SOAL DAN JAWABAN UJIAN SERTIFIKASI MTA FUNDAMENTAL NETWORKING

 SOAL UJIAN SERTIFIKASI MTA FUNDAMENTAL NETWORKING




HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7 of the OSI model

Answer 1

 Jawab: yes

                                       

Layer 3 of the OSI model controls routing between network devices

Jawab:  yes( network)

 

Layer 4 of the OSI model controls dialogue between computers

Jawab  : no (transport)

 

A layer 2 device that connects multiple computers within a network is a :

 

Jawab : swict

 

Which OSI layers offers reliable, connection-oriented data communication services?

 

Jawab : Transport

 

According to the OSI model, encryption takes place on the transport layer.

Select the correct answer if the underlined text does not mek the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

Jawab  : Presentation

 

The 7 OSI Layer is as follow

1. Physical
2. Data Link
3. Network
4. Transport
5. Presentation
6. Session
7. Application

Select the correct order

 

Jawab : 1, 3, 2, 4, 6, 5, 7.

 

It relies on upper layers for reliable delivery and sequencing. IPX, X.25, and NLSP operate on this layer.

Jawab  : network

 

It ensures that reassembled bits are in the correct order and it requests retransmission of frames if an error occurs.

Jawab :  transport

 

Switches and WAPs operate on this layer.

Jawab : datalink

 

It controls dialogue between source and destination nodes. RPC and NETBIOS operate on this layer

 

Jawab : sesion

 

It provides network services directly to the user's application. TELNET, SMTP, and NTP operate on this layer

 

Jawab : application

 

It checks for errors by adding CRC to the frame. Bridges and NICs operate on this layer.

 

Jawab : datalink

 

It is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP, and ARP operate on this layer.

 

Jawab : network

 

topologi

 

 

Each computer is connected by a single cable.

Jawab : star

 

Each workstation acts as a repeater.

 Jawab : ring

Each computer is connected to every other computer.

Jawab : mesh

 

Each node is connected so exactly two other nodes

Jawab : ring

 

A node within a local area network (LAN) must have a network interface device and a:

 

 Jawab : Host address

 

 

 

 

Which logical topology best describes the exhibited network?

 Jawab : star

 

Which type of network covers the broadest area  ?

Jawab : wan

 

Which access method is used in a physical ring topology?

 

Jawab : Token Passing

 

Which of the following determines the media access method that is used in a network?

Jawab : Topology and Protocol

 

The topology of a local area network (LAN) is define by the?

Jawab :  Physical and Logical characteristics

 

A node within a local area network (LAN) must have a network interface device and a:

Jawab : contention & token passing

 

MAC ADDRESS

Which of the following represents a Media Access control (MAC) address ?

JAWAB : 09:53:CD:6E:A1:25

 

A Media Access Control (MAC) address identifies a/an

JAWAB : Network Interface Card (NIC)

 

Protocol that maps IP Address to a Media Access Control (MAC) address is

JAWAB : ARP

 

A network device that associate a Media Acccess Control (MAC) address with a port is a:

 

JAWAB : SWITCH

 

IP ADDRESS

To which IP configuration does the CIDR notation 192.168.1.1 /26 refer?

JAWAB : 192.168.1.1 255.255.255.192

133.234.23.2

Answer 1

Jawab : class b

 

201.111.22.3

Jawab : class c

 

224.100.20.3

Answer 1

 

Jawab : class D

 

 

64.123.12.1

Jawab : kelas A

 

Ipv4 multicast address range from 192.168.0.0 to 192.168.255.255.

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

Jawab  :  224.0.0.0 to 239.255.255.255

 

APIPA address range is 10.0.0.0 - 10.255.255.255

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

Jawab : 169.254.0.1 - 169.254.255.254

 

Each Ipv4 address consists of a MAC address and data-link layer address.

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct

 

Jawab : Network ID and a host ID

 

 

 

An IPv4 address consists of 64 bits

Jawab : no

 

The value of any IPv4 octet can be from 0 to 256

Jawab : no

 

It is standard practice to divide the binary bits of an IPv4 address into 8-bit fields name octets

Answer 3

 Jawab : yes

 

Which subnet mask is Valid ?

Jawab : 255.255.255.240

SMTP

Jawab : 25

 

 

HTTPS

Answer 2

 

Jawab : 443

FTP

Jawab : 21

Telnet

Jawab :23

 

A cable that meets the 1000BaseT standard has a maximum lenght of :

Jawab : 100m

 

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a?

 

Jawab : crossover

 

Which of these cable types transmits data the greatest distance?

Jawab : Single-mode fiber

 

The type of connector used on a 100BaseT Ethernet cable is?

Jawab : RJ-45

What are two characteristic of fiber optic cable? (Choose two.)

Jawab :

·       Supports splicing

·       Requires a polish for end connectors

 

Which technology provides the highest bit rate?

Jawab: DS3

 

A university has network links between various locations.

Where would a T3 connection be appropriate?

Jawab : Server to network in the main campus server room

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters.

An interference exists along the path of each drop.

You need to ensure that interference is reduced.

Which cable type should you use?

Jawab: STP Cat5e

 

What are two characteristics of wired Ethernet network topology? (Choose two.)

Jawab :

·       It uses network adapters physically encoded with an IP address

·       It can negotiate different transmission speeds

 

 

The four IEEE standards, 802.11a, b, g, and N, are collectively known as mobile ad hoc networks. Select the correct answer if the bolded text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

Jawab : WiFi

 

Attenuation in a wireless network signal is a result of

Jawab : Distance from the access point.

 

Which of these factors has the biggest impact on data transmission speed in a wireless

Jawab : The transmission  standard of the equipment used

 

If an 802.11g Internet connection has connectivity problems, what may be the cause

Jawab :  Electromagnetic Interference (EMI)

 

The maximum throughput of an 802.11 g network is:

Jawab :  54 Mbps

 

Which wireless authentication method provides the highest level of security?

Jawab : WiFi Protected Access (WPA)

 

Frequency range: 2.4 - 2.485 GHz

Data rate: 11 Mbps 

Jawab: 802.11b

 

Frequency range: 5.1 - 5.8 GHz

Data rate: up to 3.46 Gbps

Jawab : 802.11 ac

 

On a wireless router, an SSID is the default Administrator account

Jawab :  AP brodcast ID

 

What could happens when an 802. 11b node starts broadcasting within the range of an 802. 11g access point?

Jawab : A connection will be established

A Wireless Bridge increases the wireless signal strength of the access point.

Answer 2

Jawab : yes

Wireless bridges always work in pairs

Jawab : no

A Wireless Bridge connects Ethernet-based devices to the network

Jawab : no

 

 

 

Frequency range: 2.4 - 2.485 GHz

Data rate: 54 Mbps

Jawab : 802.11g

Frequency range: 5.1 - 5.8 GHz

Data rate: 54 Mbps

Jawab : 802.11a

 

Frequency range: 2.4 - 2.485 GHz or 5.1 - 5.8 GHz

Data rate: 65 - 600 Mbps

Jawab : 802.11n

One reason to incorporate VLANs in a network is to:

 

Jawab :  Reduce the number of nodes in a broadcast domain

In addition to switching, multilayer switches also?

Jawab :  Provide Layer 3 routing functions.

 

One reason to replace an unmanaged switch with a managed switch is to?

Jawab : Support multiple VLANS.

 

A switch sends unicast packets to one destination port only.

Jawab : yes

A switch floods ports if it does not know where to send a packet.

Answer 2

 

Jawab : yes

 

What is a similarity between Layer 2 and Layer 3 switches?

Jawab : Both allow the implementation of VLANs

 

A switch sends broadcast packets to the uplink port only.

Jawab : no

Which

What are two differences between switches and hubs? (Choose two.)

Jawab :

·       Switches are capable of sending and receiving data at the same time

·       Switches identify the intended destination of the data that they receive

What are three advantages of VLANs? (Choose three)

Jawab :

·       They require a router to connect to VLANs on another switch

·       They act as though they are on the same LAN regardless of physical location

·       They compartmentalize a network and isolate traffic

a network that allows access only to users within an organization

jawab : intranet

 

A Network that allows controlled access for specific business or educational purposes

Answer 2

 

Jawab : extranet

 

A system of interconnected networks

Jawab : internet

A/an virtual private network (VPN) protects a network’s perimeter by monitoring traffic as it  enters and leaves.

Jawab : firewall

 

What is private network that allow organizations to exchange data?

Jawab : intranet

 

Connecting to a private network address from a public network requires?

Jawab : nat

Which of the following uses a tunneling protocol ?

Jawab : vpn

Which type of network is most vulnerable to intrusion ?

Jawab : Wireless

 

A network that separates an organization's private network from a public network is a/an :

Jawab : firewall

Which technology can you use to extend an internal network across shared or public networks?

Jawab : vpn

Two Companies want to share data by using the Internet, Which type of network provides the solution ?

 

Jawab : extranet

 

One purpose of a perimeter networks is to?

Jawab : Make resources available to the Internet

 

You work at a coffee shop. Your supervisor asks you to help set up a computer network

The network needs to have the following items.

·         A public facing web server

·         A Wi-Fi network for customers

·         A private network for the point of sale terminals

·         An office PC

·         A file print server

·         A network printer

You need to set up a perimeter network to protect the network.

Which two items should you include in the perimeter network? (Choose two.)

 Jawab :

·       network printer

·       Web server

Which of the following uses a tunneling protocol ?

Jawab : vpn

Teredo tunnelling is a protocol that :

Jawab : Allows IPv6 connectivity through IPv4 devices

 

Which protocol is a application layer protocol

Jawab : ftp

 

Which protocol is responsible for automatically assigning IP addresses?

Jawab : dhcp

Which protocol can be used to encrypt packets on the internet

Jawab : https

A service that resolves NetBIOS names to IP addresses is :

Jawab : Windows Internet Name Service (WINS)

This question requires that you evaluate the underlined text to determine if it is correct.

The query protocol used to locate resources on a network is User Datagram Protocol (UDP).

Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

 

Jawab : Lightweight Directory Access Protocol (LDAP)

Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?

Jawab : DirectAccess

Which of the following is a Layer 2 WAN protocol?

 Jawab : Point to Point Protocol (PPP)

 

Resolved IP address to MAC address

 

Jawab : arp

Connectionless, message-based protocol with  best-effort service

 

Jawab : udp

 

Conncetion-oriented protocol with guarandeed service

Jawab : tcp

Which of the following are features of DHCP?

Jawab :  IP Address exclusion & Address reservation

Setting the DNS server setting to ... will allow the user's computer to look up website addresses

Jawab : obtain dns server address automaticcly

Changing the IP address settings to ... will allow Internet acces

Jawab : obrain ip address automatcly

 

When a client's DHCP-issued address expires, the client will:

Jawab : a. Attempt to obtain a new address by broadcasting.

 

If a router is installed so that it separates a DHCP server from its clients, the clients will:

Jawab :  Be unable to obtain their leases from the server.

What type of DNS record maps host names to addresses ?

Jawab : Host (A) DNS record

What is the DNS record type that specifies an alias name of another address record?

Jawab: CNAME

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is

Jawab : mail

This question requires that you evaluate the underlined text to determine if it is correct.

The NTP value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

 

Jawab : ttl

Which setting is used to determine the Domain Name System (DNS) settings on a client computer ?

Jawab a. NSLOOKUP

The top level domain of www.axiooclassprogram.org is?

Jawab :a. org

 

 

This question requires that you evaluate the underlined text to determine if it is correct.

A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Jawab: Primary zone

 

Which DNS record type specifies the host that is the authority for a given domain?

 

Jawab : SOA

 

This question requires that you evaluate the underlined text to determine if it is correct.

The process of replicating a zone file to multiple DNS servers is called zone replication.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

 

Jawab : zone transfer

 

Which utility would you use to determine if your Domain Name System (DNS) server is properly resolving fully qualified domain names (FQDNs) as IP addresses?

Jawab : ipconfig

 

IPSec policies for two machines on a LAN can be modified by using the IPSec policy snap-in on Windows 7.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

 

Jawab : Windows Firewall with Advanced Security snap-in

 

To protect a network when it is connected to the internet, you should use a?

Jawab : firewall

 

Your friend wants to protect the internal network from intrusion.

What should you do?

Jawab :  Set the web server in a perimeter network.

 

Security is a concern on wireless networks due to?

Jawab : The radio broadcast access method

 

IPsec can be used to secure network communications between two networks.

Answer 3

 

Jawab : yes

For which two reasons should you use IPsec between computers? (Choose two)

Jawab :

·       Data confidentiality

·       Data integrity

 

To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the "Local Intranet "zone.

Jawab : Trusted Sites

 

ipsec can be used to secure network communications between two machines.

Jawab : yes

iPsec network traffic is always encrypted

jawab : no

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)

Jawab :

·       Negotiating algorithms to use

·       Exchanging key information

All session data is encrypted between all machines while using telnet.

Jawab : Not encrypted

A Virtual Private Network is a/an?

Jawab :  Encrypted connection across the internet

 

allows a remote user to connect to a private network from anywhere on the Internet

Answer 1

Jawab : SSL vpn

 

securely connects two portions of a private network or to private networks

jawab : site-to-site

 

creates an unencrypted connection between two network devices

jawab : layer 2 tunneling protocol (L2TP)

VPNs are implemented to provide

JAWAB : A secure connection through public networks

 

The command-line tool used to list a host's active incoming connections is :

JAWAB : NETSTAT

 

Which command displays the ports that your computer is listening for?

JAWAB :  Netstat

 

Which command is used to verify that a server is connected to the network?

JAWAB : PING

 

The IPCONFIG command will?

JAWAB : Display a cilent's address

Tracert is used to

JAWAB: Report the route taken by packet across an IP Network

Each hop shown in a trace route is a ...... IP Address.

JAWAB : ROUTER

 

The tracert command determines packet loss between a source and a destination

JAWAB : NO

The tracert command displays router addresses that are traversed between a source and a destination

JAWAB : YES

The tracert command can display a list of routers being used for all active connection

JAWAB : NO

The ping tool is used to? (Choose two.)

JAWAB :

·       Determine whether a host is reachable

·        Self-test a host's own network interface

 

Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.

JAWAB :  No change is needed

A router's static route is set by the

JAWAB :  Network administrator

The function of a router is to:

JAWAB : Forward traffic to other networks

One advantage of dynamic routing is that it

JAWAB : Automatically maintains routing tables

 

Which metric does Routing Information Protocol (RIP) use to determine the least costly route?

JAWAB : HOP COUNT

 

Route changes are broadcast immediately through the network

Answer 1

 

JAWAB : YES

If a router cannot determine the next hop for a packet, the router will?

JAWAB : Forward the packet to the default route

 

A route can contain no more than 15 hops

JAWAB : YES

 

Routes are calculated based on the number of hops required

JAWAB: YES

"Dynamic routing" is fault tolerant.

JAWAB : No Change in needed

The default gateway address identifies the?

JAWAB : Device that will connect the computer to a remote network

Route management becomes more efficient as the network grows

JAWAB : NO

Which of these represents the Internet Protocol version 6 (IPv6) loopback address?

JAWAB :  ::1

FE80::F856:02AA is a valid Link-Local (APIPA) IPv6 address

JAWAB : YES

IPv6 addresses are represented by dotted-decimal notation

JAWAB : NO

0:0:0:0:0:0:0:1 is the Loopback address for IPv6

JAWAB : YES

FEC0::9C5A is a valid Site-Local IPv6 address

JAWAB : NO

IPv6 addresses are 64-bit in length

JAWAB : NO

IPv6 addresses are divided into 8-bit blocks

JAWAB : YES

 

You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the internet is slow. When you plug your laptop into a wall jack, you can no longer access the internet at all. You run the ipconfig /all command. The results are shown in the following image:

JAWAB :  Through DHCP

 

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt?

JAWAB : The DNS is not resolving

You receive a call from a family member who is unable to connect to a game server. You learn that the server’s IP is 172.16.2.11. To help, you ping the server and receive the information shown in the following image.

JAWAB :

·       DID NOT RETURN

·       UNKNOWN

You have configured a new client PC and connected it to your LAN.You can see some of the servers on the network, but not all of them.What is the most likely cause?

JAWAB : A missing protocol driver

Quality of Service (QoS) allows you to control bandwidth

JAWAB : YES

Quality of Service (QoS) allows you to define the priority traffic on the network

JAWAB : YES

A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

 

JAWAB : Use the ping 127.0.0.1 command at the command prompt

 

Quality of Service (QoS) allows you to assign protocols dynamically

JAWAB : NO

A computer that has an IP address of 169.254.12.7 cannot access the network, which of the following services should you confirm is available?

JAWAB : DHCP

 

ou are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the internet is slow. When you plug your laptop into a wall jack, you can no longer access the internet at all. You run the ipconfig /all command. The results are shown in the following image:

JAWAB :  APIPA

 

SOAL PREEXAM YANG TIDAK ADA

 

Which type of port is used to support VLAN traffic between two switches?

Select one:

a. WAN Port

b. Trunk Port

c. Virtual Port

d. LAN Port

 

 

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday.

You verify that the user’s computer is properly physically connected to the network. You discover that the computer’s IP address is 169.254.48.97

You need to restore access to network resources.

What should you do next?



Select one:

a. Finish the cache on the DNS server

b. Reset the user’s password on the server

c. Verify that the DHCP service is available

d. Check your router’s current routing tables

 

One advantage of dynamic routing is that it:

·         A. Automatically maintains routing tables.

 

Which of the following represents a Media Access Control (MAC) address?

 

·         C. 05:35:AB:6E:Al:25

Connecting to a private network address from a public network requires:

·         A. Network address translation (NAT).

A network device that associates a Media Access Control (MAC) address with a port is a:

·         D. Switch

A cable that meets the l000BaseT standard has a maximum length of:

·         A. 100 m

A router's static route is set by the:

·         C. Network administrator

Which setting is used to determine the Domain Name System (DNS) settings on a client computer?

·         B. NSLOOKUP

The default subnet mask for a Class B network is:

·         D. 255.255.0.0

The default port used for SMTP is:

·         B. 25

The ping tool is used to: (Choose two.)

·         B. Self-test a host's own network interface.

·         C. Determine whether a host is reachable.

Which of the following are features of DHCP? (Choose two.)

·         C. Address reservation

  • E. IP address exclusion

The command-line tool used to list a host's active incoming connections is:

·         A. NETSTAT

A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?

·         C. DHCP

Which network does the IP address 220.100.100.100 belong to?

·         A. 220.100.100.0/24

Which subnet mask is valid?

·         A. 255.255.255.240

A service that resolves NetBIOS names to IP addresses is:

·         D. Windows Internet Name Service (WINS).

What type of DNS record maps host names to addresses?

·         C. Host (A) DNS record

Teredo tunneling is a protocol that:

·         B. Allows IPv6 connectivity through IPv4 devices.

What is the default subnet mask for a Class C Internet network?

·         D. 255.255.255.0

The default port used for telnet is:

·         A. 23

When a client's DHCP-issued address expires, the client will:

·         C. Attempt to obtain a new address by broadcasting.

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?

·         B. The DNS is not resolving.

A Media Access Control (MAC) address identifies a/an:

·         C. Network interface card (NIC).

Two companies want to share data by using the Internet.
Which type of network provides the solution?

·         C. Extranet

VPNs are implemented to provide:

·         B. A secure connection through public networks.

If an 802.llg Internet connection has connectivity problems, what may be the cause?

·         D. Electromagnetic interference (EMI)

Which of these factors has the biggest impact on data transmission speed in a wireless network?

·         B. The transmission standard of the equipment used

Which of the following uses a tunneling protocol?

·         B. VPN

A network that separates an organization's private network from a public network is a/an:

·         C. Perimeter

Which type of network is most vulnerable to intrusion?

·         B. Wireless

Attenuation in a wireless network signal is a result of:

·         B. Distance from the access point.

Which type of network covers the broadest area?

·         A. WAN

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

·         A. Contention

  • D. Token passing

In a physical star topology, the central device is referred to as a:

·         D. Hub

Which technology can you use to extend an internal network across shared or public networks?

·         D. VPN

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)

·         B. 802.11g

  • E. 802.11n

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

·         B. A connection will be established.

Which technology provides the highest bit rate?

DS3

 

A VPN is a/an:

·         A. Encrypted connection across the Internet.

Which of the following determines the media access method that is used in a network?

·         D. Topology and protocols

Which wireless authentication method provides the highest level of security?

·         C. WI-FI Protected Access (WPA)

 

The topology of a local area network (LAN) is defined by the:

·         B. Physical and logical characteristics.

The maximum throughput of an 802.llg network is:

·         D. 54 Mbps.

A node within a local area network (LAN) must have a network interface device and a:

·         C. Host address

 

Which of the following is a Layer 2 WAN protocol?

·         A. Point-to-Point Protocol (PPP)

Which type of port is used to support VLAN traffic between two switches?

·         C. Trunk port

The protocol that maps IP addresses to a Media Access Control (MAC) address is:

·         E. Address Resolution Protocol (ARP).

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday.
You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
What should you do next?

·         D. Verify that the DHCP service is available.

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:

·         E. mail

To which IP configuration does the CIDR notation 192.168.1.1/25 refer?

·         E. 192.168.1.1 255.255.255.128

Which command is used to verify that a server is connected to the network?

·         C. PING

Which of these represents the Internet Protocol version 6 (IPv6) loopback address?

·         D. ::1

Which of these addresses is a multicast address?

·         D. 224.0.0.1

 

Which of the following uses pointer records and A records?

·         B. DNS Server

The ipconfig command will:

·         B. Display a client's address

One reason to incorporate VLANs in a network is to:

·         D. Reduce the number of nodes in a broadcast domain.

Which of these is an application layer protocol?

·         B. FTP

 

The top-level domain of www.adventureworks.com is:

·         D. com

At what layer in the OSI model are hardware addresses referenced?

·         C. Data link

You need to divide a network into three subnets.
Which device should you use?

·         C. Router

The type of connector used on a 100BaseT Ethernet cable is:

·         B. RJ-45.

In addition to switching, multilayer switches also:

·         A. Provide Layer 3 routing functions.

 

One reason to replace an unmanaged switch with a managed switch is to:

·         B. Support multiple VLANS.

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:

·         A. Crossover cable

The function of a router is to:

·         B. Forward traffic to other networks.

If a router cannot determine the next hop for a packet, the router will:

·         A. Forward the packet to the default route.

In which physical network topology is each computer connected to a central point?

·         A. Star

Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)

·         C. Dial-up

·         D. Leased line

A private network that allows members of an organization to exchange data is an:

·         C. Intranet

Security is a concern on wireless networks due to:

·         A. The radio broadcast access method.

A characteristic of the mesh topology is that it:

·         C. Uses redundant paths.

To protect a network when it is connected to the Internet, you should use a:

·         B. Firewall

One purpose of a perimeter network is to:

·         D. Make resources available to the Internet.

Which protocol can be used to encrypt packets on the Internet?

·         B. HTTPS

The service that resolves fully qualified domain names (FQDN) to IP addresses is:

·         B. Domain Name Service (DNS).

https://www.examtopics.com/assets/media/exam-media/02217/0003700001.png

If a router is installed so that it separates a DHCP server from its clients, the clients will:

·         B. Be unable to obtain their leases from the server.

Which of the following services masks internal IP addresses from outside the network?

·         C. NAT

The query protocol used to locate resources on a network is:

·         B. Lightweight Directory Access Protocol (LDAP)

Tracert is used to:

 

·         C. Report the route taken by packets across an IP network.

 

In which OSI layer does routing occur?

·         B. Network

What type of record does DNS use to find a mail service?

·         C. Mail Exchanger (MX) DNS record

The default gateway address identifies the:

·         B. Device that will connect the computer to a remote network.

How many bits are there in an Internet Protocol version 6 (IPv6) address?

·         C. 128

Which of the following is a public IP address?

·         B. 68.24.78.221

What is the minimum cabling requirement for a 100BaseTX network?

·         B. Category 5 UTP cable

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)

·         C. Negotiating algorithms to use

·         D. Exchanging key information

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

https://www.examtopics.com/assets/media/exam-media/02217/0004400001.jpg

HOTSPOT -
You are trying to access a music sharing service on the Internet. The service is located at the IP address 173.194.75.105. You are experiencing problems connecting.
You run a trace route to the server and receive the output shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0004500001.jpg
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

 

JAWAB :

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0004600001.jpg
* traceroute (tracert) outputs the list of traversed routers in simple text format, together with timing information
* Q: How is it possible for traceroute to timeout, yet the site will load fine in a browser?
If a router along the way decides to not send the ICMP error message, you will get a timeout at that point in the traceroute.
The router may pass on normal traffic, thus allowing your TCP-based http request to complete, but it may silently drop ICMP requests or errors, leaving your local traceroute process waiting and then timing out on that stop.

Question #91

 

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0004700001.png
Sometimes you will want to create a tunnel without encryption. The IPSEC protocols provide two ways to do this.

 

This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called "zone replication".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. Zone transfer

DRAG DROP -
Match each IP address to its corresponding IPv4 address class.
To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point.

orrect Answer: https://www.examtopics.com/assets/media/exam-media/02217/0005000001.png
Class A: 0.0.0.0 - 127.255.255.255
Class B: 128.0.0.0 - 191.255.255.255
Class C: 192.0.0.0 - 223.255.255.25
Class D: 224.0.0.0 - 239.255.255.255

 

Which DNS record type specifies the host that is the authority for a given domain?

·         D. SOA

DRAG DROP -
Match each protocol to its description.
To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all.
Each correct match is worth one point.
Select and Place:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0005200001.png
* UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. User datagram protocol (UDP) provides a thinner abstraction layer which only error-checks the datagrams.
Note: Best-effort delivery describes a network service in which the network does not provide any guarantees that data is delivered or that a user is given a guaranteed quality of service level or a certain priority.
* Transmission control protocol (TCP) provides a guaranteed delivery of an octet stream between a pair of hosts to the above layer, internally splitting the stream into packets and resending these when lost or corrupted.
* Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network.

 

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

 

ect Answer: https://www.examtopics.com/assets/media/exam-media/02217/0005300001.jpg
* Yes, the TCP/IP four layers corresponds to the OSI model's seven layers.
* No, the TCP/IP application layer corresponds to only the three top OSI Layers.
* Yes, TCP transport (host-to-host in diagram below) and Internet layers corresponds to layer 3 and layer 4 in the OSI model.
Illustration:
https://www.examtopics.com/assets/media/exam-media/02217/0005400001.png

 

 

This question requires that you evaluate the underlined text to determine if it is correct.
All session data is "encrypted between all machines" while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. Not encrypted

Which protocol is a transport layer protocol?

·         C. UDP

This question requires that you evaluate the underlined text to determine if it is correct.
IPv4 multicast addresses range from "192.168.0.0 to 192.168.255.255".
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

·         C. 224.0.0.0 to 239.255.255.255

This question requires that you evaluate the underlined text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

 

·         C. WiFi

A university has network links between various locations. Where would a T3 connection be appropriate?

·         A. Server to network in the main campus server room

HOTSPOT -
You cannot get to any site on the Internet or on the school's intranet. Your school uses DHCP.
You check your network settings, which are configured as shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0005800001.jpg
You need to change the settings to access websites.
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0005900001.jpg
The configuration must be set to obtain both IP and DNS server address automatically.

Question #103

DRAG DROP -
Match each network type to its corresponding definition.
To answer, drag the appropriate network type from the column on the left to its definition on the right. Each network type may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0006000001.png
* An extranet is a computer network that allows controlled access from outside of an organization's intranet. Extranets are used for specific use cases including business-to-business (B2B).
* An intranet is a private network that is contained within an enterprise
* The Internet is a global system of interconnected computer networks

 

DRAG DROP -
Match the VPN connection type to the corresponding definition.
To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all.
Each correct match is worth one point.
Select and Place:
https://www.examtopics.com/assets/media/exam-media/02217/0006100001.png

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0006200001.png
* An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet
Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. It's used to give remote users with access to Web applications, client/server applications and internal network connections.
* A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet.
* Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

 

DRAG DROP -
Match each set of characteristics to the corresponding 802.11 standard.
To answer, drag the appropriate set of characteristics from the column on the left to its 802.11 standard on the right. Each set may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:
https://www.examtopics.com/assets/media/exam-media/02217/0006300001.png

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0006400001.png
* 802.11a
5.8 GHz
allow transmission and reception of data at rates of 1.5 to 54 Mbit/s.
* 802.11b
2.4 GHz
The 802.11b standard has a maximum raw data rate of 11 Mbit/s.
* 802.11g
works in the 2.4 GHz band (like 802.11b)
maximum physical layer bit rate of 54 Mbit/s

 

You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items:
A public facing web server
A Wi-Fi network for customers
A private network for the point of sale terminals
An office PC
A file/print server
A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)

·         A. Network printer

·         B. Web server

DRAG DROP -
Match the networking topologies to their corresponding characteristics.
To answer, drag the appropriate topology from the column on the left to its characteristic on the right. Each topology may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:
https://www.examtopics.com/assets/media/exam-media/02217/0006600001.png

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0006700001.png
* Star
In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch.
* Ring
Each device present in Ring Topology is incorporated with a REPEATER.
* Mesh
Fully connected mesh topology:
https://www.examtopics.com/assets/media/exam-media/02217/0006800001.jpg
A fully connected network is a communication network in which each of the nodes is connected to each other.
* Star
In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch.
* mesh (full)
The major disadvantage is that the number of connections grows quadratically with the number of nodes,as per the formula: c=n(n-1)/2
* Ring
Ring Topology: In this type of Topology, data is passed from one node to another in a series. Here each device has dedicated Point-to-Point connection, with only two devices present on either side of it.

 

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)

·         A. Network Policy and Access Services

·         B. Routing and Remote Access Services

What are two characteristics of fiber optic cable? (Choose two.)

 

·         C. Supports splicing

·         D. Requires a polish for end connectors

 

HOTSPOT -
Identify the network cable type and connector in the following graphic:
https://www.examtopics.com/assets/media/exam-media/02217/0007000001.jpg
Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0007100001.jpg
This is an RJ45 ethernet cable.
https://www.examtopics.com/assets/media/exam-media/02217/0007200001.jpgWhich Microsoft network service can you use to establish a connection to a corporate LAN without any user action?

·         C. DirectAccess

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0007400001.jpg
* No.
With a recursive name query , the DNS client requires that the DNS server respond to the client with either the requested resource record or an error message stating that the record or domain name does not exist. The DNS server cannot just refer the DNS client to a different DNS server.
* No. * Yes.
An iterative name query is one in which a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data. If the queried
DNS server does not have an exact match for the queried name, the best possible information it can return is a referral (that is, a pointer to a DNS server authoritative for a lower level of the domain namespace). The DNS client can then query the DNS server for which it obtained a referral. It continues this process until it locates a DNS server that is authoritative for the queried name, or until an error or time-out condition is met.
Example:
https://www.examtopics.com/assets/media/exam-media/02217/0007500001.png
Reference: Recursive and Iterative Queries

DRAG DROP -
Match the IPv4 address type to the corresponding definition.
To answer, drag the appropriate definition from the column on the left to the address type on the right. Each definition may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:
https://www.examtopics.com/assets/media/exam-media/02217/0007600001.jpg

Reveal Solution    Discussion  

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0007700001.jpg
* Multicast
Multicast is communication between a single sender and multiple receivers on a network.
* Broadcast
Broadcasting sends a message to everyone on the network.
* Unicast
Unicast is a one-to one connection between the client and the server.

 

This question requires that you evaluate the underlined text to determine if it is correct.
A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. Primary zone

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0007900001.jpg
* TRACERT prints out an ordered list of the routers in the path that returned the ICMP Time Exceeded message.
* Ping, not tracert, determines packet loss.
* Tracert just displays the path to the target, not all connections.

Note -
* Example:
tracert 11.1.0.1
Tracing route to 11.1.0.1 over a maximum of 30 hops
1 2 ms 3 ms 2 ms 157.54.48.1
2 75 ms 83 ms 88 ms 11.1.0.67
3 73 ms 79 ms 93 ms 11.1.0.1
Trace complete.
* The TRACERT diagnostic utility determines the route taken to a destination by sending Internet Control Message Protocol (ICMP) echo packets with varying IP
Time-To-Live (TTL) values to the destination. Each router along the path is required to decrement the TTL on a packet by at least 1 before forwarding it, so the
TTL is effectively a hop count. When the TTL on a packet reaches 0, the router should send an ICMP Time Exceeded message back to the source computer.

 

You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?

·         D. netstat

You are configuring a wireless network with the Wireless Network Properties that are shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0008500001.jpg
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0008600001.jpg
* Connect automatically when this network is in range
If you want to have a network in the list, but dont want Windows to connect to it automatically, you can open up the properties from the Manage Wireless
Networks dialog, and then uncheck the box for "Connect automatically when this network is in range".
* 802.1x
This deployment scenario requires server certificates for each NPS server that performs 802.1X authentication.

 

This question requires that you evaluate the underlined text to determine if it is correct.
"A/anvirtual private network (VPN)" protects a network's perimeter by monitoring traffic as it enters and leaves.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         B. Firewall

This question requires that you evaluate the underlined text to determine if it is correct.
The loopback address of your computer is "127.0.0.1".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         D. No change is needed

You run the ipconfig command. The output is shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0008800001.png
From these settings, you can tell that the computer:

·         A. Will have limited Internet access

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?

·         D. 802.11n

What is the bit rate for a North American T3 circuit?

·         B. 44.736 Mbit/s

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0009000001.jpg
* Dynamic Routing. A router with dynamically configured routing tables is known as a dynamic router. Dynamic routing consists of routing tables that are built and maintained automatically through an ongoing communication between routers.
* Most of the dominant routing algorithms are dynamic routing algorithms, which adjust to changing network circumstances by analyzing incoming routing update messages. If the message indicates that a network change has occurred, the routing software recalculates routes and sends out new routing update messages.
These messages permeate the network, stimulating routers to rerun their algorithms and change their routing tables accordingly.
* When there are multiple routes to the same destination, a router must have a mechanism for calculating the best path. A metric is a variable assigned to routes as a means of ranking them from best to worst or from most preferred to least preferred.

 

Which feature of Category 5e STP cable reduces external interference?

 

·         D. Twisting

What are three advantages of VLANs? (Choose three.)

 

Correct Answer: BCE
VLANs provide the following advantages:
* (E) VLANs enable logical grouping of end-stations that are physically dispersed on a network. ...
* VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ...
* (C) Confinement of broadcast domains on a network significantly reduces traffic.
By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them.
* (B) If a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

 

DRAG DROP -
Match the OSI layer to its corresponding description.
To answer, drag the appropriate OSI layer from the column on the left to its description on the right. Each OSI layer may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

 

https://www.examtopics.com/assets/media/exam-media/02217/0009300001.jpg

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0009400001.jpg
* (1) Application layer protocols include:

Remote login to hosts: Telnet -
File transfer: File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP)
Electronic mail transport: Simple Mail Transfer Protocol (SMTP)

NTP, Network Time Protocol -
* (2) Session Layer
Session-layer services are commonly used in application environments that make use of remote procedure calls (RPCs).
NetBios is also a session layer protocol.
* (3) Network Layer
The network layer is responsible for packet forwarding including routing through intermediate routers.
Network Layer protocols include IPX (Internetwork Packet Exchange).
/ X.25 is one of the oldest packet-switched services available. It was developed before the OSI Reference Model. The protocol suite is designed as three conceptual layers, which correspond closely to the lower three layers of the seven-layer OSI model. It also supports functionality not found in the OSI network layer.
/ NetWare Link Services Protocol (NLSP) is a routing protocol for Internetwork Packet Exchange (IPX).
* (4) Data link layer
WAPs (Wireless access points) and wwitches operate on the data link layer.
* (5) Network layer
Network layer protocols include ICMP (Internet Control Message Protocol), RIP (Routing Information Protocol), and ARP (Address Resolution Protocol).
* (6) Data link layer
the data link layer is responsible for media access control, flow control and error checking.
Bridges and network cards are on the data link layer.

 

HOTSPOT -
You receive a call from a family member who is unable to connect to a game server.
You learn that the server's IP is 172.16.2.11.
To help, you ping the server and receive the information shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0009600001.jpg
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/assets/media/exam-media/02217/0009600002.jpg

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0009700001.jpg
* Received = 0 means that that the ping request did not return any answers.
* Request timed out.
This message indicates that no Echo Reply messages were received within the default time of 1 second. This can be due to many different causes; the most common include network congestion, failure of the ARP request, packet filtering, routing error, or a silent discard.
So we cannot know if the server is down or not.
Reference: Test Network Connection with Ping and PathPing

 

DRAG DROP -
Match each address type to its appropriate range.
To answer, drag the appropriate address type from the column on the left to its range on the right. Each address type may be used once, more than once, or not at all. Each correct match is worth one point.
Select and Place:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0009800001.png

 

For which two reasons should you use IPsec between computers? (Choose two.)

·         B. Data integrity

  • D. Data confidentiality

 

This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is "TCP/IP" enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

 

·         D. No change is needed

 

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office.
The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?

 

·         C. Cat5e

 

This question requires that you evaluate the underlined text to determine if it is correct.
"WEP" wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct

·         D. No change is needed

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/assets/media/exam-media/02217/0010100001.jpg

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0010200001.jpg
* Yes. Unicast
Unicast is a one-to one connection between the client and the server.
* Yes. No.
As part of the learning process, a switch will flood (broadcast) the single frame out all of its other ports when it cannot find the destination MAC address in the switchs lookup table.

 

What is an example of a network device that associates a network address with a port?

 

·         B. Router

Which wireless communication problem is caused by electromagnetic waves?

 

·         C. Interference

An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two.)

 

·         D. Port 80

·         E. Port 443

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)

 

·         B. A central connection point allows for flexibility and scalability.

  • D. A cable problem within the group affects two nodes, at most.

 

This question requires that you evaluate the underlined text to determine if it is correct.
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of "Message Switching".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct.

·         A. Circuit Switching

What are three characteristics of Ethernet network topology? (Choose three.)

B: Ethernet networks can use coax, twisted-pair, or fibre optic cabling.
C: Ethernet is the most widely used network topology.
E: Speed can be negotiated on Ethernet network.

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0010600001.jpg
NO. No. YES.
In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

 

You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to two web servers.
The servers connect to the three new PCs as shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0010800001.jpg
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0010900001.png
* Trusted sites
The level of security set for Trusted sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information.
* Local intranet
The level of security set for the Local intranet zone is applied to websites and content that is stored on a corporate or business network.
Reference: Change Internet Explorer Security settings

 

 

Your home computer is having problems accessing the Internet.
You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address.
Which address indicates that your router's DHCP service is NOT functioning?

·         A. 169.254.1.15

Which of these is a public address space?

·         B. 197.16.0.0/12

This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, "WEP" handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. 802.1X

This question requires that you evaluate the underlined text to determine if it is correct.
To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the "Local Intranet "zone.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

 

·         B. Trusted Sites

 

You are helping a friend set up a public-facing web server for a home office.
Your friend wants to protect the internal network from intrusion.
What should you do?

·         A. Set the web server in a perimeter network.

·         HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0011300001.jpg
* No.
Network bridging is the action taken by network equipment to create an aggregate network from either two or more communication networks, or two or more network segments. If one or more segments of the bridged network are wireless, it is known as wireless bridging.
* Yes.
In Wi-Fi, repeater mode is a variation on bridging. Rather than join multiple LANs, repeater mode is intended mainly to increase the range of a single wireless LAN by extending the same wireless signal.
* No.
In Wi-Fi networking, bridging mode allows two or more wireless access points (APs) to communicate with each for the purpose of joining multiple LANs.

 

What are two characteristics of the CSMA/CD access method? (Choose two.)

·         A. It checks to see if a collision has been detected.

  • D. It waits until the transmission medium is idle.

 

What are two characteristics of a mesh network topology? (Choose two.)

·         A. It is fault tolerant because of redundant connections.

·         B. Every node connects to every other node on the network.

 

Which protocol is responsible for automatically assigning IP addresses?

·         A. HTTP

This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the "transport layer".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. Presentation

·         HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

·         Hide Solution    Discussion  

·         Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0011700001.jpg
* No.
IPv4 uses a 32-bit address scheme.
* Yes.
IPv4 addresses may be written in any notation expressing a 32-bit integer value, but for human convenience, they are most often written in the dot-decimal notation, which consists of four octets of the address expressed individually in decimal and separated by periods.
* No.
Each octet has a value between 0 and 255.

 

This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the "IPSec policy snap-in" on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. Windows Firewall with Advanced Security snap-in

This question requires that you evaluate the underlined text to determine if it is correct.
An Address Resolution Protocol (ARP) table is used to associate IP addresses with "host names".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         A. MAC addresses

Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?

 

·         D. Managed switch

What is the maximum cable length for a single Cat5 UTP cable run?

·         B. 328 feet/99.97 meters

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0012100001.jpg
* Yes.
QoS traffic control: Regulate data flows by classifying, scheduling, and marking packets based on priority and by shaping traffic (smoothing bursts of traffic by limiting the rate of flow). Traffic control mechanisms segregate traffic into service classes and control delivery to the network. The service class assigned to a traffic flow determines the QoS treatment the traffic receives.
* Yes.
The goal of QoS is to provide preferential delivery service for the applications that need it by ensuring sufficient bandwidth, controlling latency and jitter, and reducing data loss.
* No

 

Which of these cable types transmits data the greatest distance?

·         B. Single-mode fiber

What is a similarity between Layer 2 and Layer 3 switches?

·         D. Both allow the implementation of VLANs.

This question requires that you evaluate the underlined text to determine if it is correct.
"Dynamic routing" is fault tolerant.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

·         D. No change is needed

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters.
An interference exists along the path of each drop.
You need to ensure that interference is reduced.
Which cable type should you use?

·         A. STP Cat5e

What is an example of a Layer 3 device that connects multiple computers and networks?

 

·         D. Router

Which metric does Routing Information Protocol (RIP) use to determine the least costly route?

·         C. Hop count

What are two differences between switches and hubs? (Choose two.)

·         A. Switches are slower than hubs because of the extra addressing functions that switches perform.

  • D. Switches identify the intended destination of the data that they receive.

What is the DNS record type that specifies an alias name of another address record?

 

·         B. CNAME

This question requires that you evaluate the underlined text to determine if it is correct.
Each IPv4 address consists of a "MAC address and data-link laver address".
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

·         A. Network ID and a host ID

This question requires that you evaluate the underlined text to determine if it is correct.
The "NTP" value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

·         A. TTL

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0012700001.jpg
* Yes.
Layer 7 TCP/IP protocols include:
HTTP, Hypertext Transfer Protocol
Telnet, a remote terminal access protocol
SMTP, Simple Mail Transfer Protocol
TFTP, Trivial File Transfer Protocol, a simple file transfer protocol
* No.
The session layer (layer 5) controls the dialogues (connections) between computers.
The transport layer provides the functional and procedural means of transferring variable-length data sequences from a source to a destination host via one or more networks, while maintaining the quality of service functions.
* Yes.
The network layer provides the functional and procedural means of transferring variable length data sequences (called datagrams) from one node to another connected to the same network. It translates logical network address into physical machine address. A network is a medium to which many nodes can be connected, on which every node has an address and which permits nodes connected to it to transfer messages to other nodes connected to it by merely providing the content of a message and the address of the destination node and letting the network find the way to deliver ("route") the message to the destination node.

 

 

 

 

 

 

 

HOTSPOT -
You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the Internet is slow. When you plug your laptop into a wall jack, you can no longer access the Internet at all.
You run the ipconfig /all command. The results are shown in the following image:
https://www.examtopics.com/assets/media/exam-media/02217/0012900001.png
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

Reveal Solution

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0013000001.jpg
The wireless adapter is DHCP enabled and has a normal IP address of 192.168.11.1.
The Ethernet adapter is also DHCP enabled but has an APIPA IP address of 169.254.143.166.

 

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0013100001.jpg
* No. IPv6 addresses are 128 bit in length.
* No.No.
IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

 

HOTSPOT -
Where in the diagram is a T3 connection possible? (To answer, select the appropriate connection in the diagram in the answer area.)
Hot Area:
https://www.examtopics.com/assets/media/exam-media/02217/0013200001.jpg

 

Correct Answer: https://www.examtopics.com/assets/media/exam-media/02217/0013300001.jpg
T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters

 

What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

·         D. The node transmits, but the access point is unable to receive.

 

This question requires that you evaluate the underlined text to determine if it is correct.
An ICMP ping message is sent at the application layer of the OSI model.
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

·         A. network

This question requires that you evaluate the underlined text to determine if it is correct.
The query protocol used to locate resources on a network is User Datagram Protocol (UDP).
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

·         A. Lightw21daeight Directory Access Protocol (LDAP)

HOTSPOT -
Network client computers running Windows 8.1 and Windows 10 are configured to receive IPv4 addresses through DHCP. The DHCP server fails.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:

 

Correct Answer: Explanation
The IpReleaseAddress and IpRenewAddress functions are used to release and renew the current Dynamic Host Configuration Protocol (DHCP) lease. The
IpReleaseAddress function releases an IPv4 address previously obtained through DHCP. The IpRenewAddress function renews a lease on an IPv4 address previously obtained through DHCP. It is common to use these two functions together, first releasing the lease with a call to IpReleaseAddress, and then renewing the lease with a call to the IpRenewAddress function.
When a DHCP client has previously obtained a DHCP lease and IpReleaseAddress is not called before the IpRenewAddress function, the DHCP client request is sent to the DHCP server that issued the initial DHCP lease. This DHCP server may not available or the DHCP request may fail. When a host has previously obtained a DHCP lease and IpReleaseAddress is called before the IpRenewAddress function, the DHCP client first releases the IP address obtained and sends a
DHCP client request for a response from any available DHCP server.
References:
https://docs.microsoft.com/en-us/windows/desktop/IpHlp/managing-dhcp-leases-using-ipreleaseaddress-and-iprenewaddress

 

This question requires that you evaluate the underlined text to determine if it is correct.
The protocol that maps IP addresses to a Media Access Control (MAC) address is Domain Name Systems (DNS).
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

·         A. Address Resolution Protocol (ARP)

Which utility would you use to determine if your Domain Name System (DNS) server is properly resolving fully qualified domain names (FQDNs) as IP addresses?

 

·         D. ipconfig

What type of DNS resource record maps an IP address to a fully qualified domain name (FQDN)?

 

·         C. AAAA

Your network is reconfigured as multiple subnets. Your company needs to support legacy NetBIOS applications across subnet boundaries.
Which should you use for name resolution?

 

·         D. NetBIOS broadcasts

 

A Layer 2 device that connects multiple computers within a network is:

 

·         B. a switch

 

What are two characteristics of switches? (Choose two.)

 

·         A. Switches identify the intended destination of the data that they receive

  • C. Switches are capable of sending and receiving data at the same time

 

Your network uses routers configured with the RIP router protocol.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

 

Correct Answer: Explanation
Routing Information Protocol (RIP) uses hop count as the metric to rate the value of different routes. The hop count is the number of devices that can be traversed in a route. A directly connected network has a metric of zero; an unreachable network has a metric of 16. This limited metric range makes RIP unsuitable for large networks.
The Routing Information Protocol (RIP) sends routing-update messages at regular intervals and when the network topology changes. When a device receives a
RIP routing update that includes changes to an entry, the device updates its routing table to reflect the new route. The metric value for the path is increased by 1, and the sender is indicated as the next hop. RIP devices maintain only the best route (the route with the lowest metric value) to a destination. After updating its routing table, the device immediately begins transmitting RIP routing updates to inform other network devices of the change. These updates are sent independently of the regularly scheduled updates that RIP devices send.
Summarizing routes in RIP Version 2 improves scalability and efficiency in large networks. Summarizing IP addresses means that there is no entry for child routes
(routes that are created for any combination of the individual IP addresses contained within a summary address) in the RIP routing table, reducing the size of the table and allowing the router to handle more routes.
It is a stable protocol that uses a distance-vector algorithm to calculate routes.
References:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_rip/configuration/15-mt/irr-15-mt-book/irr-cfg-info-prot.html

 

HOTSPOT -
You deploy a computer running Windows Server 2016 in your perimeter network. You want to use this computer to route traffic between the Internet and your network.
Which role do you need to configure?
To answer, select the appropriate role in the answer area.
Hot Area:

 

Correct Answer: Explanation
Network Controller is a highly available and scalable server role, and provides one application programming interface (API) that allows Network Controller to communicate with the network, and a second API that allows you to communicate with Network Controller.

 

At Ethernet 1000BaseT network is wired as a physical star using switches.
What is the logical topology?

·         D. star

 

Which access method is used in a physical ring topology?

 

·         B. token passing

 

What are two characteristics of wired Ethernet network topology? (Choose two.)

 

·         A. It uses network adapters physically encoded with an IP address

  • D. It can negotiate different transmission speeds

This question requires that you evaluate the underlined text to determine if it is correct.
All devices on your company network connect to the same network switch. This is an example of a physical star topology.
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

·         D. No change is needed

 

What is the primary purpose of a perimeter network?

 

·         C. to provide a buffer area between a private intranet and the public Internet

This question requires that you evaluate the underlined text to determine if it is correct.
The 802.11n wireless standard specifies a maximum data rate of 54 Mbps.
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

 

·         C. 300-600 Mbps

What is the purpose of a Media Access Control (MAC) address?

 

·         D. provide a routing address on a local area network (LAN)

 

This question requires that you evaluate the underlined text to determine if it is correct.
A network that separates an organization's private network from a public network is an extranet.
Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

·         A. a perimeter

Which connectivity option for wide area networks (WANs) is most readily available in most geographic areas?

·         D. Dial-up

 

 

 



Post a Comment

0 Comments