Sie sind auf Seite 1von 5

NETWORK+ CERTIFICATION REVIEWS

1. Which of the following tools is used for querying DNS server to obtain domain name or IP address mapping? nslookup 2. HTTPS: (Select 2) uses SSL/TLS and runs on TCP port 443 3. In transport mode, IPsec doesn't offer any encryption. false 4. Which of the following TCP ports is used for FTP data transfer? 20 5. Which of the following cabling types is used with BNC connectors? coaxial 6. IPv6 address consists of: 128 bits 7. Layer 2 Tunneling Protocol (L2TP): (Select 3) offers no encryption, is used with IPsec and runs over UDP port 1701 8. Which of the following is an IPv6 loopback address? ::1 9. Network Time Protocol (NTP) uses: UDP port 123 10. Which of the following port numbers are used by Simple Network Management Protocol (SNMP)? (Select 2) 161 and 162 11. Wireless network name is also known as: SSID 12. Smurf attack is an example of: (Select best answer) Distributed Denial of Service 13. Which of the following is also known as an echo request? ICMP packet 14. Internet Group Management Protocol (IGMP): (select 2) is used for establishing multicast group memberships and is used on IPv4 networks 15. IMAP4: (Select 2) runs on TCP port 143 and is used for retrieving e-mail messages from e-mail servers 16. Which of the following protocols are used for retrieving e-mail messages from e-mail servers? (Select 2) IMAP and POP 17. MAC address: (Select 2) consists of 48 bits and is also known as a physical address 18. Which of the following is an access method used in Ethernet networks? CSMA/CD 19. When two communicating nodes can send and receive but not at the same time, the communication is described as: half-duplex 20. Which of the following standards defines 10 Gigabit Ethernet (10GbE)? 802.3ae 21. What is the value of the number 192 in binary? 11000000 22. Which of the following is an address range used by Automatic Private Internet Protocol Addressing (APIPA)? 169.254/16 23. /24 subnet mask: has 24 leading 1s in binary 24. If a host gets a link-local address only, this may indicate a possible problem with: DHCP 25. Which of the following services may need troubleshooting if a host gets a single IP address and that address has the fe80::/10 prefix? DHCP 26. Which of the following commands must be typed in Windows to get a new DHCP lease? (Select 2) ipconfig /release and ipconfig /renew 27. UDP port 67 is used by: (Select 2) DHCP and Bootstrap Protocol 28. Which of the following can be called a static VLAN? VLAN based on ports 29. Which of the following can be called a dynamic VLAN? VLAN based on MAC addresses 30. Which part of the MAC address identifies the vendor of the Network Interface Card (NIC)? first half 31. Which of the following statements are true? (Select 2) modem converts analog signal to digital signal and modem converts digital signal to analog signal 32. Which of the following DNS records is an IPv4 address record? A 33. Which of the following DNS records is an IPv6 address record? AAAA 34. PAP, CHAP, MS-CHAP, and MS-CHAPv2, are all used to provide: authentication 35. Password Authentication Protocol sends credentials over the network in cleartext. True 36. Lack of encryption is the feature of: (Select all that apply) PAP, L2TP and TFTP 37. Which of the following is used to provide encryption in WEP? RC4 38. Timestamps and tickets are the features of: Kerberos 39. Which of the following UDP ports are used by Simple Network Management Protocol (SNMP)? (Select 2) 161 and 162 40. Your answer to "T1 lines run at the speed of:" was "44.736 Mbps". The correct response was "1.544 Mbps". 41. Your answer to "Asynchronous Transfer Mode (ATM) encodes data into:" was "packets". The correct response was "cells". 42. Your answer to "Which of the following standards applies to cable modems?" was "ATM". The correct response was "DOCSIS".

Page 1 of 5

NETWORK+ CERTIFICATION REVIEWS


43. Your answer to "T3 lines run at the speed of:" was "2.048 Mbps". The correct response was "44.736 Mbps". 44. Your answer to "Public Switched Telephone Network (PSTN) is also commonly referred to as:" was "DSL". The correct response was "POTS". 45. Your answer to "Faults in fiber-optic cabling can be located with the use of:" was "multimeter". The correct response was "OTDR". 46. Your answer to "E1 lines run at the speed of:" was "44.736 Mbps". The correct response was "2.048 Mbps". 47. Your answer to "Which of the following tools can be used to analyze network traffic?" was "port mapper". The correct response was "packet sniffer". 48. Your answer to "Which netstat parameter displays all connections and listening ports?" was "-g". The correct response was "-a". 49. Your answer to "Which of the following standards applies to VLANs?" was "802.5". The correct response was "802.1Q". 50. Your answer to "E3 lines run at the speed of:" was "44.736 Mbps". The correct response was "34.368 Mbps". 51. Your answer to "Which netstat parameter displays addresses and port numbers in numerical form?" was "o". The correct response was "-n". 52. Your answer to "Which of the following IEEE standards defines port-based access control?" was "802.11X". The correct response was "802.1X". 53. Your answer to "Which netstat parameter displays the routing table?" was "-a". The correct response was "r". 54. Your answer to "Wireless broadband solution defined in the IEEE 802.16 standard is also referred to as:" was "VLAN". The correct response was "WiMAX". 55. Your answer to "What is the name for an Ethernet cable terminated on both ends according to the TIA/EIA568-A standard or the TIA/EIA-568-B standard?" was "rollover cable". The correct response was "patch cable". 56. Your answer to "Which of the following security zones offers best security?" was "DMZ". The correct response was "intranet". 57. Your answer to "What is a honeypot? (Select 3)" was "virtual system that is used for testing updates and malware analysis". The correct response was "system that is meant to be compromised, system that is used to divert an attacker from the real production network and system that allows security administrators to monitor activities of a hacker". 58. Your answer to "Which of the following meet the requirements for two-factor authentication process?" was "password and PIN". The correct response was "password and biometric scanner". 59. Your answer to "Which IEEE standard specifies security mechanisms for wireless networks?" was "802.1Q". The correct response was "802.11i". 60. Your answer to "RC4 is used in: (Select 2)" was "WPA". The correct response was "WEP and WPA". 61. Your answer to "Which of the following are the features of WPA2? (Select all that apply)" was "WPA2 uses a block encryption cipher". The correct response was "WPA2 uses AES encryption, WPA2 is also known as Robust Security Network (RSN) and WPA2 uses a block encryption cipher". 62. Your answer to "The term "site survey" refers to:" was "social engineering technique". The correct response was "determining obstacles for a planned wireless network deployment". 63. Your answer to "Wich of the following can be used to enhance wireless network security? (Select 2)" was "wardriving". The correct response was "MAC address filtering and RADIUS". 64. Your answer to "Mac OS X is a:" was "Windows-based OS". The correct response was "UNIX-based OS". 65. Your answer to "Mac OS X account that has read and write privileges to all areas of the file system is called:" was "Administrator". The correct response was "root". 66. Your answer to "Which of the following are wireless broadcasting methods? (Select 3)" was "FHSS". The correct response was "DSSS, OFDM and FHSS". 67. Your answer to "Which type of DSL offers the highest connection speed?" was "SDSL". The correct response was "VDSL". 68. Your answer to "Secure Shell (SSH): (Select 2)" was "was designed as a replacement for Telnet". The correct response was "runs on TCP port 22 and was designed as a replacement for Telnet". 69. Your answer to "Which of the following are cryptographic hash functions? (Select 2)" was "AES". The correct response was "SHA-1 and MD5".

Page 2 of 5

NETWORK+ CERTIFICATION REVIEWS


70. Your answer to "Layer 5 of the OSI model is also referred to as:" was "data link layer". The correct response was "session layer". 71. Your answer to "Which of the following statements are true? (Select 3)" was "symmetric-key algorithms are based on a single key (shared key)". The correct response was "block ciphers provide stronger encryption than stream ciphers, symmetric-key algorithms are based on a single key (shared key) and public/private key pair is a feature of asymmetric encryption". 72. Your answer to "Which of the following statements apply to the Time to Live (TTL) field of an IP packet? (Select 3)" was "Every device processing an IP packet must increase the TTL value by at least 1.". The correct response was "TTL describes the maximum time an IP packet can exist in a network., Every device processing an IP packet must decrease the TTL value by at least 1. and If the TTL field value reaches 0 while an IP packet is still on the way to its destination, the IP packet is considered undeliverable and must be discarded.". 73. Your answer to "Which of the following parameters is used to execute ping command in the loop?" was "f". The correct response was "-t". 74. Your answer to "Which of the following parameters is used in the ping utility for setting the size of an ICMP packet?" was "-a". The correct response was "-l". 75. Your answer to "Which of the following is used as another term for a rogue wireless access point?" was "ICS". The correct response was "evil twin". 76. Your answer to "Which of the following are the features of Spanning Tree Protocol (STP)? (Select 2)" was "STP runs over a TCP port". The correct response was "STP can block ports that cause switching loops and STP operates at Layer 2 of the OSI model". 77. Your answer to "What kind of cabling types can be used in Ethernet networks? (Select best answer)" was "coaxial". The correct response was "coaxial, twinaxial, twisted pair, fiber-optic". 78. Your answer to "One rack unit is:" was "1 cm". The correct response was "1.75 inches". 79. Your answer to "Interference between two pairs in a cable measured at the same end of the cable as the signal source is called:" was "LPX". The correct response was "NEXT". 80. Your answer to "Which of the following is a Linux command-line utility for configuring TCP/IP network interface parameters?" was "ipconfig". The correct response was "ifconfig". 81. Your answer to "An IP address consists of: (Select 2)" was "network ID". The correct response was "network ID and host ID". 82. Your answer to "Which of the following are the elements of a MAC address? (Select 2)" was "subnet mask". The correct response was "OUI and device ID". 83. Your answer to "Which of the following ports is used by the Trivial File Transfer Protocol (TFTP)?" was "UDP port 67". The correct response was "UDP port 69". 84. Your answer to "Simple Mail Transfer Protocol (SMTP):" was "is used by e-mail clients for retrieving email messages from mail servers". The correct response was "is used for relaying e-mail messages between mail servers". 85. Your answer to "Reverse Address Resolution Protocol (RARP) does what kind of resolution?" was "domain name to IP". The correct response was "MAC to IP". 86. Your answer to "Which of the following ports are used by DNS? (Select 2)" was "UDP port 67". The correct response was "TCP port 53 and UDP port 53". 87. Your answer to "10.0.0.0 - 10.255.255.255 address range: (Select 2)" was "includes routable IP addresses". The correct response was "is class A address range and is made of non-routable IP addresses". 88. Your answer to "Which of the following commands produce the same result (display routing table)? (Select 2)" was "ifconfig". The correct response was "route print and netstat -r". 89. Your answer to "Simple Mail Transfer Protocol (SMTP) runs on:" was "TCP port 23". The correct response was "TCP port 25". 90. Your answer to "IMAP4 uses:" was "TCP port 443". The correct response was "TCP port 143". 91. Your answer to "Which of the following ports need to be open in order to be able to retrieve an e-mail from SMTP server? (Select 2)" was "143". The correct response was "110 and 143". 92. Your answer to "172.16.0.0 - 172.31.255.255 address range: (Select 2)" was "is class B address range". The correct response was "is class B address range and is made of non-routable IP addresses". 93. Your answer to "Port numbers are divided into:" was "5 ranges". The correct response was "3 ranges". 94. Your answer to "HTTPS runs on:" was "TCP port 80". The correct response was "TCP port 443". 95. Your answer to "192.168.0.0 - 192.168.255.255 address range: (Select 2)" was "is class C address range". The correct response was "is class C address range and is made of non-routable IP addresses".

Page 3 of 5

NETWORK+ CERTIFICATION REVIEWS


96. Your answer to "What is the range assigned to The Dynamic and/or Private Ports?" was "1024 through 49151". The correct response was "49152 through 65535". 97. Your answer to "Which of the following are port ranges assigned by the Internet Assigned Numbers Authority (IANA)? (Select all that apply)" was "Dynamic and/or Private Ports (from 49152 through 65535)". The correct response was "Well Known Ports (from 0 through 1023), Registered Ports (from 1024 through 49151) and Dynamic and/or Private Ports (from 49152 through 65535)". 98. Your answer to "Which netstat parameter displays separate lists of statistics for each protocol?" was "-a". The correct response was "-s". 99. Your answer to "Which of the following allow for secure file transfer? (Select 2)" was "Anonymous FTP". The correct response was "SSH File Transfer Protocol and Secure Copy". 100. Your answer to "Physical connection between two incompatible media types (such as copper and fiberoptics) requires:" was "BNC connector". The correct response was "media converter". 101. Your answer to "In routing, the route with the lowest metric is the:" was "active route". The correct response was "preferred route". 102. Your answer to "Which of the following terms describes the number of routers traversed by a packet between its source and destination?" was "TTL". The correct response was "hop count". 103. Your answer to "Which of the following provides an ISP with a troubleshooting tool for testing connection at the customer site without the need of sending a technician to that site?" was "demarc". The correct response was "smartjack". 104. Your answer to "What is an SNMP trap?" was "notification sent between managed devices". The correct response was "message sent from a managed device to a management station". 105. Your answer to "During a network installation, which of the following would require a punch down tool? (Select 3)" was "NIC". The correct response was "110 block, 66 block and patch panel". 106. Your answer to "Which of the following statements are true? (Select 2)" was "A switch with Auto-MDIX ports can only be connected to with a crossover cable". The correct response was "A switch with AutoMDIX ports can be connected to either with a crossover cable or patch cable and X in MDIX stands for crossover". 107. Your answer to "Which of the following port numbers is not used by remote administration tools?" was "23". The correct response was "25". 108. Your answer to "Which of the following are the features of Transmission Control Protocol (TCP)? (Select 2)" was "commonly used for streaming audio and video". The correct response was "three-way handshake and retransmission of lost packets". 109. Your answer to "Which of the following are the features of User Datagram Protocol (UDP)? (Select 2)" was "retransmission of lost packets". The correct response was "UDP is commonly used for streaming audio and video and offers faster transfer speed than TCP". 110. Your answer to "In binary notation, IPv4 class A address will always start with:" was "10". The correct response was "0". 111. Your answer to "Which of the following are examples of what an IDS can do? (Select 2)" was "logging event". The correct response was "sending alert and logging event". 112. Your answer to "Which parameter will cause netstat to display updated statistics every 5 seconds?" was "netstat /interval=5". The correct response was "netstat 5". 113. Your answer to "In binary notation, IPv4 class D address will always start with:" was "110". The correct response was "1110". 114. Your answer to "In binary notation, IPv4 class E address will always start with:" was "10". The correct response was "1111". 115. Your answer to "Which of the following are connectors used with fiber-optic cabling? (Select 3)" was "RS232". The correct response was "SC, ST and LC". 116. Your answer to "In binary notation, IPv4 class B address will always start with:" was "1110". The correct response was "10". 117. Your answer to "In which physical network topology every node has a direct connection to every other node?" was "star". The correct response was "full mesh". 118. Your answer to "In binary notation, IPv4 class C address will always start with:" was "10". The correct response was "110". 119. Your answer to "The Preamble of an Ethernet frame is made of:" was "128 bits". The correct response was "7 bytes".

Page 4 of 5

NETWORK+ CERTIFICATION REVIEWS


120. Your answer to "Application Layer of the Open Systems Interconnection model (OSI model) is also known as:" was "Layer 5". The correct response was "Layer 7". 121. Your answer to "An 802.11 networking framework in which devices or stations communicate directly with each other without the use of a wireless access point (WAP) is called:" was "EBSS". The correct response was "IBSS". 122. Your answer to "Promiscuous mode: (Select 2)" was "can only be used with devices that are part of wired networks". The correct response was "allows a computer to read data addressed to other computers on the network and is used for packet sniffing". 123. Your answer to "Which of the following tools is used to identify running services on a host?" was "traceroute". The correct response was "port scanner". 124. Your answer to "Which of the following topologies offer the lowest fault tolerance? (Select 2)" was "star". The correct response was "bus and ring". 125. Your answer to "Challenge-Handshake Authentication Protocol (CHAP): (Select 3)" was "doesn't send the actual password". The correct response was "uses hashing, periodically reauthenticates the client during session and doesn't send the actual password". 126. Your answer to "Which of the following are not secure for network use? (Select 3)" was "rcp". The correct response was "rsh, rlogin and rcp". 127. Your answer to "What are the advantages of using fiber-optic cabling over copper cabling? (Select 2)" was "resistance to interference". The correct response was "higher security and resistance to interference". 128. Your answer to "Connecting a fiber-optic system with an Ethernet system would need what kind of interface? " was "QoS". The correct response was "GBIC". 129. Your answer to "Which of the following is a network protocol for submitting print jobs to a remote printer?" was "Line Printer Terminal (LPT)". The correct response was "Line Printer Daemon (LPD)". 130. Your answer to "Ethernet frame begins with:" was "cyclic redundancy check". The correct response was "preamble". 131. Your answer to "Cyclic redundancy check (CRC) of an Ethernet frame is designed to: (Select all that apply)" was "detect any accidental changes to data". The correct response was "detect any accidental changes to data and check data integrity". 132. Your answer to "Which of the following wireless standards offers highest connection speeds?" was "802.11a". The correct response was "802.11n". 133. Your answer to "What does the term multiple-input and multiple-output (MIMO) refer to?" was "wireless network topology". The correct response was "use of multiple antennas for improved performance". 134. Your answer to "Which of the following can operate at 5 GHz frequency range? (Select 2)" was "802.11b". The correct response was "802.11a and 802.11n". 135. Your answer to "Which of the following are modulation techniques used in wireless networks? (Select 3)" was "FHSS". The correct response was "DSSS, OFDM and FHSS". 136. Your answer to "Which of the following wireless standards offers the highest backward compatibility?" was "802.11g". The correct response was "802.11n". 137. Practice exam number 8

Page 5 of 5

Das könnte Ihnen auch gefallen