Network+ Study Guide

Card Set Information

Author:
ocularcandy
ID:
157377
Filename:
Network+ Study Guide
Updated:
2012-06-05 18:33:17
Tags:
Network plus exam
Folders:

Description:
study guide for Network+ 10-005 Exam
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user ocularcandy on FreezingBlue Flashcards. What would you like to do?


  1. What is the basic purpose of a local area network (LAN)?
    To connect one or more computers together so they can share resources. LANs generally have a geographic scope of a single building or smaller. They can be simple (two hosts) or complex (w/ thousands of hosts)
  2. You need a topology that is easy to troubleshoot and scalable. Which would you use?
    Star

    Star topologies are the easiest to troubleshoot and can easily scale to large sizes.
  3. IP resides at which layer of the OSI model?
    Network (Layer 3)

    IP is a Network Layer Protocol. IE is an example of an Application Layer protocol. Ethernet is an example of a Data Link Layer protocol, and T1 can be considered a Physical Layer protocol.
  4. Layer 2 of the OSI model is named ________.
    Data Link Layer

    Layer 2 of the OSI model is the Data Link layer, which provides the physical transmission of the data and handles error notification, network topology and flow control.
  5. Which RG rating of coax is used for cable modems?
    RG-6

    Cable modems use RG-6 coax cables.
  6. Which UTP wiring used four twisted pairs (eight wires) and is rated for 250 MHz?
    Category 6 UTP

    To get the high data-transfer speed, like 1 Gbps, you need to use a wire standard that is highly rated, such as Cat-5e or Cat-6
  7. If you are running half-duplex internet, which of the following is true?

    A. Your digital signal cannot transmit and receive data at the same time.
    B. Hosts use tha CSMA/CD protocol to prevent collisions.
    C. The physical connection consitst of one wire pair.
    D. All of the above.
    D. All of the above

    With half-duplex, you are using one wire pair with a digital signal either transmitting or receiving (but not both at once). Carrier Sense Multiple Access with Collision Detection (CSMA/CD) helps packets that are transmitted simultaneously from different hosts share bandwidth evenly.
  8. You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the bug to the switch?
    Crossover

    To connect two switches together or a hub to a switch, you need a crossover cable.
  9. Your boss asks you why you just put in a requisition to buy a bunch of switches. He said he just bought you a bunch of hubs five years ago! Why did you buy the switches?
    A. Because each port is its own collision domain.
    B. There were too many broadcast domains, and a switch breaks up broadcast domains by default.
    C. The hubs kept repeating signals but quit recognizing frames and data structures.
    D. The cable connecting devices to the hub wore out, and switches were cheapter than new cable.
    B. There were too many broadcast domains, and a switch breaks up broadcast domains by default.

    For the most part, switches are not cheap; however, one of the biggest benefits of using switches instead of hubs in your internetwork is that each switch port is actually its own collision domain. A hub creates one large collision domain. Switches still can't break up broadcast domains. Hubs do not recognize frames and data structures but switches do.
    (this multiple choice question has been scrambled)
  10. Which device would connect network segments together, creating separate collision domais for each segment but only a single broadcast domain?
    Router.

    A switch creates separate collision domains for each port but does not break up broadcast domains by default.
  11. Most Application Layer protocols use only UDP or TCP at the Transport Layer. Which of the following could use both?
    A. DNS
    B. Telnet
    C. Microsoft Word
    D. TCP
    A. DNS

    DNS used TCP for zone exhanges between servers and UDP when a client is trying to resolve a hotname to an IP address.
    (this multiple choice question has been scrambled)
  12. HTTP, FTP, and Telnet work at which layer of the OSI model?
    Application.

    HTTP, FTP, and Telnet use TCP at the Transport Layer; however they are all Application Layer Protocols, so Application layer is the best answer for this question.
  13. IPv6 uses multiple types of addresses. WHich of the following would describe an anycast address used by and IPv6 host?
    A. Communications are routed to the most distant host that shares the same address
    B. This address identifies multiple interfaces, and the anycast packet is only delivered to one address. This address can also be called one-to-one-of-many
    C. Packets are delivered to all interfaces identified by the address. This is also called one-to-many addressing.
    B. This address identifies multiple interfaces, and the anycast packet is only delivered to one address. Anycast is a new type of communciation that replaces broadcasts in IPv4. Anycast addresses identify multiple interfaces, which is the same as multicast; however, the big difference is that the anycast packet is delivered to only one address: the first one it finds defined in the terms of routing distance.
    (this multiple choice question has been scrambled)
  14. Which of the following IP addressses are not allowed on the Internet?
    A. 11.255.255.1
    B. 10.0.0.1
    C. 172.33.255.0
    D. 192.168.0.1
    B, D. The addresses in the range 10.0.0.0 through 10.255.255.255 and 172.16.0.0 through 172.31.255.255 as well as 192.168.0.0 through 192.168.255.255 are all considered private. Use of these addresses on the Internet is prohibited so that they can be used simultaneously in different administrative domains without concern for conflict.
  15. What is the subnetwork address for a host with the IP address of 200.10.5.168/28?
    A. 200.10.5.255
    B. 200.10.5.132
    C. 200.10.5.0
    D. 200.10.5.160
    E. 200.10.5.156
    D. 200.20.5.160

    This is a pretty simple question. A /28 is 255.255.255.240 which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176 and so on...The host is in subnet 160.
    (this multiple choice question has been scrambled)
  16. If you wanted to verify the local IP stack on your computer what would you do?
    PING 127.0.0.1

    To test the local stack on your host, ping the loopback interface of 127.0.0.1. As a matter of fact, the entire range from 127.0.0.1-127.255.255.254 will test the IP stack.
  17. The OSI model used an encapsulation method to describe the data as it is encapsulated at each layer. What is the encapsulation named at the Data Link Layer?
    A. Frames
    B. Data
    C. Segments
    D. Bits
    E. Packets
    A. Frames

    The Data Link layer is responsible for encapsulating IP packets into frames and for providing logical network addresses.
    (this multiple choice question has been scrambled)
  18. Where does a Data Link layer frame have to carry a Network Layer packet if the packet is destined for a remote network?
    Router.

    Packets specifically have to be carried to a router in order to be routed through a network
  19. Which of the following are not distance vector routing protocols?
    A. OSPF
    B. RIP
    C. RIP-v2
    D. IS-IS
    A, D.

    RIP and RIPv2 are distance vector routing protocols. OSPF and IS-IS are link-state protocols.
  20. Which of the following uses both distance vector and link state properties?
    A. OSPF
    B. IGRP
    C. IS-IS
    D. RIPv1
    E. EIGRP
    E. EIGRP

    EIGRP is called a hybrid routing protocol because it uses the characteristics of both distance vector and link state routing protocols. However, EIGRP can only be run on Cisco routers and is not vendor nuetral.
    (this multiple choice question has been scrambled)
  21. You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use?
    A. implement a loop-avoidance scheme.
    B. Create a VLAN
    C. Disable spanning tree on individual ports
    D. Create a flatter network structure using switches
    B. Create a VLAN

    Virtual LANs break up broadcast domains in Layer 2 switched internetworks.
    (this multiple choice question has been scrambled)
  22. Why do most switches run the Spanning Tree Protocol by default?
    A. It stops data from forwarding until all devices are updated.
    B. It manages the VLAN database
    C. It monitors how the network is functioning
    D. It prevents switching loops
    D. The Spanning Tree Protocol (STP) was designed to stop Layer 2 loops. All eterprise model switches have STP by default.
    (this multiple choice question has been scrambled)
  23. Which of the following describes MIMO correctly?
    A. A modulation technique that allow more than one data rate
    B. A technique that packs smaller packets into a single unit, which improves throughput
    C. A protocol that requires acknowledgment of each and every frame.
    D. Data Transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antannae
    D. Data Transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antannae

    Part of the 802.11 Wireless standard, MIMO sends multiple frames by several antennae aver several paths; they are then recombined by another set of antane to optimize throughput and multipath resistance. This is called spatial multiplexing.
    (this multiple choice question has been scrambled)
  24. Which two practices help secure your wireless access points from unauthroized access? (choose all that apply)
    A. Assigning a private IP address to the AP
    B. Changing the default SSID value
    C. Configuring a new administrator password
    D. Changing the mixed-mode setting to single mode
    E. Configuring traffic filtering.
    B, C. At a minimum you need to change the default SSID value on each AP and configure new usernames and passwords on the AP.
  25. IPSec is defined at what layer of the OSI model?
    A. Layer 4
    B. Physical
    C. Netowrk
    D. Layer 7
    C. Network

    IPSec works at the Network Layer (3) of the OSI model and secures all applications that operate above it (layer 4 and above). Additionally, because is was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the internet.
    (this multiple choice question has been scrambled)
  26. You want your users to log in and authenticate before they can gget onto your network. Which of the following services would you use?
    A. Remote Desktop Protocol
    B. RADIUS
    C. DNS
    D. Virtual Network Computing
    B. RADIUS

    RADIUS combines user authentication and authorization into one profile.
    (this multiple choice question has been scrambled)
  27. Someone calls you and asks for your bank acount number because the bank is having problems with your account. You give them this information and then later find out that you were scammed. What type of attack it this?
    Phishing.

    Social engineering, or phishing, referes to the act of attempting to illegally obtain sensitive information by pretending to be a credible source. Phishing usually takes one of two forms: email or phone call.
  28. Which three of the following are types of denial of service (DoS) attacks?
    A. Ping of Death
    B. Stacheldraht
    C. SYN flood
    D. Virus FloodSyn
    A, B, C. A denial of service attack prevents users from accessing the system. All of the options are all possible DoS attacks except Virus FloodSyn
  29. You want to stop a hacker in their tracks. Which of the following devices are proactive in providing this service?
    A. Network Address Translation
    B. Virtual LANs
    C. Content Filtering
    D. Intrusion Prevention System (IPS)
    E. Access Control List (ACL)
    F. Security Zones
    D. IPS

    Changing network configurations, terminating sessions, and deceiving the attacker are all actions that can be taken by an IPS device. These are all proactive approaches to security.
    (this multiple choice question has been scrambled)
  30. You connected your company to the Internet and security is a concern. What should you install?
    A. Higher-quality cables
    B. Firewall
    C. Switches
    D. DNS
    B. Firewall

    Firewalls help provide perimeter network security by allowing or denying connections and types of traffic in or out of the network.
    (this multiple choice question has been scrambled)
  31. Which of the following are WAN protocols or technology? (choose all that apply)
    A. ATM
    B. ISDN
    C. MPLS
    D. RIP
    A, B, C.

    RIP is not a WAN protocol but a routing protocol used in local area connections.
  32. The rate at which the Frame Relay switch agrees to transfer data is referred to as ______.
    CIR

    the Committed Information Rate is the rate, in bits per second, at which the Frame Relay switch agrees to transfer data.
  33. Which two arp utility switches perform the same function?
    -g, -a

    The arp utility's -a and -g switches perform the same function. They both show the current ARP cache.
  34. You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use?
    -R

    To purge and reload the remote NetBIOS name cache, you must use nbtstat -R. Remember the R must be uppercase, and it will not work corectly without the hyphen before it.
  35. Which tool is used to attach ends to network cables?
    Crimper

    A wire crimper is used to attach ends onto different types of network cables.
  36. You are using a TDR. Which three of the following actions can you do with this device?
    A. Estimate cable lengths
    B. Find splice and connector locations and their associated loss amounts
    C. Display unused services
    D. Define cable-impedence characteristics
    A, B, D.

    Due to sensitivity to any variation and impedance to cabling, A, B, and D are all reasons you would use a TDR.
  37. Which of the following are considered cabling issues? (choose all that apply)
    A. Crosstalk
    B. Shorts
    C. Open impedance mismatch
    D. DNS configurations
    A, B, C.

    Because most of today's networks still consist of large amounts of copper cable, they can continue to suffer from the physical issues (the options are not a complete list) that have plagued all networks since the very beginning of networking.
  38. You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, what is the next step?
    Establish a plan of action to resolve the problem and identify potential effects.

    You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, establishing a plan of action to resole the problem and identify potential effects would be the next step.
  39. Which network performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?
    A. Traffic Shaping
    B. Logical Network Mapping
    C. Load Balancing
    D. Jitter Control
    E. Access Lists
    A. Traffic Shaping

    Also known as packet shaping, is another form of bandwidth optimization.
    (this multiple choice question has been scrambled)
  40. You need to optimize network traffic by spreading it across multiple connections. Which strategy should be used?
    A. Add VLANs
    B. A 1Gbps connction
    C. Load Balancing
    D. Traffic Shaping
    E. Following Regulations
    C. Load Balancing

    Load balancing refers to a technique used to spread work out to multiple computers, network links, or other devices. You can load-balance work on servers by clustering servers so that multiple machines all provide the same service.
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview