Computer Networking > QUESTIONS & ANSWERS > Computer Networking and the Internet. All Questions Explained and Rationalized (All)

Computer Networking and the Internet. All Questions Explained and Rationalized

Document Content and Description Below

Top Five Toughest Questions 1. A new intranet has been created in your organization, and it includes a File Transfer Protocol (FTP) site to download files and a news server for sharing information. T... he network is internetworked with a network belonging to a subsidiary of the company. The subsidiary’s network uses Apple computers and uses AppleTalk as a network protocol. To access the intranet, which of the following protocols would need to be installed on your computer? • A. IPX/SPX • B. NWLink • C. TCP/IP • D. AppleTalk 2. Your company’s network is on several floors of a building. Because of the amount of data being stored, there are three file servers, a Web server for the intranet, an e-mail server for internal e-mail, and an SQL Server that is used for several databases that have been developed in house. Because of security reasons, floppy disks and other devices to transfer or transmit data to and from the computer have been removed and aren’t permitted. What type of network model is being used? • A. Client/server • B. Peer-to-peer • C. MAN • D. PAN 3. A company has multiple offices that are internetworked. Office A has a single computer that has the capability to dial into the Internet but isn’t connected to the other offices. Office B is in another part of the country from the other offices but doesn’t have its network interconnected to the other offices. Offices C and D are in separate states but have a dedicated connection between them. Office C has 20 computers that access each other’s machines and provide services and data to one another. Office D has 50 computers that log onto the network using a single server. Based on this information, which of the Offices are part of a LAN and a WAN? • A. Offices A and B • B. Offices B and C • C. Offices C and D • D. The entire network (Offices A, B, C, and D) 4. You receive a call that the network is down. In this network, all the computers are connected together using a single cable, which they are connected to using T-connectors. Looking at the situation, you find that there is no break through the trunk. Which of the following is most likely the cause of the problem? • A. A failed network card • B. One of the computers is turned off • C. T-connectors are missing from the ends of the cable • D. Terminators are missing from the ends of the cable 5. Your network has 10 computers that are networked together using a star topology. Which of the following is a possible point of failure for this topology that could bring down the entire network? • A. Cable • B. Network card • C. T-connector • D. Hub CHAPTER 2Network Media Top Five Toughest Questions 1. You are the network administrator of a 10BaseT network. On the weekend, when few people are working, you run 110 m of cable to a new server that is being used as a file server. The cable is installed in a new section of the building, where no cabling currently exists. When you attempt to access files on the server, they are experiencing errors and corrupt data. Which of the following is most likely the cause of this problem? • A. Bandwidth • B. Attenuation • C. Crosstalk from a neighboring cable • D. CSMA/CD issues 2. Your company uses UTP cable for all of its network connections including workstations and servers. The users have reported problems connecting to one of the most important servers on the network, and you have been called in to look at it due to a possible physical security breach by a former employee. While examining the server, you find that a small battery-powered motor has been placed and is running next to the server’s network connection. What is causing the network problem? • A. Electromagnetic interference • B. Static electricity • C. Transceivers • D. Unknown, but the motor is probably unrelated 3. You have been hired by a small company to cable its network. The company has offices in two buildings that are 300 m apart. Both of the offices have about 15 computers and the numbers are expected to grow in near future. All of the computers are within 90 m of one another. You need to decide on the cabling that will be used both in the individual buildings and which will be used to connect the buildings LANs together. Which of the following will you do? • A. Use UTP cabling in each of the buildings, and connect the two buildings together using 10BaseT cabling • B. Use fiber-optic cabling in each of the buildings, and connect the two buildings together using 10Base2 cabling • C. Use 10BaseT cabling in each of the buildings, and connect the two buildings together using 10Base5 cabling • D. Use 100BaseFX cabling in each of the buildings, and connect the two buildings together using 10BaseT cabling 4. Your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of 400 m. During transmission, data can travel in both directions, but only in one direction at a given time. Which of the following transmission methods is used? • A. Simplex • B. FireWire • C. Half-duplex • D. Full duplex 5. You are the network engineer assigned to implement a new 100 Mbps network connection. You need to select the correct cabling, as well as the correct standard. From the selections below; choose which 100 Mbps networking standard makes use of only two pairs of a Category 5 UTP cable. • A. 10BaseT • B. 100BaseFL • C. 100BaseTX • D. 100BroadT4 CHAPTER 3Network Devices Top Five Toughest Questions 1. You have installed new cabling to accommodate a new section of the building that is being networked. Once computers are installed, you find that they are unable to connect to the network. You believe the problem is that the length of the cabling has exceeded the maximum distance allowed. You want to fix the problem with the least amount of cost and work. Which of the following will you do? • A. Remove the cabling and install cable that supports a longer distance. • B. Install a passive hub to increase the distance that data can travel along the cable. • C. Install an NIC to increase the distance that data can travel along the cable. • D. Install a switch to increase the distance that data can travel along the cable. 2. What will happen if the default gateway is not specified on your computer and you are trying to reach another network? • A. The packet will ask every router if they know the path to reach the destination. • B. The packet will broadcast for the IP address of the nearest router. • C. The packet will be forwarded to the DNS server. • D. The packet will not be sent. 3. You have replaced all the hubs in your network with 10/100 Mbps switches. The switch ports are configured to work by automatically sensing the network speed. Most of the workstations already had 10/100 Mbps network adapters. Which of the following will you need to do to upgrade the speed of the entire network to 100 Mbps? • A. Replace all 10 Mbps network adapters to 10/100 Mbps in the remaining workstations. • B. Reconfigure all the ports on the switch to operate only at 100 Mbps. • C. Reconfigure the 10 Mbps adapters in remaining workstations to operate only at 100 Mbps. • D. None of the above. 4. As a network technician, you are asked to deploy a network load balancer. You need to configure a network load balancer on the 10.0.10.0/8 network for the Web development group. You need to configure it appropriately. From the list of possible deployment scenarios, which would you select from as your design? • A. You need to distribute the load to a group of Secure Shell (SSH) servers. • B. You need to centralize your traffic around your File Transfer Protocol (FTP) servers. • C. You need to distribute the load to a pool of Web servers. • D. You need to redistribute the traffic to a farm of DHCP servers on your DMZ. 5. You are the administrator of a small business network. You notice that as you add workstations to the network over time the speed of the network decreases; what devices would you replace in your network with what other device to resolve this problem? • A. Replace repeaters with hubs. • B. Replace routers with hubs. • C. Replace routers with switches. • D. Replace hubs with switches. CHAPTER 4Wireless Networking Top Five Toughest Questions 1. You are a corporate user trying to connect to the company’s wireless network. When you look at the list of available networks, you do not find the corporate network listed. What is most likely the cause? • A. Wireless is turned off • B. Incorrect mode • C. Beaconing is turned off • D. Interference 2. You are a corporate user trying to connect to the company’s wireless network. You are within the distance limit of the wireless network yet you are unable to find the network. When you move closer, the network then shows up. What could be the cause? • A. Structural interference between the access point and your machine • B. Environmental interference such as electromagnetic interference • C. Radio frequency interference from other devices • D. All of the above 3. You are a corporate user trying to connect to the company’s wireless network. When you attempt to connect to the network, you are denied being able to connect, what could be the cause? • A. Wrong 802.11 standard • B. Incorrect encryption type • C. Bad username • D. Interference 4. You are a user in a company who would like to connect to the company’s wireless network. The company uses access points for connection to the corporate LAN. To what mode should your wireless connection be set to attach to WAPs? • A. Ad Hoc • B. Secure • C. Infrastructure • D. WPA 5. You are running a wireless network using 802.11g. You fear that someone might eavesdrop on your confidential information. What protocols could you use to protect your wireless network? • A. WPA • B. 802.1X • C. WEP • D. Multiple Input/Multiple Output (MIMO) CHAPTER 5The OSI Model and Networking Protocols Top Five Toughest Questions 1. You are the system administrator for a small company that runs two Windows servers (Windows Server 2003) and two Linux servers (SUSE Linux). You need to lock down the connections to the switch via port security; this essentially means you will need to retrieve the MAC addresses on the systems. MAC addresses are found on Linux server by issuing which command? • A. ipconfig/a • B. ifconfig/a • C. winipcfg/a • D. ifconfig–a 2. You are a network administrator looking to implement technology into a company. You are told you need to build a network utilizing the IEEE 802.11 standard. From the list below, the IEEE 802.11 standard maps to which of the following? (Select only one answer). • A. Token Ring • B. Wired Ethernet • C. Metropolitan Area Network • D. Wireless in Infrastructure mode 3. From the list of choices, which of the following media access methods is used for an IEEE 802.5 network? • A. Direct sequence • B. Token passing • C. CSMA/CD • D. CSMA/CA 4. Which of the following is a valid MAC address? • A. 00:05:J6:0D:91:K1 • B. 10.0.0.1 – 255.255.255.0 • C. 00:05:J6:0D:91:B1 • D. 00:D0:A0:5C:C1:B5 5. Standards for CSMA/CD are specified by which IEEE 802 sublayer? • A. 802.1 • B. 802.2 • C. 802.3 • D. 802.5 CHAPTER 6TCP/IP and Routing Top Five Toughest Questions 1. You have been given an IP address in binary form. The address you have been given is 11000000.00000000.00000000.00000001. What is this IP address in decimal form? • A. 127.0.0.1 • B. 191.0.0.1 • C. 137.0.0.1 • D. 192.0.0.1 2. You have been asked to explain what a certain IP address is used for. The IP address is 224.0.0.1. What are addresses in the 224.0.0.0 range used for? • A. SNMP • B. HTTP • C. POP3 • D. Multicasting 3. You have a user who cannot get connected to the internet. You have the user run IPCONFIG/ALL and he reads you the IP address of 169.254.1.3. What is wrong with this system? • A. System has a static IP address • B. System has an APIPA address • C. System has a bad address • D. System has a classless address 4. A user has been given an IP address of 192.168.1.1 with a subnet mask of 255.255.255.0. How would you express the subnet mask for this address using CIDR notation? • A. /24 • B. /8 • C. /16 • D. /22 5. A user has been given an address of fe80::9c5f:9695:f235:0051. What kind of address has she been given? • A. IPV4 address • B. IPV6 address • C. MAC address • D. Globally Unique Identifier (GUID) CHAPTER 7Wide Area Networking Top Five Toughest Questions 1. As the primary lead on your company’s helpdesk, you are asked to help resolve a problem call with an ISDN line. A customer wants to upgrade an existing ISDN line because it’s currently too slow. Right now, he is using a single BRI ISDN circuit switched B channel. From the available choices, what should his transmission rate be? • A. 56 Mbps • B. 64 Kbps • C. 128 Kbps • D. 256 Mbps 2. As the network administrator for your company, you are asked by your CIO to design and deploy a data link between two offices of your company. There are 10 employees located in each office. Your main concerns are the speed of the connections, the reliability of transferring of data, and the cost. Which solution should you implement? (Choose one.) • A. Place a modem on a server in each office so that they can connect. • B. Connect an ISDN circuit to each workstation in both locations. • C. Use an ISDN circuit connected to a dedicated location or server in each building. • D. Have each workstation at both locations and use a modem to connect to opposite offices. 3. As the Network Manager for rsnetworks.net, you need to implement a solution that will allow for sporadic connection to the Internet. Your only requirement is that you find a solution that will provide a connection of up to 128 Kbps to the Internet, only when needed. Which solution should you implement? • A. T1 • B. T3 • C. 56 Kbps • D. BRI ISDN 4. You are a network administrator at your company. Your company has a number of sales and marketing users who work remotely and telecommute from home or from sales meetings. These users dial into a Remote Access Server (RAS) to access the corporate headquarters. One day, one of the sales users dials up the RAS server to connect to the corporate headquarters network to access a few files. The sales user dials up the RAS server and cannot connect. The sales user when asked reports that there is no dial tone. What is the cause of the problem? (Choose one.) • A. Telephone company problem • B. The modem does not support the PC • C. The modem settings are set incorrectly. • D. There are no settings configured within Windows 5. What is the difference between ISDN and dial-up? • A. Both use dialing, but dial-up is based on the WAN and use analog lines, whereas ISDN and DSL are both digital. • B. Neither use dialing, but dial-up is based on the telephone system and use analog lines, whereas ISDN and DSL are both analog. • C. Both use dialing, but dial-up is based on the telephone system and use digital lines, whereas ISDN and DSL are both digital. • D. Both use dialing, but dial-up is based on the telephone system and use analog lines, whereas ISDN and DSL are both digital. CHAPTER 8Security Standards and Services Top Five Toughest Questions 1. You are performing a security audit for a company to determine their risk from various attack methods. As part of your audit, you work with one of the company’s employees to see what activities he performs during the day that could be at risk. As you work with the employee, you see him perform the following activities: • Log into the corporate network using Kerberos • Access files on a remote system through a Web browser using SSL • Log into a remote UNIX system using Secure Shell (SSH) • Connect to a Post Office Protocol 3 (POP3) server and retrieve e-mail • Which of these activities is most vulnerable to a sniffing attack? • A. Logging into the corporate network using Kerberos • B. Accessing files on a remote system through a Web browser using SSL • C. Logging into a remote UNIX system using SSH • D. Connecting to a POP3 server and retrieving e-mail 2. You are a security consultant for a large company that wants to make its intranet available to its employees via the Internet. They want to ensure that the site is as secure as possible. To do this, they want to use multifactor authentication. The site uses an ID and password already but they want to add security features that ensure that the site is indeed their site, not a spoofed site, and that the user is an authorized user. Which authentication technology supports this? • A. Certificates • B. CHAP • C. Kerberos • D. Tokens 3. You have been asked to help a company implement multifactor authentication. They want to make sure that the environment is as secure as possible through the use of biometrics. Based on your knowledge of authentication, you understand that biometrics falls under the “something you are” category. Which other category should be used with the biometric device to provide the highest level of security? • A. Something you know • B. Something you have • C. Something you do • D. All these options have their own benefits and detriments. 4. When using LDAP for authentication in an internetworking environment, what is the best way to ensure that the authentication data is secure from packet sniffing? • A. Use LDAP to keep all passwords encrypted when transmitted to the server. • B. Use LDAP over SSL/TLS to encrypt the authentication data. • C. Require that the clients use strong passwords so that they cannot easily be guessed. • D. Use LDAP over HTTP/S to encrypt the authentication data. 5. You have been asked to use an existing router and utilize it as a firewall. Management would like you to use it to perform address translation and block some known bad IP addresses that previous attacks have originated from. With this in mind, which of the following statements are accurate? • A. You have been asked to perform NAT services • B. You have been asked to set up a proxy • C. You have been asked to set up stateful inspection • D. You have been asked to set up a packet filter CHAPTER 9Network Management Top Five Toughest Questions 1. You have just been hired by Aplura Inc., a global Internet service provider (ISP), as their first junior network analyst. Bob, your supervisor was late this morning, and before he picked up his daily cup of coffee he asks you to begin troubleshooting the connectivity from your offices’ border router to the border router in your remote office in Sydney, Australia. You find the CM documentation but you are looking for the link speed of your router to determine if it is correct. What piece of information is missing from this document? • A. Physical access methods • B. Service protocols • C. Hardware devices • D. Software applications 2. As the network manager for a small ISP in Maryland serving more than 2000 customers across the eastern United States, you are in charge of daily operations. Your regional supervisor just received a phone call from Corporate. He asks you over the phone to develop a calculated plan of action to guide decisions and achieve sound outcomes that provide guidelines that the installation contractors will use on how to access the closest data center which will be the location that is outfitted with the latest load balancing technology. What kind of document is your regional supervisor asking you to create? • A. Common management documentation • B. CM documentation • C. Procedure • D. Policy 3. You want to control and optimize the network traffic entering your domain. What technique will assist your boss in increasing the usable bandwidth and lowering the latency? • A. Traffic shaping • B. Load balancing • C. High availability • D. Jitter 4. You’re VoIP phone rings. You pick it up and say, “Hello?” You listen very closely, but all you can hear is broken speech as if someone is talking very slowly but the words are not coming out right. You notice your VoIP switch is blinking red and you open up a command console to your VoIP switch to see why. Looks like there is a problem with your switch and it is not prioritizing your VoIP traffic above all else. What kind of service do you need to enable to ensure VoIP has the highest priority to ensure your VoIP packets are sent and received first? • A. QoS • B. Dropped • C. Delay • D. Jitter 5. You are working for Google as an intern for the summer. You have always wondered how googling occurred on the back end of all those servers. You ask your supervisor what technique they use to distribute incoming traffic onto other servers when the traffic load became overbearing for one single server. What technique does your supervisor tell you that Google uses to allow for a group of computers in a cluster to share trafficload? • A. Traffic shaping • B. Load balancing • C. High availability • D. Packet shaping CHAPTER 10Network Troubleshooting Top Five Toughest Questions 1. Examine the tracert output shown in Figure 10.2. What is a possible explanation for the “Request timed out” values shown? Choose all that apply. • A. The router at hop 10 is down • B. The router at that hop is configured to drop ping packets • C. There has been an incorrect DNS resolution, and the wrong router is being contacted • D. The maximum hop count has been reached, so all other hops beyond it will show Request timed out 2. You are the network administrator for a network who employs a Windows 2003 server and 30 Windows XP Professional workstations. The Windows 2003 server runs the DHCP service to provide TCP/IP configurationinformation to the Windows XP clients. You receive a call from one of your users stating that he is unable to browse any internal network resources or Internet Web sites. Other users on the same subnet are able to browse without difficulty. You run the ipconfig command on the problem workstation and see the following output: Windows IP Configuration   Host Name : IBM-A38375FF22E Primary Dns Suffix : Node Type : Hybrid IP Routing Enabled : No WINS Proxy Enabled : No Ethernet adapter Wireless   Network Connection:   Connection-specific DNS Suffix : Description : Intel(R) PRO/Wireless 2200BG   Network Connection Physical Address : 00-1E-25-1A-D3-5A Dhcp Enabled : Yes Autoconfiguration Enabled : Yes IP Address : 169.254.1.96 Subnet Mask : 255.255.0.0 Default Gateway : DHCP Server : DNS Servers : Lease Obtained : Tuesday, March 29, 2005 1:00:10 PM Lease Expires : Wednesday, March 30, 2005 1:00:10 PM Based on this output, why is this workstation unable to browse any network resources? • A. The default gateway is unavailable • B. The workstation could not contact a DHCP server • C. The workstation is configured with the incorrect default gateway • D. The workstation’s DHCP lease has expired 3. You are the network administrator for a large pharmaceutical company that has over 1000 workstations. To simplifyTCP/IP configuration for these numerous clients, you installed a DHCP server over a year ago to automatically configure your clients with an IP address, as well as the following common configuration information: Subnet Mask: 255.255.0.0 Default Gateway: 172.16.0.1 DNS Servers: 172.16.0.100 172.16.0.101 As part of a recent network redesign, you had to change the default gateway used by your clients to a different IP address: 172.16.1.1. You made the necessary change on the DHCP server, and most of your clients were updated automatically. After you make this change, you receive a call from one user who no longer is able to browse the Internet. You examine the TCP/IP configuration of her LAN connection (see Figure 10.3). How can you configure this workstation with the correct default gateway information? (Each choice represents a complete solution. Choose two.) • A. Delete the manually configured information and select Obtain an IP address automatically • B. Run ipconfig/renew from the command prompt • C. Manually update the IP address of the default gateway • D. Run ipconfig/release from the command prompt 4. You are the administrator of the network shown in Figure 10.4. The firewall in the exhibit was installed by an outside consultant a few weeks ago. Once a month, one of your company’s employees needs to access the FTP site of one of your company’s business partners, ftp.airplanes.com to download large PDF files containing product marketing information. You receive a help desk call from this employee, stating that he is now unable to access this FTP site. The last time he performed this task was before the firewall was installed, and he says that it worked fine then. You are able to ping the ftp.airplanes.com DNS name, and you can access www.airplanes.com, which is located on the same physical machine. What is the best way to restore this employee’s access to the ftp.airplanes.com FTP site? • A. Configure a firewall rule allowing traffic to TCP ports 20 and 21 • B. Configure a firewall rule allowing traffic to TCP ports 25 and 110 • C. Configure a firewall rule allowing all TCP traffic to this employee’s workstation • D. Configure a firewall rule allowing traffic to TCP ports 80 and 443 5. Your e-mail server is having network connectivity problems. You have replaced the NIC and reconfigured the IP address. The last step that you take is to start the e-mail services, and all services have now started successfully without generating error messages. Which of the following actions will allow you to verify that the e-mail services are successfully accepting inbound e-mail? • A. Telnet from a client machine to port 25 on the e-mail server • B. Telnet from a client machine to port 23 on the e-mail server • C. Use POP3 to create an e-mail queue and validate that e-mail passes through it successfully • D. Use IMAP4 to send Internet e-mail to the server [Show More]

Last updated: 1 year ago

Preview 1 out of 33 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$16.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
67
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 13, 2020

Number of pages

33

Written in

Seller


seller-icon
Kirsch

Member since 4 years

905 Documents Sold


Additional information

This document has been written for:

Uploaded

Mar 13, 2020

Downloads

 0

Views

 67

Document Keyword Tags


$16.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·