Trine Answers

. . .

Network Management

quiz22

Which environmental variables are critical factors in the health of computing equipment?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A Temperature
C Humidity

选择一个选项, 以及列出选项内容, 不要解释原因: What is the variation in delay called?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Bandwidth variance

B

Jitter

C

Audit log

D

Latency

B: Jitter

A specific server’s baseline describes norms for factors, such as how busy its processors are and how much of the memory it uses.

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

True

B

False

A: True

Which of these are the metrics that are tracked to account for utilization in operations?

Each correct answer represents a complete solution. Choose all that apply.

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Uptime

B

Downtime

C

SNMP

D

Syslog

A: Uptime
B: Downtime

Which of the following versions of SNMP supports plaintext authentication with community strings and uses only UDP?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

SNMPv2c

B

SNMPv4

C

SNMPv1

D

SNMPv3

C: SNMPv1

Which of these supports strong authentication with MD5 or SHA, providing confidentiality and data integrity of messages via DES or DES-256 encryption between agents and managers?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

NetFlow

B

SNMPv2c

C

SNMPv3

D

Syslog

C: SNMPv3

Which of these mathematically determines network errors?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

NetFlow

B

SNMP

C

Syslog

D

CRC

D: CRC

Which of these occurs when a segment of data fails the addition or deletion of header information?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Runt

B

CRC error

C

Encapsulation error

D

Giant

C: Encapsulation error

Which device components should not be allowed to reach full capacity?

Each correct answer represents a complete solution. Choose all that apply.

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Voltage

B

CPU

C

Relay

D

Memory

B: CPU
D: Memory

Which of these can collect more granular information on traffic flows than SNMP is able to?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Baseline

B

Syslog

C

Uptime

D

NetFlow

D: NetFlow

Which of these is a text string containing detailed information about the event being reported?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Timestamp

B

Facility

C

Description

D

MNEMONIC

C: Description

Which of the following Syslog severity level denotes that the system is unusable?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Critical

B

Alert

C

Emergency

D

Error

C: Emergency

Which SNMP version added support for the GET BULK operations?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

SNMPv3

B

SNMPv2c

C

SNMPv2a

D

SNMPv1

B: SNMPv2c

Which of these can refer to the standard level of performance of a certain device or to the normal operating capacity for the whole network?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

SNMPv2c

B

Management information base

C

Baseline

D

Syslog

E

NetFlow

C: Baseline

What can be the smallest size of an Ethernet frame?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

128 bytes

B

64 bytes

C

72 bytes

D

256 bytes

B: 64 bytes

Which of these represents the bi-directional traffic flow across an Ethernet interface?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Two-way

B

Duplex

C

Symmetric

D

Full-duplex

D: Full-duplex

Which of the following statements is true about latency?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

More the latency, longer the delay, and longer the users have to stare blankly back at their computer screen, hoping something happens soon.

B

Less the latency, longer the delay, and longer the users have to stare blankly back at their computer screen, hoping something happens soon.

C

More the latency,shorter the delay, and longer the users have to stare blankly back at their computer screen, hoping something happens soon.

D

Less the latency, longer the delay, andshorter the users have to stare blankly back at their computer screen, hoping something happens soon.

A: More the latency, longer the delay, and longer the users have to stare blankly back at their computer screen, hoping something happens soon.

Which protocol allows the users to display, sort, and even search messages, all of which makes it a great troubleshooting tool?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

NetFlow

B

Syslog

C

Kibana

D

SNMP

B: Syslog

Which of these is a system-design protocol that guarantees a certain amount of operational uptime during a given period?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

High availability

B

Backup systems

C

Hot standby

D

Redundancy

A: High availability

Which networking protocol uses OIDs and MIBs for data collection and organization of data?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Uptime

B

SNMP

C

Syslog

D

NetFlow

B: SNMP

quiz23

You install new switches in your server room and are now experiencing network instability and other issues across all servers in the rack. Which device would be used to alert you of system overheating?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Surge protector
B

Probe
C

Voltage event recorder
D

Fiber light meter

c: Voltage event recorder

Which device would be used to measure voltage?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

OTDR

B

Butt set

C

Toner probe

D

Multimeter

D: Multimeter

Which device should be used if you need to determine whether your network meets ISO or TIA standards?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Certifiers

B

Nmap

C

Routing table

D

Angry IP

A: Certifiers

End-to-end loss across an Ethernet cable is called ___.

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

interference

B

bad port

C

incorrect pinout

D

attenuation

D: attenuation

Which tool is used to attach an RJ-45 connector to Cat 5e, 6, 7, or 8 cables?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

OTDR

B

Spectrum analyzer

C

Punch-down tool

D

Crimper

D: Crimper

Which tool pushes a conductor between the sides of a V inside an IDC?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Snips

B

Crimper

C

Punch-down tool

D

Strippers

C: Punch-down tool

Which tool would the users use to both find a break in a fiber-optic connection and test the fiber connectivity on the network?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

OTDR

B

Butt set

C

Toner probe

D

Multimeter

A: OTDR

Which of these is not a function of a TDR?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Estimate cable lengths.

B

Find splice and connector locations and their associated loss amounts.

C

Display unused services.

D

Determine cable-impedance characteristics.

E

Send a signal down a cable and measure how long it takes to come back.

C: Display unused services.

Which device monitors incoming voltage levels and overvoltage thresholds?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Toner probe

B

Repeater

C

Surge protector

D

VOM

C: Surge protector

On which of these would a technician use a punch-down tool?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Fiber ST connector

B

110 blocks

C

CSU/DSU

D

RJ-45 connector

B: 110 blocks

Which of the following tools can test a port on a device?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Certifier

B

Toner probe

C

Butt set

D

Loopback plug

D: Loopback plug

Which of the following statements is true about a wire-map tester?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

It is a device that transmits signals through each wire in a copper fiber-optic cable to determine if it’s connected to the correct pin at the other end.

B

It is a device that transmits signals through each wire in a copper twisted-pair cable to determine if it’s connected to the correct pin at the same end.

C

It is a device that transmits signals through each wire in a copper twisted-pair cable to determine if it’s connected to the correct pin at the other end.

D

It is a device that transmits signals through each wire in a copper fiber-optic cable to determine if it’s connected to the correct pin at the same end.

C: It is a device that transmits signals through each wire in a copper twisted-pair cable to determine if it’s connected to the correct pin at the other end.

Which device will be used to locate a specific connection in an unlabeled punch-down block?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Certifier

B

TDR

C

Toner probe

D

VOM

C: Toner probe

Which software tool looks at all traffic on a network segment?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Spectrum analyzer

B

Packet sniffer

C

Time-domain reflectometer

D

Multimeter

B: Packet sniffer

What is the purpose of wire-map testers?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

To help find unused protocols and remove them from the network

B

To analyze protocols in software

C

To check the copper cable for crossed pairs only

D

To detect transposed wires, opens, and shorts in twisted-pair cables

D: To detect transposed wires, opens, and shorts in twisted-pair cables

You install new switches in your server room and are now experiencing network instability and other issues across all servers in the rack. Which device would be used to alert you of system overheating?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Surge protector

B

Probe

C

Voltage event recorder

D

Fiber light meter

C: Voltage event recorder

Which of these is a wiring error where two connections that are supposed to be connected using the two wires of a twisted-pair cable are instead connected using two wires from different pairs?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Attenuation

B

Split pair

C

Bent pin

D

Bad port

B: Split pair

Which of the following statements is true about a butt set?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

It is essentially a portable telephone that allows the users to test analog wet or dry lines and is used to remove those lines.

B

It is essentially a portable telephone that allows the users to test digital wet or dry lines and is used to monitor those lines.

C

It is essentially a portable telephone that allows the users to test digital wet or dry lines and is used to remove those lines.

D

It is essentially a portable telephone that allows the users to test analog wet or dry lines and is used to monitor those lines.

D: It is essentially a portable telephone that allows the users to test analog wet or dry lines and is used to monitor those lines.

Which of these can check the speed and condition of the signal on a cable, measure the time it takes to send a signal down the wire and back, and find the exact location of a break?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Multimeter

B

Event recorder

C

Tone generator

D

TDR

D: TDR

no bookmarked, confident, or note marked bookmark popover collapsed

Question 19 :

You need to create a cable that will connect your host to a wall jack connection. Which of the following tools will you use?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Multimeter

B

IDS/IPS

C

Snips

D

Coax cable strippers

C: Snips

Which tool will the users use to trace cables in multiple-pair wiring?

This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.

A

Toner probe

B

Cable stripper/snips

C

Cable tester

D

Butt set

A: Toner probe

quiz24

A user calls you to report a problem regarding logging in to the corporate intranet. You can access the website without problems using the user’s username and password. At your request, the user has tried logging in from other workstations but has been unsuccessful. What is the most likely cause of the problem?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The intranet server is locked up.
B

The network is down.
C

The user is logging in incorrectly.
D

The server is not routing packets correctly to that user’s workstation.
Explanation
Answer C is correct.

A workstation presents an error message to a user. The message states that a duplicate IP address has been detected on the network. After establishing a change in the network, what should be the next step of the standard troubleshooting model?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Create an action plan.
B

Identify the results and effects of the solution.
C

Test the result.
D

Select the most probable cause.
Explanation
Answer D is correct.

You have gathered information on a network issue and determined the affected areas of the network. What should be your next step to resolve this issue?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

You should test the best solution for the issue.
B

You should implement the best solution for the issue.
C

You should consider any negative impact on the network that might be caused by a solution.
D

You should check if there have been any recent changes to this affected part of the network.

Answer D is correct.

A user calls you to report a problem regarding logging in to the corporate intranet. You can access the website without problems using the user’s username and password. At your request, the user has tried logging in from other workstations but has been unsuccessful. What is the most likely cause of the problem?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The intranet server is locked up.
B

The network is down.
C

The user is logging in incorrectly.
D

The server is not routing packets correctly to that user’s workstation.
Explanation
Answer C is correct.

You are troubleshooting a LAN switch and have identified the symptoms. What is the next step you should take?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Determine the scope of the problem.
B

Escalate the issue.
C

Create an action plan.
D

Implement the solution.

Answer B is correct.

When troubleshooting an obscure network problem, what physical conditions should be reviewed to make sure that the network device is operating correctly?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ESD problems
B

Excessive humidity
C

Excessive heat
D

Plugged cables
Explanation
Answers A, B, and C are correct.

You lose power to your computer room, and the switches in your network do not come back up when everything is brought online. After you have identified the affected areas, established the cause, and escalated this problem, what should be your next step?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Start to implement a solution to get those users back online ASAP.
B

Create an action plan and solution.
C

Meet with the emergency response team to determine the next step.
D

Copy all the working routers’ configurations to the nonworking switches.
Explanation
Answer C is correct.

Several users can’t log in to the server. Which action would help you to narrow the problem down to the workstations, network, or server?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Check the network diagnostics.
B

Run tracert from a workstation.
C

Check the server console for user connections.
D

Run netstat on all workstations.
Explanation
Answer C is correct.

You have a user who cannot connect to the network. What is the first thing you could check to determine the source of the problem?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Connectivity
B

Workstation configuration
C

Server configuration
D

Patch cable
Explanation
Answer A is correct.

quiz25

Which netstat command displays the owning process ID associated with each connection?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

-s
B

-t
C

-o
D

-r
ChatGPT 说:

✅ 答案:C — -o

说明:
netstat -o 显示每个连接所对应的进程 ID (PID)。

您说:
Which netstat command displays addresses and port numbers in numerical form?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

-n
B

-e
C

-b
D

-f
ChatGPT 说:

✅ 答案:A — -n

说明:
netstat -n 会以数字形式显示地址和端口号,而不是尝试解析为主机名或服务名。

您说:
Which TCP/IP utility is most often used to test whether an IP host is up and functional?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ping
B

netstat
C

ftp
D

telnet
ChatGPT 说:

✅ 答案:A — ping

说明:
ping 用于检测目标 IP 主机是否在线并响应网络请求。

您说:
Which Windows utility can the users use to connect to a machine 50 miles away to troubleshoot?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

netstat
B

Remote Desktop
C

Wireshark
D

arp
ChatGPT 说:

✅ 答案:B — Remote Desktop

说明:
Remote Desktop 允许用户远程连接到另一台 Windows 计算机进行管理和故障排除。

您说:
Which TCP/IP utility will produce the given output?

Start of code blockReply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time<10ms TTL=128End of code block
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ipconfig
B

tracert
C

ping
D

WINS
ChatGPT 说:

✅ 答案:C — ping

说明:
输出显示了每次发送的数据包大小、往返时间 (time) 和 TTL,典型为 ping 命令的响应格式。

您说:
Which command-line tool would best be used to verify DNS functionality in Linux?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

netstat
B

arp
C

dig
D

nbtstat
ChatGPT 说:

✅ 答案:C — dig

说明:
dig 是 Linux 下用于查询 DNS 记录和验证 DNS 功能的标准命令行工具。

您说:
Which utility produces output similar to the given output?

Start of code block110 ms 96 ms 107 ms fgo1.corpcomm.net [209.74.93.10]
96 ms 126 ms 95 ms someone.corpcomm.net [209.74.93.1]
113 ms 119 ms 112 ms Serial5–1–1.GW2.MSP1.alter.net [157.130.100.185]
133 ms 123 ms 126 ms 152.ATM3–0.XR2.CHI6.ALTER.NET [146.188.209.126]
176 ms 133 ms 129 ms 290.ATM2–0.TR2.CHI4.ALTER.NET [146.188.209.10]
196 ms 184 ms 218 ms 106.ATM7–0.TR2.SCL1.ALTER.NET [146.188.136.162]
182 ms 187 ms 187 ms 298.ATM7–0.XR2.SJC1.ALTER.NET [146.188.146.61]
204 ms 176 ms 186 ms 192.ATM3–0–0.SAN–JOSE9– GW.ALTER.NET [146.188.144.133]
202 ms 198 ms 212 ms atm3–0–622M.cr1.sjc.globalcenter.net [206.57.16.17]
209 ms 202 ms 195 ms pos3–1–155M.br4.SJC.globalcenter.net [206.132.150.98]
190 ms * 191 ms pos0–0–0–155M.hr3.SNV.globalcenter.net [206.251.5.93]
195 ms 188 ms 188 ms pos4–1–0– 155M.hr2.SNV.globalcenter.net [206.132.150.206]
198 ms 202 ms 197 ms www10.yahoo.com [204.71.200.75]
End of code block
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

nbtstat
B

netstat
C

arp
D

tracert
ChatGPT 说:

✅ 答案:D — tracert

说明:
输出显示沿路径的每一跳的响应时间和路由节点信息,这是 tracert(Windows 下的 traceroute)命令典型输出。

您说:
Which command-line tool can the users use to find the NIC’s specific MAC address and IP address without physically going to the computer?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

arp
B

nbtstat
C

ping
D

ftp
E

netstat
ChatGPT 说:

✅ 答案:A - arp

您说:
Which ftp navigation tool displays and changes the current directory on the local machine?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

cd
B

ls
C

lcd
D

pwd
ChatGPT 说:

✅ 答案:C — lcd

说明:
lcd (local change directory) 用于在 FTP 会话中显示或切换本地计算机的当前目录。

您说:
Which new Linux command was added recently to configure IP and interface parameters?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ifconfig
B

ip
C

ipconfig
D

nbtstat
ChatGPT 说:

✅ 答案:B — ip

说明:
ip 命令是现代 Linux 系统中替代 ifconfig 的工具,用于配置 IP 地址、路由和网络接口参数。

您说:
Which TCP/IP utility will produce the following result?

Start of code blockInterface: 199.102.30.152
Internet Address Physical Address Type
199.102.30.15 A0–ee–00–5b–0e–ac dynamicEnd of code block
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

nbtstat
B

tracert
C

netstat
D

arp
ChatGPT 说:

✅ 答案:D — arp

说明:
输出显示 IP 地址与物理地址(MAC 地址)的映射,这是 arp 命令的典型结果。

您说:
Which of the following arp utility switches display the current ARP entries by interrogating the current protocol data?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

–d
B

–a
C

–g
D

–N
ChatGPT 说:

✅ 答案:B — –a, C — –g

说明:

arp -a 和 arp -g 都用于显示当前 ARP 表中的条目。

-d 用于删除条目,-N 用于指定接口或网络,不显示表。

您说:
You are a network administrator in a reputed company. A user calls you complaining that the performance of the intranet web server is sluggish. When you try to ping the server, it takes several seconds for the server to respond. You suspect that the problem is related to a router that is seriously overloaded. Which of the following workstation utilities could you use to find out which router is causing this problem?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

nbtstat
B

tracert
C

ping
D

arp
E

netstat
ChatGPT 说:

✅ 答案:B — tracert

说明:
tracert(Windows 下)或 traceroute(Linux 下)可以显示从源到目标经过的每一跳路由器,并显示每跳的响应时间,从而帮助定位性能瓶颈或负载过重的路由器。

您说:
Which ping commands will verify that the local TCP/IP interface is working?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ping localif
B

ping localhost
C

ping iphost
D

ping 204.153.163.2
E

ping 127.0.0.1
ChatGPT 说:

✅ 答案:B — ping localhost, E — ping 127.0.0.1

说明:

localhost 和 127.0.0.1 都指向本地回环接口,用于测试本机 TCP/IP 堆栈是否正常工作。

其他选项测试的是网络上的远程主机,而非本地接口。

您说:
Which command captures the traffic on all interfaces?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

tcpdump host 192.168.5.5
B

tcpdump host all
C

tcpdump -i any
D

tcpdump -i eth0
ChatGPT 说:

✅ 答案:C — tcpdump -i any

说明:
tcpdump -i any 捕获所有网络接口上的流量,而 -i eth0 只捕获指定接口的数据包。

您说:
Wireshark is an example of a(n) __.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

remote connection tool
B

protocol analyzer
C

throughput tester
D

IDS
ChatGPT 说:

✅ 答案:B — protocol analyzer

说明:
Wireshark 是用于捕获和分析网络数据包的协议分析工具(protocol analyzer)。

您说:
Wireshark is an example of a(n) __.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

remote connection tool
B

protocol analyzer
C

throughput tester
D

IDS
ChatGPT 说:

✅ 答案:B — protocol analyzer

说明:
Wireshark 用于捕获、检查和分析网络上的数据包,是典型的协议分析器工具。

您说:
Which utility can the users use to find the MAC and TCP/IP addresses of the Windows workstation?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ipconfig /all
B

tracert
C

ping
D

ipconfig
ChatGPT 说:

✅ 答案:A — ipconfig /all

说明:
ipconfig /all 显示 Windows 工作站的完整网络配置信息,包括 IP 地址、子网掩码、默认网关和物理地址(MAC 地址)。

您说:
Which utility can the users use to find the MAC and TCP/IP addresses of the Windows workstation?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ipconfig /all
B

tracert
C

ping
D

ipconfig
ChatGPT 说:

✅ 答案:A — ipconfig /all

说明:
ipconfig /all 显示 Windows 工作站的完整网络信息,包括 IP 地址和 MAC 地址,而 ipconfig 仅显示基本 IP 配置。

您说:
Which of these is not a chain type used by iptables?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Output
B

Forward
C

Backward
D

Input
ChatGPT 说:

✅ 答案:C — Backward

说明:
iptables 使用的链类型包括 Input、Output 和 Forward。不存在 Backward 链。

您说:
Which netstat utility displays all connections and listening ports on the host computer?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

-f
B

-a
C

-e
D

-b
ChatGPT 说:

✅ 答案:B — -a

说明:
netstat -a 显示主机上所有活动的连接以及所有正在监听的端口。

您说:
Which switch displays both workstation and server sessions but lists remote addresses by IP address only?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

-R
B

-n
C

-S
D

-r
ChatGPT 说:

✅ 答案:C — -S

practice A

给我正确选项即可: Your wireless network is configured with WEP encryption and has a limited number of users. You notice that there are some unauthorized connections on your access point. Which of the following steps will you take to enhance the security of your network?
Each correct answer represents a part of the solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Enable SSID broadcast.
B

Change channel configuration.
C

Configure MAC filtering.
D

Configure WPA encryption.思考了 5sC
DWhich of the following statements is true about the unique local addresses?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

They were designed to replace unicast addresses, so they allow communication throughout a site while being routable to a single local network.
B

They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to a single local network.
C

They were designed to replace unicast addresses, so they allow communication throughout a site while being routable to multiple local networks.
D

They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to multiple local networks.思考完毕无响应.5个网页不要多余的解释, 只需要选项和选项内容: Which of the following statements is true about the unique local addresses?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

They were designed to replace unicast addresses, so they allow communication throughout a site while being routable to a single local network.
B

They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to a single local network.
C

They were designed to replace unicast addresses, so they allow communication throughout a site while being routable to multiple local networks.
D

They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to multiple local networks.D
They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to multiple local networks.Jennifer, a network administrator, is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. Which of the following cable types is used to connect the line to the expansion card?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CAT6
B

CAT2
C

CAT9
D

CAT12B
CAT2Which of the following vulnerability scanning tools is also known as a sniffer?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Network mapper
B

Wireless scanner
C

Password cracker
D

Protocol analyzerD
Protocol analyzerWhich of the following system ports is sometimes called the registered port?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

User
B

Ephemeral
C

Private
D

DynamicNone of the provided options (A: User, B: Ephemeral, C: Private, D: Dynamic) directly correspond to the term “registered port.” In networking, registered ports are those numbered from 1024 to 49151, as defined by the Internet Assigned Numbers Authority (IANA), and are used by specific services or applications upon registration.
However, since the question requires selecting one of the given options and none accurately match, the closest related concept might be misinterpreted in the context of the question. Based on standard terminology:

Ephemeral ports (often called dynamic or private ports) are temporary ports used by clients (49152–65535).
Registered ports are not synonymous with user, ephemeral, private, or dynamic ports.

If forced to choose from the given options, none are correct, but the question may expect D: Dynamic due to occasional confusion in terminology where dynamic ports are misunderstood. However, this is not accurate for registered ports.
Final Answer: None (if allowed); otherwise, D: Dynamic (noting potential question error).Which of the following types of cables don’t need EMI shielding?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Optical
B

Twisted-pair
C

MultifiberA
Optical
C
MultifiberHow many broadcast domains are created when an unmanaged 12-port switch is used?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

1
B

6
C

12
D

0A
1Which layer of the OSI model performs the process-to-process communication using segments?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Presentation
B

Application
C

Transport
D

NetworkC
TransportWhich of these are the types of PDUs?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Set
B

Report
C

Get
D

TrapB
Report
C
Get
D
TrapMultiple lower bit rate streams are combined by a device called a multiplexer.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

TrueB
TrueWhich of the following layers of the OSI model provides delivery and formatting of information for processing and display?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Presentation
B

Data link
C

Transport
D

ApplicationA
PresentationA technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following pin mappings represent what the technician should do to make a crossover cable before crimping the new plug?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

1 > 3, 2 > 6, 3 > 1, and 6 > 2
B

1 > 4, 2 > 5, 4 > 1, and 5 > 2
C

1 < > 8, 2 < > 7, 3 < > 6, and 4 < > 5
D

1 > 3, 4 > 2, 3 > 4, and 6 > 2A
1 > 3, 2 > 6, 3 > 1, and 6 > 2Which of these is the correct name of the original Ethernet standard?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

10BASE10
B

10BASE5
C

10BASE12
D

10BASE2B
10BASE5A company is concerned about the possible attacks on its network by the attackers to gain access to confidential research data. Which of these is a type of vulnerable system that could be implemented to redirect any attackers on the network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Separation of duties
B

Honeypot
C

NAC
D

BotnetB
HoneypotOn Wi-Fi networks, both WEP and WPA-TKIP use the RC4 cipher, but WEP’s implementation is far more vulnerable to attack.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

FalseA
TrueA company’s management has given a list of requirements to the network technician for a LAN connection using CAT6 cabling in an older building. The technician has to keep the environmental factors in mind during the network installation. Which of these should the network technician consider while deciding whether or not to use plenum-rated cables?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Window placement
B

Floor composition
C

Ceiling airflow condition
D

Workstation modelC
Ceiling airflow conditionWhich type of cryptographic technology can be used for authentication and non-repudiation?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Cryptographic hashing
B

Asymmetric
C

SymmetricB
AsymmetricWhich of these is used when a host joins a network or is assigned a new MAC address?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

FQDN
B

ARP announcement
C

NDP
D

ARP probeB
ARP announcementWhich of the following incident goals ensures that incident prevention and response follow the organization’s policies plus any relevant laws, business agreements, or generally expected industry practices?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Forensic practices
B

BC
C

Regulatory compliance
D

DRC
Regulatory complianceWhich of the following terms examines the packet origins at a network’s periphery to restrict the outside traffic?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Guest network isolation
B

MAC filtering
C

Edge control
D

Captive portalC
Edge controlWhy a password written on a slip of paper is a knowledge factor?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Because it’s meant to be written
B

Because it’s meant to be created
C

Because it’s meant to be remembered
D

Because it’s meant to be identifiedC
Because it’s meant to be rememberedWhich of the following SNMP versions has no significant security features, and the devices only respond to messages containing the correct community name string?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

SNMPv1
B

SNMPv2c
C

SNMPv3A
SNMPv1
B
SNMPv2cThe end goal of network security is minimizing the risk to critical assets. However, to calculate risk, the users need to know what threats they face and where the network is vulnerable.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

TrueB
Trueno bookmarked, confident, or note marked bookmark popover collapsed
Question 74 :
Which of the following statements is true about a learning bridge?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It can use the network’s traffic to teach itself the IP address of any given address.
B

It can use the network’s traffic to teach the other networks the IP address of any given address.
C

It can use the network’s traffic to teach itself the location of any given address.
D

It can use the network’s traffic to teach the other networks the location of any given address.C
It can use the network’s traffic to teach itself the location of any given address.A network technician in a company has to assist a security team that wants to capture all traffic on a single subnet between the router and the core switch. The team has to ensure that there is only a single collision and a broadcast domain between the router and the switch to collect the traffic easily. Which of the following devices should the technician install to meet the goal mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Media converter
B

Bridge
C

Router
D

HubD
HubIn a NetFlow system, what are the devices that identify network flows called?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Flow collectors
B

Flow aggregators
C

Flow exporters
D

Flow samplersC
Flow exportersWhich of the following technologies is designed for communication over long distances on networks containing thousands or millions of users, requiring complex and expensive infrastructure?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

PAN
B

MAN
C

WAN
D

CANC
WANConsider the following command:
Start of code blockcommand -p ip_address [interface_name] [/all]End of code block
Which of the following statements is true regarding the -p and /all options?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The users can use these options to change the command’s functions.
B

The users can use these options to terminate the command’s functions.
C

The users can use these options to delete the command’s functions.A
The users can use these options to change the command’s functions.Which of these was the most common reason for BSOD errors and system reboots in the older versions of Windows?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Failure of the clustered driver
B

Failure of the graphics driver
C

Failure of the facility driver
D

Failure of the virtualized driverB
Failure of the graphics driverWhich of the following statements is true about non-repudiation?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The authorization is verified in a way that even its creator can’t dispute.
B

The availability is verified in a way that even its creator can’t dispute.
C

The authenticity is verified in a way that even its creator can’t dispute.
D

The confidentiality is verified in a way that even its creator can’t dispute.C
The authenticity is verified in a way that even its creator can’t dispute.Adam, a user, reports to you that he is unable to communicate with a particular IP address on the company’s network. You have addressed the issue and, now, you need to find where the traffic is stopping. Which of the following commands will you use?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

nslookup
B

arp
C

netstat
D

tracertD
tracertWhich of the following protocols is not included in the network layer of the OSI model?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

SPX
B

IPv6
C

IPv4
D

IPXA
SPXIf the binary values are of 8-bits, the users show the full eight digits even if it starts with 0.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

FalseA
TrueWhich of the following security features is designed to prevent DoS and reconnaissance attacks, which utilize the control plane of software-defined networks?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

DAI
B

Flood guard
C

BPDU guard
D

CoPPD
CoPPWhich of the following fields in the IPv4 packet specifies the current hop limit?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

TTL
B

Explicit congestion notification
C

DSCP
D

Fragment offset思考了 3sA
TTLWhich of the following is not an example of using network segmentation to control traffic through the internal network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

When possible, isolate vulnerable legacy systems.
B

Separate other special-purpose networks where possible, such as IoT deployments or Wi-Fi hotspots.
C

Enable DHCP snooping, dynamic ARP inspection, and (for IPv6) RA guard.
D

Segment the L2 network using appropriate VLANs.
E

Segment the L3 network using subnets.思考完毕C
Enable DHCP snooping, dynamic ARP inspection, and (for IPv6) RA guard.The chief information officer has noticed that the corporate wireless signal is available in the parking lot. Now, the management requests the network administrator to change the wireless network so that it is no longer accessible in public areas without affecting the availability inside the building. Which of these should the network administrator change on the wireless network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Power levels
B

Overcapacity
C

Multipath
D

Channel overlapA
Power levelsWhich of the following statements is true about insertion loss?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

0 dB would indicate a poor connection.
B

0 dB would indicate 90% signal loss.
C

0 dB would indicate 99% signal loss.
D

0 dB would indicate a perfect and a lossless connection.D
0 dB would indicate a perfect and a lossless connection.Which protocol uses UDP port 123 and allows hosts to get information from a time source either by direct queries or by listening to broadcast or multicast traffic?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

POP
B

SMTP
C

IMAP
D

NTPD
NTPWhich of the following statements is true with regards to securing authentication and identity management?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Use patch management processes or solutions to ensure that all hosts on the network are kept up to date.
B

Ensure that network-based authentication uses secure protocols.
C

Apply particular scrutiny to legacy systems that cannot be easily replaced.
D

Upgrade or replace legacy systems and hosts with older and unsupported operating systems.B
Ensure that network-based authentication uses secure protocols.Which of the following statements is true about biometrics?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Inherence elements that are based on personal physical characteristics are called biometrics.
B

Possession elements that are based on personal logical characteristics are called biometrics.
C

Knowledge elements that are based on personal logical characteristics are called biometrics.
D

Knowledge elements that are based on personal physical characteristics are called biometrics.A
Inherence elements that are based on personal physical characteristics are called biometrics.Ann, a network technician, is replacing the existing cables in her company’s remote location. She has to re-install a new cabling solution that will have 10 Gbps speed and can also be run between the structural and drop-down ceilings providing safety in case of fires. Which of these will best meet the requirement of Ann?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Plenum, Cat 6
B

PVC, Cat 6
C

Plenum, Cat 6a
D

STPC
Plenum, Cat 6aWhich of the following statements is true about the twist rates in twisted-pair cables?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Higher twist rates are more resistant to crosstalk but need a little more wire for a cable of the same length.
B

Higher twist rates are less resistant to crosstalk and need a little less wire for a cable of the same length.
C

Higher twist rates are more resistant to crosstalk and need a little less wire for a cable of the same length.
D

Higher twist rates are less resistant to crosstalk but need a little more wire for a cable of the same length.A
Higher twist rates are more resistant to crosstalk but need a little more wire for a cable of the same length.In which of the following types of assessments do the users need to consider security risks through the supply chain?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Threat
B

Risk
C

Vendor
D

ProcessC
VendorTasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

B
True

A company wants to secure its WLAN network by implementing a method that will provide a web page before the users ask for authentication credentials while allowing them access to the network. Which of these will help in satisfying this requirement?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

RBAC
B

Wireless client isolation
C

Geofencing
D

Captive portalD
Captive portalWhich of the following technologies is used to connect private devices?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

LAN
B

CAN
C

MAN
D

PAN
D
PAN

Which of the following networks connects multiple LANs using long-range transmission media?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

MAN
B

PAN
C

CAN
D

WAN

D
WAN

A technician is troubleshooting a customer’s network connectivity issue. He needs to determine the IP address of the customer’s router. The customer has an IP address of 192.168.1.55/24. Which of these is the address of the customer’s router?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

192.168.5.55
B

192.168.1.1
C

192.168.0.5
D

192.168.100.1

B
192.168.1.1

Which of the following combinations will form a two-factor authentication process?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ID card and key fob
B

Smart card and PIN
C

Retina scan and fingerprint
D

Password and PIN

B
Smart card and PIN

An employee at a company received a call from someone in the IT department asking for information about the company’s network. The caller explained that the information would be used to improve the connection speed, thus improving performance. However, the caller ID on the phone indicated that the call came from outside the company. Which of the following types of attack has occurred in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Social engineering
B

Password
C

Dictionary
D

IP spoofingA
Social engineeringWhich of the following procedures are employed when identifying a network problem?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Determine if anything has changed.
B

Approach multiple problems individually.
C

Create a plan.
D

Question users.

A
Determine if anything has changed.
B
Approach multiple problems individually.
D
Question users.

Which of these are the common representations of binary values?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Dodecadecimal
B

Hexadecimal
C

Octal
D

Septal

answer:

B
Hexadecimal
C
Octal

no bookmarked, confident, or note marked bookmark popover collapsed
Question 86 :

Which type of network scope is often used to connect all or parts of a city?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CAN
B

MAN
C

WAN
D

LANB
MANEthernet addressing uses the MAC address burned into each and every Ethernet NIC.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

A
True

While troubleshooting a network, it’s important to view the identification of a problem as an ongoing process.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

TrueB
TrueDecibels can be used to describe the absolute power level of a signal that’s being sent or received or the relative losses due to the transmission medium.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

B
True

Which of the following services provides the desktop and other resources?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

PaaS
B

IaaS
C

SaaS
D

DaaS

D
DaaS

Which TCP/IP tool supersedes the ifconfig, arp, and route commands?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ipconfig
B

dig
C

ip
D

nslookup

C
ip

Which of the following statements are true about a logical network?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It is the network from the perspective of the computers that use it.
B

It is the path that the information follows.
C

It is the information carried by the physical network.
D

It is a network that includes the electrical, optical, and radio signals that are transmitted and received.
A
It is the network from the perspective of the computers that use it.
B
It is the path that the information follows.
C
It is the information carried by the physical network.

Internet is an example of the largest WAN.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

A
True

Which of the following IP addresses is reserved for private use?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

197.168.3.100
B

172.168.5.0
C

10.100.200.0
D

169.253.10.20C
10.100.200.0

Which of the following statements is true about RIP?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Since it has a maximum allowable hop count of 20 by default, a hop count of 21 would be deemed unreachable.
B

Since it has a maximum allowable hop count of 18 by default, a hop count of 19 would be deemed unreachable.
C

Since it has a maximum allowable hop count of 16 by default, a hop count of 17 would be deemed unreachable.
D

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.
Explanation
Answer D is correct.

Which of the following statements is true about SNR?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The higher the SNR, the lower the signal with respect to the noise floor.
B

The higher the SNR, the higher the noise floor with respect to the signal.
C

The lower the SNR, the higher the signal with respect to the noise floor.
D

The higher the SNR, the lower the noise floor with respect to the signal.
Explanation
Answer D is correct.

Decibels can be used to describe the absolute power level of a signal that’s being sent or received or the relative losses due to the transmission medium.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

Which of these implies a line topology with reference to the point-to-point connections?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Daisy chain
B

Bus
C

Star
D

Termination
Explanation
Answer B is correct.

Which of the cellular technologies is a type of cell phone that contains a SIM chip?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

FDMA
B

TDMA
C

GSM
D

CDMA
Explanation
Answer C is correct.

Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

A
B

AAAA
C

CNAME
D

SOA
Explanation
Answer B is correct.

A laser transmission would stay in a tight beam and only suffer attenuation due to absorption by the air.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

Which of these are installed in racks, such as servers, firewall appliances, and redundant power supplies?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

System labeling
B

Port labeling
C

Circuit labeling
D

Naming conventions
Explanation
Answer A is correct.

Tasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

What is the correct distance range of 1000BaseLX?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

From 2 km up to 20 km
B

From 3 km up to 20 km
C

From 3 km up to 10 km
D

From 2 km up to 10 km
Explanation
Answer C is correct.

A network technician has to set up a firewall on a company’s network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of these should the network technician use to achieve this goal?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

tracert
B

traceroute
C

NAT
D

JAT
Explanation
Answer C is correct.

The most effective way to control both authentication of remote users and the application of their permissions is to provision an AAA server.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

Which of these is not considered a network device?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Repeater
B

Media
C

Firewall
D

Switch
E

Hub
Explanation
Answer B is correct.

High memory utilization can be as severe as a saturated CPU.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer B is correct.

A technician is troubleshooting a customer’s network connectivity issue. He needs to determine the IP address of the customer’s router. The customer has an IP address of 192.168.1.55/24. Which of these is the address of the customer’s router?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

192.168.100.1
B

192.168.0.5
C

192.168.1.1
D

192.168.5.55
Explanation
Answer C is correct.

QoS refers to the way the resources are controlled so that the quality of service is maintained.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
Explanation
Answer A is correct.

The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
Explanation
Answer A is correct.

Which of the following statements is true about RIP?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Since it has a maximum allowable hop count of 20 by default, a hop count of 21 would be deemed unreachable.
B

Since it has a maximum allowable hop count of 18 by default, a hop count of 19 would be deemed unreachable.
C

Since it has a maximum allowable hop count of 16 by default, a hop count of 17 would be deemed unreachable.
D

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.
ChatGPT 说:

The correct answer is:

C — Since it has a maximum allowable hop count of 16 by default, a hop count of 17 would be deemed unreachable. ✅

Explanation:
RIP (Routing Information Protocol) uses hop count as its routing metric. The protocol defines:

Maximum hop count = 15

Any destination with a hop count of 16 is considered unreachable

So if a route’s hop count exceeds 16 (i.e., 17), RIP will treat it as unreachable. This is a fundamental limit designed to prevent routing loops.

Option D is a common distractor because it flips the numbers, but RIP’s limit is 15 hops.

您说:
只需要给我选项即可
ChatGPT 说:

C

您说:
选项和选项内容
ChatGPT 说:

C

Since it has a maximum allowable hop count of 16 by default, a hop count of 17 would be deemed unreachable.

您说:
Which of the following statements is true about RIP?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Since it has a maximum allowable hop count of 20 by default, a hop count of 21 would be deemed unreachable.
B

Since it has a maximum allowable hop count of 18 by default, a hop count of 19 would be deemed unreachable.
C

Since it has a maximum allowable hop count of 16 by default, a hop count of 17 would be deemed unreachable.
D

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.
ChatGPT 说:

D

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.

您说:
Members of a basic service set share a 48-bit identifier compatible with the MAC standard and included in every Wi-Fi frame sent by its members. What is this identifier called?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

SSID
B

PBSSID
C

BSSID
D

GBSSID
ChatGPT 说:

C

BSSID

您说:
Which of the following TCP/IP tools tests the reachability and latency of a given host?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ping
B

ipconfig
C

route
D

netstat
ChatGPT 说:

A

ping

您说:
Which of the following statements are true about networks?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

By definition, physical networks always consist only of hardware components and devices.
B

Radio signals are part of the physical network.
C

In a logical network, connections are the protocols that guide data to its destination address.
D

Interface cards are technically a part of the logical network.
ChatGPT 说:

B

Radio signals are part of the physical network.

C

In a logical network, connections are the protocols that guide data to its destination address.

您说:

您说:
Which of these is a standardized rule for formatting data?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Protocol
B

Node
C

Media
D

Bit
ChatGPT 说:

A

Protocol

您说:
What should you do if you cannot connect to an AP and you’ve verified that your DHCP configuration and WEP key are correct?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Check the MAC address filtering on the mitigation.
B

Check the MAC address filtering on the AP.
C

Check the IP address filtering on the mitigation.
D

Check the IP address filtering on the AP.
ChatGPT 说:

B

Check the MAC address filtering on the AP.

您说:
Which of these are some of the calamities that the users should escalate while implementing the solution during network troubleshooting?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Routing problems
B

IPv6 teaming misconfiguration
C

Routing loops
D

Broadcast storms
ChatGPT 说:

A

Routing problems

C

Routing loops

D

Broadcast storms

您说:
The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
What is the port number of SMB?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

TCP 945
B

TCP 445
C

TCP 245
D

TCP 345
ChatGPT 说:

B

TCP 445

您说:
An attacker floods a switch with frames in an attempt to redirect traffic to his server. Which of the following attacks is the attacker most likely using?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

DNS poisoning
B

Phishing
C

On-path
D

ARP spoofing
ChatGPT 说:

D

ARP spoofing

您说:
A network administrator is setting up a web-based application that needs to be continually accessible to the end-users. Which of the following concepts would best ensure this requirement?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CARP
B

High availability
C

Fault tolerance
D

Traffic shaping
ChatGPT 说:

B

High availability

您说:
Which of the following protocols allows active-active load balancing?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

FHRP
B

VRRP
C

GLBP
ChatGPT 说:

C

GLBP

您说:
Which of these is not a general guideline for establishing the probable cause of a network problem?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Consider multiple approaches.
B

Question the obvious.
C

Consider only the most relevant approach.
D

Keep track of what you’ve already tried.
ChatGPT 说:

C

Consider only the most relevant approach.

您说:
What is the correct distance range of 1000BaseLX?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

From 3 km up to 20 km
B

From 3 km up to 10 km
C

From 2 km up to 10 km
D

From 2 km up to 20 km
ChatGPT 说:

B

From 3 km up to 10 km

您说:
Which of the following statements is true about the data link layer of the OSI model?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It is subdivided into four sublayers, namely, MAC, IP, LLC, and UDP.
B

It is subdivided into two sublayers, namely, NIC and LLC.
C

It is subdivided into two sublayers, namely, MAC and LLC.
D

It is subdivided into three sublayers, namely, NIC, MAC, and LLC.
ChatGPT 说:

C

It is subdivided into two sublayers, namely, MAC and LLC.

您说:
Both RIPv1 and RIPv2 are distance-vector protocols, which means that each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:

您说:
Which of the following statements is true about authentication in a client-server fashion?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The client providing resources ask for credentials, and the server provides them.
B

The client providing resources ask for credentials, and the server hosts them.
C

The server hosting resources ask for credentials, and the client provides them.
ChatGPT 说:

C

The server hosting resources ask for credentials, and the client provides them.

您说:
Which type of cable uses low-smoke and fire-retardant materials?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

PVC
B

Multifiber
C

Plenum
D

Riser-rated
ChatGPT 说:

C

Plenum

您说:
Which of these describes the resolution of a problem while troubleshooting the network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Determining the extent and the root cause of the problem
B

Learning that a problem exists, through direct observation or a problem report
C

Planning and implementing a fix for the problem
D

Pursuing multiple avenues, beyond personal recollection
ChatGPT 说:

C

Planning and implementing a fix for the problem

您说:
A network technician has to set up a firewall on a company’s network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of these should the network technician use to achieve this goal?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

traceroute
B

tracert
C

JAT
D

NAT
ChatGPT 说:

D

NAT

您说:
Which of these is a technique that writes data patterns over the entire media, thereby eliminating any trace data?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Physical destruction
B

Purging
C

Overwriting
D

Clearing
ChatGPT 说:

C

Overwriting

您说:
The original intention of NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
Which of the following is not the step for testing a theory when troubleshooting?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Measure the plausibility of the theory against the most obvious cause of the problem.
B

Escalate the testing process, if necessary.
C

Perform a sanity check, which means think over the theory and see if there’s any reason that it couldn’t explain the problem.
D

If the theory passes a sanity check, verify it by examining settings or components.
ChatGPT 说:

A

Measure the plausibility of the theory against the most obvious cause of the problem.

您说:
Which of the following statements is true about access control hardware?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It makes the data unreadable even with advanced forensic techniques.
B

It comprises a category of devices that are used to identify and authenticate users.
C

It scrambles the data on the media, thereby rendering it unreadable without the encryption key.
D

It exposes the media to a powerful and alternating magnetic field, thus removing any previously written data.
ChatGPT 说:

B

It comprises a category of devices that are used to identify and authenticate users.

您说:
Which of the following statements is correct about the OSI model in networking?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

A communication protocol or network appliance can be described by the layer it occupies.
B

It can be complicated, stressful, and time-consuming.
C

It operates using leased lines from a telecommunication provider.
D

It is made up of seven layers arranged vertically in what is called a stack.
ChatGPT 说:

A

A communication protocol or network appliance can be described by the layer it occupies.

D

It is made up of seven layers arranged vertically in what is called a stack.

您说:
The MIB is a database with a set of predefined questions that the NMS can ask the agents regarding the health of the device or network.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
Which of these is not considered a network device?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Repeater
B

Media
C

Firewall
D

Switch
E

Hub
ChatGPT 说:

B

Media

您说:
DWAN is a virtual WAN architecture that uses software to manage connectivity, devices, and services and can make changes in the network that is based on the current operations.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
ChatGPT 说:

A

True

您说:
Which of these is not a distinct function of the layer 2 switches?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Address learning
B

Easy maintenance
C

Forward decisions
D

Loop avoidance
ChatGPT 说:

B

Easy maintenance

您说:
Essential WAN technologies include user-level connections, such as cable, DSL, or 4G.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
A network technician configured a network device. After restarting, the device was unresponsive. Even after doing a hard reset, the device was not restored to factory defaults and did not display any output. Which of these has the technician most likely performed?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Access control lists
B

Driver update
C

Firmware update
D

Rollback
ChatGPT 说:

C

Firmware update

您说:
A network administrator has to implement a physical security control method that can prevent an attacker from gaining access to a network closet or server room. Which of these will help the network administrator in achieving this goal?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Mantrap
B

Locking rack
C

Biometric
D

Smart lock
ChatGPT 说:

A

Mantrap

您说:

您说:
no bookmarked, confident, or note marked bookmark popover collapsed

您说:
Which of these best describes network reliability?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Minimal transmission errors, and detection and correction of any that do occur
B

Connection security
C

Compatibility of components
D

Minimal required network maintenance
ChatGPT 说:

A

Minimal transmission errors, and detection and correction of any that do occur

您说:
APC connectors can be used only with other APC connectors.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
James, a network engineer, is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following networks will James implement?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

LAN
B

CAN
C

PAN
D

MAN
ChatGPT 说:

D

MAN

您说:
Which of these are installed in racks, such as servers, firewall appliances, and redundant power supplies?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Port labeling
B

System labeling
C

Naming conventions
D

Circuit labeling
ChatGPT 说:

B

System labeling

您说:
On the network, you don’t just need to know what the matter is, but you need to know how many users are affected. Which of the following steps of problem identification is explained in the given information?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Determine if anything has changed.
B

Question users.
C

Gather information.
D

Identify the symptoms.
ChatGPT 说:

D

Identify the symptoms.

您说:
Which of these is a primary concern for WANs?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Fiber-optic connection
B

Digital subscriber line
C

Security
ChatGPT 说:

C

Security

您说:
An attacker, after gaining access to a facility, places a wireless access point to make it look as though it belongs to the network. He then begins eavesdropping on the wireless traffic. Which of the following attacks has the attacker performed?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Ransomware
B

Evil twin
C

Brute-force
D

Logic bomb
ChatGPT 说:

B

Evil twin

您说:

您说:
Which of the following statements is correct about SMB?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It manages distributed directory information services across a network.
B

It is designed to allow various applications to communicate over the network.
C

It refers to the programming language used to communicate with the most popular RDBMS.
D

It allows folders or hard drives to be shared over the network and accessed as if they were local drives.
ChatGPT 说:

D

It allows folders or hard drives to be shared over the network and accessed as if they were local drives.

您说:
The most effective way to control both authentication of remote users and the application of their permissions is to provision an AAA server.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
QoS refers to the way the resources are controlled so that the quality of service is maintained.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
您说:
您说:
Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

AAAA
B

CNAME
C

SOA
D

A
ChatGPT 说:

A

AAAA

您说:
Which of the following are the resource-sharing protocols?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

SMB
B

POP
C

LDAP
D

SMTP
ChatGPT 说:

A

SMB

C

LDAP

您说:

您说:
An effective network’s topology is a matter of planning, not organic growth.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
ChatGPT 说:

A

True

您说:

您说:
Which of the following statements is correct about sessions in the session layer of the OSI model?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

They must be created, maintained separately from other sessions, but not ended.
B

They must be created, maintained together with other sessions, but not ended.
C

They must be created, maintained separately from other sessions, and ended.
D

They must be created, maintained together with other sessions, and ended.
ChatGPT 说:

C

They must be created, maintained separately from other sessions, and ended.

您说:
Which of the following statements is true about RBAC?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It is commonly used in networks to simplify the process of assigning new users the permission required to perform a job role.
B

It is commonly used in networks to simplify the process of denying new users the permission required to perform a job role.
C

It is commonly used in networks to simplify the process of assigning existing users the permission required to perform a job role.
D

It is commonly used in networks to simplify the process of denying existing users the permission required to perform a job role.
ChatGPT 说:

A

It is commonly used in networks to simplify the process of assigning new users the permission required to perform a job role.

您说:
Which of the following statements is true regarding network convergence?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

High-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.
B

High-performance TCP/IP networks augmented by additional technologies are increasingly using other options.
C

Low-performance TCP/IP networks augmented by additional technologies are increasingly using other options.
D

Low-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.
ChatGPT 说:

A

High-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.

您说:
High memory utilization can be as severe as a saturated CPU.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
ChatGPT 说:

B

True

您说:
Which of the following TCP/IP tools is a more powerful alternative to nslookup for performing DNS lookups?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

hostname
B

dig
C

netstat
ChatGPT 说:

B

dig

您说:
Why is the TCP/IP model in such wide use, despite its limitations?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It proved so robust and scalable that it was quickly adopted by the US government and research networks that formed the early Internet.
B

It employs physical layers rather than abstraction layers.
C

It’s more comprehensive than the OSI model.
D

It’s protocol-independent.
ChatGPT 说:

A

It proved so robust and scalable that it was quickly adopted by the US government and research networks that formed the early Internet.

您说:
Ethernet is not only the standard used for almost all modern wired LANs, it’s also increasingly being used for telecommunications and storage networks and is even increasingly adopted as a WAN technology.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
ChatGPT 说:

A

True

您说:
Which of the following statements is true about the twisted-pair cables?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Large cables often have a central strength member, with the fibers themselves placed around them.
B

They don’t need EMI shielding, but cables for outdoor use need more physical protection than those used indoors.
C

Instead of an electrical circuit confining the radio signal within a copper cable, light from a laser or LED shines down a hair-thin and highly purified glass fiber.
D

Each balanced pair is warped around itself for the cable’s length, so even a nearby source, such as a parallel cable, will, on average, balance out.
ChatGPT 说:

D

Each balanced pair is warped around itself for the cable’s length, so even a nearby source, such as a parallel cable, will, on average, balance out.

您说:
Which of the cellular technologies is a type of cell phone that contains a SIM chip?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CDMA
B

GSM
C

TDMA
D

FDMA
ChatGPT 说:

B

GSM

您说:
no bookmarked, confident, or note marked bookmark popover collapsed
Question 66 :
A WAN operates using leased lines from a telecommunication provider, connecting to the LANs in each site.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
ChatGPT 说:

A

True

您说:
Why is a routing table more complicated than a MAC table on a switch?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Because multiple entries have to have a single piece of information
B

Because each entry has to have more pieces of information
C

Because multiple entries have to have more pieces of information
D

Because each entry has to have a single piece of information
ChatGPT 说:

B

Because each entry has to have more pieces of information

您说:
A hospital has installed CCTVs on all the entrances and hallways to monitor the people entering and leaving the facility. The camera feeds go to the surveillance room where security personnel monitors the activities. One of the security personnel notices a man wearing a doctor’s lab coat whose identity cannot be verified by looking through the video feed. The man is seen interacting and mobilizing with other people around him. What kind of attack is the security personnel witnessing?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Man-in-the-middle
B

Ransomware
C

Logic bomb
D

Social engineering
ChatGPT 说:

D

Social engineering

您说:

您说:
A network technician has to perform maintenance on many of the company’s web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

IDS
B

Wireless LAN controller
C

VPN concentrator
D

Load balancer
ChatGPT 说:

D

Load balancer

您说:
An ad hoc network would not scale well and is not recommended due to collision and organization issues.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
ChatGPT 说:

A

True

您说:

Which of the following standards are used within the telecommunication networks?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

MELS
B

MPLS
C

DSL
D

Frame Relay
Explanation
Answers B and D are correct.

Which of the following would be the most efficient subnet mask for a subnetwork accommodating eight hosts?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

/28
B

/29
C

/27
D

/30
Explanation
Answer A is correct.

Which of the following statements are not true about the OSI model?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It describes network communication in terms of the underlying network technology or structure.
B

It is a suite of protocols that serves as the world’s primary network standard.
C

Even though the OSI model precisely describes the Internet’s structure, it’s excellent at explaining how real devices and protocols interact.
D

It’s a very abstract model and describes network communication in terms of functions.
Explanation
Answers A and B are correct.

The transport layer of the OSI model translates the data between network packets and also the data used by applications.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
Explanation
Answer A is correct.

Which of the following statements is true about the input errors?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

They often indicate low-level errors, such as CRCs.
B

They often indicate low-level errors, such as mitigation.
C

They often indicate high-level errors, such as CRCs.
D

They often indicate high-level errors, such as mitigation.
Explanation
Answer C is correct.

A network technician in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following addresses would fulfill these requirements?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

172.16.0.0/22
B

172.18.0.0/23
C

10.5.4.0/27
D

192.168.25.0/24
Explanation
Answer B is correct.

A company is setting up a new branch office. The new office will have two departments, Finance and Engineering. The Finance department will have 55 employees and the Engineering department will have 5 employees. The IP subscribed from the ISP is 192.168.1.0/29. The network administrator is configuring the subnets for the two departments starting with the Finance department. What will be the last host address on the Engineering subnet?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

192.168.1.80
B

192.168.1.78
C

192.168.0.76
D

192.168.1.77
E

192.168.1.79
Explanation
Answer B is correct.

A LAN could have hundreds or thousands of nodes.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
Explanation
Answer A is correct.

Which of the following actions are taken by a learning bridge when it checks the destination address against its MAC table?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

If the destination is in the table and on a different segment from that source, it forwards the frame to only that segment.
B

If the destination is on the same segment as the source, it filters the frame by ignoring it.
C

If the destination is in the table and on the same segment as the source, it forwards the frame to only that segment.
D

If the destination address isn’t in the table, it floods the frame to all other segments except the source.
Explanation
Answers A, B, and D are correct.

Which of the following statements is true about the dial-up access?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Some modem bondings do not offer dial-up access to users who subscribe to other services.
B

Some ISPs offer dial-up access to users who subscribe to other services.
C

Some modem bondings offer dial-up access to users who subscribe to other services.
D

Some ISPs do not offer dial-up access to users who subscribe to other services.
Explanation
Answer B is correct.

The important troubleshooting process for Network+ is CompTIA’s five-step model.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True
Explanation
Answer A is correct.

Which of the following statements are true about network troubleshooting?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The important thing is that the specific methods find a complete process and stick to it, especially during the diagnosis process.
B

It’s often wise to skip around from one troubleshooting step to another based on hunches or habits.
C

Using a systematic process will give the users quicker and more consistent results.
D

The users can solve a surprising amount of problems by fiddling with one piece of a system after another until things work.
Explanation
Answers A, C, and D are correct.

Which of these is not a category of the cause of disaster in a disaster recovery plan?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Technological
B

Manmade
C

Technical
D

Natural
Explanation
Answer C is correct.

Which of the following statements is true about the networking concepts?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

A bridge is a node on the physical network.
B

A switch is a node on the physical network.
C

A hub is a node on the physical network.
D

A repeater is a node on the physical network.
Explanation
Answer D is correct.

Loopback adapters are only useful to verify that the port transmits and receives electronics successfully.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False
Explanation
Answer A is correct.

practice B

What happens when a switching loop floods the network repeatedly?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Switch storm
B

Loop bomb
C

Broadcast storm

ChatGPT 说:
✅ C. Broadcast storm

When a switching loop occurs, broadcast and multicast frames are endlessly replicated and circulated through the network. This results in a broadcast storm, which floods the network and severely degrades performance or causes complete network failure.

您说:
Which of the following spares is connected, powered on, and ready to serve as an automatic failover if the primary connection fails?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Hot
B

Humid
C

Cold
D

Warm

ChatGPT 说:
✅ A. Hot

A hot spare is connected, powered on, and fully operational, ready to immediately take over if the primary connection or device fails — ensuring minimal or no downtime.

您说:
只需要给我选项和选项描述即可: Switches can create multiple broadcast domains by partitioning the network into the software. What are these domains called?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

VCANs
B

VLANs
C

Address learning
D

RSTP

ChatGPT 说:
B — VLANs: Virtual LANs partition a network into multiple broadcast domains through software configuration on switches.

您说:
Which of the following formulas can be used to express EIRP in decibels?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

EIRP = ERP * 1.65
B

EIRP = ERP / 1.65
C

EIRP = ERP + 2.15
D

EIRP = ERP + 30

ChatGPT 说:
✅ C — EIRP = ERP + 2.15
This formula expresses Effective Isotropic Radiated Power (EIRP) in decibels, where 2.15 dB is the gain difference between an isotropic radiator and a dipole antenna.

您说:
不要多余的解释, 就只要选项: VoIP is used not only in voice chat apps but also in many phones.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B

您说:
和选项的内容

ChatGPT 说:
B — True

您说:
Which of these is not included in the layer 2 protocol of the OSI model?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Ethernet
B

IPv4 protocol
C

802.11
D

Frame Relay

ChatGPT 说:
B — IPv4 protocol

您说:
A network technician is setting up a wireless access point for a SOHO location. The user has demanded exclusive use of the 5GHz band. Which of the following wireless standards should the network technician use for the purpose mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

802.11g
B

802.11b
C

802.11ac
D

802.11n

ChatGPT 说:
C — 802.11ac

您说:
A network technician, while troubleshooting a Linux system, wants to display the associated IP address of a network adapter. Which of the following commands should he use?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ipconfig
B

dig
C

traceroute
D

ifconfig

ChatGPT 说:
D — ifconfig

您说:
You are working at the IT help desk when a user calls to report that he cannot access the Internet, although he can connect to the computers on the local network. At the user’s workstation, you run the ipconfig /all command and examine the output. Which of the following options is the most likely explanation for the user’s problem, based on the given ipconfig results?

Start of code blockWindows IP Configuration

Host Name . . . . . . . . . . . . : Client12
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : PCIe Family Controller
Physical Address. . . . . . . . . : 60-EB-69-93-5E-E5
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2
IPv4 Address. . . . . . . . . . . : 192.168.23.234
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM
Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM
Default Gateway . . . . . . . . . : 192.168.216.99
DHCPv6 IAID . . . . . . . . . . . : 241232745
DHCPv6 Client DUID . . . . . . . : 00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
DNS Servers . . . . . . . . . . . : 192.168.22.114
NetBIOS over Tcpip. . . . . . . . : EnabledEnd of code block
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The ‘Default Gateway’ setting is incorrect.
B

The ‘DNS Servers’ setting is located on another network.
C

DHCP is not enabled.
D

The ‘Subnet Mask’ setting is incorrect.

ChatGPT 说:
A — The ‘Default Gateway’ setting is incorrect.

您说:
What is the wavelength of MMF?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Around 850 nm or 1500 nm
B

Around 950 nm or 1500 nm
C

Around 850 nm or 1300 nm
D

Around 1000 nm or 1300 nm

ChatGPT 说:
C — Around 850 nm or 1300 nm

您说:
In an organization, many users are reporting that they are unable to access the Internet in the evening. Users working the day shift are not having such a problem. Which of these can be the cause of this issue?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

MAC filtering
B

Time-based ACL
C

Jamming
D

Port security

ChatGPT 说:
B — Time-based ACL

您说:
The users would use a bridge in a network to reduce collisions within broadcast domains and to increase the number of collision domains in their network.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
What is the primary purpose of SSID?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

To allow devices to self-identify as members of multiple interoperating physical network segments
B

To allow devices to self-identify as members of multiple interoperating logical network segments
C

To allow devices to self-identify as members of a single interoperating physical network segment
D

To allow devices to self-identify as members of a single interoperating logical network segment

ChatGPT 说:
D — To allow devices to self-identify as members of a single interoperating logical network segment

您说:
Which of the following statements are true about load balancer configurations?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

The least-connection method is more complicated to implement than round-robin, but it’s better able to deal with services that have variable session lengths.
B

In the round-robin method, servers are listed in order, and each request goes to the server next in line.
C

In the active-passive method, all redundant servers or other resources are constantly available and share the load. If one fails, its workload is distributed to the remaining nodes.
D

In the active-active method, there are one or more failover nodes left on standby until an active node fails, then immediately activated.

ChatGPT 说:
A — The least-connection method is more complicated to implement than round-robin, but it’s better able to deal with services that have variable session lengths.
B — In the round-robin method, servers are listed in order, and each request goes to the server next in line.

您说:
Ann, a network technician, has set up an FTP server for a company to distribute software updates for the company’s products. For security reasons, each customer is provided with a unique username and password. Several customers have discovered a virus in one of the security updates. The network technician tested all files before uploading them but on retesting the file, found the virus. Which of these should the network technician do for the customers to validate the proper security patch?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Provide an MD5 hash for each file.
B

Provide biometric authentication.
C

Use TFTP for tested and secured downloads.
D

Configure a honeypot.

ChatGPT 说:
A — Provide an MD5 hash for each file.

您说:
NFV is the process of taking networking functions (such as routers, switches, firewalls, load balancers, and controllers) and virtualizing them.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
Ann, a network technician, has to implement a physical security control that will allow her to detect any intrusion into the server room. Which of the following physical security controls will be most suitable for the purpose mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Biometrics
B

Proximity readers
C

CCTVs
D

Mantraps

ChatGPT 说:
C — CCTVs

您说:
Which of these makes clustering a less desirable option than load balancing?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It’s less tightly configured since its nodes operate as multiple logical units.
B

It can be more complicated to configure.
C

It doesn’t work as well for some services.
D

It requires identical or nearly identical hardware for each node.

ChatGPT 说:
B — It can be more complicated to configure.
C — It doesn’t work as well for some services.
D — It requires identical or nearly identical hardware for each node.

The users would use a bridge in a network to reduce collisions within broadcast domains and to increase the number of collision domains in their network.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

A. True

A bridge in a network reduces collisions by segmenting the network into multiple collision domains, while keeping the broadcast domain intact. This increases the number of collision domains and reduces collisions within each domain.

Which of the following terms represents a higher layer router that uses NAT to split server requests between multiple identical servers?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

TCP offloading
B

Content switch
C

Failover cluster
D

Content caching

B. Content switch

A content switch, also known as a load balancer, operates at a higher layer (typically the application layer) and uses Network Address Translation (NAT) to distribute server requests across multiple identical servers to balance the load and improve performance.

An organization has been facing an increased number of successful social engineering attacks. Which of these can help in reducing these attacks in the near future?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Vulnerability analysis
B

AUP
C

End-user awareness training
D

MOU

C. End-user awareness training

Social engineering attacks exploit human behavior, and end-user awareness training is the most effective way to reduce these attacks. It educates employees on recognizing phishing, pretexting, and other tactics, empowering them to make informed decisions and avoid falling victim to such schemes.

A company recently faced an attack on its network infrastructure. On further inspection, it was found that the attacker exploited the vulnerabilities resulting from open switch ports. The CIO has instructed the network administrator that he not only wants the network to be secure but also would like to monitor any attack in the future. Which of these should the network administrator implement to achieve the goal mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Install a mantrap.
B

Create a VLAN with honeypots.
C

Enable the network-based firewall.
D

Install a HIDS.

B. Create a VLAN with honeypots.

您说:
A network technician is setting up a new wireless network. With the WPA2 standard in use, which of these will provide both data confidentiality and data integrity?
Each correct answer represents a part of the solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CCMP
B

AES
C

RC4
D

TKIP

ChatGPT 说:
A — CCMP
B — AES

您说:
NAT is great to have around when an organization changes its ISP and the networking manager doesn’t want the hassle of changing the internal address scheme.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
Which of the following commands is used to view or alter the routing table?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

route PRINT
B

route
C

route SCAN
D

route -f

ChatGPT 说:
B — route

您说:
A junior network technician is configuring voice control of devices in the CEO’s cabin. Which type of IoT network is established in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

LAN
B

MAN
C

CAN
D

PAN

ChatGPT 说:
D — PAN

您说:
Which of the following well-known ports do the users use to configure outgoing mail on a POP3 email client?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

80
B

143
C

25
D

110

ChatGPT 说:
C — 25

您说:
To ensure security, the users need to install new certificates or generate new SSH keys when deploying a device.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
Which wireless standard uses the 800-900 MHz ISM band with precise frequencies varying by country?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Bluetooth
B

ANT+
C

Zigbee
D

Z-wave

ChatGPT 说:
D — Z-wave

您说:
All ports on the root switch are designated ports that forward the traffic they receive from their segment.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
no bookmarked, confident, or note marked bookmark popover collapsed
Question 32 :
A properly designed VLAN-based network only routes a minority of traffic, while most packets remain within their VLAN.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
You are installing an ADSL router for your company’s new branch office. The router has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN named VLAN1. When you plug a laptop into one of the Ethernet ports, you can access the Internet with no difficulties. Now, you need to connect the ADSL router to the company’s network so that the wireless access points on the network can provide the users with Internet access through the ADSL router. However, when you plug the router into a network switch port that is assigned to VLAN4, the switch starts generating ‘Native VLAN mismatch detected’ errors once every minute. Which of the following steps should be a part of the solution that you implement to stop the error messages from appearing?
Each correct answer represents a part of the solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Create a VLAN4 on the ADSL router’s switch module.
B

Configure the network switch port connected to the router to use VLAN1.
C

Create a VLAN1 on the network switch.
D

Configure the router port connected to the network switch to use VLAN4.

ChatGPT 说:
A — Create a VLAN4 on the ADSL router’s switch module.
D — Configure the router port connected to the network switch to use VLAN4.

您说:
Each connection to the hub is its own electrical connection but part of the same overall collision domain.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
The most common use for MySQL is for creating a manual database.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
A — False

您说:
Which of the following statements is true regarding LACP?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It allows ports to be configured as only passive.
B

It allows ports to be configured as active or passive.
C

It allows ports to be configured as only active.
D

It does not allow port configuration.

ChatGPT 说:
B — It allows ports to be configured as active or passive.

您说:
Which backup strategy contains the changes in data since the last full backup?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Differential
B

Dual stack
C

Incremental

ChatGPT 说:
A — Differential

您说:
Why is return loss a problem?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Because it causes interference
B

Because more signal reaches the receiver
C

Because less signal reaches the receiver
D

Because more signal reaches the sender

ChatGPT 说:
A — Because it causes interference
C — Because less signal reaches the receiver

您说:
In networks using IPv6 tunneling, an IPv6 packet can be carried as the payload of an IPv4 packet.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
no bookmarked, confident, or note marked bookmark popover collapsed
Question 44 :
In which of the following methods, each incoming connection goes to the server with the fewest active connections?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Least connection
B

Round-robin
C

Content caching
D

Random

ChatGPT 说:
A — Least connection

您说:
Ad hoc networks are created peer to peer or directly between stations and not through an AP.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
Which of the following standards utilize MIMO on non-overlapping channels?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

802.11g
B

802.11n
C

802.11ac
D

802.11a
E

802.11b

ChatGPT 说:
B — 802.11n
C — 802.11ac

您说:
Which specific type of network configuration is often used in the case of a single institution consisting of multiple and collocated buildings?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

PAN
B

LAN
C

MAN
D

CAN

ChatGPT 说:
D — CAN

您说:
Which of the following layer 1 devices connects multiple nodes into a star configuration?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Collision domain
B

Repeater
C

Network tap
D

Hub

ChatGPT 说:
D — Hub

您说:
Which of these can be used to authenticate remote workers connecting from an offsite location?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

802.1X
B

RADIUS server
C

DHCP server
D

DNS server

ChatGPT 说:
A — 802.1X
B — RADIUS server

您说:
What is the purpose of a load balancer?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

To deploy a hardware or software appliance designed to transparently distribute the services among the multiple and virtual whole
B

To deploy a hardware or software appliance designed to transparently combine distributed services into a single and virtual whole
C

To deploy a hardware or software appliance designed to transparently combine distributed services into the multiple and virtual whole
D

To deploy a hardware or software appliance designed to transparently distribute the services into the single and virtual whole

ChatGPT 说:
B — To deploy a hardware or software appliance designed to transparently combine distributed services into a single and virtual whole

您说:
Which of the following types of cameras are helpful in low-traffic areas, where full-time recording might waste network bandwidth or storage space?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Motion-sensitive
B

Wireless
C

Video
D

Night-vision

ChatGPT 说:
A — Motion-sensitive

您说:
Which of the following layers of the OSI model translates physical layer bits to and from ordered packets called frames, transfers them between nodes, and optionally receives acknowledgment of their receipt?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Data link
B

Network
C

Physical
D

Transport

ChatGPT 说:
A — Data link

您说:
A narrowband transmission is highly susceptible to interference, either from noise sources or another network or electronic device using the same channel.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
A node on the logical network isn’t described by its physical location but rather by its address.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
no bookmarked, confident, or note marked bookmark popover collapsed
Question 55 :
If an Ethernet segment needs to connect to another segment that uses Wi-Fi, Token Ring, or even a different Ethernet speed, a repeater can join them.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
B — False

您说:
The simplest repeater has ports listening in two directions along a cable.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
Which of these frequently reports RSSI as a negative dBm measurement?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Antenna gain
B

SNR
C

IETF
D

Wi-Fi analyzer

ChatGPT 说:
D — Wi-Fi analyzer

您说:
Broadband is frequently used for referring to fast Internet connections instead of slow ones.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
STP is used by switches to communicate their relative positions and detect redundant links.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
Link aggregation can be used on routers or even hosts with multiple interfaces, where it’s more commonly known as NIC teaming.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
A company has provided kiosks to employees within the organization’s boundaries. However, some of the kiosks are in close proximity to a shopping center. The management is concerned about someone accessing the Internet via the kiosk’s wireless network. The network technician has been asked to implement a solution that will provide wireless access only to the employees working at the kiosk. Which of these should the network technician implement?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Port mirroring
B

Firewall
C

VLAN pooling
D

Switch port security

ChatGPT 说:
D — Switch port security

您说:
Which of the following devices should a network administrator configure on the outermost part of a network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Firewall
B

Content switch
C

Media converter
D

VPN concentrator

ChatGPT 说:
A — Firewall

您说:
What is the purpose of health checking in load balancing devices?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

To move the processing overhead associated with SSL or TLS encryption to another server or a hardware appliance with accelerated encryption features
B

To track the functionality of each server in the load balancing pool and remove it in the case of a failure
C

To use standard compression methods for reducing the bandwidth required by some kinds of data traffic
D

To allow some traffic to be given priority over others

ChatGPT 说:
B — To track the functionality of each server in the load balancing pool and remove it in the case of a failure

您说:
Which of the following statements is true about the original 1997 802.11 standards?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It only supported network speeds of 5 Mbps.
B

It only supported network speeds of 8 Mbps.
C

It only supported network speeds of 10 Mbps.
D

It only supported network speeds of 2 Mbps.

ChatGPT 说:
D — It only supported network speeds of 2 Mbps.

您说:
Some connections use intelligent demarc that performs signal translation or routing.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

True
B

False

ChatGPT 说:
A — True

您说:
Network taps and port mirrors should be placed on chokepoints for critical traffic.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
A company wants a cloud service solution that can provide a deployment platform for its applications, and it doesn’t need to worry about the infrastructure requirements. Which of the following cloud services should be used for the purpose mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

IaaS
B

SaaS
C

PaaS
D

NaaS

ChatGPT 说:
C — PaaS

您说:
Which of the following components is the transparent optical fiber that carries the signal and is made out of silica glass, which is far more transparent than ordinary consumer glass?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Core
B

Buffer
C

Outer jacket
D

Cladding

ChatGPT 说:
A — Core

您说:
Which of the following statements is true regarding the applications of heightened scrutiny to network applications?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Use secure alternatives to insecure protocols, such as HTTPS and HTTP, instead of SSH and Telnet.
B

Use secure alternatives to insecure protocols, such as HTTPS and SSH, instead of HTTP and Telnet.
C

Use secure alternatives to insecure protocols, such as HTTP and SSH, instead of HTTPS and Telnet.
D

Use secure alternatives to insecure protocols, such as HTTPS and Telnet, instead of HTTP and SSH.

ChatGPT 说:
B — Use secure alternatives to insecure protocols, such as HTTPS and SSH, instead of HTTP and Telnet.

您说:
Which of these would be the most efficient subnet mask for a point-to-point link?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

/29
B

/30
C

/32
D

/28

ChatGPT 说:
B — /30

您说:
Layer 3 devices need a control protocol for sending diagnostic and error information relevant to layer 3.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
A network administrator has configured RIPv2 as the routing protocol for the company’s network. Which metric will be in use for deciding the best path to the network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Bandwidth
B

Infinite
C

Cost
D

Hop count

ChatGPT 说:
D — Hop count

您说:
A network administrator discovers multiple attempts to scan network hosts and devices originating from a single host on the network. Which of the following threats is most likely involved in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Compromised system
B

IP spoofing
C

Brute-force attack
D

Rogue AP

ChatGPT 说:
A — Compromised system

您说:
A user reports an issue to a network technician that he is unable to connect to the server. The user has Linux OS installed on his system. Which of the following commands should the network technician use to test the connectivity issue between two network devices?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ping
B

dig
C

ipconfig
D

ifconfig

ChatGPT 说:
A — ping

您说:
A new employee is assigned a laptop by the network administrator, which was assigned to someone else in the company. Upon delivering the laptop to the new employee, the administrator documents the new location, the employee’s name, and when the device was reassigned. Which of these best describes the actions mentioned in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Standard operating procedure
B

Change management
C

Asset management
D

Statement of work

ChatGPT 说:
C — Asset management

您说:
Which of these is a general category of scope for a network used over great distances?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

CAN
B

MAN
C

SAN
D

WAN

ChatGPT 说:
D — WAN

您说:
A network technician has been given permission to exploit a weakness in the company’s network. Which process is described in the given scenario?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Social engineering
B

Vulnerability scanning
C

Penetration testing
D

Port mirroring

ChatGPT 说:
C — Penetration testing — Authorized, simulated exploitation of weaknesses to identify and validate security vulnerabilities.

您说:
Which of the following leased line has a maximum data rate of 1.544 Mbps?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

E1
B

T3
C

E3
D

T1

ChatGPT 说:
D — T1

您说:
Which topology consists of two distinct and terminated ends, with each of its computers connecting to one unbroken cable running its entire length?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Mesh
B

Bus
C

Star
D

Ring

ChatGPT 说:
B — Bus

您说:
Which of the following approaches starts in the middle of the stack and can be quicker than the top-to-bottom and bottom-to-top approaches?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Divide-and-conquer
B

Move-the-problem
C

Spot-the-differences
D

Follow-the-path

ChatGPT 说:
A — Divide-and-conquer

您说:
The attackers use the monlist command, which is a remote command in older versions of NTP, that sends the requester a list of the last 600 hosts who have connected to that server.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
B — True

您说:
Which of the following statements is true about VLANs?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

They are a single standard and a collection of methods switches that can be used to partition broadcast domains.
B

They are a single standard and a collection of methods switches that cannot be used to partition broadcast domains.
C

They aren’t a single standard but a single method switch that can be used to partition broadcast domains.
D

They aren’t a single standard but rather a collection of method switches that can be used to partition broadcast domains.

ChatGPT 说:
D — They aren’t a single standard but rather a collection of method switches that can be used to partition broadcast domains.

您说:
The network layer of the OSI model is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the requested communication exist.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
A — False

您说:
What is the other name for the current 802.11ax Wi-Fi standard?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Wi-Fi 8
B

Wi-Fi 9
C

Wi-Fi 6
D

Wi-Fi 7

ChatGPT 说:
C — Wi-Fi 6

您说:
A high-latency network connection is one that experiences short delay times, while a low-latency connection suffers from long delays.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

False
B

True

ChatGPT 说:
A — False

您说:
no bookmarked, confident, or note marked bookmark popover collapsed
Question 89 :
Which of these is a designation used in routing to send packets to a remote network?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Network address
B

Broadcast address
C

IP address
D

Octet

ChatGPT 说:
A — Network address

您说:
Which of the following statements is true about STP?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It is standardized as IEEE 802.1D.
B

It is standardized as IEEE 802.1C.
C

It is standardized as IEEE 802.1A.
D

It is standardized as IEEE 802.1B.

ChatGPT 说:
A — It is standardized as IEEE 802.1D.

您说:
A disgruntled employee performs a man-in-the-middle attack on a company’s network. All the layer 2 traffic, which was destined for the default gateway, is redirected to the employee’s network. What kind of attack has the employee performed?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Phishing
B

Amplified DNS attack
C

Evil twin
D

ARP cache poisoning

ChatGPT 说:
D — ARP cache poisoning

您说:
An organization’s security policy requires that when new devices are introduced to the network, the devices must be monitored to establish normal traffic patterns. Which of these is generated from the initial monitoring of the devices?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

SOW
B

Baseline
C

Network diagram
D

SLA

ChatGPT 说:
B — Baseline

Which of the following ping commands specifies the time stamp for count hops in IPv4 addresses only?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

ping -n count
B

ping -s count
C

ping -i TTL
D

ping -f
Explanation
Answer B is correct.

Which of the following are the functions of load balancing?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

TCP offloading
B

Priority queuing
C

TLS offloading
D

Content caching
Explanation
Answers A, B, and D are correct.

The inverse-square law applied to antenna placement dictates that if the distance from the antenna to the receiving device is doubled, then the signal will drop by how much?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

12 dB
B

10 dB
C

8 dB
D

6 dB
Explanation
Answer D is correct.

Which of the following statements are correct about network connectivity?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

In a wireless network, a physical connection between the points is not necessary.
B

The target system must be able to recognize and act on the data it receives.
C

Each system on the network must be able to transmit information to any other system with which it might want to communicate.
D

There must be a physical connection between all points on the network.
Explanation
Answers B, C, and D are correct.

Which of the following statements are true about a hub?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It’s similar to a repeater with more than two ports.
B

A hub has no memory for storing data.
C

Connections to a hub are always effectively half-duplex.
D

A hub contains a repeater to help it maintain signal strength.
Explanation
Answers A, B, and C are correct.

Which of the following statements are true about the presentation layer of the OSI model?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

It includes HTTP, FTP, telnet, and email.
B

It is sometimes called the syntax layer.
C

It provides services used by host applications.
D

It controls the formatting and security of data.
Explanation
Answers B and D are correct.

Which of these are examples of IoT devices?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

A remotely monitored cardiac pacemaker
B

A smartphone app for your home thermostat
C

A key fob that unlocks your car
D

A television remote control
E

A refrigerator with an internal camera
Explanation
Answers A, B, and E are correct.

Which of these are the characteristics of jumbo frames?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Used in WAN
B

Used in SAN
C

Used in LAN
D

MTU > 1500
E

MTU > 10000
F

Improves network performance
Explanation
Answers B, D, and F are correct.

Which of these is not a primary method of load-balancer configuration?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Priority weighting
B

Least connection
C

Random
D

Round-robin
Explanation
Answer A is correct.

Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be the server hardening techniques?
Each correct answer represents a complete solution. Choose all that apply.
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

Disabling unused TCP and UDP ports
B

Upgrading server firmware
C

Disabling unnecessary services
D

Creating privileged user accounts
Explanation
Answers A, C, and D are correct.

Which of the following IP addresses is a local host that the router has already spotted via Ethernet traffic and added to the table?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

192.168.200.36
B

192.178.100.36
C

192.168.100.24
D

192.168.100.36
Explanation
Answer C is correct.

no bookmarked, confident, or note marked bookmark popover collapsed
Question 81 :
Which of the following technologies lets the switch bind multiple physical ports into a single logical interface?
This type of question contains radio buttons and checkboxes for selection of options. Use Tab for navigation and Enter or space to select the option.
A

LACP
B

Routing table
C

Port aggregation
D

STP
Explanation
Answer C is correct.