Appendix A
Answers to Written Labs

Chapter 1: Introduction to Networks

  1. Bus, ring, and star
  2. Multiprotocol Label Switching (MPLS)
  3. Server
  4. Client-server
  5. Point-to-point
  6. Hub or switch
  7. Multiprotocol Label Switching (MPLS)
  8. Wide area network
  9. A segment
  10. Bus

Chapter 2: The Open Systems Interconnection Specifications

  1. The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses).
  2. The Physical layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium.
  3. The Network layer provides routing through an internetwork and logical addressing.
  4. The Presentation layer makes sure that data is in a readable format for the Application layer.
  5. The Session layer sets up, maintains, and terminates sessions between applications.
  6. Protocol data units (PDUs) at the Data Link layer are called frames. As soon as you see the word frame and/or the term physical addressing in a question, you know the answer is always Data Link layer.
  7. The Transport layer uses virtual circuits to create a reliable connection between two hosts.
  8. The Network layer provides logical addressing, IP and/or IPv6 addressing, and routing.
  9. The Physical layer is responsible for the electrical and mechanical connections between devices.
  10. The Data Link layer is responsible for the framing of data packets.

Chapter 3: Networking Connectors and Wiring Standards

  1. Category 6
  2. Demarcation point, or demarc
  3. Crossover
  4. RG-6
  5. Category 5e
  6. Straight-through
  7. To connect two CSU/DSUs
  8. 1, 2, 3, and 6
  9. 1 to 3 and 2 to 6
  10. It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles).

Chapter 4: The Current Ethernet Specifications

  1. Decimal1286432168421Binary
    1921100000011000000
    1681010100010101000
    100000101000001010
    150000111100001111
  2. Decimal1286432168421Binary
    1721010110010101100
    160001000000010000
    200001010000010100
    550011011100110111

  3. Decimal1286432168421Binary
    100000101000001010
    110000101100001011
    120000110000001100
    990110001101100011
  4. Binary1286432168421Decimal
    1100110011001100204
    001100110011001151
    1010101010101010170
    010101010101010185
  5. Binary1286432168421Decimal
    1100011011000110198
    1101001111010011211
    001110010011100157
    1101000111010001209
  6. Binary1286432168421Decimal
    1000010010000100132
    1101001011010010210
    1011100010111000184
    1010011010100110166

  7. Binary1286432168421Hexadecimal
    1101100011011000D8
    00011011000110111B
    00111101001111013D
    011101100111011076
  8. Binary1286432168421Hexadecimal
    1100101011001010CA
    1111010111110101F5
    100000111000001183
    1110101111101011EB
  9. Binary1286432168421Hexadecimal
    100001001000010084
    1101001011010010D2
    010000110100001143
    1011001110110011B3

Chapter 5: Networking Devices

DescriptionDevice or OSI layer
This device sends and receives information about the Network layer.Router
This layer creates a virtual circuit before transmitting between two end stations.Transport
A Layer 3 switch or multilayer switch.Router
This device uses hardware addresses to filter a network.Bridge or switch
Ethernet is defined at these layers.Data Link and Physical
This layer supports flow control and sequencing.Transport
This device can measure the distance to a remote network.Router
Logical addressing is used at this layer.Network
Hardware addresses are defined at this layer.Data Link (MAC sublayer)
This device creates one big collision domain and one large broadcast domain.Hub
This device creates many smaller collision domains, but the network is still one large broadcast domain.Switch or bridge
This device can never run full-duplex.Hub
This device breaks up collision domains and broadcast domains.Router

Chapter 6: Introduction to the Internet Protocol

  1. This would be a layer 2 broadcast, or FF:FF:FF:FF:FF:FF.
  2. FTP uses both TCP ports 20 and 21 for the data channel and the control channel, respectively.
  3. Both TCP and UDP! A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions. Notice that DNS uses both TCP and UDP. Whether it opts for one or the other depends on what it's trying to do.
  4. ICMP uses IP directly to build error-reporting packets that are transmitted back to the originating source host when issues arise during the delivery of data packets. ICMP is also used during Ping and some Traceroute operations.
  5. Quite simply, the service might not be running currently on that server. Another possibility might be that a firewall between the client and the server has blocked the protocol in question from passing.
  6. RDP uses port 3389.
  7. MGCP uses ports 2427 and 2727.
  8. ICMP is the protocol that the ping and tracert commands rely on. If you're having trouble getting pings and traceroutes through a router, you might need to check if ICMP is being allowed through.
  9. TFTP servers respond to UDP messages sent to port 69.
  10. SMTP uses TCP port 25, POP3 uses TCP port 110, RDP uses TCP port 3389, and IMAP4 uses TCP port 143.

Chapter 7: IP Addressing

Written Lab 7.1

  1. The class C private range is 192.168.0.0 through 192.168.255.255.
  2. IPv6 has the following characteristics, among others, that make it preferable to IPv4: more available addresses, simpler header, options for authentication, and other security.
  3. Automatic Private IP Addressing (APIPA) is the technology that results in hosts automatically configuring themselves with addresses that begin with 169.254.
  4. An IP address assigned to an interface, considered a one-to-one communication.
  5. One-to-many address
  6. A MAC address, sometimes called a hardware address or even a burned-in address
  7. IPv6 has 128-bit (16-octet) addresses, compared to IPv4's 32-bit (4-octet) addresses, so 96 more bits than IPv4.
  8. 172.16.0.0 through 172.31.255.255
  9. 192–223, 110xxxxx
  10. Loopback or diagnostics. Actually, the full range of 127.0.0.1 through 127.255.255.254 is referred to as the loopback address.

Written Lab 7.2

  1. Unicast
  2. Global unicast
  3. Link-local
  4. Unique local (used to be called site-local)
  5. Multicast
  6. Anycast
  7. Anycast
  8. ::1
  9. FE80::/10
  10. FC00::/7

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT

  1. 192.168.100.25/30. A /30 is 255.255.255.252. The valid subnet is 192.168.100.24, broadcast is 192.168.100.27, and valid hosts are 192.168.100.25 and 26.
  2. 192.168.100.37/28. A /28 is 255.255.255.240. The fourth octet is a block size of 16. Just count by 16s until you pass 37. 0, 16, 32, 48. The host is in the 32 subnet, with a broadcast address of 47. Valid hosts are 33–46.
  3. 192.168.100.66/27. A /27 is 255.255.255.224. The fourth octet is a block size of 32. Count by 32s until you pass the host address of 66. 0, 32, 64. The host is in the 64 subnet, broadcast address of 95. The valid host range is 65–94.
  4. 192.168.100.17/29. A /29 is 255.255.255.248. The fourth octet is a block size of 8. 0, 8, 16, 24. The host is in the 16 subnet, broadcast of 23. Valid hosts are 17–22.
  5. 192.168.100.99/26. A /26 is 255.255.255.192. The fourth octet has a block size of 64. 0, 64, 128. The host is in the 64 subnet, broadcast of 127. Valid hosts are 65–126.
  6. 192.168.100.99/25. A /25 is 255.255.255.128. The fourth octet is a block size of 128. 0, 128. The host is in the 0 subnet, broadcast of 127. Valid hosts are 1–126.
  7. A default Class B is 255.255.0.0. A Class B 255.255.255.0 mask is 256 subnets, each with 254 hosts. We need fewer subnets. If we use 255.255.240.0, this provides 16 subnets. Let's add one more subnet bit. 255.255.248.0. This is 5 bits of subnetting, which provides 32 subnets. This is our best answer, a /21.
  8. A /29 is 255.255.255.248. This is a block size of 8 in the fourth octet. 0, 8, 16. The host is in the 8 subnet, and broadcast is 15.
  9. A /29 is 255.255.255.248, which is 5 subnet bits and 3 host bits. This is only 6 hosts per subnet.
  10. A /23 is 255.255.254.0. The third octet is a block size of 2. Starting at 0, 2, 4. The host is in the 16.2.0 subnet; the broadcast address is 16.3.255.

Chapter 9: Introduction to IP Routing

  1. False. RIP and RIPv2 are both distance-vector protocols.
  2. False. RIP and RIPv2 are both distance-vector protocols.
  3. False. EIGRP was created by Cisco as a proprietary routing protocol; however, it is no longer proprietary.
  4. Autonomous system
  5. RIP does not work well in large networks, so OSPF would be the best answer, and both RIP and OSPF are nonproprietary.
  6. Static routing
  7. The MAC address of your default gateway (router)
  8. The IP address of the server
  9. The MAC address of the router sending the frame to the server
  10. The IP address of the server

Chapter 10: Routing Protocols

  1. 120
  2. 90
  3. 120
  4. 1
  5. RIPng (Next Generation).
  6. OSPFv3
  7. EIGRPv6
  8. When you need to connect two autonomous systems (ASs) together
  9. When all your routers are Cisco routers and you want easy configuration
  10. Distance vector

Chapter 11: Switching and Virtual LANs

  1. Broadcast
  2. Collision
  3. Trunking allows you to send information about many or all VLANs through the same link. Access ports allow information about only one VLAN transmitted.
  4. Power over Ethernet (PoE)
  5. The VLAN port membership is set wrong.
  6. Flood the frame out all ports except the port on which it was received.
  7. Address learning, filtering, and loop avoidance
  8. It will add the source MAC address to the forward/filter table.
  9. Spanning Tree Protocol (STP)
  10. Create a VLAN for contractors and another VLAN for guests.

Chapter 12: Wireless Networking

  1. 11 Mbps
  2. 54 Mbps
  3. 54 Mbps
  4. 2.4 GHz
  5. 2.4 GHz
  6. 5 GHz
  7. 1 Gbps
  8. The values of WPA keys can change dynamically while the system is being used.
  9. The IEEE 802.11i standard has been sanctioned by WPA and is called WPA version 2.
  10. Three

Chapter 13: Using Statistics and Sensors to Ensure Network Availability

DescriptionTerm
The percentage of time the CPU spends executing a non-idle thread.Processor\% Processor Time
The amount of physical memory in megabytes currently available.MemoryAvailable Mbytes
The percentage of bandwidth the NIC is capable of that is currently being used.Network InterfaceBytes Total/Sec
The delay typically incurred in the processing of network data.Latency
Occurs when the data flow in a connection is not consistent; that is, it increases and decreases in no discernable pattern.Jitter
Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.SNMPv2
Sent by SNMP agents to the NMS if a problem occurs.SNMP trap
Identifier mechanism standardized by the International Telecommunications Union (ITU) and ISO/IEC for naming any object, concept, or “thing” with a globally unambiguous persistent name.Object identifiers (OIDs)
Hierarchical structure into which SNMP OIDs are organized.Management information bases (MIBs)
Refers to the standard level of performance of a certain device or to the normal operating capacity for your whole network.Baseline
Centralizes and stores log messages and can even time-stamp and sequence them.Syslog
Provides real-time analysis of security alerts generated by network hardware and applications.SIEM
Errors that mean packets have been damaged.CRC errors

Chapter 14: Organizational Documents and Policies

StepPlan
Utilization of three network interfaces on the DNS serverBusiness continuity plan
Phased introductions of security patchesChange management plan
Degaussing of all discarded hard drivesSystem life cycle plan
Security issue escalation listIncident response plan
System recovery priority chartDisaster recovery plan

Chapter 15: High Availability and Disaster Recovery

DefinitionTerm
Technique used to spread work out to multiple computers, network links, or other devicesLoad balancing
Allows multiple network interfaces to be placed into a team for the purposes of bandwidth aggregationNIC teaming
Devices that can immediately supply power from a battery backup when a loss of power is detectedUPS
A leased facility that contains all the resources needed for full operationHot site
A Cisco proprietary FHRPHSRP

Chapter 16: Common Security Concepts

Authentication MethodTerm
Utilizes the connection-based TCP protocol.TACACS+
When a user logs into the domain, the domain controller issues them an access token.Single sign-on
The user's local account and password are verified with the local user database.Local authentication
Defines a framework for centralized port-based authentication.802.1X
Combines user authentication and authorization into one profile.RADIUS

Chapter 17: Common Types of Attacks

AttackCountermeasure
Shoulder surfingPrivacy filters
PiggybackingLive guards
TailgatingAccess control vestibule/mantrap
PhishingSecurity awareness training
Brute-force attackAccount lockout policy

Chapter 18: Network Hardening Techniques

Authentication MethodTerm
Method of blocking rogue router advertisementsRA Guard
Can prevent many on-path/man-in-the-middle attacksDAI
Can limit network access on a port to a single (or in the case of an IP phone, two) MAC addressPort security
Carries signaling traffic originating from or destined for a routerControl plane
Carries user trafficData plane

Chapter 19: Remote Access Security

TermDefinition
Clientless VPNRequires only a browser that can perform SSL/TLS.
Full tunnelAll traffic goes through the VPN, including Internet traffic.
Site-to-site VPNAll traffic goes through the VPN tunnel.
Split tunnelOnly traffic to the office goes through the VPN. Internet traffic does not
Client-to-site VPNOnly the traffic between the user and the office will go through the tunnel.

Chapter 20: Physical Security

TermDefinition
PurgingMakes the data unreadable even with advanced forensic techniques.
ClearingWith this method, the data is only recoverable using special forensic techniques.
DestructionBreaking the media apart or chemically altering it.
OverwritingWrites data patterns over the entire media, thereby eliminating any trace data.

Chapter 21: Data Center Architecture and Cloud Concepts

  1. Leaf, spine
  2. East-West
  3. Automation
  4. Automation
  5. Elasticity
  6. A baseline
  7. Crossover
  8. Cloud computing
  9. Virtual servers, virtual switches, virtual desktops, Software as a Service (SaaS), and Network as a Service (NaaS)
  10. Infrastructure as Code (IaC)

Chapter 22: Ensuring Network Availability

  1. CPU and memory
  2. Baseline
  3. Syslog
  4. Duplex
  5. Bits
  6. FTP
  7. CRC, or cyclic redundancy check
  8. Giant
  9. NetFlow
  10. SNMP, or Simple Network Management Protocol

Chapter 23: Cable Connectivity Issues and Tools

  1. True
  2. True
  3. True
  4. True
  5. False
  6. Certifiers
  7. False
  8. Temperature monitor
  9. Voltage event recorder
  10. Crimper

Chapter 24: Network Troubleshooting Methodology

  1. Test the theory to determine cause.
  2. Document findings, actions, outcomes, and lessons learned.
  3. By twisting the wire pairs together
  4. IP addressing
  5. Crossover
  6. Attenuation
  7. Establish a plan of action to resolve the problem and identify potential effects.
  8. Implement the solution or escalate as necessary.
  9. Routing problems
  10. Incorrect pinout, transceiver mismatch, crosstalk, and attenuation

Chapter 25: Network Software Tools and Commands

  1. traceroute or tracert
  2. Throughput tester/bandwidth speed tester
  3. ipconfig /all
  4. Telnet
  5. route
  6. FTP
  7. nslookup
  8. netstat -n
  9. ifconfig
  10. route print
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.103.15