IS5203 Week 8 Quiz

  1. Refer to the exhibit. Which authentication protocol is shown in this exhibit?

    reference image for question TACACS+

2. Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?

Local authentication

3. Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?

Local Authentication

4. What kind of network is the PSTN?

Circuit-switched

5. What kind of device can monitor a connection at the demarc but cannot interpret data?

Smart jack

6. Where does an MPLS label go in a PDU?

Between Layers 2 and 3

7. What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

8. How many channels are in an ISDN PRI connection?

23B+D

9. What method does a GSM network use to separate data on a channel?

TDMA

10. Which DSL standard has the fastest speeds immediately outside the CO?

VDSL

11. An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier’s cloud.

dedicated line, virtual circuit

12. ______________ in SONET are analogous to the ________________ of T-carriers.

OC levels, digital signal levels

13. What specifications define the standards for cable broadband?

DOCSIS

14. Which type of address uses 12 hexadecimal digits? (Choose two.)

  •  MAC address
  •  Physical address

15. Which of the following is the PDU used by a connection-oriented Transport layer protocol?

Segments

16. Which cell phone technology uses a spread-spectrum technique that uses codes on the packets to keep calls separated?

CDMA

17. You need to implement software that can manage virtual machines and manage resource sharing between a host computer and guest VMs. What should you implement?

A hypervisor

18. A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has been told that all Internet access should go through a single computer so incoming and outgoing traffic can be screened and only that computer should have an address revealed to the Internet. What should the administrator set up?

Proxy server

19. After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices on the LAN. He verifies that the IP address and subnet mask are in the correct IP subnet. While the technician is troubleshooting, another user complains that she can no longer access the network. No other users seem to be having any problems. What could be the cause of the problem?

Duplicate IP

20. Which of the following best describes the IEEE 802.11b standard?

2.4 GHz, 11 Mbps

21. Which authentication protocol uses PKI to provide mutual authentication?

EAP-TLS

22. The Webmaster for a company installed a certificate on a Web server to provide secure communication between the Web server and Web browsers. What protocol will be used to provide a secure channel?

SSL

23. A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?

Load balancing

24. Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)

  • Patch panel labeling
  •  Wall jack labeling

25. You have been asked to install a physical security control that will prevent unauthorized users from accessing the server room. Which of the following should you install?

Proximity reader

26. Which protocol is most likely used to communicate with a SAN over an Ethernet LAN using standard NICs?

iSCSI

27. You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintain a network connection as they move between buildings. What should you be sure to configure on your WAPs to give the wireless users the best mobile experience?

Set the SSIDs to match

28. A company negotiates with a service provider for Frame Relay service. At the conclusion, the company and service provider sign an agreement specifying the bandwidth and the availability of the service. What document was signed?

SLA

29. You have been called to terminate a DS3 connection at a customer site. What type of connector should you bring to terminate the copper cable?

BNC

30. Which type of Internet connection can provide an unshared connection over regular telephone lines operating with at least 1 Mbps of bandwidth?

DSL

31. One of your clients is adding several computers to a guest waiting area. They have asked you to ensure that inappropriate websites cannot be accessed from those computers. What should you configure?

Content filter

32. A technician has run an MMF cable from the IDF to the MDF and is not getting a strong signal. He needs to check the length of the cable and see if there are any breaks or mismatched connectors. What should he use?

OTDR

33. When two or more WAPs are installed in close proximity, what must be different on each WAP to avoid problems?

Channel

34. A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred?

Phishing attack

35. Which of the following is a private IP address?

172.30.99.8

36. Your boss has asked you to run an Nmap scan on all the routers on one of your subnets. What is your boss looking for?

Open ports

37. One morning you come into work and find that one of your servers has been attacked by malware. All the security patches are up-to-date. After doing some investigating and research, you cannot find any information about the nature of the attack or the server vulnerability that allowed it. What are you most likely experiencing?

Zero-day exploit

38. MMF cable runs from a company datacenter to a workgroup switch that has 16 RJ-45 ports. A connection must be made from the MMF cable to the switch. What is necessary?

Media converter

39. Which of the following is found in the intermediate distribution frame and is used to terminate cabling coming from the work area?

Patch panel

40. You need to ensure that customers have access to your public web servers in the event of a disaster such as a power outage or a failed server. What do you need to implement on your network?

High availability

41. You have been asked to install a device that supports WPA2 and 802.11ac. What device should you install?

WAP

42. While investigating a problem with a router, the show interface command reports line protocol down on the Ethernet port. A Cat5e cable is plugged into the port and is connected to another router’s Ethernet port about 80 meters down the hall. Both routers are turned on and configured correctly. The cable is terminated using the TIA/EIA 568A standard on both ends and was tested with a cable certifier. What would solve the problem?

Re-terminate one end using TIA/EIA 568B

43. A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the applications they are running are still critical. The administrator wants to consolidate the older servers into about five servers while maintaining isolation among the applications. What should the administrator implement?

Server virtualization

44. A network technician has been asked to make a connection between two switches in an IDF and MDF using 1000BaseSX Ethernet. The IDF and MDF are about 85 meters apart. The technician brings an adequate length of Cat6a cable to make the connection but finds that he is unable to make a connection. What is the problem?

He needs a multimode fiber cable

45. You are planning to configure a voice and video system that will use TCP/IP. You need to study the protocols and devices you might be using to deploy the system. Which of the following are you likely to study? (Choose two.)

 SIP

 H.323

46. A user is unable to connect to a server with address 172.21.100.100. A technician troubleshooting the problem enters the ipconfig command and sees the output shown below. What should be done to resolve the problem?

Change the default gateway to 172.31.210.250

47. Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the machine shop was closed. The network is using 1000BaseT switches and all the NICs are 1000BaseT compatible. The longest run of cable is 85 meters. All cabling was certified and network connectivity was verified. On Monday, the users of the computers report very slow network performance and the switch reports CRC errors. What is the most likely reason for the problems?

External EMI/RFI

48. Which type of cable should you use if you need to support up to 10 Gbps bandwidth at a distance of 85 meters using RJ45 connectors?

Cat 6a

49. A recent audit has prompted a lengthy search for the whereabouts of high-value equipment. While the equipment was eventually found, you want to ensure that you don’t have to waste time in the future searching for your equipment. What can you put in place to keep track of your equipment?

Asset tracking

50. Which device uses CSMA/CD when the interface is set to half duplex mode?

Ethernet NIC

51

You want to implement a system that uses certificates for identity verification and secure key management. What type of system do you need to implement?

PKI

52. Which of the following works over two copper wire pairs, uses TDM, and transmits at 1.544 Mbps?

T1

53. You are configuring some new network printers and you want to be sure the printers are always dynamically assigned the same IP address. What should you configure?

DHCP reservation

54. One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, reliable Internet access. You have been asked to connect the branch office with the main office with a secure connection that uses their existing network infrastructure. What do you recommend?

Site-to-site VPN

55. You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?

Vulnerability scan

56. Which layer of the OSI model should you examine if you want to troubleshoot a problem with the HTTP protocol?

Application

57. You are familiar with SSH and are happy with the level of security it provides. You want similar secure communication for file transfers on your network. What should you use?

SFTP

58. Which TCP/IP protocol has only these fields in its header: Source port, Destination port, Length, and Checksum?

UDP

59. A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server’s performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do?

Install a second server and load balancer

60. You need to perform out-of-band management on a router. How should you connect to the router?

Via the console port

61. Which device is used to detect suspicious packets and provides information about possible violations to a management station?

IDS

62. Several users on the second floor of your company’s building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?

Question users

63. Which technology allows multiple signals to travel simultaneously over one medium?

Multiplexing

64. A user transfers several MP3 files from her smartphone to her laptop computer using Bluetooth. What type of network infrastructure is she using?

PAN

65. You have been tasked with hardening some of the routers and switches on your network. Currently, your network administrators use telnet to remotely manage the devices. What can you do to make those devices more secure?

Use SSH for remote management instead of telnet

66. What type of connector is used with an SFP port?

LC

67. A network technician is meeting with a representative of an ISP to inspect the facility where a new WAN connection will be made. Where should the technician meet the representative?

MDF

68. Which device should you install that will give your mobile users secure remote access to the company servers through the public Internet?

VPN concentrator

69. You have been asked to examine the status of antivirus software, security patches, and open ports. When you are finished, you should provide a report of your findings. What have you been asked to perform?

Posture assessment

70. Recent police reports suggest that unsavory individuals have been casing the neighborhood where your company is located. You want to ensure that an alarm is triggered in the event someone is detected roaming the premises after business hours. What are you most likely to deploy?

Motion detection

71. Which of the following is a valid example of an IPv6 link local address?

FE80::1

72. A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need?

F-connector

73. Which networking model should you use to allow the users on each computer to control access to their own shared folders and printers without centralized control?

Peer-to-peer

74. A network technician is asked to send ICMPv6 packets to the IPv6 loopback address on her computer. What command will the technician use?

ping ::1

75. While installing routers between two buildings, a technician must configure an IPv4 address on both routers using a subnet mask that will yield only the required IP addresses. What should the technician use for the subnet mask, expressed in CIDR notation?

/30

76. You have recently implemented a new WAN technology to connect a remote branch office to your headquarters. While making VoIP calls between the offices, employees complain about delays between someone talking and the other party hearing what they’ve said. Which WAN technology is most likely to cause this apparent latency?

Satellite

74. Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and was developed by Cisco?

TACACS+

75. You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?

Wrong antenna type

76. You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that run the conferencing client application receive packets related to the videoconference. You need to assign an address to the videoconferencing application. Which of the following addresses is appropriate?

229.1.100.1

77. You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others that they used to have access to. What is the most likely reason for this problem?

Access control lists

78. Which of the following devices works with frames and MAC addresses and supports STP?

Switch

79. You have recently set up a new Windows server and have configured the Administrator account with a strong password. What else should you do to make the new server more secure?

Rename the Administrator account

80. A network administrator wants to provide backup power for his datacenter. He will be using a generator. What type of power does a generator produce and what other component is needed to provide the type of power required for a datacenter?

Produces DC power, need an inverter

81. Which of the following separates multiple signals on the same medium by using time slots where each time slot carries data to a different destination or carries a different type of data to the same destination?

TDM

82. You are planning on a redesign of your network that will involve adding two VLANs and reconfiguring some IP subnets. What should you do first?

Submit a change request document

83. A startup company has an idea for a new medical records application. The company wants to develop the application so it can be run on multiple OSs. However, they have limited funds to build the development environment that is necessary to create and test the application properly. What service should they consider?

Public PaaS

84. You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you investigate?

Transport

84. A number of computers have been reported to be getting incorrect IP addresses. After doing some investigating, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next?

Establish a plan of action to find the DHCP server

85. You need to provide a method to ensure that sensitive files downloaded from your servers can be verified for integrity. Which of the following solutions can you deploy?

SHA-2

86. While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?

Can you access other devices on the network?

87. While cleaning loose-tube fiber-optic cables, a technician gets some of the cleaning solvent near his eyes. Which of the following should the technician check to see how to deal with the problem?

MSDS

88. You need to be able to create rules to filter packets and protect against attacks from the Internet. What type of device should you use?

Firewall

89. While setting up a new network, a technician connects two switches together using a Cat6 straight-through cable. The switch ports are configured for 1000BaseT Ethernet, full-duplex, and do not support auto-MDIX. After making the connection, the link status light for both ports remains off. What is the most likely problem?

Wrong cable termination

90. A network has four switches, each with twenty computers connected to the switch ports. Each set of twenty computers been assigned a different IP network number. What is required for all computers to communicate with each other?

Router

91. You are configuring an AP for a WLAN. You want to use the strongest encryption supported by the device. Which of the following should you choose?

WPA2

92. To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the technician configure?

Jumbo frames

93. You arrive at a customer site to resolve a problem with a router. After logging on to the router, you find that it uses a different operating system than the routers you are familiar with. Which troubleshooting step should you take next?

Escalate the problem

94. A user’s computer is redirected to an attacker’s server after the attacker transmitted several frames onto the network. After some investigation, you have found that the user’s computer had an incorrect mapping of an IP address to a MAC address. What type of attack took place?

ARP cache poisoning

95. While using a protocol analyzer, you see a packet with UDP source port 68 and destination port 67. What are you seeing?

A DHCP packet going from the DHCP client to the DHCP server

96. You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems?

Interference

97. You’ve arrived on site to a WAN installation where you will be performing maintenance operations. You have been told the WAN protocol in use allows multiple Layer 3 protocols and uses routers that use labels in the frame headers to make routing decisions. What WAN technology is in use?

MPLS

98. The default VLAN on a switch has been assigned an IP address of 172.19.0.64/27 with a default gateway of 172.19.0.94. You can’t ping the switch from your workstation that has the address 172.19.0.66/27 but you can ping your default gateway that has the address 172.19.0.94. Why can’t you ping the switch?

The switch has the wrong IP address.

99. Which of the following is associated with SNMP software? (Choose two.)

MIB

Trap

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *