Читать книгу CompTIA Network+ Study Guide - Todd Lammle - Страница 6

Assessment Test

Оглавление

1. What is the basic purpose of a local area network (LAN)?

A. To interconnect networks in several different buildings

B. To connect one or more computers together so they can share resources

C. To interconnect two to 10 routers

D. To make routers unnecessary

2. You need a topology that is easy to troubleshoot and scalable. Which would you use?

A. Bus

B. Star

C. Mesh

D. Ring

3. IP resides at which layer of the OSI model?

A. Application

B. Data Link

C. Network

D. Physical

4. Layer 2 of the OSI model is named____.

A. Application layer

B. Network layer

C. Transport layer

D. Data Link layer

5. Which RG rating of coax is used for cable modems?

A. RG-59

B. RG-58

C. RG-6

D. RG-8

6. Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz?

A. Category 3 UTP

B. Category 5 STP

C. Category 5 UTP

D. Category 6 UTP

7. If you are running half-duplex Internet, which of the following is true? (Choose allthat apply.)

A. Your digital signal cannot transmit and receive data at the same time.

B. Hosts use the CSMA/CD protocol to prevent collisions.

C. The physical connection consists of one wire pair.

D. None of the above.

8. You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the hub to the switch?

A. EtherIP

B. Crossover

C. Straight-through

D. Cable Sense, Multiple Access

9. Your boss asks you why you just put in a requisition to buy a bunch of switches. He said he just bought you a bunch of hubs five years ago! Why did you buy the switches?

A. Because each switch port is its own collision domain.

B. The cable connecting devices to the hub wore out, and switches were cheaper thannew cable.

C. There were too many broadcast domains, and a switch breaks up broadcast domains by default.

D. The hubs kept repeating signals but quit recognizing frames and data structures.

10. Which device would connect network segments together, creating separate collision domains for each segment but only a single broadcast domain?

A. Hub

B. Router

C. Switch

D. Modem

11. Most Application layer protocols use only UDP or TCP at the Transport layer. Which of the following could use both?

A. TCP

B. Microsoft Word

C. Telnet

D. DNS

12. HTTP, FTP, and Telnet work at which layer of the OSI model?

A. Application

B. Presentation

C. Session

D. Transport

13. IPv6 uses multiple types of addresses. Which of the following would describe an anycast address used by an IPv6 host?

A. Communications are routed to the most distant host that shares the same address.

B. Packets are delivered to all interfaces identified by the address. This is also called one-to-many addressing.

C. This address identifies multiple interfaces, and the anycast packet is only delivered to one address. This address can also be called one-to-one-of-many.

D. Anycast is a type of broadcast.

14. Which of the following IP addresses are not allowed on the Internet? (Choose allthat apply.)

A. 11.255.255.1

B. 10.1.1.1

C. 172.33.255.0

D. 192.168.0.1

15. What is the subnetwork address for a host with the IP address 200.10.5.168/28?

A. 200.10.5.156

B. 200.10.5.132

C. 200.10.5.160

D. 200.10.5.0

E. 200.10.5.255

16. If you wanted to verify the local IP stack on your computer, what would you do?

A. Ping 127.0.0.0

B. Ping 127.0.0.1

C. Telnet 1.0.0.127

D. Ping 169.5.3.10

E. Telnet 255.255.255.255

17. The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer. What is the encapsulation named at the Data Link layer?

A. Bits

B. Packets

C. Frames

D. Data

E. Segments

18. Where does a Data Link layer frame have to carry a Network layer packet if the packet is destined for a remote network?

A. Router

B. Physical medium

C. Switch

D. Another host

19. Which of the following are not distance vector routing protocols? (Choose all that apply.)

A. OSPF

B. RIP

C. RIPv2

D. IS-IS

20. Which of the following uses both distance vector and link state properties?

A. IGRP

B. OSPF

C. RIPv1

D. EIGRP

E. IS-IS

21. You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use?

A. Implement a loop-avoidance scheme.

B. Create a flatter network structure using switches.

C. Create a VLAN.

D. Disable the spanning tree on individual ports.

22. Why do most switches run the Spanning Tree Protocol by default?

A. It monitors how the network is functioning.

B. It stops data from forwarding until all devices are updated.

C. It prevents switching loops.

D. It manages the VLAN database.

23. Which of the following describes MIMO correctly?

A. A protocol that requires acknowledgment of each and every frame

B. A data-transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae

C. A modulation technique that allows more than one data rate

D. A technique that packs smaller packets into a single unit, which improves throughput

24. Which two practices help secure your wireless access points from unauthorized access? (Choose all that apply.)

A. Assigning a private IP address to the AP

B. Changing the default SSID value

C. Configuring a new administrator password

D. Changing the mixed-mode setting to single mode

E. Configuring traffic filtering

25. IPSec is defined at what layer of the OSI model?

A. Network

B. Physical

C. Layer 4

D. Layer 7

26. You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use?

A. RADIUS

B. DNS

C. Virtual Network Computing

D. Remote Desktop Protocol

27. Someone calls you and asks for your bank account number because the bank is having problems with your account. You give them this information and later find out that you were scammed. What type of attack is this?

A. Phishing

B. Calling scam

C. Analog scam

D. Trust-exploration attack

E. Man-in-the-middle attack

F. Rogue access point

28. Which of the following are types of denial of service attacks? (Choose all that apply.)

A. Ping of Death

B. Stacheldraht

C. SYN flood

D. Virus FloodSyn

29. You want to stop a hacker in their tracks. Which of the following devices are proactive in providing this service?

A. Access control list (ACL)

B. Content filtering

C. Security zones

D. Intrusion prevention system (IPS)

E. Network Address Translation

F. Virtual LANs

30. You connected your company to the Internet, and security is a concern. What shouldyou install?

A. Higher-quality cables

B. Firewall

C. DNS

D. Switches

31. Which of the following are WAN protocols or technologies? (Choose all that apply.)

A. ATM

B. ISDN

C. MPLS

D. RIP

32. The rate at which the Frame Relay switch agrees to transfer data is referred to as________.

A. BE

B. FECN

C. CIR

D. BECN

33. Which two arp utility switches perform the same function?

A. – g

B. – Z

C. – d

D. – a

E. -h

F. -b

34. You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use?

A. – r

B. – R

C. /r

D. /R

E. -a

F. -A

35. Which tool is used to attach ends to network cables?

A. Punch-down tool

B. Crimper

C. VLAN tool

D. Strippers

E. ARP tool

36. You are using a TDR. Which of the following actions can you do with this device? (Choose all that apply.)

A. Estimate cable lengths

B. Find splice and connector locations and their associated loss amounts

C. Display unused services

D. Define cable-impedance characteristics

37. Which of the following are considered cabling issues? (Choose all that apply.)

A. Crosstalk

B. Shorts

C. Open impedance mismatch

D. DNS configurations

38. You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, what is your next step?

A. Question the obvious.

B. Establish a theory of probable cause.

C. Establish a plan of action to resolve the problem and identify potential effects.

D. Verify full system functionality, and if applicable, implement preventative measures.

39. Which network performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

A. Traffic shaping

B. Jitter control

C. Logical network mapping

D. Load balancing

E. Access lists

40. You need to optimize network traffic by spreading it across multiple connections. Which strategy should be used?

A. Load balancing

B. Traffic shaping

C. Adding VLANs

D. A 1Gbps connection

E. Following the regulations

CompTIA Network+ Study Guide

Подняться наверх