12
Which protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is responsible for reporting errors and providing information about packet delivery? ICMP UDP ARP IGMP When is it necessary to use plenum-rated cable when installing network cabling? In environments in which there is a risk of electrical interference Only when installing Ethernet coaxial cable When required by local building codes In all network wiring applications Which network device is used to extend the length of a network segment by simply amplifying the data signal? Repeate r Switch Bridge

Test Questions Comp TIA Network

Embed Size (px)

Citation preview

Which protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is responsible for reporting errors and providing information about packet delivery?

ICMP

UDP

ARP

IGMP

When is it necessary to use plenum-rated cable when installing network cabling?

In environments in which there is a risk of electrical interference

Only when installing Ethernet coaxial cable

When required by local building codes

In all network wiring applications

Which network device is used to extend the length of a network segment by simply amplifying the data signal?

Repeater

Switch

Bridge

Hub

The Network layer of the Open Systems Interconnect (OSI) model is responsible for managing what function?

Routing and subnetting

Physical connection to the cable plant

Establishing and maintaining communication sessions

Providing reliable data transfer and error control

You want to view IP address information on a computer running UNIX.

What should you do?

Run nslookup.

Run nbtstat.

Run ipconfig.

Run ifconfig.

A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what?

A virus

A Trojan

A man-in-the-middle

A worm

Which Transmission Control Protocol/Internet Protocol (TCP/IP) protocol is used to transfer e-mail messages and attachments between mail servers?

SNMP

SMTP

TFTP

POP3What type of coaxial cable is used when wiring a 10Base2 Ethernet network?

RG-6

RG-58

RG-11

RG-59

You need to extend an existing 10Base2 network segment. The new segment will be wired as 10BaseT. Both segments must be logically addressed as part of the same subnet.

What should you do?

Use a router to connect the segments.

Use a repeater to connect the segments.

Use a hub to connect the segments.

Use a bridge to connect the segments

File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) are implemented as which layer of the Open System Interconnect (OSI) model?

Transport layer

Application layer

Session layer

Presentation layer

You need to determine where the route is failing between your computer running Windows and a remote host. You need this information as quickly as possible.

What should you do?

Run ping.

Run tracert.

Run mtr.

Run route.

Your employees are being targeted by phishing attacks. How can you minimize the impact of these attacks? (Choose two.)

Through antivirus software

Through regular computer updates

Through enforced policies and procedures

Through traffic monitoring

Through user education

What protocol is used to find a network device's Media Access Control (MAC) address when its IP address is known?

DNS

ARP

DHCP

FTP

What category of twisted pair cable should you use when wiring a 10GBaseT Ethernet network?

CAT 3

CAT 6

CAT 5e

CAT 5

You need to extend your office network, but you cannot run new cable in the area. Devices should be addressed as part of an existing subnet that is wired as 10BaseT.

What should you do first?

Deploy a router.

Deploy a bridge.

Deploy a basic firewall.

Deploy a wireless access point

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are implemented at which layer of the OSI model?

Layer 6

Layer 7

Layer 4

Layer 5

You want to retrieve information about TCP/IP network connections and protocol statistics.

What should you do?

Run netstat.

Run ping.

Run nbtstat.

Run ipconfig.

You are setting up a home office with two computers. The computers will access the Internet through a cable modem connected to a switch that shares the connection.

You want to protect the computers from unwanted traffic and block access to unused TCP and UDP ports. You need to keep the cost and complexity of the network to a minimum.

What should you do?

Use a network firewall.

Use a host-based firewall on each computer.

Use an intrusion prevention system (IPS).

Use an intrusion detection system (IDS).

For what purpose is User Datagram Protocol (UDP) port 67 used?

IP address assignment

Host name resolution

File transfers

Mail delivery

What type of connector is used with RG-58 coaxial cable networking implementations?

RJ-11

BNC

SC

RJ-45

You are connecting your local area network (LAN) to the Internet. You need deploy a device to filter traffic between the Internet and your LAN based on TCP and UDP port usage.

What should you do?

Install and configure a router.

Install and configure a firewall

Install and configure a hub

Install and configure a bridge.

After you extended the length of a coaxial cable, you have problems with the signal strength at the far ends of the cable.

What should you do?

Test the new section of cable to see if it has a short and replace it if necessary.

Add an additional length of cable.

Install a repeater between the cable segments.

Increase the resistance of the cable terminators.

You need to determine if your network's Domain Name System (DNS) servers are properly supporting reverse lookup.

What should you do? (Choose two.)

Run the dig command.

Run the ping command.

Run the arp command.

Run the rarp command.

Run the nbtstat command.

Run the nslookup command.

You have three Web servers deployed in your perimeter network. You want to limit the traffic between your perimeter network and the Internet to secured and unsecured Hypertext Transfer Protocol (HTTP) only.

What should you do?

Deploy an IPS in the perimeter network.

Deploy a personal firewall on each Web server.

Deploy a network firewall between the perimeter network and the Internet.

Deploy an IDS in the perimeter network.

What Transmission Control Protocol (TCP) port is used for secure communications between Web clients and Web servers?

110

443

80

123

What type of connector is used with 10BaseT Ethernet networks?

BNC

RJ-11

RS-232

RJ-45

You need to prioritize network traffic so that you can control data transmission rates by port usage. What should you use?

Load balancer

Content switch

Multilayer switch

Bandwidth shaper

You add a computer to an existing 10BaseT network that is configured as a single subnet. The computer is configured with a static IP address. Other computers on the network cannot communicate with the new computer using its IP address. The new computer's network interface card and protocol stack appear to be working correctly.

What is most likely wrong? (Choose two).

Invalid IP address

Incorrect default gateway

Incorrect subnet mask

Problem with contacting a Dynamic Host Configuration Protocol (DHCP) server

Invalid computer name

When would you use a port scanner to test your perimeter network?

To identify potential holes in network firewalls

To determine if your network's Web servers are operating properly

To see if your proxy server is forwarding traffic

To tell how well your network responds to threats

When would you use a stateful firewall to filter traffic?

To filter by protocol type

To filter by individual packet headers

To filter by monitoring connections and allowing valid traffic by connection type

To filter by evaluating detailed packet content