    4. Transport; connectionless
  28. An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?
    1. Physical and data link
    2. Data link and network
    3. Network and transport
    4. Transport and application
  29. Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)
    1. HTTP
    2. SNMP
    3. ICMP
    4. IGMP
    5. UDP
  30. Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?
    1. Application
    2. Presentation
    3. Session
    4. Physical
  31. Which of the following protocols operates at the network layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?
    1. IP
    2. UDP
    3. ARP
    4. ICMP
    5. TCP
  32. A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in the Transmission Control Protocol (TCP) session establishment messages?
    1. SYN, ACK, SYN, ACK
    2. SYN, SYN, ACK, ACK
    3. SYN/ACK, SYN/ACK
    4. SYN, SYN/ACK, ACK
  33. Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?
    1. 512
    2. 1024
    3. 1500
    4. 1518
  34. Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?
    1. SYN
    2. URG
    3. FIN
    4. END
    5. PSH
  35. An electrician installing a new light fixture accidentally severs one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?
    1. Bus
    2. Star
    3. Logical ring
    4. Mesh
  36. Which of the following statements about a wired Local Area Network (LAN) is true?
    1. Wired LANs support only the star topology.
    2. Wired LANs support only the star and bus topologies.
    3. Wired LANs support only the star and ring topologies.
    4. Wired LANs can support ring, bus, or star topologies.
  37. Which of the following is an example of a hybrid topology?
    1. A workstation with two network interface cards, one of which is connected to a star network and one to a bus network
    2. Four Ethernet switches connected using a bus topology
    3. Four workstations, each with a separate network connection to each of the other three
    4. Four Ethernet switches, each with a separate network connection to each of the other three
  38. Which type of network is typically confined to a small area, such as a single room, floor, or building?
    1. WAN
    2. LAN
    3. MAN
    4. CAN
  39. Which type of network connects Local Area Networks (LANs) in distant locations?
    1. WAN
    2. LAN
    3. MAN
    4. CAN
  40. Which of the following topologies requires the installation of terminating resistors at two locations?
    1. Bus
    2. Star
    3. Ring
    4. Mesh
  41. Which of the following topologies is used by the majority of new Ethernet networks installed today?
    1. Bus
    2. Virtual ring
    3. Mesh
    4. Hierarchical star
  42. Alice has constructed a five-node failover cluster in which all five servers are connected to a hard disk array using a dedicated Fibre Channel network. Which of the following terms describes this network arrangement?
    1. SAN
    2. PAN
    3. WAN
    4. MAN
  43. Which of the following is not a technology typically used for a personal area network (PAN)?
    1. Bluetooth
    2. Z-Wave
    3. NFC
    4. SDWAN
  44. Which of the following network topologies are used by Wireless Local Area Networks (WLANs)? (Choose all that apply.)
    1. Ad hoc
    2. Bus
    3. Infrastructure
    4. Star
  45. Which of the following cabling topologies was used by the first Ethernet networks?
    1. Bus
    2. Ring
    3. Star
    4. Mesh
  46. On an Ethernet network using the star topology, which of the following devices can function as the cabling nexus that forms the figurative center of the star? (Choose all that apply.)
    1. Hub
    2. Router
    3. Switch
    4. Access Point
  47. Which of the following cabling topologies provides the greatest number of redundant paths through the network?
    1. Star
    2. Ring
    3. Mesh
    4. Bus
  48. Which of the following Ethernet physical layer options does not use the star topology?
    1. 10Base2
    2. 10Base-T
    3. 100Base-TX
    4. 1000Base-T
  49. Which of the following network types are typically wireless? (Choose all that apply.)
    1. WAN
    2. PAN
    3. SAN
    4. WLAN
  50. Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?
    1. Digital Subscriber Line (DSL)
    2. Metro-optical
    3. Satellite
    4. Cable
  51. Which of the following statements is true about the differences between a peer-to-peer network and a client-server network?
    1. Peer-to-peer networks are inherently less secure than client-server networks.
    2. Peer-to-peer networks are illegal, while client-server networks are legal.
    3. On peer-to-peer networks, every workstation is capable of authenticating users.
    4. On a peer-to-peer network, all workstations must share their resources.
  52. Why does DSL (Digital Subscriber Line) technology support faster data transmissions than a standard Public Switched Telephone Network (PSTN) modem connection?
    1. DSL uses a separate control circuit that provides clear channels for data.
    2. DSL does not perform Cyclic Redundancy Check (CRC) functions and therefore has less overhead.
    3. DSL performs only a single analog-to-digital conversion.
    4. DSL uses a higher frequency range.
  53. Which DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions?
    1. HDSL
    2. IDSL
    3. RADSL
    4. VDSL
  54. Which of the following Wide Area Network (WAN) technologies uses broadband signaling?
    1. Digital Subscriber Line (DSL)
    2. Synchronous Optical Network (SONET)
    3. Integrated Services Digital Network (ISDN)
    4. Cable television (CATV)
  55. Ed has been hired by a private company to connect two remote sites with a Wide Area Network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?
    1. A standard modem-to-modem connection
    2. A T-3 dedicated leased line
    3. A cable television (CATV) connection
    4. An ADSL (Asymmetrical Digital Subscriber Line) connection
  56. Ralph is an employee of a company that offers the option to telecommute from home. As a telecommuting employee, he needs to connect to the company network to access client information, transfer files, and send email through a Virtual Private Network (VPN) connection. Ralph is investigating the different Wide Area Network (WAN) services available for the remote connection before he implements one. His home is over 30 years old; the existing telephone wiring was not run through conduit, and the wiring seems to be deteriorating. Ralph has cable television (CATV) service, and his home is also approximately 20,000 feet from the nearest telephone central office. He wants to implement the fastest remote connection service possible, but cost is a factor in the decision. Which WAN technology should Ralph implement?
    1. A dedicated leased line (fractional T-1)
    2. A standard modem-to-modem connection
    3. A DSL (Digital Subscriber Line) connection
    4. A broadband CATV connection
  57. Which of the following Wide Area Network (WAN) connection technologies uses analog signaling?
    1. Public Switched Telephone Network (PSTN)
    2. Cable television (CATV)
    3. Digital Subscriber Line (DSL)
    4. Synchronous Optical Network (SONET)
  58. If you want to allow both voice and data traffic to be transmitted across the same Digital Subscriber Line (DSL) connection, what type of device is required at the customer site?
    1. A signal terminator
    2. A Digital Subscriber Line Access Multiplexer (DSLAM)
    3. A coder/decoder (CODEC) device
    4. A splitter
  59. What are the two main factors that affect DSL (Digital Subscriber Line) transmission rates?
    1. Signal termination
    2. Distance to the nearest central office
    3. Line conditions
    4. Line reflection
  60. Which of the following best describes the function of a demarcation point or demarc?
    1. The vertical cross-connect that links horizontal networks together
    2. The place where an outside service enters the building
    3. A switch or hub that connects the computers in a particular work area together, forming a horizontal network
    4. The place in a telecommunications room where a patch panel is located
  61. Which of the following broadband WAN services provides equal amounts of upstream and downstream bandwidth?
    1. ADSL
    2. SDSL
    3. Satellite
    4. Cable
  62. Which of the following hardware components is typically found at the demarcation point of a leased line, such as a T-1 or T-3?
    1. Terminator
    2. Punchdown block
    3. 110 block
    4. Smartjack
    5. CSU/DSU
  63. Which of the following remote access connection technologies can support the simultaneous transmission of voice and data traffic over the Public Switched Telephone Network (PSTN)? (Choose all that apply.)
    1. Dial-up modem connection
    2. Integrated Services Digital Network (ISDN)
    3. Digital Subscriber Line (DSL)
    4. Synchronous Optical Network (SONET)
    5. Cable television (CATV) network
  64. A company is moving their entire operation to a new building, and part of the plan is to increase the speed of their Internet access by installing a leased T-3 line to replace their existing broadband connection. The service provider they have selected sends a technician to install the leased line. Which of the following is the correct term for the location in the new building where the technician will terminate the T-3?
    1. Patch panel
    2. Switch
    3. Firewall
    4. Demarc
  65. A T-3 leased line connection runs at 44.736 megabits per second (Mbps). How many separate channels does a T-3 provide?
    1. 24
    2. 64
    3. 128
    4. 512
    5. 672
  66. A T-3 leased line connection is the equivalent of how many T-1 connections?
    1. 7
    2. 14
    3. 28
    4. 112
  67. Which of the following is the U.S. standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192?
    1. SDH
    2. SONET
    3. ISDN
    4. DSL
  68. Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?
    1. Frame relay
    2. MPLS
    3. ATM
    4. PPPoE
    5. SDWAN
  69. Which two of the following constructs provide roughly the same function? (Choose two that apply.)
    1. SIP trunk
    2. CSU/DSU
    3. VoIP gateway
    4. Smartjack
    5. VPN concentrator
  70. Which of the following is the European equivalent of the Synchronous Optical Networking (SONET) standard in the United States?
    1. SDH
    2. OC-3
    3. E-3
    4. ATM
  71. Which of the following is the device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN)?
    1. QSFP
    2. CSU/DSU
    3. SIP trunk
    4. IDS/IPS
  72. Which of the following terms describes a leased line subscription that provides access to only part of a T-1?
    1. E-1
    2. B channel
    3. OC-1
    4. Fractional T-1
  73. Multiprotocol Label Switching (MPLS) is sometimes said to operate between two layers of the Open Systems Interconnection (OSI) model. Between which two layers is it usually said to function?
    1. Physical and data link
    2. Data link and network
    3. Network and transport
    4. Transport and Session
  74. Which of the following Wide Area Network (WAN) services provides the fastest transfer rate?
    1. T-1
    2. E-1
    3. T-3
    4. OC-1
  75. To which of the following Internet connection types does a specification called DOCSIS apply?
    1. Dial-up modem
    2. DSL
    3. Cable broadband
    4. ISDN
  76. Which of the following are types of circuits offered by frame relay services? (Choose all that apply.)
    1. SRV
    2. PVC
    3. SVC
    4. UPC
  77. Which of the following types of Wide Area Network (WAN) connections commonly use Point-to-Point Protocol over Ethernet (PPPoE)? (Choose all that apply.)
    1. Leased lines
    2. SONET
    3. Cable broadband
    4. Digital Subscriber Line (DSL)
  78. Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line Wide Area Network (WAN) service?
    1. SIP trunk
    2. Media converter
    3. Smartjack
    4. AAAA server
  79. Which of the following Wide Area Network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?
    1. ATM
    2. Fractional T-1
    3. SONET
    4. Frame relay
  80. Ralph has been contracted to consult for a company that wants to update its legacy Ethernet network to Gigabit Ethernet. On examining the site, he discovers that the network is still using coaxial-based Thin Ethernet. What change in network topology must occur to upgrade the existing network to Gigabit Ethernet using Unshielded Twisted Pair (UTP) cable?
    1. Bus to Ring
    2. Ring to Star
    3. Star to Bus
    4. Bus to Star
    5. Star to Ring
  81. Which of the following best describes the function of a vSwitch (or virtual switch)?
    1. A vSwitch is a software product that enables a computer with multiple network adapters to function as a switch.
    2. A vSwitch is a feature in layer 3 switches that enables VLANs on the same switch to communicate with each other.
    3. A vSwitch is a feature in layer 3 switches that enables VLANs on different switches to communicate with each other.
    4. A vSwitch enables virtual machines (VMs) running on the same hypervisor to communicate with each other internally.
  82. Which of the following statements best describes the difference between Type I and Type II virtualization?
    1. Type II virtualization requires the host computer to have a processor that supports hardware virtualization assistance; Type I virtualization does not.
    2. In Type I virtualization, the hypervisor runs directly on the physical computer hardware, whereas in Type II virtualization, a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.
    3. Type I virtualization supports up to 256 virtual machines, whereas Type II virtualization supports only 8.
    4. Type I virtualization requires a separate processor for each virtual machine, whereas in Type II virtualization, the VMs all share a single processor.
  83. On which of the following virtual networking components can you create VLANs?
    1. Virtual NIC
    2. Virtual switch
    3. Virtual router
    4. Virtual firewall
  84. On an unmanaged network, which of the following virtual networking components have media access control (MAC) addresses assigned to them?
    1. Virtual switches
    2. Virtual NICs
    3. Hypervisors
    4. Virtual firewalls
  85. Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?
    1. Hypervisor
    2. Virtual server
    3. vSwitch (virtual switch)
    4. VPN concentrator
  86. Which of the following is the proper term for a computer with a hypervisor on which you can create virtual machines and other virtual components?
    1. Guest
    2. NAS
    3. Host
    4. SAN
  87. In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?
    1. Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.
    2. Physical switches typically support the creation of VLANs, whereas virtual switches do not.
    3. Virtual switches cannot forward traffic to the host server running them, whereas physical switches can forward traffic to all connected computers.
    4. Physical switches always include layer 3 functionality, whereas virtual switches do not.
  88. In which of the following components can a virtual firewall be implemented?
    1. On a host operating system
    2. On a guest operating system
    3. In a dedicated virtual machine
    4. In a virtual switch
    5. All of the above
  89. Which of the following technologies can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud?
    1. E-1s
    2. Frame relay
    3. ATM
    4. PPP
  90. Which of the following is not a protocol that uses tunneling to establish secured links between TCP/IP systems?
    1. L2TP
    2. IPsec
    3. MGRE
    4. NAT
  91. Which of the following is not one of the primary components of the Network Function Virtualization (NFV) framework?
    1. VNF
    2. NFV ISG
    3. NFVI
    4. NFV-MANO
  92. Which of the following best describes the function of the network medium?
    1. The network medium provides the physical connection between networked computers.
    2. The network medium provides the protocol used to transmit data between end systems.
    3. The network medium passes data packets between two routers.
    4. The network medium processes electrical or light signals and converts them to data.
  93. Which of the following signal types is carried by copper cable?
    1. Fiber optic
    2. Microwave
    3. Infrared
    4. Electrical
  94. Identify the organizations that developed the general cable type standards for voice and data communications that are currently in use and identify the document name.
    1. ANSI/TVA, document C568
    2. TWA/ANSI/EIA, document T530-A
    3. EIA/ANSI/TWA, document 802.2
    4. TDA/EIA/TIA, document 802.11
    5. ANSI/TIA/EIA, document T568b
  95. Which of the following cable types and connectors are used to attach a television set to a cable television (CATV) network?
    1. A fiber-optic cable and a Straight Tip (ST) connector
    2. A coaxial cable and a Bayonet-Neill-Concelman (BNC) connector
    3. A twisted pair cable and an RJ-45 connector
    4. A coaxial cable and an F-type connector
    5. An AUI cable and a vampire tap connector
    6. A twinaxial cable and a Bayonet-Neill-Concelman (BNC) connector
  96. Which of the following cable types is used for Thick Ethernet network segments?
    1. RG-8
    2. RG-58
    3. RJ-45
    4. RJ-11
  97. Which of the following cable types is used for Thin Ethernet network segments?
    1. RG-8
    2. RG-58
    3. RJ-45
    4. RJ-11
  98. Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?
    1. 66 block
    2. 110 block
    3. Patch panel
    4. Smartjack
  99. Which of the following is a common European alternative to the 110 punchdown block used in U.S. telecommunications installations?
    1. 66 block
    2. mGRE
    3. Krone LSA-Plus
    4. BIX
  100. Which of the following coaxial cable types are still in general use? (Choose all that apply.)
    1. RG-6
    2. RG-8
    3. RG-58
    4. RG-59
  101. Which of the following statements about the differences between fiber-optic Angled Physical Contact (APC) and Ultra-Physical Contact (UPC) connectors are true? (Choose all that apply.)
    1. APCs should only be joined to other APCs.
    2. APCs generate more insertion loss that UPCs.
    3. UPCs generate more return loss than APCs.
    4. UPCs use a green connector boot or body.
  102. Which of the following is not a type of fiber-optic connector?
    1. SC
    2. MTRJ
    3. ST
    4. BNC
  103. Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete?
    1. SFP
    2. SFP+
    3. GBIC
    4. QSFP
    5. QSFP+
  104. Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?
    1. RG-8
    2. Twisted pair
    3. RG-58
    4. Fiber optic
  105. Which of the following statements explains the purpose of the twists in twisted pair cabling?
    1. The twists prevent collisions.
    2. The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.
    3. The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
    4. The twists extend the bend radius allowance of the cable.
  106. Which of the following tools do cable installers use to add connectors such as RJ-45 and RJ-11 to twisted pair cabling?
    1. A crimper
    2. A splicer
    3. A pigtail
    4. A patch
  107. Which of the following combinations of attributes describes the cable used for a Thin Ethernet network?
    1. RJ-45, 50-ohm, 0.270-inch, coaxial cable with BNC connectors
    2. RG-59, 75-ohm, 0.242-inch, coaxial cable with F connectors
    3. RG-58, 50-ohm, 0.195-inch, coaxial cable with BNC connectors
    4. RG-8, 50-ohm, 0.405-inch, coaxial cable with N connectors
    5. RJ-6, 75-ohm, 0.242-inch, coaxial cable with BNC connectors
  108. Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)
    1. F-type
    2. BNC
    3. RJ-45
    4. DB-9
    5. N-type
  109. Which of the following connector types was typically associated with a T-connector attached to the computer?
    1. RJ45
    2. MT-RJ
    3. 8P8C
    4. BNC
    5. F
  110. Which of the following connector types are associated with fiber-optic cables? (Choose all that apply.)
    1. RJ11
    2. ST
    3. F
    4. LC
    5. MT-RJ
  111. Which of the following types of cable, when installed, sometimes employed a device called a vampire tap?
    1. Unshielded twisted pair
    2. Shielded twisted pair
    3. Multimode fiber optic
    4. Single-mode fiber optic
    5. Coaxial
  112. In an internal UTP cable installation, each horizontal cable run connects a wall plate in the work area to a centralized cabling nexus in a telecommunications room. Which of the following is the correct term for this cabling nexus?
    1. Telepole
    2. Demarc
    3. Backbone
    4. Patch panel
    5. Fiber distribution panel
  113. Which of the following statements about single-mode and multimode fiber-optic cables are true?
    1. Single-mode cables can span longer distances than multimode cables.
    2. Single-mode cables are more resistant to electromagnetic interference than multimode cables.
    3. Single-mode cables are more difficult to install than multimode cables.
    4. Single-mode cables have a much larger core diameter than multimode cables.
  114. Which of the following components are typically used only for telephone cable installations, and not for data networking? (Choose all that apply.)
    1. 66 blocks
    2. 110 blocks
    3. 25 pair UTP cables
    4. 100 pair UTP cables
  115. Which of the following statements about single-mode fiber-optic cable are true? (Choose all that apply.)
    1. Single-mode cables use an LED light source, whereas multimode cables use a laser.
    2. Single-mode cables can span longer distances than multimode cables.
    3. Single-mode cables have a smaller core filament than multimode cables.
    4. Single-mode cables have a smaller bend radius than multimode, making them easier to install.
    5. Single-mode fiber-optic cables require a ground, whereas multimode cables do not.
  116. Which of the following tools do cable installers use to connect bulk cable runs to wall plates and patch panels?
    1. A crimper
    2. A splicer
    3. A pigtail
    4. A punchdown block tool
  117. Ralph has been hired by a client to install cabling to connect two existing networks. The two networks are in different buildings approximately 1000 feet apart. The cable type must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets their needs. Which of the following cable types best meets the needs of this client?
    1. Multimode fiber-optic cable
    2. Shielded Twisted Pair (STP) cable
    3. Unshielded Twisted Pair (UTP) cable
    4. Thin coaxial cable
    5. Single-mode fiber-optic cable
  118. Which of the following are connector types used with coaxial cables? (Choose all that apply.)
    1. BNC
    2. F-type
    3. N-type
    4. ST
    5. RJ-11
  119. Alice has been hired by a corporation to design the cabling for their network. The corporation just moved into two different floors of an older building: a retail space on the ground floor and an office space on the 43rd floor. The building has existing Category 5 (CAT5) Unshielded Twisted Pair (UTP) cable. Alice's client wants two separate Local Area Networks (LANs), one on each of the two floors, with a backbone network connecting them. They want a 1 gigabit-per-second (Gbps) data rate for each LAN but plan on migrating to 10 Gbps in the future. The two networks are approximately 200 meters apart. Which of the following solutions best meets the client's needs?
    1. Install Category 6 (CAT6) or Category 6a (CAT6a) UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use twisted pair cable for the backbone network.
    2. Use the existing CAT5 cabling for the LANs, since CAT5 runs at 1 Gbps. Use thick coaxial cable for the backbone network.
    3. Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.
    4. Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use the existing CAT5 cable for the backbone network.
  120. A maintenance worker, while replacing a light fixture in an office building, accidentally severs a network cable in the drop ceiling. The tenants use a variety of Local Area Network (LAN) technologies throughout the structure, but on that particular floor, there are three separate LANs: a 10-node Thin Ethernet LAN using coaxial cable in a bus topology, a 25-node Gigabit Ethernet LAN using twisted pair cable in a star topology, and a 5-node Fiber Distributed Data Interface (FDDI) LAN using multimode fiber-optic cable in a double ring topology. Without knowing which of the LANs the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?
    1. 0
    2. 1
    3. 5
    4. 10
    5. 25
    6. 40
  121. In the punchdown process for Unshielded Twisted Pair (UTP) cable, which of the following is the last step that you perform when connecting bulk cables to jacks in wall plates and patch panels?
    1. Cut off the excess wire that protrudes past the contacts.
    2. Press the bare wire down between the two metal contacts that hold it in place.
    3. Strip some of the insulating sheath off the cable end to expose the wires.
    4. Insert the wires into the appropriate contacts in the jack.
    5. Strip a small amount of insulation off each wire.
    6. Separate the twisted wire pairs at the ends.
  122. Which of the following cable connector types is not used with fiber-optic cable?
    1. Straight Tip (ST)
    2. Subscriber Connector (SC)
    3. Mechanical Transfer–Registered Jack (MT-RJ)
    4. F-type
    5. Fiber Local Connector (LC)
  123. Which of the following twisted pair cable types can you use to construct a 10GBase-T network with 100-meter segments? (Choose all that apply.)
    1. CAT5
    2. CAT5e
    3. CAT6
    4. CAT6a
    5. CAT7
    6. CAT8
  124. Which of the following cable connector types have been rendered nearly obsolete by Universal Serial Bus (USB) connections? (Choose all that apply.)
    1. BNC
    2. RJ-11
    3. DB-9
    4. DB-25
  125. Which of the following twisted pair cable types is rated for both a 10-megabit-per-second (Mbps) data rate (using two pairs) and a 100 Mbps data rate (using four pairs)?
    1. Category 3 (CAT3)
    2. Category 5 (CAT5)
    3. Category 5e (CAT5e)
    4. Category 6 (CAT6)
  126. Ed has been hired to install network cabling for a small private company with 15 employees who need to share files and printers. All of the employees are physically located within the same building in two separate office spaces directly adjacent to each other, sharing a common wall and door for access. Both offices have drop ceilings. The client wants a simple Gigabit Ethernet installation that is easy to troubleshoot. In addition, Ed's client wants to keep installation costs to a minimum. Which of the following combinations of topology, cable type, and installation method would best meet the needs of Ed's client?
    1. Star topology, fiber-optic cabling, and internal installation
    2. Bus topology, coaxial cabling, and external installation
    3. Bus topology, twisted pair cabling, and internal installation
    4. Star topology, coaxial cabling, and external installation
    5. Star topology, twisted pair cabling, and external installation
  127. Which of the following cable types are typically used in newly constructed Local Area Network (LAN) installations? (Choose all that apply.)
    1. Single-mode fiber optic
    2. Multimode fiber optic
    3. Coaxial
    4. Unshielded twisted pair
  128. Which of the following statements are true about coaxial cable? (Choose all that apply.)
    1. Coaxial cable has three conductors within the same sheath.
    2. Coaxial cable has two conductors within the same sheath.
    3. Coaxial cable has a copper core that carries light pulse signals.
    4. Coaxial cable has a copper core that carries electrical signals.
    5. Coaxial cable has an insulating outer sheath made of braided strands.
    6. Coaxial cable has an insulating sheath made of either PVC or Teflon.
  129. Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs? (Choose all that apply.)
    1. Category 3 (CAT3)
    2. Category 5 (CAT5)
    3. Category 5e (CAT5e)
    4. Category 6 (CAT6)
    5. Category 6a (CAT6a)
    6. None of the above
  130. Which of the following twisted pair cable types support both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs? (Choose all that apply.)
    1. Category 3 (CAT3)
    2. Category 5 (CAT5)
    3. Category 5e (CAT5e)
    4. Category 6 (CAT6)
  131. Which of the following statements about fiber-optic cabling are true? (Choose all that apply.)
    1. There are two main fiber-optic cable types: single-mode and multimode.
    2. Fiber-optic cable is typically used to span long distances.
    3. Fiber-optic cables use IBM Data Connector (IDC) connectors.
    4. Fiber-optic cables often use Straight Tip (ST) and Subscriber Connector (SC) connectors.
    5. Single-mode fiber-optic cable uses a laser light source and a glass core.
    6. Multimode fiber-optic cable uses a Light-Emitting Diode (LED) light source.
  132. Which of the following are characteristics of an internal cable installation? (Choose all that apply.)
    1. An internal cable installation uses bulk spools of cabling with no connectors attached for most cable runs.
    2. An internal cable installation uses only prefabricated cables with connectors attached for all cable runs.
    3. An internal cable installation uses solid wire conductors for all cable runs, regardless of distance.
    4. An internal cable installation uses stranded wire conductors for short cable runs and solid core for longer cable runs.
    5. In an internal cable installation, cables are typically not run through walls or ceilings.
    6. In an internal cable installation, cables are typically run through walls or ceilings.
  133. Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?
    1. 10GBase-T
    2. 40GBase-T
    3. 100Base-TX
    4. 1000Base-SX
  134. Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star topology using twisted pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology, cable type, and installation method are best suited for this network?
    1. Star topology, fiber-optic cabling, and internal installation
    2. Star topology, coaxial cabling, and external installation
    3. Mesh topology, fiber-optic cabling, and external installation
    4. Bus topology, twisted pair cabling, and internal installation
    5. Mesh topology, fiber-optic cabling, and internal installation
    6. Star topology, twisted pair cabling, and external installation
  135. Alice is a network consultant who has been contracted to evaluate a network design created many years ago, to determine if the design is still viable. The network will support 20 workstations, scattered throughout the building, to run an inventory database application. The two most distant computers are 150 meters apart. The primary goal for the network design is to connect all 20 workstations to a single LAN running at 10 megabits per second (Mbps). The two secondary goals are to provide sufficient fault tolerance for a single cable break to occur without affecting the entire network and to provide resistance to the electromagnetic interference (EMI) generated by machinery in the building. The earlier design calls for a Thin Ethernet LAN with all of the computers connected to a single coaxial cable segment. Which of the following statements about the proposal is true?
    1. The solution achieves neither the primary goal nor either of the secondary goals.
    2. The solution achieves the primary goal but neither of the secondary goals.
    3. The solution achieves the primary goal and one of the secondary goals.
    4. The solution achieves the primary goal and both of the secondary goals.
  136. Ed is a network consultant who has been contracted to design the network for a new manufacturing plant. The plant consists of two buildings 150 meters apart: an office with 20 computers and a manufacturing facility that has 30 computers. The two most distant computers at the site are 225 meters apart. Ed's design calls for a Gigabit Ethernet network using fiber-optic cable. On receiving the proposal, the client asks Ed to justify the additional labor and expense of installing fiber-optic cable instead of Unshielded Twisted Pair (UTP). Which of the following is not a valid reason for choosing fiber optic over UTP for this project?
    1. The 225-meter distance between the two most distant computers exceeds Ethernet's maximum cable segment length for UTP.
    2. Only fiber-optic cable can keep the two buildings electrically isolated.
    3. Fiber-optic cable is completely resistant to any electromagnetic interference generated by the equipment in the manufacturing plant.
    4. Fiber-optic cable provides a greater degree of tolerance to cable breaks than UTP.
  137. In the 100Base-TX specification, which of the following are the functions of the Fast Link Pulse (FLP) signals exchanged by switches and network interface adapters? (Choose all that apply.)
    1. The FLP signals verify the integrity of the connection (or link) between the devices.
    2. The FLP signals enable the devices to negotiate the speed of the link between them.
    3. The FLP signals indicate when a collision has occurred.
    4. The devices use FLP signals to detect bad frames.
  138. Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable?
    1. 10GBase-LR
    2. 10GBase-CX4
    3. 10GBase-ER
    4. 10GBase-LX4
    5. 10GBase-SR
  139. Alice is a network consultant who has been contracted to upgrade an existing Ethernet network to Gigabit Ethernet. The network consists of 20 workstations with integrated 10Base-T/100Base-TX/1000Base-T network interface adapters. The network cabling is Category 5 (CAT5) Unshielded Twisted Pair (UTP), installed when the building was constructed. All of the workstations are connected to a single 100Base-TX switch. Which of the following options would Alice find to be a valid upgrade path to Gigabit Ethernet?
    1. Replace the CAT5 cable with at least Category 5e (CAT5e) or Category 6 (CAT6), and leave the existing network interface adapters and switch in place.
    2. Install a 1000Base-T network interface card in each computer, and leave the existing cables and switch in place.
    3. Replace the CAT5 cable with at least CAT5e or CAT6, and replace the 100Base-T switch with a 1000Base-T switch.
    4. Replace the 100Base-TX switch with a 1000Base-T switch, and leave the existing cables and network interface adapters in place.
  140. Ralph is a network consultant with a client who wants him to design the Local Area Network (LAN) for his company's new branch office. The site consists of a building with Unshielded Twisted Pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants Ralph to install the fastest possible LAN using the existing cable. After examining the site, Ralph notes that the cable is Category 5 (CAT5), installed using a star topology, and that the individual cable runs are all less than 100 meters long. Which of the following Ethernet physical layer specifications can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?
    1. 10GBase-T
    2. 100Base-TX
    3. 1000Base-T
    4. 1000Base-LX
    5. 1000Base-SX
  141. Which Institute of Electrical and Electronics Engineers (IEEE) standards for Ethernet support 10-megabit-per-second (Mbps) communications, and what are the correct segment limitations for each standard? (Choose all that apply.)
    1. 10Base2; segment maximum is 100 meters
    2. 10Base2; segment maximum is 185 meters
    3. 10Base5; segment maximum is 500 meters
    4. 100Base5; segment maximum is 500 meters
    5. 10Base-T; segment maximum is 100 meters
    6. 10Base-T segment maximum is 328 meters
  142. Which of the following are Ethernet cable types that must be configured in a bus topology? (Choose all that apply.)
    1. RG-8
    2. RG-10
    3. RG-14
    4. RG-58
  143. Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow, and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?
    1. Upgrade to 100Base-TX and keep the existing hubs.
    2. Upgrade to 1000Base-T and keep the existing hubs.
    3. Upgrade to 100Base-FX and replace all of the hubs with switches.
    4. Upgrade to 1000Base-T and replace all of the hubs with switches.
    5. Upgrade to 100Base-SX and replace all of the hubs with switches.
  144. Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told to use the T568B pinout standard for all of the cable connectors. Ralph gathers the materials and the tools needed to complete the task, but he is not sure about the T568B pinout. Which of the following pinouts must Ralph use when creating the patch cables?
    1. White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
    2. White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
    3. White/orange, orange, white/green, green, white/blue, blue, white/brown, brown
    4. White/brown, white/green, white/orange, blue, white/blue, orange, green, brown
  145. It is Ralph's first day working for a consultancy that does network cable installations. His new boss hands him a spool of Category 6 cable, a large plier-like device, and a bag of little clear plastic components and tells him to “get started on fives and tens.” What is Ralph expected to do?
    1. Pull cable runs
    2. Create patch cables
    3. Attach keystone connectors
    4. Install a patch panel
  146. Wavelength division multiplexing is a fiber-optic technique for carrying multiple signals on a single network medium. There are several types of this technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is not one of the ways in which these types of multiplexing differ?
    1. They use different wavelength spacings.
    2. They carry different numbers of channels on a single medium.
    3. They provide different amounts of signal amplification.
    4. None of the above.
  147. Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?
    1. DHCP
    2. NAT
    3. DNS
    4. NTP
  148. Which of the following best defines the concept of the dual stack?
    1. A computer with two network interface adapters
    2. A computer with two installed operating systems
    3. A computer with two sets of networking protocols
    4. A computer with connections to two different network segments
  149. Network Address Translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?
    1. Data link
    2. Network
    3. Transport
    4. Application
  150. Which of the following is the most accurate description of the subnetting process on an IPv4 network?
    1. You extend the IP address by adding bits for a subnet identifier.
    2. You borrow bits from the network identifier to create a subnet identifier.
    3. You borrow bits from the host identifier to create a subnet identifier.
    4. You create a subnet identifier by borrowing half of the bits from the network identifier and half from the host identifier.
  151. Which of the following IPv4 addresses are you unable to assign to a network host? (Choose all that apply.)
    1. 1.1.1.1
    2. 229.6.87.3
    3. 103.256.77.4
    4. 9.34.0.1
  152. How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?
    1. 8
    2. 15
    3. 16
    4. 17
  153. Which of the following are not valid IPv4 addresses in the private address space defined by RFC 1918? (Choose all that apply.)
    1. 10.16.225.1
    2. 172:33:19:7
    3. 192.168.254.77
    4. 10.255.255.255
    5. 172.15.2.9
  154. Alice has been instructed to create an IPv4 network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?
    1. 255.255.255.128
    2. 255.255.255.192
    3. 255.255.255.224
    4. 255.255.255.240
    5. 255.255.255.248
    6. 255.255.255.252
  155. Which of the following is the default subnet mask for an IPv4 Class A network?
    1. 255.0.0.0
    2. 255.255.0.0
    3. 255.255.255.0
    4. 255.255.255.255
  156. Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server?
    1. 10.0.0.0 to 10.0.255.255
    2. 169.254.0.0 to 169.254.255.255
    3. 192.168.0.0 to 192.168.0.255
    4. 224.0.0.0 to 224.0.255.255
  157. In which IPv4 class is the address 127.0.0.1 found?
    1. Class A
    2. Class B
    3. Class C
    4. None of the above
  158. Which of the following is a valid IPv6 address?
    1. fe00::b491:cf79:p493:23ff
    2. 2001:0:49e6:39ff:8cf5:6812:ef56
    3. fe00::c955:c944:acdd:3fcb
    4. 2001:0:44ef68:23eb:99fe:72bec6:ea5f
  159. To which class does the following IPv4 address belong: 190.126.14.251?
    1. Class A
    2. Class B
    3. Class C
    4. Class D
  160. Classless Inter-Domain Routing (CIDR) is a standard for IPv4 addressing that includes the ability to create subnets using any number of IP address bits, rather than using 8-bit blocks. Which of the following terms describes this ability?
    1. VLSM
    2. APIPA
    3. VLAN
    4. EUI-64
  161. Ralph has been instructed to use the network address 10.12.0.0/14 for the new network he is installing. What subnet mask value should he use when configuring his computers?
    1. 255.248.0.0
    2. 255.252.0.0
    3. 255.254.0.0
    4. 255.255.248.0
    5. 255.255.252.0
    6. 255.255.254.0
  162. Ed has been hired to design a company's network. The company has an assigned Class C network address of 192.168.30.0. Ed's client wants the network to be configured with 10 subnets, each with 14 hosts. Is this configuration possible with the given address, and if so, how many subnets and hosts can Ed create on the network?
    1. Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.
    2. No, this will not work. A Class C address cannot be subnetted to create 8 subnets.
    3. No, this will not work. Although there are sufficient bits available to create 10 subnets, there are not enough bits left over for Ed to create 14 hosts per subnet.
    4. Yes, this will work. Ed can create 10 subnets with 14 hosts per subnet. By using 3 subnet bits, he can create 10 subnets, which leaves 5 bits to create up to 30 hosts per subnet.
  163. What is the greatest number of subnets you can create with a Class A IPv4 address if you use a 14-bit subnet identifier?
    1. 256
    2. 1,022
    3. 1,024
    4. 16,382
    5. 16,384
  164. Alice has been asked to design her company's Internet Protocol (IPv4) addressing scheme. The company has been assigned a Class C network address of 192.168.30.0. Alice's director wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new subnet mask be for this network?
    1. 3 subnet bits, 5 host bits, and subnet mask 255.255.255.240
    2. 4 subnet bits, 3 host bits, and subnet mask 255.255.255.248
    3. 3 subnet bits, 5 host bits, and subnet mask 255.255.255.224
    4. 5 subnet bits, 3 host bits, and subnet mask 255.255.255.192
  165. A network interface adapter in a workstation has a hexadecimal MAC address of 001F9EFC7AD0. Which of the following would be the adapter's IPv6 link local address based on its EUI-64 value?
    1. FE80::001F:9EFF:FEFC:7AD0
    2. FE80::FFFE:021F:9EFC:7AD0
    3. FE80::FF00:1F9E:FC7A:D0FE
    4. FE80::021F:9EFF:FEFC:7AD0
  166. The default mask for a IPv4 Class B network is 255.255.0.0. How many subnet bits do you need to create 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?
    1. 10 subnet bits with a subnet mask of 255.255.255.192
    2. 9 subnet bits with a subnet mask of 255.255.255.128
    3. 10 subnet bits with a subnet mask of 255.255.224.0
    4. 11 subnet bits with a subnet mask of 255.255.255.192
  167. What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?
    1. 142
    2. 144
    3. 4,094
    4. 4,096
  168. Ralph has an IPv4 Class B network with a subnet mask of 255.255.248.0. How many subnets can he create, and how many hosts can he create per subnet?
    1. 64 subnets and 2046 hosts
    2. 32 subnets and 2046 hosts
    3. 30 subnets and 1022 hosts
    4. 62 subnets and 1022 hosts
  169. Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?
    1. 255.255.224.0
    2. 255.255.240.0
    3. 255.255.248.0
    4. 255.255.252.0
  170. If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?
    1. 192.168.1.33 through 192.168.1.63
    2. 192.168.1.33 through 192.168.1.62
    3. 192.168.1.34 through 192.168.1.62
    4. 192.168.1.34 through 192.168.1.63
  171. Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?
    1. 510
    2. 512
    3. 1022
    4. 1024
  172. Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?
    1. Class A
    2. Class B
    3. Class C
    4. Class D
  173. Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?
    1. Class A
    2. Class B
    3. Class C
    4. Class D
    5. Class E
  174. Which of the following is an address that you can assign to a host on a private IPv4 network?
    1. 192.167.9.46
    2. 172.16.255.255
    3. 10.1.0.253
    4. 225.87.34.1
  175. Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?
    1. 255.255.224.0
    2. 255.255.240.0
    3. 255.255.248.0
    4. 255.255.255.224
    5. 255.255.255.240
  176. Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?
    1. 192.168.2.32 to 192.168.2.55
    2. 192.168.2.33 to 192.168.2.46
    3. 192.168.2.33 to 192.168.2.40
    4. 192.168.2.1 to 192.168.2.254
  177. Which of the following IPv4 addresses is available for use on a network device?
    1. 1.0.0.1
    2. 127.98.127.0
    3. 234.9.76.32
    4. 240.65.8.124
  178. Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?
    1. Link local
    2. Global unicast
    3. Site local
    4. Anycast
  179. When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)
    1. A unique port number
    2. A common public IPv4 address
    3. A common port number
    4. A unique public IPv4 address
  180. Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?
    1. EUI-64
    2. SLAAC
    3. APIPAv6
    4. DHCPv6
  181. Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)
    1. Teredo
    2. IPsec
    3. ICMPv6
    4. 6to4
  182. Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?
    1. To obtain the prefix needed to generate a link-local address
    2. To learn the IPv6 address of the nearest router
    3. To perform address conflict detection for its link-local address
    4. To encapsulate IPv4 packets and transmit them over the router
  183. Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)
    1. An IP address assigned to a host workstation by a DHCP server
    2. A public IP address substituted for a host's own private IP address by a NAT router
    3. An IP address assigned to a host workstation by APIPA
    4. An IP address assigned to a virtual NIC
  184. Which of the following is the best definition of a subinterface?
    1. A logical network interface created from a physical network interface
    2. One of the ports on a physical network interface adapter with multiple ports
    3. A physical network interface connected to a subnet
    4. One of the IP addresses associated with a network interface that has multiple IP addresses
  185. Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?
    1. 110 and 25
    2. 143 and 25
    3. 110 and 143
    4. 80 and 110
    5. 25 and 80
  186. Which of the following server applications use two well-known port numbers during a typical transaction?
    1. NTP
    2. SNMP
    3. HTTP
    4. FTP
  187. Which of the following protocols does the Ping utility use to exchange messages with another system?
    1. UDP
    2. TCP
    3. ICMP
    4. IGMP
  188. Which of the following components does the port number in a transport layer protocol header identify?
    1. A transport layer protocol
    2. An application
    3. A gateway
    4. A proxy server
  189. Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?
    1. Institute for Electronic and Electrical Engineers (IEEE)
    2. Internet Assigned Numbers Authority (IANA)
    3. Internet Engineering Task Force (IETF)
    4. International Organization for Standardization (ISO)
  190. Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?
    1. 22
    2. 20
    3. 80
    4. 443
  191. The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?
    1. 25
    2. 80
    3. 110
    4. 443
  192. What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?
    1. MSS
    2. Window
    3. MMS
    4. WinMS
  193. What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?
    1. Socket
    2. OUI
    3. Well-known port
    4. Network address
    5. Domain
  194. Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)
    1. ICMP
    2. IGMP
    3. SMTP
    4. SNMP
  195. Which of the following protocols is used to exchange directory service information?
    1. RDP
    2. LDAP
    3. SNMP
    4. SMB
  196. Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)
    1. 110
    2. 25
    3. 587
    4. 993
    5. 995
  197. Which of the following is not a port number used for Structured Query Language (SQL) communications?
    1. 1433
    2. 1521
    3. 3306
    4. 3389
  198. Which of the following port numbers is assigned to a Unix logging services program?
    1. 389
    2. 514
    3. 636
    4. 993
  199. Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?
    1. HTTP
    2. HTML
    3. SMTP
    4. FTP
  200. Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?
    1. DHCP
    2. BOOTP
    3. DNS
    4. SNMP
  201. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)
    1. Ethernet
    2. IP
    3. TCP
    4. UDP
  202. What is the native file sharing protocol used on all Microsoft Windows operating systems?
    1. Hypertext Transfer Protocol (HTTP)
    2. Network File System (NFS)
    3. File Transfer Protocol (FTP)
    4. Server Message Block (SMB)
    5. Lightweight Directory Access Protocol (LDAP)
  203. When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?
    1. ACK
    2. FIN
    3. PSH
    4. SYN
    5. URG
  204. Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?
    1. Synchronization
    2. Initialization exchange
    3. Connection establishment
    4. Three-way handshake
  205. Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)
    1. 65
    2. 66
    3. 67
    4. 68
    5. 69
  206. Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?
    1. The port number indicates to the receiver that the sender can activate a specific port only.
    2. The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.
    3. The port number is used only by the receiver, to indicate the application process running on the sender.
    4. The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.
  207. What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
    1. 1023 through 65534
    2. 1 through 1024
    3. 49152 through 65535
    4. 1024 to 49151
  208. Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all that apply.)
    1. UDP does not use packet sequencing and acknowledgments.
    2. UDP uses packet sequencing and acknowledgments.
    3. UDP is a connection-oriented protocol.
    4. UDP is a connectionless protocol.
    5. UDP has an 8-byte header.
    6. UDP has a 20-byte header.
  209. Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)
    1. 21
    2. 23
    3. 20
    4. 53
    5. 69
  210. Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?
    1. TCP
    2. HTTP
    3. UDP
    4. ARP
  211. What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?
    1. 1024 through 49151
    2. 1 through 49151
    3. 49152 through 65534
    4. 1 through 1023
  212. Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)
    1. SNMP
    2. SMTP
    3. POP3
    4. IMAP
    5. RIP
  213. Which of the following values could a web client use as an ephemeral port number when communicating with a web server?
    1. 1
    2. 23
    3. 80
    4. 1024
    5. 1999
    6. 50134
  214. Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?
    1. TCP
    2. HTTP
    3. UDP
    4. IP
  215. Which of the following protocols is limited to use on the local subnet only?
    1. Address Resolution Protocol (ARP)
    2. Dynamic Host Configuration Protocol (DHCP)
    3. Domain Name System (DNS)
    4. Simple Mail Transfer Protocol (SMTP)
  216. Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?
    1. TLS://
    2. HTTPS://
    3. HTTP://
    4. HTLS://
  217. What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)
    1. The connection between the web browser and the server is encrypted.
    2. The browser uses a different port number to connect to the server.
    3. The connection uses SSL or TLS instead of HTTP.
    4. The browser uses a different IP address to connect to the server.
  218. You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.com has been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website?
    1. http://www.adatum.com
    2. http://www.adatum.com:12354
    3. https://www.adatum.com:80
    4. https://www.adatum.com:12354
  219. Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?
    1. ESP
    2. SSL
    3. AH
    4. MSCHAP
  220. Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)
    1. SSH
    2. AH
    3. ESP
    4. SSL
  221. What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?
    1. Lack of security
    2. Slow file transfers
    3. File size limitations
    4. Lack of authentication
  222. Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?
    1. FTP
    2. FTPS
    3. SFTP
    4. TFTP
  223. Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?
    1. FTP
    2. FTPS
    3. SFTP
    4. TFTP
  224. Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?
    1. ESP
    2. SSL
    3. AH
    4. MSCHAP
  225. Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?
    1. SSL
    2. TLS
    3. SSH
    4. DTLS
  226. Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?
    1. SSH
    2. SSL
    3. RDP
    4. IPsec
  227. In which of the following DNS transactions does the querying system generate a recursive query? (Choose all that apply.)
    1. A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution.
    2. A client's DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.
    3. A client's DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain.
    4. A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP's DNS server for resolution.
    5. A client's DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www.
  228. Which of the following devices would you most likely configure to function as a Dynamic Host Configuration Protocol (DHCP) server?
    1. A wireless router
    2. An unmanaged switch
    3. A hub
    4. A bridge
  229. Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)
    1. Dynamic Host Configuration Protocol (DHCP)
    2. Address Resolution Protocol (ARP)
    3. Domain Name System (DNS)
    4. File Transfer Protocol (FTP)
    5. Bootstrap Protocol (BOOTP)
  230. Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?
    1. MX
    2. AAAA
    3. CNAME
    4. PTR
  231. Which of the following features is supported by DHCP, but not by BOOTP and RARP?
    1. Dynamic address allocation
    2. Relay agents
    3. Manual address allocation
    4. Automatic address allocation
  232. Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address allocation transaction? (Choose all that apply.)
    1. DHCPDISCOVER
    2. DHCPOFFER
    3. DHCPINFORM
    4. DHCPACK
    5. DHCPREQUEST
    6. DHCPNAK
    7. DHCPRENEW
    8. DHCPRELEASE
  233. Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)
    1. DHCPDISCOVER
    2. DHCPOFFER
    3. DHCPINFORM
    4. DHCPACK
    5. DHCPREQUEST
    6. DHCPNAK
    7. DHCPRENEW
    8. DHCPRELEASE
  234. Which of the following is not a protocol used to allocate IP address assignments to clients on a network?
    1. ARP
    2. RARP
    3. BOOTP
    4. DHCP
  235. Which of the following best describes what happens when a DNS server receives an iterative name resolution query?
    1. The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.
    2. The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by issuing its own iterative queries to other DNS servers.
    3. The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by forwarding the name resolution request to another DNS server in a recursive query.
    4. The DNS server responds immediately if it is the authoritative server for the domain in which the requested name is located. Otherwise, it returns an error message stating that it could not resolve the requested name.
  236. What is the term used to refer to the DNS client mechanism that generates name resolution queries and sends them to DNS servers?
    1. Requestor
    2. Forwarder
    3. Authority
    4. Resolver
  237. Which of the following TCP/IP parameters, configured on an end system, specifies the IP address of a device that performs domain name resolution services?
    1. WINS Server Addresses
    2. Default Gateway
    3. DNS Server Addresses
    4. Subnet Gateway
  238. Which IP address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)?
    1. Manual
    2. Dynamic
    3. Stable
    4. Automatic
  239. On a Dynamic Host Configuration Protocol (DHCP) server, what is the name of the element you create to specify which IP addresses the server should assign to clients?
    1. Range
    2. Scope
    3. Pool
    4. Subnet
  240. Why is it necessary to use a relay agent to enable a Dynamic Host Configuration Protocol (DHCP) server to assign IP addresses to clients on other networks? (Choose all that apply.)
    1. Because DHCP requires a separate license for each subnet.
    2. Because clients cannot initiate an address assignment by contacting DHCP servers on other networks directly.
    3. Because DHCP must use the Transmission Control Protocol (TCP) to communicate with clients.
    4. Because the DHCP address assignment process relies on broadcast transmissions.
  241. Which of the following Domain Name System (DNS) resource records is used to resolve a hostname into an IPv6 address?
    1. MX
    2. PTR
    3. AAAA
    4. CNAME
  242. Ralph has configured a server called NE6 to function as a web server. He does not want to change the server's existing name, but he wants it to also be accessible to clients using the name www . What Domain Name System (DNS) modification can Ralph make to accomplish this?
    1. Create an additional A resource record.
    2. Create a new CNAME resource record.
    3. Modify the existing A resource record.
    4. Create a new PTR resource record.
  243. Which of the following options should you configure on a Dynamic Host Configuration Protocol (DHCP) server to supply clients with a default gateway address?
    1. Router
    2. Time Server
    3. Name Server
    4. LPR Server
  244. Dynamic Host Configuration Protocol (DHCP) clients rely on which of the following types of transmissions to locate and initiate contact with DHCP servers on the local network?
    1. Unicast
    2. Broadcast
    3. Multicast
    4. Anycast
  245. Which of the following Domain Name System (DNS) resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?
    1. NS
    2. PTR
    3. MX
    4. SRV
    5. SOA
    6. TXT
  246. Which of the following must you create on a DHCP server if you want it to always assign the same IP address to a particular computer?
    1. Exclusion
    2. Scope
    3. Reservation
    4. Relay
  247. Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?
    1. Automatic
    2. Dynamic
    3. Manual
    4. Static
  248. Which of the following technologies enables the IP addresses assigned to clients by a Dynamic Host Configuration Protocol (DHCP) server to be automatically added to the DNS namespace?
    1. Reverse name resolution
    2. Dynamic DNS
    3. Automatic allocation
    4. HOSTS
  249. Which of the following is a tool that integrates DHCP and DNS so that each is aware of the changes made by the other?
    1. HOSTS
    2. DHCPv6
    3. IPAM
    4. APIPA
  250. Which of the following is the term used to describe the logical distance of a Network Time Protocol (NTP) server from the time source to which it is synchronized?
    1. Layer
    2. Path
    3. Iteration
    4. Stratum
  251. Which of the following protocols is used to synchronize computer clocks to a time signal provided by a server?
    1. TFTP
    2. HTTP
    3. SMTP
    4. NTP
  252. Which of the words in the fully qualified domain name (FQDN) www.paris.mydomain.org represents the topmost layer in the DNS namespace hierarchy?
    1. www
    2. paris
    3. mydomain
    4. org
  253. Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?
    1. Interface MTU
    2. Default IP TTL
    3. ARP cache timeout
    4. TCP keepalive interval
  254. In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server? (Choose all that apply.)
    1. Company database servers
    2. Internet web servers
    3. Incoming email servers
    4. Domain controllers
  255. Ralph is concerned that the IP address scope of available leases on his DHCP server is nearly exhausted. What happens to DHCP clients when there are no IP addresses left in the scope for assignment?
    1. Clients are assigned a 0.0.0.0 address.
    2. Clients self-assign APIPA addresses.
    3. Client DHCP requests are forwarded to another DHCP server.
    4. Clients are forced to share IP addresses.
  256. Alice is the administrator of a subnet for which she has been allotted 100 IP addresses. She has installed a DHCP server with a scope containing all 100 available addresses for lease. There are currently 99 clients configured to use the DHCP server, many of which are mobile devices, and Alice fears that systems frequently leaving and rejoining the network might cause the scope of available leases to be exhausted. Which of the following adjustments can help to prevent this from happening?
    1. Increase the lease time for the scope.
    2. Decrease the lease time for the scope.
    3. Install a second DHCP server.
    4. Create a second scope for the subnet.
  257. DHCP clients use broadcast messages to contact a DHCP server on the local subnet. Which of the following are mechanisms by which DHCP broadcast messages can be forwarded to a DHCP server on another subnet when there is none on the local subnet? (Choose all that apply.)
    1. DHCP relay
    2. UDP forwarding
    3. Zone transfer
    4. IP helper
  258. Which of the following mechanisms enables administrators to maintain current DNS database information on multiple name servers, for fault tolerance and load balancing purposes?
    1. Multi-master replication
    2. UDP forwarding
    3. Iterative query
    4. Zone transfer
  259. Which of the following Storage Area Network (SAN) protocols are capable of sharing a network medium with standard Local Area Network (LAN) traffic? (Choose all that apply.)
    1. iSCSI
    2. Fibre Channel
    3. FCoE
    4. InfiniBand
  260. Which of the following protocols is not used for Storage Area Networks (SANs)?
    1. iSCSI
    2. FCoE
    3. VoIP
    4. Fibre Channel
  261. Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?
    1. Active Directory
    2. ICMP
    3. DNS
    4. iWINS
    5. iSNS
  262. What is the highest possible data transfer rate on a Storage Area Network (SAN) using Fibre Channel?
    1. 8 Gbps
    2. 16 Gbps
    3. 32 Gbps
    4. 128 Gbps
    5. 256 Gbps
  263. In its primary functionality, a network attached storage (NAS) device is most closely associated with which of the following devices?
    1. Failover cluster
    2. File server
    3. JBOD
    4. RAID
  264. Which of the following statements about the differences between Network Attached Storage (NAS) and Storage Area Networks (SANs) are true? (Choose all that apply.)
    1. NAS provides file-level storage access, whereas SAN provides block-level storage access.
    2. NAS devices typically contain integrated iSCSI targets.
    3. SAN devices have an operating system, whereas NAS devices do not.
    4. NAS devices typically provide a filesystem, whereas SAN devices do not.
  265. Which of the following statements specify advantages of FCoE over the original Fibre Channel standard? (Choose all that apply.)
    1. FCoE is less expensive to implement than Fibre Channel.
    2. FCoE can share a network with standard IP traffic, whereas Fibre Channel cannot.
    3. FCoE is routable over IP networks, whereas Fibre Channel is not.
    4. FCoE uses standard Ethernet networking hardware.
  266. Which of the following are application layer protocols that Network Attached Storage (NAS) devices can use to serve shared files to clients on the network? (Choose all that apply.)
    1. CIFS
    2. NFS
    3. RDMA
    4. HTTP
  267. Which of the following is not one of the advantages of iSCSI over Fibre Channel? (Choose all that apply.)
    1. iSCSI is routable, whereas Fibre Channel is not.
    2. iSCSI is less expensive to implement than Fibre Channel.
    3. iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.
    4. iSCSI can share the same network as standard local area network traffic, whereas Fibre Channel cannot.
  268. Which of the following Storage Area Network (SAN) technologies is primarily used by supercomputers as a high-speed, low-latency connection between Central Processing Units (CPUs) and storage systems?
    1. InfiniBand
    2. Fibre Channel
    3. iSCSI
    4. FCoE
  269. Which of the following is the term for the client that accesses an iSCSI device on a storage area network?
    1. Initiator
    2. Target
    3. Controller
    4. Adapter
  270. Which of the following protocols are included in an iSCSI packet? (Choose all that apply.)
    1. Ethernet
    2. IP
    3. TCP
    4. UDP
    5. None of the above
  271. Which of the following protocols are included in a Fibre Channel packet?
    1. Ethernet
    2. IP
    3. TCP
    4. UDP
    5. None of the above
  272. Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model?
    1. iSCSI
    2. Fibre Channel
    3. PPP
    4. RDMA
  273. Which of the following protocols are included in an FCoE packet?
    1. Ethernet
    2. IP
    3. TCP
    4. UDP
    5. None of the above
  274. Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?
    1. Ethernet
    2. IP
    3. Fibre Channel
    4. iSCSI
  275. Which of the following is not the name of one of the layers in the three-tier datacenter architecture?
    1. Core
    2. Intermediate
    3. Distribution
    4. Access
  276. Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?
    1. The leaf and spine arrangement uses a full mesh switching topology.
    2. In a leaf and spine topology, all data flows require the same number of hops.
    3. The leaf and spine topology is less expensive to implement than the three-tier topology.
    4. The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
  277. Which of the following best describes the difference between east-west and north-south traffic in a datacenter?
    1. East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.
    2. East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.
    3. East-west traffic stays within the datacenter, while north-south traffic does not.
    4. East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.
  278. Top-of-rack switches most commonly form which layer of the datacenter topology?
    1. Leaf
    2. Backbone
    3. Spine
    4. Core
  279. Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?
    1. Application
    2. Control
    3. Infrastructure
    4. Core
  280. In a Software Defined Network (SDN), as defined in the RFC 7426 specification, a plane is a set of resources related to a particular function. Which of the following is not one of the five planes defined in the SDN architecture?
    1. Forwarding
    2. Operational
    3. Control
    4. Management
    5. Infrastructure
    6. Application
  281. Ralph is designing the datacenter for his company's new branch office. He is considering various options, including building a new datacenter at the branch office facility, using a colocated datacenter, and creating a virtual datacenter using a public cloud provider. Which of the following statements about the differences between these options are true? (Choose all that apply.)
    1. A colocated datacenter would be less expensive to implement than a branch office or public cloud datacenter.
    2. In a branch office or colocated datacenter, Ralph's company would own the hardware.
    3. In all three datacenter options, the administrators in Ralph's company would be responsible for setting up and managing the hardware.
    4. In a branch office or colocated datacenter, Ralph's company would be responsible for all utility costs, including heating, cooling, and power.
    5. A public cloud datacenter would have greater physical security than the other two options.
    6. A public cloud datacenter is easier to expand than a colocated or branch office datacenter
  282. Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?
    1. IaaS
    2. PaaS
    3. SaaS
    4. DaaS
    5. All of the above
  283. When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?
    1. IaaS
    2. PaaS
    3. SaaS
    4. DaaS
    5. None of the above
  284. Which of the following cloud service models provides the consumer with the most control over the cloud resources?
    1. IaaS
    2. PaaS
    3. SaaS
    4. DaaS
    5. IaaS, PaaS, SaaS, and DaaS all provide the same degree of control.
  285. Alice has just created a new Windows Server 2016 virtual machine using remote controls provided by a cloud service provider on the Internet. Which of the following cloud architectures is she using? (Choose all that apply.)
    1. IaaS
    2. PaaS
    3. SaaS
    4. Public cloud
    5. Private cloud
    6. Hybrid cloud
    7. Community cloud
  286. In which of the following cloud models can a single organization function as both the provider and the consumer of all cloud services?
    1. Public cloud
    2. Private cloud
    3. Hybrid cloud
    4. Ad hoc cloud
  287. Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?
    1. Cloud busting
    2. Cloud bursting
    3. Cloud splitting
    4. Cloud migrating
  288. Microsoft's Outlook.com email service is an example of which of the following cloud service models?
    1. IaaS
    2. PaaS
    3. SaaS
    4. DaaS
    5. None of the above
  289. Which of the following statements about cloud delivery models is true?
    1. A public cloud is inherently insecure because anyone can access it.
    2. A private cloud consists of hardware that is all located in a single datacenter.
    3. A hybrid cloud enables administrators to migrate services between public and private resources.
    4. Public, private, and hybrid clouds all utilize the same hardware resources.
  290. Ed has just created a new Windows application for his company, and he wants to deploy it in the public cloud. He is looking for a provider that will furnish his company with a fully installed and configured Windows server on which he can install and run his application. Which of the following service models is he seeking to use?
    1. IaaS
    2. PaaS
    3. SaaS
    4. DaaS
    5. None of the above
  291. Which of the following are valid advantages or disadvantages of multitenancy in a public cloud datacenter? (Choose all that apply.)
    1. Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.
    2. Multitenancy reduces the cost of utilities and other overhead.
    3. Multitenancy introduces the possibility of competition for bandwidth with other tenants.
    4. Multitenancy separates tenants by assigning each one its own virtual machine.
  292. Which of the following is not one of the advantages of Infrastructure as Code (IaC) deployment for cloud-based virtual machines?
    1. IaC provides rapid deployment of virtual machine configurations.
    2. IaC provides consistency in virtual machine configurations.
    3. IaC provides cost savings by automating the virtual machine configuration process.
    4. IaC provides increased security by encrypting the virtual machine configuration
    5. IaC provides elasticity and scalability by simplifying the virtual machine deployment process.
  293. Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client's private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?
    1. Use a different ISP for the cloud connection.
    2. Use a VPN for the cloud connection.
    3. Use a cloud direct connection for the hybrid link.
    4. Use a leased line connection to the ISP
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.95.107