At which of the following layers of the Open Systems Interconnection (OSI) model do the protocols on a typical local area network (LAN) use media access control (MAC) addresses to identify other computers on the network?
Physical
Data link
Network
Transport
Which of the following organizations developed the Open Systems Interconnection (OSI) model?
International Telecommunication Union (ITU-T)
Comité Consultatif International Télégraphique et Téléphonique (CCITT)
American National Standards Institute (ANSI)
Institute of Electrical and Electronics Engineers (IEEE)
International Organization for Standardization (ISO)
Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?
Physical
Data link
Network
Transport
Session
Presentation
Application
On a TCP/IP network, which layers of the Open Systems Interconnection (OSI) model contain protocols that are responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network? (Choose all that apply.)
Physical
Data link
Network
Transport
Session
Presentation
Application
What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?
Physical
Data link
Network
Transport
Session
Presentation
Application
Which of the following devices typically operates at the network layer of the Open Systems Interconnection (OSI) model?
Proxy server
Hub
Network interface adapter
Router
Which layer of the Open Systems Interconnection (OSI) model provides an entrance point to the protocol stack for applications?
Physical
Data link
Network
Transport
Session
Presentation
Application
Which layer of the Open Systems Interconnection (OSI) model is responsible for dialogue control between two communicating end systems?
Physical
Data link
Network
Transport
Session
Presentation
Application
Some switches can perform functions associated with two layers of the Open Systems Interconnection (OSI) model. Which two of the following layers are often associated with network switching? (Choose all that apply.)
Physical
Data link
Network
Transport
Session
Presentation
Application
At which layer of the Open Systems Interconnection (OSI) model are there TCP/IP protocols than can provide either connectionless or connection-oriented services to applications?
Physical
Data link
Network
Transport
Session
Presentation
Application
Which of the following layers of the Open Systems Interconnection (OSI) model typically have dedicated physical hardware devices associated with them? (Choose all that apply.)
Physical
Data link
Network
Transport
Session
Presentation
Application
At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?
Physical
Data link
Network
Transport
Session
Presentation
Application
Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.
Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Data link layer; CSMA/CD
Data link layer; CSMA/CA
At which layer of the OSI model do you find the protocol responsible for the delivery of data to its ultimate destination on an internetwork?
Data link
Network
Session
Application
Which of the following is not a protocol operating at the network layer of the OSI model?
IP
ICMP
IGMP
IMAP
Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the Open Systems Interconnection (OSI) model does the protocol that provides the guaranteed delivery run, and what type of protocol must Ed use?
Data link layer; connectionless
Network layer; connection-oriented
Transport layer; connection-oriented
Application layer; connectionless
Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?
Hub
Bridge
Switch
Router
Alice is a network administrator designing a new Local Area Network (LAN). She needs to determine the type of cabling and the network topology to implement. Which layers of the Open Systems Interconnection (OSI) model apply to cabling and topology elements?
Physical and data link layers
Data link and network layers
Network and transport layers
Transport and application layers
Which layers of the Open Systems Interconnection (OSI) model do not have protocols in the TCP/IP suite exclusively dedicated to them? (Choose all that apply.)
Physical
Data link
Network
Transport
Session
Presentation
Application
The protocols at which layer of the Open Systems Interconnection (OSI) model use port numbers to identify the applications that are the source and the destination of the data in the packets?
Application
Presentation
Transport
Network
Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?
Physical, data link, transport, network, session presentation, application
Application, session, presentation, transport, network, data link, physical
Presentation, application, transport, session, network, physical, data link
Session, application, presentation, transport, data link, network, physical
Application, presentation, session, transport, network, data link, physical
At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?
Physical
Data link
Network
Transport
On a TCP/IP network, flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?
Presentation
Session
Transport
Network
Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?
Physical
Data link
Network
Transport
Session
Presentation
Application
Which of the OSI model layers is responsible for syntax translation and compression or encryption?
Data link
Network
Session
Presentation
Application
Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?
Physical
Data link
Network
Transport
Session
Presentation
Application
Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.
Network; connection-oriented
Network; connectionless
Transport; connection-oriented
Transport; connectionless
An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?
Physical and data link
Data link and network
Network and transport
Transport and application
Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)
HTTP
SNMP
ICMP
IGMP
UDP
Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?
Application
Presentation
Session
Physical
Which of the following protocols operates at the network layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?
IP
UDP
ARP
ICMP
TCP
A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in the Transmission Control Protocol (TCP) session establishment messages?
SYN, ACK, SYN, ACK
SYN, SYN, ACK, ACK
SYN/ACK, SYN/ACK
SYN, SYN/ACK, ACK
Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?
512
1024
1500
1518
Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?
SYN
URG
FIN
END
PSH
An electrician installing a new light fixture accidentally severs one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?
Bus
Star
Logical ring
Mesh
Which of the following statements about a wired Local Area Network (LAN) is true?
Wired LANs support only the star topology.
Wired LANs support only the star and bus topologies.
Wired LANs support only the star and ring topologies.
Wired LANs can support ring, bus, or star topologies.
Which of the following is an example of a hybrid topology?
A workstation with two network interface cards, one of which is connected to a star network and one to a bus network
Four Ethernet switches connected using a bus topology
Four workstations, each with a separate network connection to each of the other three
Four Ethernet switches, each with a separate network connection to each of the other three
Which type of network is typically confined to a small area, such as a single room, floor, or building?
WAN
LAN
MAN
CAN
Which type of network connects Local Area Networks (LANs) in distant locations?
WAN
LAN
MAN
CAN
Which of the following topologies requires the installation of terminating resistors at two locations?
Bus
Star
Ring
Mesh
Which of the following topologies is used by the majority of new Ethernet networks installed today?
Bus
Virtual ring
Mesh
Hierarchical star
Alice has constructed a five-node failover cluster in which all five servers are connected to a hard disk array using a dedicated Fibre Channel network. Which of the following terms describes this network arrangement?
SAN
PAN
WAN
MAN
Which of the following is not a technology typically used for a personal area network (PAN)?
Bluetooth
Z-Wave
NFC
SDWAN
Which of the following network topologies are used by Wireless Local Area Networks (WLANs)? (Choose all that apply.)
Ad hoc
Bus
Infrastructure
Star
Which of the following cabling topologies was used by the first Ethernet networks?
Bus
Ring
Star
Mesh
On an Ethernet network using the star topology, which of the following devices can function as the cabling nexus that forms the figurative center of the star? (Choose all that apply.)
Hub
Router
Switch
Access Point
Which of the following cabling topologies provides the greatest number of redundant paths through the network?
Star
Ring
Mesh
Bus
Which of the following Ethernet physical layer options does not use the star topology?
10Base2
10Base-T
100Base-TX
1000Base-T
Which of the following network types are typically wireless? (Choose all that apply.)
WAN
PAN
SAN
WLAN
Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?
Digital Subscriber Line (DSL)
Metro-optical
Satellite
Cable
Which of the following statements is true about the differences between a peer-to-peer network and a client-server network?
Peer-to-peer networks are inherently less secure than client-server networks.
Peer-to-peer networks are illegal, while client-server networks are legal.
On peer-to-peer networks, every workstation is capable of authenticating users.
On a peer-to-peer network, all workstations must share their resources.
Why does DSL (Digital Subscriber Line) technology support faster data transmissions than a standard Public Switched Telephone Network (PSTN) modem connection?
DSL uses a separate control circuit that provides clear channels for data.
DSL does not perform Cyclic Redundancy Check (CRC) functions and therefore has less overhead.
DSL performs only a single analog-to-digital conversion.
DSL uses a higher frequency range.
Which DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions?
HDSL
IDSL
RADSL
VDSL
Which of the following Wide Area Network (WAN) technologies uses broadband signaling?
Digital Subscriber Line (DSL)
Synchronous Optical Network (SONET)
Integrated Services Digital Network (ISDN)
Cable television (CATV)
Ed has been hired by a private company to connect two remote sites with a Wide Area Network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?
A standard modem-to-modem connection
A T-3 dedicated leased line
A cable television (CATV) connection
An ADSL (Asymmetrical Digital Subscriber Line) connection
Ralph is an employee of a company that offers the option to telecommute from home. As a telecommuting employee, he needs to connect to the company network to access client information, transfer files, and send email through a Virtual Private Network (VPN) connection. Ralph is investigating the different Wide Area Network (WAN) services available for the remote connection before he implements one. His home is over 30 years old; the existing telephone wiring was not run through conduit, and the wiring seems to be deteriorating. Ralph has cable television (CATV) service, and his home is also approximately 20,000 feet from the nearest telephone central office. He wants to implement the fastest remote connection service possible, but cost is a factor in the decision. Which WAN technology should Ralph implement?
A dedicated leased line (fractional T-1)
A standard modem-to-modem connection
A DSL (Digital Subscriber Line) connection
A broadband CATV connection
Which of the following Wide Area Network (WAN) connection technologies uses analog signaling?
Public Switched Telephone Network (PSTN)
Cable television (CATV)
Digital Subscriber Line (DSL)
Synchronous Optical Network (SONET)
If you want to allow both voice and data traffic to be transmitted across the same Digital Subscriber Line (DSL) connection, what type of device is required at the customer site?
A signal terminator
A Digital Subscriber Line Access Multiplexer (DSLAM)
A coder/decoder (CODEC) device
A splitter
What are the two main factors that affect DSL (Digital Subscriber Line) transmission rates?
Signal termination
Distance to the nearest central office
Line conditions
Line reflection
Which of the following best describes the function of a demarcation point or demarc?
The vertical cross-connect that links horizontal networks together
The place where an outside service enters the building
A switch or hub that connects the computers in a particular work area together, forming a horizontal network
The place in a telecommunications room where a patch panel is located
Which of the following broadband WAN services provides equal amounts of upstream and downstream bandwidth?
ADSL
SDSL
Satellite
Cable
Which of the following hardware components is typically found at the demarcation point of a leased line, such as a T-1 or T-3?
Terminator
Punchdown block
110 block
Smartjack
CSU/DSU
Which of the following remote access connection technologies can support the simultaneous transmission of voice and data traffic over the Public Switched Telephone Network (PSTN)? (Choose all that apply.)
Dial-up modem connection
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Synchronous Optical Network (SONET)
Cable television (CATV) network
A company is moving their entire operation to a new building, and part of the plan is to increase the speed of their Internet access by installing a leased T-3 line to replace their existing broadband connection. The service provider they have selected sends a technician to install the leased line. Which of the following is the correct term for the location in the new building where the technician will terminate the T-3?
Patch panel
Switch
Firewall
Demarc
A T-3 leased line connection runs at 44.736 megabits per second (Mbps). How many separate channels does a T-3 provide?
24
64
128
512
672
A T-3 leased line connection is the equivalent of how many T-1 connections?
7
14
28
112
Which of the following is the U.S. standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192?
SDH
SONET
ISDN
DSL
Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?
Frame relay
MPLS
ATM
PPPoE
SDWAN
Which two of the following constructs provide roughly the same function? (Choose two that apply.)
SIP trunk
CSU/DSU
VoIP gateway
Smartjack
VPN concentrator
Which of the following is the European equivalent of the Synchronous Optical Networking (SONET) standard in the United States?
SDH
OC-3
E-3
ATM
Which of the following is the device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN)?
QSFP
CSU/DSU
SIP trunk
IDS/IPS
Which of the following terms describes a leased line subscription that provides access to only part of a T-1?
E-1
B channel
OC-1
Fractional T-1
Multiprotocol Label Switching (MPLS) is sometimes said to operate between two layers of the Open Systems Interconnection (OSI) model. Between which two layers is it usually said to function?
Physical and data link
Data link and network
Network and transport
Transport and Session
Which of the following Wide Area Network (WAN) services provides the fastest transfer rate?
T-1
E-1
T-3
OC-1
To which of the following Internet connection types does a specification called DOCSIS apply?
Dial-up modem
DSL
Cable broadband
ISDN
Which of the following are types of circuits offered by frame relay services? (Choose all that apply.)
SRV
PVC
SVC
UPC
Which of the following types of Wide Area Network (WAN) connections commonly use Point-to-Point Protocol over Ethernet (PPPoE)? (Choose all that apply.)
Leased lines
SONET
Cable broadband
Digital Subscriber Line (DSL)
Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line Wide Area Network (WAN) service?
SIP trunk
Media converter
Smartjack
AAAA server
Which of the following Wide Area Network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?
ATM
Fractional T-1
SONET
Frame relay
Ralph has been contracted to consult for a company that wants to update its legacy Ethernet network to Gigabit Ethernet. On examining the site, he discovers that the network is still using coaxial-based Thin Ethernet. What change in network topology must occur to upgrade the existing network to Gigabit Ethernet using Unshielded Twisted Pair (UTP) cable?
Bus to Ring
Ring to Star
Star to Bus
Bus to Star
Star to Ring
Which of the following best describes the function of a vSwitch (or virtual switch)?
A vSwitch is a software product that enables a computer with multiple network adapters to function as a switch.
A vSwitch is a feature in layer 3 switches that enables VLANs on the same switch to communicate with each other.
A vSwitch is a feature in layer 3 switches that enables VLANs on different switches to communicate with each other.
A vSwitch enables virtual machines (VMs) running on the same hypervisor to communicate with each other internally.
Which of the following statements best describes the difference between Type I and Type II virtualization?
Type II virtualization requires the host computer to have a processor that supports hardware virtualization assistance; Type I virtualization does not.
In Type I virtualization, the hypervisor runs directly on the physical computer hardware, whereas in Type II virtualization, a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.
Type I virtualization supports up to 256 virtual machines, whereas Type II virtualization supports only 8.
Type I virtualization requires a separate processor for each virtual machine, whereas in Type II virtualization, the VMs all share a single processor.
On which of the following virtual networking components can you create VLANs?
Virtual NIC
Virtual switch
Virtual router
Virtual firewall
On an unmanaged network, which of the following virtual networking components have media access control (MAC) addresses assigned to them?
Virtual switches
Virtual NICs
Hypervisors
Virtual firewalls
Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?
Hypervisor
Virtual server
vSwitch (virtual switch)
VPN concentrator
Which of the following is the proper term for a computer with a hypervisor on which you can create virtual machines and other virtual components?
Guest
NAS
Host
SAN
In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?
Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.
Physical switches typically support the creation of VLANs, whereas virtual switches do not.
Virtual switches cannot forward traffic to the host server running them, whereas physical switches can forward traffic to all connected computers.
Physical switches always include layer 3 functionality, whereas virtual switches do not.
In which of the following components can a virtual firewall be implemented?
On a host operating system
On a guest operating system
In a dedicated virtual machine
In a virtual switch
All of the above
Which of the following technologies can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud?
E-1s
Frame relay
ATM
PPP
Which of the following is not a protocol that uses tunneling to establish secured links between TCP/IP systems?
L2TP
IPsec
MGRE
NAT
Which of the following is not one of the primary components of the Network Function Virtualization (NFV) framework?
VNF
NFV ISG
NFVI
NFV-MANO
Which of the following best describes the function of the network medium?
The network medium provides the physical connection between networked computers.
The network medium provides the protocol used to transmit data between end systems.
The network medium passes data packets between two routers.
The network medium processes electrical or light signals and converts them to data.
Which of the following signal types is carried by copper cable?
Fiber optic
Microwave
Infrared
Electrical
Identify the organizations that developed the general cable type standards for voice and data communications that are currently in use and identify the document name.
ANSI/TVA, document C568
TWA/ANSI/EIA, document T530-A
EIA/ANSI/TWA, document 802.2
TDA/EIA/TIA, document 802.11
ANSI/TIA/EIA, document T568b
Which of the following cable types and connectors are used to attach a television set to a cable television (CATV) network?
A fiber-optic cable and a Straight Tip (ST) connector
A coaxial cable and a Bayonet-Neill-Concelman (BNC) connector
A twisted pair cable and an RJ-45 connector
A coaxial cable and an F-type connector
An AUI cable and a vampire tap connector
A twinaxial cable and a Bayonet-Neill-Concelman (BNC) connector
Which of the following cable types is used for Thick Ethernet network segments?
RG-8
RG-58
RJ-45
RJ-11
Which of the following cable types is used for Thin Ethernet network segments?
RG-8
RG-58
RJ-45
RJ-11
Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?
66 block
110 block
Patch panel
Smartjack
Which of the following is a common European alternative to the 110 punchdown block used in U.S. telecommunications installations?
66 block
mGRE
Krone LSA-Plus
BIX
Which of the following coaxial cable types are still in general use? (Choose all that apply.)
RG-6
RG-8
RG-58
RG-59
Which of the following statements about the differences between fiber-optic Angled Physical Contact (APC) and Ultra-Physical Contact (UPC) connectors are true? (Choose all that apply.)
APCs should only be joined to other APCs.
APCs generate more insertion loss that UPCs.
UPCs generate more return loss than APCs.
UPCs use a green connector boot or body.
Which of the following is not a type of fiber-optic connector?
SC
MTRJ
ST
BNC
Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete?
SFP
SFP+
GBIC
QSFP
QSFP+
Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?
RG-8
Twisted pair
RG-58
Fiber optic
Which of the following statements explains the purpose of the twists in twisted pair cabling?
The twists prevent collisions.
The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.
The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
The twists extend the bend radius allowance of the cable.
Which of the following tools do cable installers use to add connectors such as RJ-45 and RJ-11 to twisted pair cabling?
A crimper
A splicer
A pigtail
A patch
Which of the following combinations of attributes describes the cable used for a Thin Ethernet network?
RJ-45, 50-ohm, 0.270-inch, coaxial cable with BNC connectors
RG-59, 75-ohm, 0.242-inch, coaxial cable with F connectors
RG-58, 50-ohm, 0.195-inch, coaxial cable with BNC connectors
RG-8, 50-ohm, 0.405-inch, coaxial cable with N connectors
RJ-6, 75-ohm, 0.242-inch, coaxial cable with BNC connectors
Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)
F-type
BNC
RJ-45
DB-9
N-type
Which of the following connector types was typically associated with a T-connector attached to the computer?
RJ45
MT-RJ
8P8C
BNC
F
Which of the following connector types are associated with fiber-optic cables? (Choose all that apply.)
RJ11
ST
F
LC
MT-RJ
Which of the following types of cable, when installed, sometimes employed a device called a vampire tap?
Unshielded twisted pair
Shielded twisted pair
Multimode fiber optic
Single-mode fiber optic
Coaxial
In an internal UTP cable installation, each horizontal cable run connects a wall plate in the work area to a centralized cabling nexus in a telecommunications room. Which of the following is the correct term for this cabling nexus?
Telepole
Demarc
Backbone
Patch panel
Fiber distribution panel
Which of the following statements about single-mode and multimode fiber-optic cables are true?
Single-mode cables can span longer distances than multimode cables.
Single-mode cables are more resistant to electromagnetic interference than multimode cables.
Single-mode cables are more difficult to install than multimode cables.
Single-mode cables have a much larger core diameter than multimode cables.
Which of the following components are typically used only for telephone cable installations, and not for data networking? (Choose all that apply.)
66 blocks
110 blocks
25 pair UTP cables
100 pair UTP cables
Which of the following statements about single-mode fiber-optic cable are true? (Choose all that apply.)
Single-mode cables use an LED light source, whereas multimode cables use a laser.
Single-mode cables can span longer distances than multimode cables.
Single-mode cables have a smaller core filament than multimode cables.
Single-mode cables have a smaller bend radius than multimode, making them easier to install.
Single-mode fiber-optic cables require a ground, whereas multimode cables do not.
Which of the following tools do cable installers use to connect bulk cable runs to wall plates and patch panels?
A crimper
A splicer
A pigtail
A punchdown block tool
Ralph has been hired by a client to install cabling to connect two existing networks. The two networks are in different buildings approximately 1000 feet apart. The cable type must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets their needs. Which of the following cable types best meets the needs of this client?
Multimode fiber-optic cable
Shielded Twisted Pair (STP) cable
Unshielded Twisted Pair (UTP) cable
Thin coaxial cable
Single-mode fiber-optic cable
Which of the following are connector types used with coaxial cables? (Choose all that apply.)
BNC
F-type
N-type
ST
RJ-11
Alice has been hired by a corporation to design the cabling for their network. The corporation just moved into two different floors of an older building: a retail space on the ground floor and an office space on the 43rd floor. The building has existing Category 5 (CAT5) Unshielded Twisted Pair (UTP) cable. Alice's client wants two separate Local Area Networks (LANs), one on each of the two floors, with a backbone network connecting them. They want a 1 gigabit-per-second (Gbps) data rate for each LAN but plan on migrating to 10 Gbps in the future. The two networks are approximately 200 meters apart. Which of the following solutions best meets the client's needs?
Install Category 6 (CAT6) or Category 6a (CAT6a) UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use twisted pair cable for the backbone network.
Use the existing CAT5 cabling for the LANs, since CAT5 runs at 1 Gbps. Use thick coaxial cable for the backbone network.
Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.
Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use the existing CAT5 cable for the backbone network.
A maintenance worker, while replacing a light fixture in an office building, accidentally severs a network cable in the drop ceiling. The tenants use a variety of Local Area Network (LAN) technologies throughout the structure, but on that particular floor, there are three separate LANs: a 10-node Thin Ethernet LAN using coaxial cable in a bus topology, a 25-node Gigabit Ethernet LAN using twisted pair cable in a star topology, and a 5-node Fiber Distributed Data Interface (FDDI) LAN using multimode fiber-optic cable in a double ring topology. Without knowing which of the LANs the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?
0
1
5
10
25
40
In the punchdown process for Unshielded Twisted Pair (UTP) cable, which of the following is the last step that you perform when connecting bulk cables to jacks in wall plates and patch panels?
Cut off the excess wire that protrudes past the contacts.
Press the bare wire down between the two metal contacts that hold it in place.
Strip some of the insulating sheath off the cable end to expose the wires.
Insert the wires into the appropriate contacts in the jack.
Strip a small amount of insulation off each wire.
Separate the twisted wire pairs at the ends.
Which of the following cable connector types is not used with fiber-optic cable?
Straight Tip (ST)
Subscriber Connector (SC)
Mechanical Transfer–Registered Jack (MT-RJ)
F-type
Fiber Local Connector (LC)
Which of the following twisted pair cable types can you use to construct a 10GBase-T network with 100-meter segments? (Choose all that apply.)
CAT5
CAT5e
CAT6
CAT6a
CAT7
CAT8
Which of the following cable connector types have been rendered nearly obsolete by Universal Serial Bus (USB) connections? (Choose all that apply.)
BNC
RJ-11
DB-9
DB-25
Which of the following twisted pair cable types is rated for both a 10-megabit-per-second (Mbps) data rate (using two pairs) and a 100 Mbps data rate (using four pairs)?
Category 3 (CAT3)
Category 5 (CAT5)
Category 5e (CAT5e)
Category 6 (CAT6)
Ed has been hired to install network cabling for a small private company with 15 employees who need to share files and printers. All of the employees are physically located within the same building in two separate office spaces directly adjacent to each other, sharing a common wall and door for access. Both offices have drop ceilings. The client wants a simple Gigabit Ethernet installation that is easy to troubleshoot. In addition, Ed's client wants to keep installation costs to a minimum. Which of the following combinations of topology, cable type, and installation method would best meet the needs of Ed's client?
Star topology, fiber-optic cabling, and internal installation
Bus topology, coaxial cabling, and external installation
Bus topology, twisted pair cabling, and internal installation
Star topology, coaxial cabling, and external installation
Star topology, twisted pair cabling, and external installation
Which of the following cable types are typically used in newly constructed Local Area Network (LAN) installations? (Choose all that apply.)
Single-mode fiber optic
Multimode fiber optic
Coaxial
Unshielded twisted pair
Which of the following statements are true about coaxial cable? (Choose all that apply.)
Coaxial cable has three conductors within the same sheath.
Coaxial cable has two conductors within the same sheath.
Coaxial cable has a copper core that carries light pulse signals.
Coaxial cable has a copper core that carries electrical signals.
Coaxial cable has an insulating outer sheath made of braided strands.
Coaxial cable has an insulating sheath made of either PVC or Teflon.
Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs? (Choose all that apply.)
Category 3 (CAT3)
Category 5 (CAT5)
Category 5e (CAT5e)
Category 6 (CAT6)
Category 6a (CAT6a)
None of the above
Which of the following twisted pair cable types support both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs? (Choose all that apply.)
Category 3 (CAT3)
Category 5 (CAT5)
Category 5e (CAT5e)
Category 6 (CAT6)
Which of the following statements about fiber-optic cabling are true? (Choose all that apply.)
There are two main fiber-optic cable types: single-mode and multimode.
Fiber-optic cable is typically used to span long distances.
Fiber-optic cables use IBM Data Connector (IDC) connectors.
Fiber-optic cables often use Straight Tip (ST) and Subscriber Connector (SC) connectors.
Single-mode fiber-optic cable uses a laser light source and a glass core.
Multimode fiber-optic cable uses a Light-Emitting Diode (LED) light source.
Which of the following are characteristics of an internal cable installation? (Choose all that apply.)
An internal cable installation uses bulk spools of cabling with no connectors attached for most cable runs.
An internal cable installation uses only prefabricated cables with connectors attached for all cable runs.
An internal cable installation uses solid wire conductors for all cable runs, regardless of distance.
An internal cable installation uses stranded wire conductors for short cable runs and solid core for longer cable runs.
In an internal cable installation, cables are typically not run through walls or ceilings.
In an internal cable installation, cables are typically run through walls or ceilings.
Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?
10GBase-T
40GBase-T
100Base-TX
1000Base-SX
Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star topology using twisted pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology, cable type, and installation method are best suited for this network?
Star topology, fiber-optic cabling, and internal installation
Star topology, coaxial cabling, and external installation
Mesh topology, fiber-optic cabling, and external installation
Bus topology, twisted pair cabling, and internal installation
Mesh topology, fiber-optic cabling, and internal installation
Star topology, twisted pair cabling, and external installation
Alice is a network consultant who has been contracted to evaluate a network design created many years ago, to determine if the design is still viable. The network will support 20 workstations, scattered throughout the building, to run an inventory database application. The two most distant computers are 150 meters apart. The primary goal for the network design is to connect all 20 workstations to a single LAN running at 10 megabits per second (Mbps). The two secondary goals are to provide sufficient fault tolerance for a single cable break to occur without affecting the entire network and to provide resistance to the electromagnetic interference (EMI) generated by machinery in the building. The earlier design calls for a Thin Ethernet LAN with all of the computers connected to a single coaxial cable segment. Which of the following statements about the proposal is true?
The solution achieves neither the primary goal nor either of the secondary goals.
The solution achieves the primary goal but neither of the secondary goals.
The solution achieves the primary goal and one of the secondary goals.
The solution achieves the primary goal and both of the secondary goals.
Ed is a network consultant who has been contracted to design the network for a new manufacturing plant. The plant consists of two buildings 150 meters apart: an office with 20 computers and a manufacturing facility that has 30 computers. The two most distant computers at the site are 225 meters apart. Ed's design calls for a Gigabit Ethernet network using fiber-optic cable. On receiving the proposal, the client asks Ed to justify the additional labor and expense of installing fiber-optic cable instead of Unshielded Twisted Pair (UTP). Which of the following is not a valid reason for choosing fiber optic over UTP for this project?
The 225-meter distance between the two most distant computers exceeds Ethernet's maximum cable segment length for UTP.
Only fiber-optic cable can keep the two buildings electrically isolated.
Fiber-optic cable is completely resistant to any electromagnetic interference generated by the equipment in the manufacturing plant.
Fiber-optic cable provides a greater degree of tolerance to cable breaks than UTP.
In the 100Base-TX specification, which of the following are the functions of the Fast Link Pulse (FLP) signals exchanged by switches and network interface adapters? (Choose all that apply.)
The FLP signals verify the integrity of the connection (or link) between the devices.
The FLP signals enable the devices to negotiate the speed of the link between them.
The FLP signals indicate when a collision has occurred.
The devices use FLP signals to detect bad frames.
Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable?
10GBase-LR
10GBase-CX4
10GBase-ER
10GBase-LX4
10GBase-SR
Alice is a network consultant who has been contracted to upgrade an existing Ethernet network to Gigabit Ethernet. The network consists of 20 workstations with integrated 10Base-T/100Base-TX/1000Base-T network interface adapters. The network cabling is Category 5 (CAT5) Unshielded Twisted Pair (UTP), installed when the building was constructed. All of the workstations are connected to a single 100Base-TX switch. Which of the following options would Alice find to be a valid upgrade path to Gigabit Ethernet?
Replace the CAT5 cable with at least Category 5e (CAT5e) or Category 6 (CAT6), and leave the existing network interface adapters and switch in place.
Install a 1000Base-T network interface card in each computer, and leave the existing cables and switch in place.
Replace the CAT5 cable with at least CAT5e or CAT6, and replace the 100Base-T switch with a 1000Base-T switch.
Replace the 100Base-TX switch with a 1000Base-T switch, and leave the existing cables and network interface adapters in place.
Ralph is a network consultant with a client who wants him to design the Local Area Network (LAN) for his company's new branch office. The site consists of a building with Unshielded Twisted Pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants Ralph to install the fastest possible LAN using the existing cable. After examining the site, Ralph notes that the cable is Category 5 (CAT5), installed using a star topology, and that the individual cable runs are all less than 100 meters long. Which of the following Ethernet physical layer specifications can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?
10GBase-T
100Base-TX
1000Base-T
1000Base-LX
1000Base-SX
Which Institute of Electrical and Electronics Engineers (IEEE) standards for Ethernet support 10-megabit-per-second (Mbps) communications, and what are the correct segment limitations for each standard? (Choose all that apply.)
10Base2; segment maximum is 100 meters
10Base2; segment maximum is 185 meters
10Base5; segment maximum is 500 meters
100Base5; segment maximum is 500 meters
10Base-T; segment maximum is 100 meters
10Base-T segment maximum is 328 meters
Which of the following are Ethernet cable types that must be configured in a bus topology? (Choose all that apply.)
RG-8
RG-10
RG-14
RG-58
Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow, and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?
Upgrade to 100Base-TX and keep the existing hubs.
Upgrade to 1000Base-T and keep the existing hubs.
Upgrade to 100Base-FX and replace all of the hubs with switches.
Upgrade to 1000Base-T and replace all of the hubs with switches.
Upgrade to 100Base-SX and replace all of the hubs with switches.
Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told to use the T568B pinout standard for all of the cable connectors. Ralph gathers the materials and the tools needed to complete the task, but he is not sure about the T568B pinout. Which of the following pinouts must Ralph use when creating the patch cables?
White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
White/orange, orange, white/green, green, white/blue, blue, white/brown, brown
White/brown, white/green, white/orange, blue, white/blue, orange, green, brown
It is Ralph's first day working for a consultancy that does network cable installations. His new boss hands him a spool of Category 6 cable, a large plier-like device, and a bag of little clear plastic components and tells him to “get started on fives and tens.” What is Ralph expected to do?
Pull cable runs
Create patch cables
Attach keystone connectors
Install a patch panel
Wavelength division multiplexing is a fiber-optic technique for carrying multiple signals on a single network medium. There are several types of this technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is not one of the ways in which these types of multiplexing differ?
They use different wavelength spacings.
They carry different numbers of channels on a single medium.
They provide different amounts of signal amplification.
None of the above.
Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?
DHCP
NAT
DNS
NTP
Which of the following best defines the concept of the dual stack?
A computer with two network interface adapters
A computer with two installed operating systems
A computer with two sets of networking protocols
A computer with connections to two different network segments
Network Address Translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?
Data link
Network
Transport
Application
Which of the following is the most accurate description of the subnetting process on an IPv4 network?
You extend the IP address by adding bits for a subnet identifier.
You borrow bits from the network identifier to create a subnet identifier.
You borrow bits from the host identifier to create a subnet identifier.
You create a subnet identifier by borrowing half of the bits from the network identifier and half from the host identifier.
Which of the following IPv4 addresses are you unable to assign to a network host? (Choose all that apply.)
1.1.1.1
229.6.87.3
103.256.77.4
9.34.0.1
How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?
8
15
16
17
Which of the following are not valid IPv4 addresses in the private address space defined by RFC 1918? (Choose all that apply.)
10.16.225.1
172:33:19:7
192.168.254.77
10.255.255.255
172.15.2.9
Alice has been instructed to create an IPv4 network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
Which of the following is the default subnet mask for an IPv4 Class A network?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server?
10.0.0.0 to 10.0.255.255
169.254.0.0 to 169.254.255.255
192.168.0.0 to 192.168.0.255
224.0.0.0 to 224.0.255.255
In which IPv4 class is the address 127.0.0.1 found?
Class A
Class B
Class C
None of the above
Which of the following is a valid IPv6 address?
fe00::b491:cf79:p493:23ff
2001:0:49e6:39ff:8cf5:6812:ef56
fe00::c955:c944:acdd:3fcb
2001:0:44ef68:23eb:99fe:72bec6:ea5f
To which class does the following IPv4 address belong: 190.126.14.251?
Class A
Class B
Class C
Class D
Classless Inter-Domain Routing (CIDR) is a standard for IPv4 addressing that includes the ability to create subnets using any number of IP address bits, rather than using 8-bit blocks. Which of the following terms describes this ability?
VLSM
APIPA
VLAN
EUI-64
Ralph has been instructed to use the network address 10.12.0.0/14 for the new network he is installing. What subnet mask value should he use when configuring his computers?
255.248.0.0
255.252.0.0
255.254.0.0
255.255.248.0
255.255.252.0
255.255.254.0
Ed has been hired to design a company's network. The company has an assigned Class C network address of 192.168.30.0. Ed's client wants the network to be configured with 10 subnets, each with 14 hosts. Is this configuration possible with the given address, and if so, how many subnets and hosts can Ed create on the network?
Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.
No, this will not work. A Class C address cannot be subnetted to create 8 subnets.
No, this will not work. Although there are sufficient bits available to create 10 subnets, there are not enough bits left over for Ed to create 14 hosts per subnet.
Yes, this will work. Ed can create 10 subnets with 14 hosts per subnet. By using 3 subnet bits, he can create 10 subnets, which leaves 5 bits to create up to 30 hosts per subnet.
What is the greatest number of subnets you can create with a Class A IPv4 address if you use a 14-bit subnet identifier?
256
1,022
1,024
16,382
16,384
Alice has been asked to design her company's Internet Protocol (IPv4) addressing scheme. The company has been assigned a Class C network address of 192.168.30.0. Alice's director wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new subnet mask be for this network?
3 subnet bits, 5 host bits, and subnet mask 255.255.255.240
4 subnet bits, 3 host bits, and subnet mask 255.255.255.248
3 subnet bits, 5 host bits, and subnet mask 255.255.255.224
5 subnet bits, 3 host bits, and subnet mask 255.255.255.192
A network interface adapter in a workstation has a hexadecimal MAC address of 001F9EFC7AD0. Which of the following would be the adapter's IPv6 link local address based on its EUI-64 value?
FE80::001F:9EFF:FEFC:7AD0
FE80::FFFE:021F:9EFC:7AD0
FE80::FF00:1F9E:FC7A:D0FE
FE80::021F:9EFF:FEFC:7AD0
The default mask for a IPv4 Class B network is 255.255.0.0. How many subnet bits do you need to create 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?
10 subnet bits with a subnet mask of 255.255.255.192
9 subnet bits with a subnet mask of 255.255.255.128
10 subnet bits with a subnet mask of 255.255.224.0
11 subnet bits with a subnet mask of 255.255.255.192
What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?
142
144
4,094
4,096
Ralph has an IPv4 Class B network with a subnet mask of 255.255.248.0. How many subnets can he create, and how many hosts can he create per subnet?
64 subnets and 2046 hosts
32 subnets and 2046 hosts
30 subnets and 1022 hosts
62 subnets and 1022 hosts
Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?
192.168.1.33 through 192.168.1.63
192.168.1.33 through 192.168.1.62
192.168.1.34 through 192.168.1.62
192.168.1.34 through 192.168.1.63
Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?
510
512
1022
1024
Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?
Class A
Class B
Class C
Class D
Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?
Class A
Class B
Class C
Class D
Class E
Which of the following is an address that you can assign to a host on a private IPv4 network?
192.167.9.46
172.16.255.255
10.1.0.253
225.87.34.1
Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?
255.255.224.0
255.255.240.0
255.255.248.0
255.255.255.224
255.255.255.240
Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?
192.168.2.32 to 192.168.2.55
192.168.2.33 to 192.168.2.46
192.168.2.33 to 192.168.2.40
192.168.2.1 to 192.168.2.254
Which of the following IPv4 addresses is available for use on a network device?
1.0.0.1
127.98.127.0
234.9.76.32
240.65.8.124
Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?
Link local
Global unicast
Site local
Anycast
When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)
A unique port number
A common public IPv4 address
A common port number
A unique public IPv4 address
Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?
EUI-64
SLAAC
APIPAv6
DHCPv6
Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)
Teredo
IPsec
ICMPv6
6to4
Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?
To obtain the prefix needed to generate a link-local address
To learn the IPv6 address of the nearest router
To perform address conflict detection for its link-local address
To encapsulate IPv4 packets and transmit them over the router
Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)
An IP address assigned to a host workstation by a DHCP server
A public IP address substituted for a host's own private IP address by a NAT router
An IP address assigned to a host workstation by APIPA
An IP address assigned to a virtual NIC
Which of the following is the best definition of a subinterface?
A logical network interface created from a physical network interface
One of the ports on a physical network interface adapter with multiple ports
A physical network interface connected to a subnet
One of the IP addresses associated with a network interface that has multiple IP addresses
Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?
110 and 25
143 and 25
110 and 143
80 and 110
25 and 80
Which of the following server applications use two well-known port numbers during a typical transaction?
NTP
SNMP
HTTP
FTP
Which of the following protocols does the Ping utility use to exchange messages with another system?
UDP
TCP
ICMP
IGMP
Which of the following components does the port number in a transport layer protocol header identify?
A transport layer protocol
An application
A gateway
A proxy server
Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?
Institute for Electronic and Electrical Engineers (IEEE)
Internet Assigned Numbers Authority (IANA)
Internet Engineering Task Force (IETF)
International Organization for Standardization (ISO)
Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?
22
20
80
443
The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?
25
80
110
443
What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?
MSS
Window
MMS
WinMS
What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?
Socket
OUI
Well-known port
Network address
Domain
Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)
ICMP
IGMP
SMTP
SNMP
Which of the following protocols is used to exchange directory service information?
RDP
LDAP
SNMP
SMB
Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)
110
25
587
993
995
Which of the following is not a port number used for Structured Query Language (SQL) communications?
1433
1521
3306
3389
Which of the following port numbers is assigned to a Unix logging services program?
389
514
636
993
Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?
HTTP
HTML
SMTP
FTP
Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?
DHCP
BOOTP
DNS
SNMP
Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)
Ethernet
IP
TCP
UDP
What is the native file sharing protocol used on all Microsoft Windows operating systems?
Hypertext Transfer Protocol (HTTP)
Network File System (NFS)
File Transfer Protocol (FTP)
Server Message Block (SMB)
Lightweight Directory Access Protocol (LDAP)
When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?
ACK
FIN
PSH
SYN
URG
Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?
Synchronization
Initialization exchange
Connection establishment
Three-way handshake
Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)
65
66
67
68
69
Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?
The port number indicates to the receiver that the sender can activate a specific port only.
The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.
The port number is used only by the receiver, to indicate the application process running on the sender.
The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.
What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
1023 through 65534
1 through 1024
49152 through 65535
1024 to 49151
Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all that apply.)
UDP does not use packet sequencing and acknowledgments.
UDP uses packet sequencing and acknowledgments.
UDP is a connection-oriented protocol.
UDP is a connectionless protocol.
UDP has an 8-byte header.
UDP has a 20-byte header.
Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)
21
23
20
53
69
Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?
TCP
HTTP
UDP
ARP
What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?
1024 through 49151
1 through 49151
49152 through 65534
1 through 1023
Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)
SNMP
SMTP
POP3
IMAP
RIP
Which of the following values could a web client use as an ephemeral port number when communicating with a web server?
1
23
80
1024
1999
50134
Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?
TCP
HTTP
UDP
IP
Which of the following protocols is limited to use on the local subnet only?
Address Resolution Protocol (ARP)
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP)
Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?
TLS://
HTTPS://
HTTP://
HTLS://
What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)
The connection between the web browser and the server is encrypted.
The browser uses a different port number to connect to the server.
The connection uses SSL or TLS instead of HTTP.
The browser uses a different IP address to connect to the server.
You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.com has been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website?
Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?
ESP
SSL
AH
MSCHAP
Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)
SSH
AH
ESP
SSL
What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?
Lack of security
Slow file transfers
File size limitations
Lack of authentication
Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?
FTP
FTPS
SFTP
TFTP
Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?
FTP
FTPS
SFTP
TFTP
Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?
ESP
SSL
AH
MSCHAP
Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?
SSL
TLS
SSH
DTLS
Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?
SSH
SSL
RDP
IPsec
In which of the following DNS transactions does the querying system generate a recursive query? (Choose all that apply.)
A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution.
A client's DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.
A client's DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain.
A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP's DNS server for resolution.
A client's DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www.
Which of the following devices would you most likely configure to function as a Dynamic Host Configuration Protocol (DHCP) server?
A wireless router
An unmanaged switch
A hub
A bridge
Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)
Dynamic Host Configuration Protocol (DHCP)
Address Resolution Protocol (ARP)
Domain Name System (DNS)
File Transfer Protocol (FTP)
Bootstrap Protocol (BOOTP)
Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?
MX
AAAA
CNAME
PTR
Which of the following features is supported by DHCP, but not by BOOTP and RARP?
Dynamic address allocation
Relay agents
Manual address allocation
Automatic address allocation
Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address allocation transaction? (Choose all that apply.)
DHCPDISCOVER
DHCPOFFER
DHCPINFORM
DHCPACK
DHCPREQUEST
DHCPNAK
DHCPRENEW
DHCPRELEASE
Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)
DHCPDISCOVER
DHCPOFFER
DHCPINFORM
DHCPACK
DHCPREQUEST
DHCPNAK
DHCPRENEW
DHCPRELEASE
Which of the following is not a protocol used to allocate IP address assignments to clients on a network?
ARP
RARP
BOOTP
DHCP
Which of the following best describes what happens when a DNS server receives an iterative name resolution query?
The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.
The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by issuing its own iterative queries to other DNS servers.
The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by forwarding the name resolution request to another DNS server in a recursive query.
The DNS server responds immediately if it is the authoritative server for the domain in which the requested name is located. Otherwise, it returns an error message stating that it could not resolve the requested name.
What is the term used to refer to the DNS client mechanism that generates name resolution queries and sends them to DNS servers?
Requestor
Forwarder
Authority
Resolver
Which of the following TCP/IP parameters, configured on an end system, specifies the IP address of a device that performs domain name resolution services?
WINS Server Addresses
Default Gateway
DNS Server Addresses
Subnet Gateway
Which IP address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)?
Manual
Dynamic
Stable
Automatic
On a Dynamic Host Configuration Protocol (DHCP) server, what is the name of the element you create to specify which IP addresses the server should assign to clients?
Range
Scope
Pool
Subnet
Why is it necessary to use a relay agent to enable a Dynamic Host Configuration Protocol (DHCP) server to assign IP addresses to clients on other networks? (Choose all that apply.)
Because DHCP requires a separate license for each subnet.
Because clients cannot initiate an address assignment by contacting DHCP servers on other networks directly.
Because DHCP must use the Transmission Control Protocol (TCP) to communicate with clients.
Because the DHCP address assignment process relies on broadcast transmissions.
Which of the following Domain Name System (DNS) resource records is used to resolve a hostname into an IPv6 address?
MX
PTR
AAAA
CNAME
Ralph has configured a server called NE6 to function as a web server. He does not want to change the server's existing name, but he wants it to also be accessible to clients using the name www
. What Domain Name System (DNS) modification can Ralph make to accomplish this?
Create an additional A resource record.
Create a new CNAME resource record.
Modify the existing A resource record.
Create a new PTR resource record.
Which of the following options should you configure on a Dynamic Host Configuration Protocol (DHCP) server to supply clients with a default gateway address?
Router
Time Server
Name Server
LPR Server
Dynamic Host Configuration Protocol (DHCP) clients rely on which of the following types of transmissions to locate and initiate contact with DHCP servers on the local network?
Unicast
Broadcast
Multicast
Anycast
Which of the following Domain Name System (DNS) resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?
NS
PTR
MX
SRV
SOA
TXT
Which of the following must you create on a DHCP server if you want it to always assign the same IP address to a particular computer?
Exclusion
Scope
Reservation
Relay
Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?
Automatic
Dynamic
Manual
Static
Which of the following technologies enables the IP addresses assigned to clients by a Dynamic Host Configuration Protocol (DHCP) server to be automatically added to the DNS namespace?
Reverse name resolution
Dynamic DNS
Automatic allocation
HOSTS
Which of the following is a tool that integrates DHCP and DNS so that each is aware of the changes made by the other?
HOSTS
DHCPv6
IPAM
APIPA
Which of the following is the term used to describe the logical distance of a Network Time Protocol (NTP) server from the time source to which it is synchronized?
Layer
Path
Iteration
Stratum
Which of the following protocols is used to synchronize computer clocks to a time signal provided by a server?
TFTP
HTTP
SMTP
NTP
Which of the words in the fully qualified domain name (FQDN) www.paris.mydomain.org represents the topmost layer in the DNS namespace hierarchy?
www
paris
mydomain
org
Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?
Interface MTU
Default IP TTL
ARP cache timeout
TCP keepalive interval
In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server? (Choose all that apply.)
Company database servers
Internet web servers
Incoming email servers
Domain controllers
Ralph is concerned that the IP address scope of available leases on his DHCP server is nearly exhausted. What happens to DHCP clients when there are no IP addresses left in the scope for assignment?
Clients are assigned a 0.0.0.0 address.
Clients self-assign APIPA addresses.
Client DHCP requests are forwarded to another DHCP server.
Clients are forced to share IP addresses.
Alice is the administrator of a subnet for which she has been allotted 100 IP addresses. She has installed a DHCP server with a scope containing all 100 available addresses for lease. There are currently 99 clients configured to use the DHCP server, many of which are mobile devices, and Alice fears that systems frequently leaving and rejoining the network might cause the scope of available leases to be exhausted. Which of the following adjustments can help to prevent this from happening?
Increase the lease time for the scope.
Decrease the lease time for the scope.
Install a second DHCP server.
Create a second scope for the subnet.
DHCP clients use broadcast messages to contact a DHCP server on the local subnet. Which of the following are mechanisms by which DHCP broadcast messages can be forwarded to a DHCP server on another subnet when there is none on the local subnet? (Choose all that apply.)
DHCP relay
UDP forwarding
Zone transfer
IP helper
Which of the following mechanisms enables administrators to maintain current DNS database information on multiple name servers, for fault tolerance and load balancing purposes?
Multi-master replication
UDP forwarding
Iterative query
Zone transfer
Which of the following Storage Area Network (SAN) protocols are capable of sharing a network medium with standard Local Area Network (LAN) traffic? (Choose all that apply.)
iSCSI
Fibre Channel
FCoE
InfiniBand
Which of the following protocols is not used for Storage Area Networks (SANs)?
iSCSI
FCoE
VoIP
Fibre Channel
Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?
Active Directory
ICMP
DNS
iWINS
iSNS
What is the highest possible data transfer rate on a Storage Area Network (SAN) using Fibre Channel?
8 Gbps
16 Gbps
32 Gbps
128 Gbps
256 Gbps
In its primary functionality, a network attached storage (NAS) device is most closely associated with which of the following devices?
Failover cluster
File server
JBOD
RAID
Which of the following statements about the differences between Network Attached Storage (NAS) and Storage Area Networks (SANs) are true? (Choose all that apply.)
NAS provides file-level storage access, whereas SAN provides block-level storage access.
NAS devices typically contain integrated iSCSI targets.
SAN devices have an operating system, whereas NAS devices do not.
NAS devices typically provide a filesystem, whereas SAN devices do not.
Which of the following statements specify advantages of FCoE over the original Fibre Channel standard? (Choose all that apply.)
FCoE is less expensive to implement than Fibre Channel.
FCoE can share a network with standard IP traffic, whereas Fibre Channel cannot.
FCoE is routable over IP networks, whereas Fibre Channel is not.
FCoE uses standard Ethernet networking hardware.
Which of the following are application layer protocols that Network Attached Storage (NAS) devices can use to serve shared files to clients on the network? (Choose all that apply.)
CIFS
NFS
RDMA
HTTP
Which of the following is not one of the advantages of iSCSI over Fibre Channel? (Choose all that apply.)
iSCSI is routable, whereas Fibre Channel is not.
iSCSI is less expensive to implement than Fibre Channel.
iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.
iSCSI can share the same network as standard local area network traffic, whereas Fibre Channel cannot.
Which of the following Storage Area Network (SAN) technologies is primarily used by supercomputers as a high-speed, low-latency connection between Central Processing Units (CPUs) and storage systems?
InfiniBand
Fibre Channel
iSCSI
FCoE
Which of the following is the term for the client that accesses an iSCSI device on a storage area network?
Initiator
Target
Controller
Adapter
Which of the following protocols are included in an iSCSI packet? (Choose all that apply.)
Ethernet
IP
TCP
UDP
None of the above
Which of the following protocols are included in a Fibre Channel packet?
Ethernet
IP
TCP
UDP
None of the above
Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model?
iSCSI
Fibre Channel
PPP
RDMA
Which of the following protocols are included in an FCoE packet?
Ethernet
IP
TCP
UDP
None of the above
Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?
Ethernet
IP
Fibre Channel
iSCSI
Which of the following is not the name of one of the layers in the three-tier datacenter architecture?
Core
Intermediate
Distribution
Access
Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?
The leaf and spine arrangement uses a full mesh switching topology.
In a leaf and spine topology, all data flows require the same number of hops.
The leaf and spine topology is less expensive to implement than the three-tier topology.
The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
Which of the following best describes the difference between east-west and north-south traffic in a datacenter?
East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.
East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.
East-west traffic stays within the datacenter, while north-south traffic does not.
East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.
Top-of-rack switches most commonly form which layer of the datacenter topology?
Leaf
Backbone
Spine
Core
Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?
Application
Control
Infrastructure
Core
In a Software Defined Network (SDN), as defined in the RFC 7426 specification, a plane is a set of resources related to a particular function. Which of the following is not one of the five planes defined in the SDN architecture?
Forwarding
Operational
Control
Management
Infrastructure
Application
Ralph is designing the datacenter for his company's new branch office. He is considering various options, including building a new datacenter at the branch office facility, using a colocated datacenter, and creating a virtual datacenter using a public cloud provider. Which of the following statements about the differences between these options are true? (Choose all that apply.)
A colocated datacenter would be less expensive to implement than a branch office or public cloud datacenter.
In a branch office or colocated datacenter, Ralph's company would own the hardware.
In all three datacenter options, the administrators in Ralph's company would be responsible for setting up and managing the hardware.
In a branch office or colocated datacenter, Ralph's company would be responsible for all utility costs, including heating, cooling, and power.
A public cloud datacenter would have greater physical security than the other two options.
A public cloud datacenter is easier to expand than a colocated or branch office datacenter
Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?
IaaS
PaaS
SaaS
DaaS
All of the above
When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?
IaaS
PaaS
SaaS
DaaS
None of the above
Which of the following cloud service models provides the consumer with the most control over the cloud resources?
IaaS
PaaS
SaaS
DaaS
IaaS, PaaS, SaaS, and DaaS all provide the same degree of control.
Alice has just created a new Windows Server 2016 virtual machine using remote controls provided by a cloud service provider on the Internet. Which of the following cloud architectures is she using? (Choose all that apply.)
IaaS
PaaS
SaaS
Public cloud
Private cloud
Hybrid cloud
Community cloud
In which of the following cloud models can a single organization function as both the provider and the consumer of all cloud services?
Public cloud
Private cloud
Hybrid cloud
Ad hoc cloud
Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?
Cloud busting
Cloud bursting
Cloud splitting
Cloud migrating
Microsoft's Outlook.com email service is an example of which of the following cloud service models?
IaaS
PaaS
SaaS
DaaS
None of the above
Which of the following statements about cloud delivery models is true?
A public cloud is inherently insecure because anyone can access it.
A private cloud consists of hardware that is all located in a single datacenter.
A hybrid cloud enables administrators to migrate services between public and private resources.
Public, private, and hybrid clouds all utilize the same hardware resources.
Ed has just created a new Windows application for his company, and he wants to deploy it in the public cloud. He is looking for a provider that will furnish his company with a fully installed and configured Windows server on which he can install and run his application. Which of the following service models is he seeking to use?
IaaS
PaaS
SaaS
DaaS
None of the above
Which of the following are valid advantages or disadvantages of multitenancy in a public cloud datacenter? (Choose all that apply.)
Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.
Multitenancy reduces the cost of utilities and other overhead.
Multitenancy introduces the possibility of competition for bandwidth with other tenants.
Multitenancy separates tenants by assigning each one its own virtual machine.
Which of the following is not one of the advantages of Infrastructure as Code (IaC) deployment for cloud-based virtual machines?
IaC provides rapid deployment of virtual machine configurations.
IaC provides consistency in virtual machine configurations.
IaC provides cost savings by automating the virtual machine configuration process.
IaC provides increased security by encrypting the virtual machine configuration
IaC provides elasticity and scalability by simplifying the virtual machine deployment process.
Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client's private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?
Use a different ISP for the cloud connection.
Use a VPN for the cloud connection.
Use a cloud direct connection for the hybrid link.