Upload
phungliem
View
218
Download
3
Embed Size (px)
Citation preview
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 1/22
Exam: Network+ Practice Test 5
Question 1 of 90
Which of the following devices accepts incoming client requests and distributes those requests to specific servers?
IPS
Load balancer
CSU/DSU
Caching engine
Media converter
Question 2 of 90
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to theprivate network through a single server.
Which solution should you implement?
VPN concentrator
IDS
IPS
DMZ
RADIUS
Question 3 of 90
How does a proxy server differ from a packet filtering firewall?
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
A proxy server includes filters for the session ID as well as the IP address and port number.
A proxy server can prevent unknown network attacks, while a packet filtering firewall can only prevent known attacks.
A proxy server is used to create a DMZ, while a packet filtering firewall can only be used for screened subnets.
Question 4 of 90
Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?
Bridge
Switch
Router
Hub
Question 5 of 90
Which of the following is a valid IPv4 address? (Select two.)
256.0.0.1
10.384.0.3
192.168.1.512
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 2/22
172.16.1.26
2.2.2.2
1.254.1.1024
254.7.1.417
Question 6 of 90
Which of the following is a valid MAC address?
192.168.12.15
255.255.255.0
7399126115
C034FF15018E
349A861GB324
835A5B0B3155F1
Question 7 of 90
Which three of the following IP addresses are Class C addresses?
192.15.5.55
222.55.0.0
223.16.5.0
240.0.0.0
189.189.5.2
125.166.11.0
Question 8 of 90
Your network has been assigned the Class C network address of 200.78.151.0. Which three of the following addresses can be assigned to hosts on yournetwork?
200.78.151.0
200.78.151.255
200.78.151.12
200.78.151.252
200.78.151.257
200.78.152.14
200.78.151.111
Question 9 of 90
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide touse APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuringInternet access.
What is the likely cause of the problem?
The default gateway is not set on the client systems.
The default gateway is not set on the server.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 3/22
Private addresses cannot directly communicate to hosts outside the local subnet.
All client systems must be rebooted.
The DNS server is unavailable to resolve Internet hostnames.
Question 10 of 90
Your computer has an IP address of 161.13.5.15. Your computer is on a:
Public network
Private network
Class C network
Multicast network
Question 11 of 90
Which of the following associates a port number with a host on a private network?
PAT
NAT
CIDR
VLSM
Question 12 of 90
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16.You have a single public address that is shared by all hosts on your private network.
You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website.
What should you use to allow access?
Static NAT
Dynamic NAT
DNS A record
DNS CNAME record
Multicast
Question 13 of 90
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device.Which protocol can be used to discover the MAC address?
ICMP
IGMP
BOOTP
DHCP
ARP
DNS
Question 14 of 90
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 4/22
All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements:
• Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet.• You want to use a sitetosite tunneling method instead of a hosttohost tunneling method.
Which IPv6 solution should you use?
ISATAP
Teredo
6to4
4to6
Question 15 of 90
Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?
OSPF
ISIS
EIGRP
BGP
RIP
Question 16 of 90
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
RIP
EIGRP
OSPF
ISIS
Question 17 of 90
What are the main differences between the OSPF and ISIS routing protocols?
OSPF is a link state protocol, while ISIS is not.
OSPF requires an area 0, while ISIS does not.
OSPF is an IGP routing protocol, while ISIS is a BGP routing protocol.
OSPF is a classful protocol, while ISIS is a classless protocol.
Question 18 of 90
Which of the following protocols has a limit of 15 hops between any two networks?
RIP
EIGRP
OSPF
ISIS
BGP
Question 19 of 90
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 5/22
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0.The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
Drop the packet.
Forward the packet to the next hop router specified by the route to network 0.0.0.0.
Send the packet out both of its directlyconnected networks as a broadcast frame.
Send the packet out both of its directlyconnected networks to the next hop router.
Question 20 of 90
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router.
The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
Drop the packet.
Send the packet out both of its directlyconnected networks as a broadcast frame.
Send the packet to both networks 192.168.3.0 and 192.168.4.0 to the next hop router.
Hold the packet in cache until a matching route is learned or configured.
Question 21 of 90
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all othernetworks.
The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?
Manually reconfigure the default route to point to the new next hop router.
Force RIP to perform an immediate update.
Stop and restart the RIP protocol on the router.
Wait for network convergence to take place.
Question 22 of 90
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks192.168.3.0/24 and 192.168.4.0/24.
The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible.
What should you do?
Manually reconfigure the default route to point to the new next hop router.
Force RIP to perform an immediate update.
Stop and restart the RIP protocol on the router.
Wait for convergence to take place.
Question 23 of 90
You have a network configured to use the OSPF routing protocol.
Which of the following describes the state when all OSPF routers have learned about all other routes in the network?
Convergence
Link state
Distance vector
Classful
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 6/22
VLSM
Question 24 of 90
Drag the collision domain property on the left to the appropriate network device(s) on the right. Eachproperty can be used more than once.
Drag
Single collision domain
Multiple collision domains
DropHub
Switch
802.11n wireless access point
Router
Bridge
Repeater
Layer 3 switch
Question 25 of 90
Which of the following protocols provide gateway redundancy? (Select all that apply.)
VRRP
HSRP
GLBP
STP
PoE
Question 26 of 90
Match the default administrative distance with the route type.
Drag
0
1
5
90
100
110
120
DropIGRP
RIP
Static Route
EIGRP Internal Route
OSPF
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 7/22
170EIGRP Summary Route
Connected Interface
EIGRP External Route
Question 27 of 90
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic betweendevices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
Which solution should you implement?
Hostbased IDS
Networkbased IDS
VPN concentrator
Port scanner
Protocol analyzer
Question 28 of 90
Which of the following devices is capable of detecting and responding to security threats?
IDS
IPS
DNS server
Multilayer switch
Question 29 of 90
You have a Web server on your network that hosts the public website for your company. You want to make sure that the website will continue to beavailable even if a NIC, hard drive, or other problem prevents the server from responding.
Which solution should you implement?
Load balancing
NIC teaming
QoS
Traffic shaping
Question 30 of 90
In virtualization, what is the role of the hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
A hypervisor has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, and motherboard.
A hypervisor is a software implementation of a computer that executes programs like a physical machine.
A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 8/22
Question 31 of 90
What type of virtualization completely simulates a real physical host?
Full virtualization
Partial virtualization
Paravirtualization
Semivirtualization
Question 32 of 90
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, etc.)• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1can communicate with.
Device Port Port Assignment
Virtual Switch P1 Virtual Network1
P2 Virtual Network1
P3 Virtual Network1
P4 Physical Network
P5 Physical Network
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network
Question 33 of 90
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualizationshould you implement?
Virtual servers
Virtual desktops
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 9/22
Virtual networks
Network as a Service (NaaS)
Question 34 of 90
Which component is most likely to allow physical and virtual machines to communicate with each other?
Virtual switch
VHD
Host operating system
Virtual desktop
Question 35 of 90
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, etc.)• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1can communicate with.
Device Port Port Assignment
Virtual Switch P1 Virtual Network1
P2 Virtual Network2
P3 Virtual Network1
P4 Virtual Network2
P5 Physical Network,
Virtual Network1
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network
Question 36 of 90
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 10/22
IaaS
PaaS
SaaS
DaaS
Question 37 of 90
Which of the following is not true regarding cloud computing?
The term cloud is used as a metaphor for the Internet.
Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a webbrowser.
Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services.
Cloud computing is software, data access, computation, and storage services provided to clients through the Internet.
Question 38 of 90
Match each description on the left with the appropriate cloud technology on the right.
Drag
Provides cloud services to just aboutanyone.
Allows cloud services to be shared byseveral organizations.
Integrates one cloud service with othercloud services.
Provides cloud services to a singleorganization.
DropPublic cloud
Private cloud
Community cloud
Hybrid cloud
Question 39 of 90
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versionsand editions.
Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you areconcerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly witheach other.
What should you do? (Select two. Both responses are part of the complete solution.)
Create a new virtual switch configured for hostonly (internal) networking.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Disconnect the network cable from the hypervisor's network interface.
Disable the switch port the hypervisor's network interface is connected to.
Create a new virtual switch configured for bridged (external) networking.
Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces.
Question 40 of 90
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automaticallyinstalled on your workstations that caused an inhouse application to stop working.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 11/22
To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations.
Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft todownload and install updates.
What should you do? (Select two. Both responses are part of the complete solution.)
Create a new virtual switch configured for hostonly networking.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Disable the switch port that the hypervisor's network interface is connected to.
Create a new virtual switch configured for bridged (external) networking.
Create a new virtual switch configured for internal networking.
Question 41 of 90
You want to be able to monitor and filter VMtoVM traffic within a virtual network.
What should you do?
Implement a virtual firewall within the hypervisor.
Create a virtual router with VRF technology.
Route VMtoVM traffic through a physical firewall and back to the virtual network.
Define VLAN memberships on each VM.
Question 42 of 90
Arrange the Fibre Channel SAN implementation tasks in the order they should be performed.
Drag
Connect each server to the FibreChannel switch using the appropriatefiber optic cabling for the equipment youare using.
Deploy a Fibre Channel switch.
Deploy a shared storage device, such asan external RAID device containingmultiple hard disk drives.
Install a Fiber Channel adapter in eachserver that will access the sharedstorage on the SAN.
DropStep 1
Step 2
Step 3
Step 4
Question 43 of 90
Which of the following statements about virtual NICs are true? (Select two.)
The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated.
Virtual NICs can communicate only with other virtual NICs.
Multiple virtual NICs can be added to a virtual machine.
Virtual NICs need the appropriate driver installed to function.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 12/22
Virtual NICs don't have a MAC address.
Question 44 of 90
Which of the following are typical components of a NAS device? (Select two.)
One or more NICs.
A minimal network OS.
An FC switch.
External RAID array.
Initiator server.
Question 45 of 90
You manage a network with a single switch. All hosts connect to the network through the switch.
You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by an accountingcomputer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through thenetwork.
What should you do?
Configure a VLAN on the switch for the accounting computers.
Implement NAC with 802.1x authentication for the accounting computers.
Use a router to configure a subnet for the accounting computers.
Configure MAC address filtering on the switch for the accounting computers.
Question 46 of 90
You have a web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be availableeven if a NIC, hard drive, or other problem prevents the server from responding.
Which solution should you implement?
Load balancing
NIC teaming
QoS
Traffic shaping
Question 47 of 90
What is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment?
They are vulnerable to exploits due to weaker security.
They use redundant paths for fault tolerance which can cause message loops to develop on the network.
They are not compatible with routing protocols which causes a burden on network bandwidth.
They are not physically secure, so they can be reconfigured by anyone who has access to them.
Question 48 of 90
Which of the following is a reason to use a protocol analyzer?
Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.
Capture, modify, and retransmit frames.
Measure the amount of data that can be transferred through a network.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 13/22
Simulate a large number of client connections to a website.
Question 49 of 90
Your organization uses a timekeeping application that only runs on Windows 2000. Because of this, there are several Windows 2000 workstations on yournetwork.
Last week you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discover that theWindows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needsto use the Windows 2000 workstations—which need to be connected to the Internet—but you want to make sure the network is protected from futureevents.
Which solution should you implement to protect the network while also allowing operations to continue as normal?
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
Implement a hostbased firewall on each Windows 2000 workstation and configure Windows to automatically download and install updates.
Install antivirus software on the Windows 2000 workstations and configure Windows to automatically download and install updates.
Create a dedicated network for the Windows 2000 workstations that is completely isolated from the rest of the network, including a separateInternet connection.
Question 50 of 90
Which of the following intrusion detection and prevention systems uses fake resources to entice intruders by displaying a vulnerability, configuration flaw, orvaluable data?
Honeypot
Botnet
Trojan horse
Zombie
Question 51 of 90
Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two.)
Attackers are offered targets that occupy their time and attention, while distracting them from valid resources.
Reveals information about an attacker's methods and gathers evidence for identification or prosecution purposes.
Detect attacks that are unique to the services on valid system resources and monitor application activity.
Detect anomalous behavior that varies from standard activity patterns, also referred to as heuristic recognition.
Entices attackers to reveal their IDS signatures which can then be matched to known attack patterns.
Lures attackers into a noncritical network segment where their actions are passively monitored and logged then shuns the attacker by simplydropping their connection.
Question 52 of 90
Load balancing provides fault tolerance by doing which of the following?
Detecting when a server in the farm is unavailable and distributing new requests to available members.
Distributing requests evenly or unevenly to servers in the farm based on criteria such as server capacity.
Caching data for quick retrieval based on the most common incoming requests for data.
Bonding multiple NICs on different switch ports on a network device into a single entity .
Question 53 of 90
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 14/22
Virtual sandbox
Offsite virtual storage
Network as a Service (NaaS)
VLAN
Question 54 of 90
Which firewall implementation creates a buffer network that can be used to host email or web servers?
DMZ
ACL
Perimeter firewall
Hostbased firewall
Question 55 of 90
Match the firewall type on the right with the OSI Layer at which it operates.
Note: Each OSI Layer can be used once, more than once, or not at all.
Drag
OSI Layer 1 OSI Layer 2
OSI Layer 3 OSI Layer 4
OSI Layer 5 OSI Layer 6
OSI Layer 7
DropPacketFilteringFirewall
CircuitlevelProxy
ApplicationlevelGateway
RoutedFirewall
TransparentFirewall
Question 56 of 90
Match the port security MAC address type on the left with its description on the right.
Drag
SecureConfigured
SecureDynamic
SecureSticky
DropMAC address manually identified asan allowed address
MAC address that has been learnedand allowed by the switch
MAC address that is manuallyconfigured or dynamically learned thatis saved in the config file
Question 57 of 90
You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your network's security.
You are currently configuring the remediation network that noncompliant clients will connect to in order to become compliant. The remediation network
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 15/22
needs to be isolated from the secure network.Which should you implement to do this?
Network segmentation
Virtual private networking (VPN)
Port security
Data encryption using PKI
Question 58 of 90
A traffic shaper is a device used to optimize network performance.
Which of the following describe the specific capabilities of a traffic shaper? (Select three.)
It modifies the flow of data through a network in response to network traffic conditions.
It throttles bandwidth to restrict the amount of data sent within a specific time period.
It restricts the maximum bandwidth available to a customer.
It allows switches to perform the switching function at wire speed.
It limits the effects of packets arriving out of order, corrupt packets, and lost or dropped packets.
It saves previously acquired data for quick retrieval at a later time.
It distributes incoming requests to members of a server farm based on current server capacity.
Question 59 of 90
A content switch works at different layers of the OSI model in order to provide network optimization through load balancing.
At which layers of the OSI model does a content switch function?
Layer 4–7
Layer 2 and 3
Layer 1–4
Layer 3–7
Question 60 of 90
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to thefirewall.
Which tool should you use?
Packet sniffer
Load tester
Throughput tester
Event log
System log
Question 61 of 90
You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneoussessions that this server can maintain before performance is negatively impacted.
Which tool should you use?
Packet sniffer
Load tester
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 16/22
Load tester
Throughput tester
Baseline
System log
Question 62 of 90
Which of the following is a standard for sending log messages to a central logging server?
Syslog
OVAL
Nmap
LC4
Question 63 of 90
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longeraccess the network.
You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make anothercable and attach it from the wall plate to the user's computer.
What should you do next in your troubleshooting strategy?
Establish what has changed.
Document the solution.
Test the solution.
Recognize the potential effects of the solution.
Question 64 of 90
You are a network administrator for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next inyour troubleshooting strategy?
Establish the symptoms.
Establish what has changed.
Identify the affected area.
Recognize the potential effects of the problem.
Question 65 of 90
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online.
After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturerthat is supposed to eliminate the problem.
What should you do next?
Apply the patch to the router.
Identify possible effects of the solution.
Document the problem and the solution.
Identify the affected areas.
Question 66 of 90
A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsiblefor managing and maintaining the wireless access point.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 17/22
for managing and maintaining the wireless access point.
What should you do next?
Create an action plan.
Determine if escalation is needed.
Fix the problem.
Document the problem.
Question 67 of 90
A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem.
What should you do next?
Identify the affected areas of the network.
Determine if anything has changed.
Establish the most probable cause.
Determine if escalation is necessary.
Question 68 of 90
You want to measure the voltage, amps, and ohms of various devices.
Which tool should you use?
Butt set
Multimeter
Certifier
Toner probe
voltage event recorder
Question 69 of 90
You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actualbandwidth of the link.
Which tool should you use?
Packet sniffer
Load tester
Throughput tester
Baseline
Question 70 of 90
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States.The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, andfive Macintosh clients.
Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers betweenyour office and the main headquarters is not working properly.
What TCP/IP utility can you use to see if a router is not working properly?
tracert
netstat
nbtstat
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 18/22
nslookup
Question 71 of 90
Which three of the following functions are performed by the OSI Transport layer?
Data segmentation and reassembly
Reliable message delivery
Endtoend flow control
Consistent data formatting between dissimilar systems
Control media access, logical topology, and device identification
Format packets for delivery through the media
Path identification and selection
Question 72 of 90
In the OSI model, what is the primary function of the Network layer?
Allows applications to establish, use, and end a connection
Transmits data frames
Ensures that packets are delivered with no loss or duplication
Routes messages between networks
Question 73 of 90
In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.)
Handle general network access, flow control, and error recovery
Provide network services
Encrypt and compress data
Transmit data frames
Specify data format (such as file formats)
Maintain separate client connections
Question 74 of 90
The Data Link Layer of the OSI model is comprised of two sublayers. What are they? (Select two.)
LLC
DLC
MAC
LAT
SAN
Question 75 of 90
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more thanonce.
Drag Drop
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 19/22
Transport
Internet
Network Interface
Application
Presentation
Data Link
Application
Session
Network
Transport
Question 76 of 90
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
Polling
Token passing
CSMA/CD
CSMA/CA
Question 77 of 90
You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch.
Which condition are you most likely to experience on the network?
Collisions
Crosstalk
Attenuation
Echo
Interference
Question 78 of 90
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?
The device with the token can use the transmission media.
The device listens to determine if the transmission media is free.
The device is notified of its turn to send messages.
The device requests permission from a controlling device.
The device transmits whenever it is ready.
Question 79 of 90
Which of the following use the CSMA/CD access method? Select all that apply.
1000BaseT
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 20/22
10BaseT
Token Ring
FDDI
Question 80 of 90
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?
IGMP
ICMP
IP
SNMP
MGP
Question 81 of 90
Match the description on the left with the appropriate networking signal line code on the right.
Drag
A 0 is represented by sending a lightpulse. A 1 is represented by sending nolight pulse.
Binary 0s and 1s are transmitted bysending voltage pulses, with the voltagereturning to zero between pulses.
Binary 1s are represented by positivevoltage while 0s are represented bynegative voltage. There is no zerovoltage state between bits.
The transition from one voltage level toanother is used to represent binary data.
DropNonReturntoZero
Manchester
ReturntoZero Inverted
ReturntoZero
Question 82 of 90
Match each network signaling method on the left with its corresponding definition on the right. Each definition may be used once, more than once, or not atall.
Drag
Baseband
Broadband
Frequencydivision multiplexing
Demultiplexing
Manchester line code
Bit rate
Baud rate
DropUses the entire network medium as a singletransmission channel.
Combines signals from multiple channels into asingle channel.
Assigns different frequencies to differentchannels on the same network medium.
Divides the transmission medium into severalchannels.
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 21/22
Measures the number of times a signal in acommunications channel changes state.
Measures the number of data bits transmitted inone second in a communication channel.
Question 83 of 90
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the mainwiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building.
Which of the following should you include in your plan?
Repeater
Shielded twisted pair
Spanning tree
Halfduplex
Question 84 of 90
Ethernet 100BaseFX networks use what type of cabling?
Fiber optic
Coaxial
Unshielded twisted pair
Shielded twisted pair
Question 85 of 90
Which of the following Ethernet standards uses fiber optic cabling? (Select two.)
1000BaseCX
100BaseT4
100BaseFX
100BaseTX
1000BaseLX
Question 86 of 90
Your network follows the 100BaseFX specifications for Fast Ethernet, and uses halfduplex, multimode cable. What is the maximum cable segment lengthallowed?
100 meters
412 meters
550 meters
1,000 meters
2,000 meters
Question 87 of 90
8/30/2016 TestOut LabSim
http://cdn.testout.com/clientv5110370/startlabsim.html?culture=enus 22/22
With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:
100 meters
185 meters
100 feet
500 feet
Question 88 of 90
What topology is used with 100BaseTX Fast Ethernet networks? (Select two.)
Physical star/logical bus
Physical star/logical ring
Physical star/logical star
Physical ring/logical star
Question 89 of 90
You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within theconnector?
White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
White/orange, orange, white/green, green, white/blue, blue, white/brown, brown
White/blue, blue, white/orange, orange, white/green, green, white/brown, brown
Question 90 of 90
Which type of Internet service uses the DOCSIS specification?
Unshielded Twisted Pair
Shielded Twisted Pair
Fiber Optic
Coaxial cable