Vous êtes sur la page 1sur 25

Spreadsheet

What is a pivot table?

A pivot table is a data summarization tool that is used in the context of data processing. Pivot tables
are used to summarize, sort, reorganize, group, count, total or average data stored in a database. It allows
its users to transform columns into rows and rows into columns. It allows grouping by any data field.
Pivot tables are the perfect solution when you need to summarize and analyze large amounts of data. In
just a few clicks, you have access to a whole new set of information. As already said, spreadsheets are
one solution to create pivot tables, but the best tools don’t require to write complicated formulas or to
start all over again every time you want to organize the data differently. A drag and drop option to move
your fields around is the easiest way to go.

1
Lesson 1: a) hub switch use for as normal on one
Understanding b) switch increased switch, regardless of
Local Area c) SOHO router performance? their physical
Networking d) VPN router a) simplex location. A VLAN is
b) half duplex implemented to
Multiple Choice Answer: b c) full duplex segment a network,
Difficulty: Easy d) sliding duplex reduce collisions,
1. You have a key Section Reference: organize the
network Defining a LAN Answer: c network, boost
administrator leave a Explanation: Hubs Difficulty: Hard performance, and
company. Therefore, are considered Section Reference: increase security.
what does the legacy devices and Defining a LAN
company depend on have been replaced Explanation: A 6. What do you use
to continue to use by switches. switch switches very to create VLANs
the network? Switches allow fast between a) router
a) the user’s multiple computers multiple b) switch
password to connect together. connections, which c) firewall
b) Active Directory The advantage of a allow multiple d) proxy server
c) master network switch over a hub is computers to
switch that it can handle communicate at the Answer: b
d) network several same time. As a Difficulty: Medium
documentation conversations at the result, each client Section Reference:
same time. can send and receive Identifying Types of
Answer: d at the same time (full LANs
Difficulty: Easy 3. What is the most duplex), which gives Explanation:
Section Reference: common adapter or better performance. Switches usually
Defining a LAN connector used to control the VLAN.
Explanation: To connect a computer 5. What do you use Like subnetting, a
understand your to a wired network? to isolate a group of VLAN
LAN better, it helps a) RG6 computers within compartmentalizes a
to write down what b) RG58 your organization? network and can
its structure is—in c) RJ45 a) WLAN isolate traffic.
other words, to d) RJ8 b) WAN
document it. c) VLAN 7. What zone is
Network Answer: c d) Internet used to publish
documentation is Difficulty: Easy external websites for
any information that Section Reference: Answer: c an organization?
helps describe, Defining a LAN Difficulty: Medium a) intranet
define, and Explanation: RJ-45, Section Reference: b) exanet
otherwise explain which is associated Identifying Types of c) internetwork
how the network with Ethernet LANs d) DMZ
computers are networks, is the most Explanation: A
connected physically common wired virtual LAN Answer: d
and logically. adapter by default (VLAN) is a group Difficulty: Easy
and is found on of hosts with a Section Reference:
2. What is the most virtually every common set of Getting to Know
common central computer these days. requirements that Perimeter Networks
device used today to communicate as Explanation: A
connect computers 4. Which of the though they were perimeter network
to a network? following does a connected together (also known as a

2
demilitarized zone or b) 802.3 a) centralized Section Reference:
DMZ) is a small c) 802.5 computing Defining the
network that is set d) 802.11 b) distributive Client/Server Model
up separately from a computing Explanation: The
company’s private Answer: b c) switching client/server model
LAN and the Difficulty: Hard computing is an architecture
Internet. It is called a Section Reference: d) dumb computing that distributes
perimeter network Defining Ethernet applications between
because it is usually Standards Answer: b servers such as
on the edge of the Explanation: IEEE Difficulty: Medium Windows Server
LAN, 802.3 defines carrier Section Reference: 2008 and client
sense multiple Identifying the computers such as
8. Which topology access with collision Differences between Windows 7 or
is the most detection Client/Server and Windows Vista
redundant and the (CSMA/CD). Peer-to-Peer machines. It also
most expensive? Because computers Distributed distributes the
a) star on a default Ethernet Networks necessary processing
b) ring LAN all share the Explanation: power. This is
c) mesh same channel, During the days of extremely common
d) bus CSMA/CD governs the mainframe, all in today’s LANs and
the way computers devices that with most
Answer: c coexist with limited connected to the one applications an
Difficulty: Medium collisions. super computer were average user would
Section Reference: known as terminals utilize when
Identifying Network 10. What (or dumb terminals). connecting to the
Topologies mechanism do Today’s computing Internet.
Explanation: A wireless networks is known as
network topology use to access the distributive 13. What type of
defines the physical network? computing and is server does Active
connections of hosts a) CSMA/CD used for both Director run on?
in a computer b) CSMA/CA client/server and a) file server
network. With the c) token passing peer-to-peer b) print server
mesh topology, d) polling networks. This c) database server
every computer means that every d) network
connects to every Answer: b device or controller
other computer. No Difficulty: Medium workstation has its
central connecting Section Reference: own processing Answer: d
device is needed. Defining Ethernet power. Difficulty: Easy
Since every Standards Section Reference:
computer connects Explanation: If an 12. Which model Defining the
to every other organization uses users a central Client/Server Model
computer, it requires wireless Ethernet, database for Explanation: A
the most cabling, carrier sense authentication? controlling server,
which increases the multiple access with a) peer-to-peer such as a Microsoft
cost. collision avoidance b) workgroup domain controller, is
(CSMA/CA) is used. c) client/server in charge of user
9. What standard d) distributive accounts, computer
describes 11. What model accounts, network
CSMA/CD? promises the most Answer: c time, and the general
a) 801.2 processing power? Difficulty: Easy well-being of an

3
entire domain of information is sent to Section Reference: communicate to
computers and users. one host only. This Configuring Internet another device at a
reduces network Protocol time. If two devices
14. Which model traffic greatly, and Explanation: IP try to communicate
has each host have helps with packet addresses are usually at the same time, a
their own security loss and duplicates. applied to your collision will result.
database? network adapter, but A switch allows
a) peer-to-peer 16. What is used to they can also be multiple
b) client/server uniquely identify a applied to other conversations to
c) distributive host on a TCP/IP devices like occur at the same
d) sliding network? switches, routers, time. In addition, a
a) IP address and so on. A device switch also supports
Answer: a b) MAC address or computer that has full-duplex, which
Difficulty: Easy c) bit pattern an IP address is a means that a
Section Reference: d) router name host. computer or host can
Defining the Peer-to- send and receive at
Peer Model Answer: a Short Answer the same time.
Explanation: Peer- Difficulty: Easy Difficulty: Medium
to-peer networking Section Reference: 18. What is the Section Reference:
means that each Configuring Internet central device used Defining a LAN
computer is treated Protocol in wireless LANs? Explanation:
as an equal— Explanation: An IP Because a hub is
meaning, each address is the Answer: wireless considered a legacy
computer has an cornerstone of access point item, purchasing a
equal ability to serve networking because Difficulty: Easy new one today is
and to access data, it defines the Section Reference: difficult. Also, a hub
just like any other computer or host you Identifying Types of communicates in
computer on the are working on. LANs half duplex, whereas
network. Each Today, every Explanation: The switches support full
computer also has its computer and many wireless access point duplex.
own security other devices have (WAP) acts as the
database. such an address. An central connecting 20. What command
IP address allows device for the do you use to test the
15. What type of each computer to network. Today, such TCP/IP stack on a
communication is send and receive networks can consist computer?
sent to a single information in an of many types of
designated host? orderly and efficient devices other than Answer: ping
a) unicast manner. traditional PCs, localhost (or ping
b) broadcast including smart 127.0.0.1 or ping
c) multicast Fill in the Blank phones, PDAs, tablet loopback)
d) anycast computers, and Section Reference:
17. A _________ is microcomputers. Defining a LAN
Answer: a a single computer or Explanation: You
Difficulty: Medium device that connects 19. What is the can ping your own
Section Reference: to a TCP/IP network. difference between a computer using the
Defining Data switch and a hub? loopback address,
Transfer on a LAN Answer: host also known as the
Explanation: Difficulty: medium Answer: A hub local loopback.
Unicast describes the allows only one When pinging this
situation in which device to address, no network

4
traffic is incurred; occurs on computer d) Transport c) Application
because the network networks. This d) Presentation
adapter is really just model is divided into Answer: c
looping the ping layers, each of which Difficulty: Medium Answer: c
back to the OS, it provides services to Section Reference: Difficulty: Hard
never places any the layers above and Defining the Layers Section Reference:
packets on to the below. These layers in the OSI Model Defining the Layers
network. Therefore, are associated with Explanation: The in the OSI Model
this is a solid way to protocols and Network layer is Explanation: The
test whether TCP/IP devices. dedicated to routing Application layer is
is installed correctly and switching where message
to a network adapter, 2. Which layer in information to creation—and,
even if you aren’t the OSI model do different networks, therefore, packet
physically connected MAC addresses and LANs, or creation—begins.
to a network. switches use? internetworks. Database access is
a) Physical on this level. End-
b) Data Link 4. Which layer in user protocols such
c) Network the OSI model is as FTP, SMTP,
Lesson 2: Defining d) Transport used to verify that TELNET, and RAS
Networks with the data was delivered work at this layer.
OSI Model Answer: b without error?
Difficulty: Medium a) Physical 6. Which layer of
Multiple Choice Section Reference: b) Data Link the OSI model is
Defining the Layers c) Network used to create a
1. What model is in the OSI Model d) Transport connection so that a
used to describe how Explanation: The host can transfer
data communication Data Link layer Answer: c files?
occurs between establishes, Difficulty: Medium a) Physical
hosts? maintains, and Section Reference: b) Session
a) server-centric decides how transfer Defining the Layers c) Application
model is accomplished over in the OSI Model d) Presentation
b) workgroup the Physical layer. Explanation: The
model Devices that exist on Network layer Answer: b
c) peer-to-peer the Data Link layer ensures error-free Difficulty: Hard
model are network interface transmission Section Reference:
d) OSI reference cards and bridges. between hosts Defining the Layers
model This layer also through logical in the OSI Model
ensures error-free addressing. Explanation: The
Answer: d transmission over Therefore, it Session layer
Difficulty: Easy the Physical layer manages the governs the
Section Reference: under LAN transmission of establishment,
Understanding OSI transmissions. messages through termination, and
Basics layers 1 through 3. synchronization of
Explanation: The 3. Which layer in sessions within the
Open Systems the OSI model 5. Which layer in OS over the network
Interconnection covers routing the OSI model and between hosts.
(OSI) reference between networks? covers HTTP, FTP,
model is used to a) Physical and RDC? 7. Which layer of
define how data b) Data Link a) Physical the OSI model
communication c) Network b) Session includes VLANs?

5
a) Physical watch or listen in c) Application
b) Data Link real time. So, if a d) Presentation Answer: a
c) Network packet is lost, we Difficulty: Medium
d) Transport don’t really care, Answer: b Section Reference:
because that time Difficulty: Medium Reviewing the OSI
Answer: b frame of the video or Section Reference: Layers
Difficulty: Easy music has already Defining the Layers Explanation: Layer
Section Reference: passed. Of course, if in the OSI Model 1 covers cables,
Understanding Layer the packet loss Explanation: The adapters, hubs, and
2 Switching becomes too severe, Session layer patch-down panels.
Explanation: Layer the streaming media governs the
2 switching can also becomes establishment, 13. How many
allow for a virtual incomprehensible. termination, and layers does the
LAN (VLAN) to be synchronization of TCP/IP model have?
implemented. A 9. Which port sessions within the a) 3
VLAN is categories include OS over the network b) 4
implemented to inbound ports of and between hosts. c) 6
segment the HTTP, HTTPS, FTP, When you log on, d) 7
network, reduce and DNS? you are creating a
collisions, organize a) well-known ports session while on the Answer: b
the network, boost b) registered ports network. Difficulty: Easy
performance, and— c) dynamic ports Section Reference:
hopefully—increase d) private ports 11. What layer in Defining the TCP/IP
security. the OSI model is Model
Answer: a used to encrypt data? Explanation: The
8. Which protocol Difficulty: Medium a) Physical TCP/IP (or TCP)
do you use as the Section Reference: b) Session model is similar to
transport protocol Defining the Upper c) Application the OSI model. It is
for a video OSI Layers d) Presentation often used by
application? Explanation: Well- software
a) TCP known ports are used Answer: d manufacturers who
b) UDP when another Difficulty: Medium are not as concerned
c) FTP computer wants to Section Reference: with how
d) RDC connect to a service Reviewing the OSI information is sent
or application Layers over physical media,
Answer: b running on your Explanation: The or how the data link
Difficulty: Hard computer. These Presentation layer is actually made.
Section Reference: ports range from 0 to covers both This model is
Defining the Upper 1023 and define compression and composed of only
OSI Layers commonly used encryption. four layers.
Explanation: User protocols such as
Datagram Protocol HTTP, HTTPS, FTP, 12. Which layer in 14. Which layer in
(UDP) is a and DNS. the OSI model the OSI model is
connectionless includes the cable included in the
protocol with little 10. What layer in and network TCP/IP model?
overhead and the OSI model is adapters? a) Physical
increased responsible for a) Physical b) Data Link
performance over logging on and off? b) Session c) Transport
TCP. Streaming a) Physical c) Application d) Application
media enables us to b) Session d) Presentation

6
Answer: c d) sliding ports Section Reference: Difficulty: Easy
Difficulty: Easy Defining the Layers Section Reference:
Section Reference: Answer: c in the OSI Model Defining the Layers
Defining the TPC/IP Difficulty: Easy Explanation: in the OSI Model
Model Section Reference: Sometimes a Explanation:
Explanation: In the Defining the Upper protocol suite such Defining how the
TCP/IP model, the OSI Layers as TCP/IP is referred computers are
OSI Physical layer is Explanation: to as a protocol connected together,
skipped altogether, Dynamic ports, also stack. as well as how they
and the Application known as private actually transmit
layer comprises the ports, can be used by Short Answer data, is important.
OSI application, applications, but The OSI model
presentation, and they cannot be 19. What is the layers provide that
session layers. The registered by advantage of UDP definition.
Transport layer is the vendors. Dynamic over TCP?
only one from the ports are from port
OSI model that also 49152 to 65535. Answer: UDP has
appears in the less overhead, which Lesson 3:
TCP/IP model. Fill in the Blank allows for faster Understanding
performance. Wired and Wireless
15. Which protocol 17. A layer 3 switch Difficulty: Hard Networks
is used to translate IP is similar to a Section Reference:
addresses to MAC __________. The Upper OSI Multiple Choice
addresses? Layers
a) RARP Answer: router Explanation: Two 1. What is the most
b) ARP Difficulty: Easy common TCP/IP common cable used
c) DNS Section Reference: protocols used on the today?
d) WINS Understanding Layer Transport layer a) UTP
3 Switching include the b) STP
Answer: b Explanation: Transmission c) Coaxial
Difficulty: Easy Switches reside on Control Protocol d) Fiber
Section Reference: the network layer. A (TCP), which is a
Understanding Layer layer 3 switch varies connection-oriented Answer: a
2 Switching from a layer 2 switch protocol, and the Difficulty: Easy
Explanation: The in that it determines User Datagram Section Reference:
Address Resolution paths for data using Protocol (UDP), Identifying and
Protocol (ARP) is logical addressing which is Working with
used to convert IP (IP addresses) connectionless. Twisted-Pair Cable
addresses to MAC instead of physical Explanation:
addresses, which are addressing (MAC 20. What are the Unshielded twisted-
the physical addresses). Layer 3 seven layers found in pair (UTP) is the
addresses found on a switches are similar the OSI model, in cable most
network card. to routers. order? commonly used in
local area networks.
16. What ports are 18. TCP/IP and Answer: Physical, It’s relatively easy to
defined above IPX/SPX are known Data Link, Network, work with, flexible,
49,152? as _________ stacks. Transport, Session, efficient, and fast.
a) well-known ports Presentation, and
b) registered ports Answer: protocol Application 2. If you are making
c) dynamic ports Difficulty: Easy a crossover cable

7
and one end is 568A, Explanation: A Explanation: a warehouse using
what should the crossover cable is Twisted-pair cables Category 6 UTP.
other end be? used to connect like are categorized However, parts of
a) 568A devices to directly according to the the network are
b) 568B each other. frequency at which down because of the
c) 568C they transmit signals heavy machinery
d) BOGB 4. You need to and their data used. What cable
connect a twisted- transfer rate or type should you use?
Answer: b pair cable to the speed. To support a) STP
Difficulty: Easy back of a patch 100 Mbps, you need b) coaxial
Section Reference: panel. What tool to use a minimum of c) fiber
Identifying and should you use? category 5. The d) plenum-rated
Working with a) punch-down tool maximum length is
Twisted-Pair Cable b) zip tool 100 m. Answer: c
Explanation: c) wire wedge Difficulty: Easy
Crossover cable is d) soldering iron 6. When you pick Section Reference:
used to connect like up your wireless Identifying and
devices to each other Answer: a phone, your Working with
—for example, a Difficulty: Easy computer drops Twisted-Pair Cable
computer to another Section Reference: network Explanation:
computer, or a Identifying and connectivity. What Electromagnetic
switch to another Working with could be the cause of interference (EMI) is
switch. With the Twisted-Pair Cable the problem? a disturbance that
crossover cable, the Explanation: The a) EMI can affect electrical
patch cable is wired tools necessary to b) RFI circuits, devices, and
with the 568B make the c) network adapter cables due to
standard on one side connections between failure electromagnetic
and the 568A patch panels and d) cable failure conduction and
standard on the RJ45 jacks include a possibly radiation.
other. cutting tool, a wire Answer: b To overcome this,
stripper, a punch- Difficulty: Medium you should use fiber
3. If you want to down tool, and a Section Reference: cabling, which uses
connect a computer continuity tester. Identifying and light instead of
directly to another Working with electrical signals.
computer without 5. What is the Twisted-Pair Cable
using a switch, you minimum category Explanation: 8. What do you call
use a __________. of twisted-pair cable Wireless it when electrical
a) straight-through you need to support adapters/networks signals jump to
cable 100 Mbps? use 2.4 or 5.0 GHz, another set of wires?
b) crossover cable a) Category 3 which is the same a) EMI
c) laplink cable b) Category 5 frequency that b) RFI
d) rollover cable c) Category 5e wireless phones use. c) crosstalk
d) Category 6 Therefore, if both d) jumpitis
Answer: b operate at the same
Difficulty: Easy Answer: b time, you have radio Answer: c
Section Reference: Difficulty: Easy frequency Difficulty: Easy
Identifying and Section Reference: interference (RFI). Section Reference:
Working with Identifying and Identifying and
Twisted-Pair Cable Working with 7. You are setting Working with
Twisted-Pair Cable up a network within Twisted-Pair Cable

8
Explanation: A supported by Section Reference:
common type of Answer: c 802.11b? Identifying Wireless
interference is Difficulty: Easy a) 1 Mbps Networking
crosstalk, in which Section Reference: b) 10 Mbps Standards
the signal that is Identifying and c) 11 Mbps Explanation:
transmitted on one Working with d) 54 Mbps 802.11n is superior
copper wire or pair Twisted-Pair Cable to older WLAN
of wires creates an Explanation: Fiber Answer: c standards in the
undesired effect on connectors include Difficulty: Medium following ways:
another wire or pair FC, LC, MT-RJ, SC, Section Reference: Multiple-Input
of wires. and ST. RJ-45 is Identifying Wireless Multiple-Output
used for UTP cables. Networking (MIMO), frame
9. What type of Standards aggregation, and
cable should be used 11. Which of the Explanation: channel bonding.
as part of a fire code following is a 802.11b runs at 2.4
for a building? characteristic of GHz and supports up 15. Which is the
a) STP single-mode fiber? to 11 Mbps. most secure
b) PVC a) Single-mode encryption used in
c) heat protected fiber supports longer 13. What is the wireless networks?
d) plenum-rated distances than maximum speed a) WEP
multimode fiber. supported by b) WPA
Answer: d b) Single-mode 802.11g? c) WPA2
Difficulty: Easy fiber has increased a) 1 Mbps d) 802.1x
Section Reference: bandwidth than b) 10 Mbps
Identifying and multimode fiber. c) 11 Mbps Answer: c
Working with c) Single-mode d) 54 Mbps Difficulty: Medium
Twisted-Pair Cable supports only a ring Section Reference:
Explanation: Cables topology. Answer: d Identifying Wireless
that are installed d) Single mode Difficulty: Medium Networking
inside walls or above allows multiplexing Section Reference: Standards
drop ceilings where of electrical and light Identifying Wireless Explanation:
they cannot be signals. Networking Several types of
accessed by Standards encryption are
sprinkler systems in Answer: a Explanation: available for
the case of a fire Difficulty: Medium 802.11g runs at 2.4 wireless networks,
should be plenum- Section Reference: GHz and supports up but the most secure
rated or low-smoke Identifying and to 54 Mbps. is WPA2 when used
rated. Plenum-rated Working with with AES.
cables have a Teflon Twisted-Pair Cable 14. What of the
coating that makes Explanation: With following is not a 16. What is used to
them more single-mode fiber, characteristic of identify a wireless
impervious to fire. you send one signal. 802.11n? network?
As a result, the a) frame a) network ID
10. Which of the single mode can aggregation b) frequency
following is not a communicate over b) channel bonding identifier
fiber connector? multi-mode. c) RFI protection c) wireless
a) FC d) MIMO password
b) LC 12. What is the d) SSID
c) RJ-45 maximum speed Answer: c
d) MT-RJ Difficulty: Medium Answer: d

9
Difficulty: Easy 18. For cable needs to be run b) 255.255.0.0
Section Reference: organizations, using farther, you can use c) 255.255.255.0
Identifying Wireless ___________ a signal repeater, a d) 255.255.255.255
Networking authentication for hub, or switch.
Standards wireless networks is Otherwise, fiber- Answer: b
Explanation: When recommended. optic cable is the Difficulty: Easy
utilizing solution because you Section Reference:
infrastructure mode, Answer: 802.1X can run it much Categorizing IPv4
the base unit Difficulty: Medium farther than twisted- Addresses
(normally a WAP) Section Reference: pair cable. Explanation: The
will be configured Identifying and IPv4 classification
with a service set Working with Short Answer system is known as
identifier (SSID). Twisted-Pair Cable the classful network
This then becomes Explanation: One 20. What mode architecture and is
the name of the way to secure a users a wireless broken down into
wireless network and wireless connection access point? five sections. Class
it is broadcast over is to use IEEE B has a default
the airwaves. Thus, 802.1X,a port-based Answer: subnet mask of
when clients want to network access infrastructure mode 255.255.0.0.
connect to the WAP, control (PNAC). Difficulty: Medium
they can identify it This provides strong Section Reference: 2. You have a host
by the SSID. authentication to Infrastructure with the address of
devices that need to Explanation: 180.24.45.120. To
Fill in the Blank connect to the Infrastructure mode what class would
WLAN; it can also occurs when this be address be
17. To test a cable, be used for regular wireless clients assigned?
you would use a wired LANs. connect to and are a) Class A
_____________. authenticated by a b) Class B
19. When a signal wireless access c) Class C
Answer: continuity degrades as it runs point, which can be d) Class D
tester through a wire, you expanded by
Difficulty: Easy have ________. creating a wireless Answer: b
Section Reference: distribution system Difficulty: Medium
Identifying and Answer: attenuation —a group of WAPs Section Reference:
Working with Difficulty: Medium interconnected Categorizing IPv4
Twisted-Pair Cable Section Reference: wirelessly. Addresses
Explanation: To Identifying and Explanation: Class
make the Working with B begins with 128–
connections between Twisted-Pair Cable 191.
patch panels and Explanation: Lesson 4:
RJ45 jacks you need Generally, you can Understanding 3. For IPv4, what
a cutting tool, a wire run twisted-pair Internet Protocol class is used for
stripper, a punch- cables 100 meters multicasting?
down tool, and a before the signal Multiple Choice a) Class A
testing device known degrades to such a b) Class B
as a continuity tester, point that it cannot 1. What is the c) Class C
which tests all be interpreted by the default subnet mask d) Class D
connection pins one destination host. for a Class B
by one. This is known as network? Answer: d
attenuation. If a a) 255.0.0.0 Difficulty: Medium

10
Section Reference: Section Reference: are hidden from the the IP configuration,
Categorizing IPv4 Categorizing IPv4 Internet and any the host has an
Addresses Addresses other networks. They address of
Explanation: Class Explanation: The are usually behind an 169.32.54.2. What is
D is used for what is broadcast address is IP proxy or firewall the problem?
known as used to communicate device. Several a) The host cannot
multicasting— with all hosts on the ranges of private IP find a DHCP server.
transmitting data to network. It is addresses have been b) The host is set to
multiple computers defined as all host reserved by the multicast.
(or routers). bits are 0 (0000 IANA. Private c) The host is
0000). address are 10.0.0.0 currently
4. What is the to 10.255.255.255, broadcasting.
maximum number of 6. What type of 172.16.0.0 to d) The host cannot
hosts you can use for address is used to 172.16.255.255 and find a domain
each subnet that send a single set of 172.31.255.255 and controller.
belongs to a class C packets to multiple 192.168.0.0 to
address? hosts? 192.168.255.255. Answer: a
a) 128 a) multicast address Difficulty: Easy
b) 254 b) broadcast 8. What type of Section Reference:
c) 256 address address is Explanation: If a
d) 65,534 c) unicast address 169.254.32.23? Windows client
d) anycast address a) APIPA cannot get an IP
Answer: b b) multicast address address from a
Difficulty: Medium Answer: a c) anycast address DHCP server and
Section Reference: Difficulty: Medium d) broadcast has not been
Categorizing IPv4 Section Reference: address configured statically,
Addresses Categorizing IPv4 it auto-assigns an
Explanation: A Addresses Answer: a APIPA number on
class C has 8 bits left Explanation: Difficulty: Easy the network.
for hosts. Therefore, Multicasting Section Reference:
2^8 is equal to 256. addresses are used to Categorizing IPv4 10. What defines
But since you cannot transmit data to Addresses the nearest router for
use all 0s (network multiple computers Explanation: a host?
address) and all 1s (or routers). Microsoft developed a) subnet mask
(broadcast address), one type of private b) default gateway
a class C will only 7. Which of the range for use on c) DNS server
support up to 254 following is not a small peer-to-peer d) WINS server
hosts. private address? Windows networks.
a) 10.4.24.24 This private range, Answer: b
5. What type of b) 172.16.36.45 called Automatic Difficulty: Easy
address is c) 192.168.34.3 Private IP Section Reference:
202.23.2.255? d) 200.23.34.120 Addressing (APIPA), Default Gateways
a) multicast address uses a single Class B and DNS Servers
b) broadcast Answer: d network number: Explanation: The
address Difficulty: Medium 169.254.0.0. default gateway is
c) unicast address Section Reference: the first IP address of
d) anycast address Categorizing IPv4 9. You have a the device that a
Addresses computer that cannot client computer will
Answer: b Explanation: connect to a server. look for when
Difficulty: Hard Private IP addresses When you look at attempting to gain

11
access outside the modifying an IP Inter-Domain 17. What type of
local network. This address while it is in Routing (CIDR) address is
device could be a transit across a Explanation: One 2001:4212:0000:34
router, server, or router, computer, or example of CIDR DB:0000:0000:0000:
other similar device; similar device. This would be the IP 4231?
it is the device that is usually so one network number a) MAC address
grants access to the larger address space 192.168.0.0/16. b) IPv4
Internet or other (private) can be The /16 means that c) IPv6
networks. remapped to another the subnet mask has d) anycast address
address space, or 16 masked bits (or
11. What server is perhaps remapped to 1s), making Answer: c
used to translate host a single public IP 255.255.0.0. Difficulty: Easy
names to IP address. Usually, that would Section Reference:
addresses? be a default Class B Understanding IPv6
a) DNS 13. What do you subnet mask, but Explanation: IPv6
b) WINS call a smaller because we are using addresses are also
c) HOSTS network that is part it with what used to hexadecimal in
d) DHCP of a larger network? be a Class C network format and divided
a) host number, the whole into eight groups of
Answer: a b) broadcast address becomes four numbers each,
Difficulty: Easy domain classless. with each group
Section Reference: c) cluster separated by a colon.
Default Gateways d) subnet 16. How many bits
and DNS Servers is an IPv6 address? Fill in the Blank
Explanation: The Answer: d a) 32
DNS server address Difficulty: Easy b) 48 18. A __________
is the IP address of Section Reference: c) 64 address is assigned
the device or server Subnetting d) 128 by a DHCP server.
that resolves DNS Explanation:
addresses to IP Subnetting is the act Answer: d Answer: dynamic
addresses. of dividing a Difficulty: Easy Difficulty: Easy
network into smaller Section Reference: Section Reference:
12. What is used to logical subnetworks Understanding IPv6 Categorizing IPv4
remap private or subnets. Explanation: The Addresses
addresses to public top reason to use Explanation: Most
addresses and back? 14. You have a IPv6 is address commonly,
a) DNS subnet mask of space. IPv6 is a 128- computers are set up
b) DHCP 255.255.240.0. What bit system, whereas to obtain an IP
c) WINS would the CIDR its still-dominant address (and other IP
d) NAT notation be? predecessor IPv4 is information)
a) /16 only a 32-bit system. automatically. In this
Answer: d b) /20 While IPv4 can have example of a
Difficulty: Easy c) /24 approximately 4 dynamic IP address,
Section Reference: d) /28 billion IP addresses the computer
Network Address in the whole system, broadcasts out to the
Translation Answer: b IPv6 can have 340 network in an
Explanation: Difficulty: Easy undecillion attempt to find a
Network address Section Reference: addresses. DHCP server,
translation (NAT) is Defining Classless whether it’s a four-
the process of port SOHO router,

12
DHCP server, or which are written in certain facets of execute the
other appliance. The the customary dot- DHCP and DNS. ipconfig /flushdns to
server then replies decimal notation. clear the DNS cache
with the required For example, 2. What protocol so that it can retrieve
information. ::ffff:192.0.2.128 does the ping fresh information
represents the IPv4 command use to test from the DNS
Short Answer address 192.0.2.128. network server.
connectivity?
19. What is the a) TCP 4. What command
loopback IP address? b) UDP do you use to test a
Lesson 5: c) ICMP system’s IPv4
Answer: 127.0.0.1 Implementing d) FTP protocol stack?
Difficulty: Easy TCP/IP in the a) ping 127.0.0.1
Section Reference: Command Line Answer: c b) ping self
Categorizing IPv4 Difficulty: Hard c) ping
Addresses Multiple Choice Section Reference: 255.255.255.255
Explanation: The Working with d) ping
range for Class A is 1. What command Ipconfig and Ping defaultgateway
0–127. However, the displays the IP Explanation: ICMP
127 network number address, subnet is used to send error Answer: a
isn’t used by hosts as mask, and default messages to relay Difficulty: Medium
a logical IP address. gateway of the query messages. It is Section Reference:
Instead, this network system you are also used with the Working with
is used for loopback currently on? ping, tracert, and Ipconfig and Ping
IP addresses, which a) ipconfig pathping commands Explanation: When
allow for testing. b) ping you ping 127.0.0.1,
c) tracert 3. What command the results do not
20. What IPv6 d) nslookup do you use to clear include any
address incorporates the DNS cache on a hostname resolution
IPv4? Answer: a local system? information. This is
Difficulty: Easy a) ipconfig the best way to ping
Answer: IPv4- Section Reference: /registerdns the local host when
mapped addresses Working with b) ipconfig testing IPv4. When
Difficulty: Easy Ipconfig and Ping /cleardns pinging 127.0.0.1,
Section Reference: Explanation: The c) ipocnfig no traffic is placed
Defining the Dual IP ipconfig and ping /flushdns on the network
Stack commands are d) ipconfig segment; instead, all
Explanation: IPv4- probably the two /releasedns traffic is kept inside
mapped addresses most commonly the computer or local
have the first 80 bits used commands Answer: c loopback.
set to 0 (note the when analyzing and Difficulty: Medium
double colon), the troubleshooting Section Reference: 5. What command
next 16 set to 1 networking issues. Working with do you use to display
(shown as ffff), and Although ipconfig Ipconfig and Ping active TCP or UDP
the last 32 bits displays information, Explanation: If the connections?
populated by the it can also be used to host has an incorrect a) nbtstat
IPv4 address. These make basic cache value, which b) netstat
addresses look like configuration has been recently c) ipconfig
IPv6 addresses, other changes and reset modified on a DNS d) nslookup
than the last 32 bits, server, you have to

13
Answer: b Explanation: The Difficulty: Easy connect to a FTP
Difficulty: Medium nbtstat command Section Reference: server to download a
Section Reference: displays NetBIOS Working with file?
Working with over TCP/IP Advanced TCP/IP a) nslookup
Advanced TCP/IP statistics for local Commands b) ssh
Commands and remote Explanation: The c) telnet
Explanation: Use computers. NetBIOS tracert command d) ftp
the netstat command was developed in the shows paths to a
to display active 1980s to allow destination on Answer: d
TCP (or UDP) applications to another network. It Difficulty: Easy
connections, as well communicate over a does this by pinging Section Reference:
as a host of other network via the OSI each step along the Working with
statistics. Of the four model’s Session way three times. The Advanced TCP/IP
columns displayed, layer. NetBIOS over time to live (TTL) Commands
we are concerned TCP/IP sends the for the pings Explanation: You
here with just the NetBIOS protocol increases with each can use the ftp
Proto and Local within TCP and UDP “hop” to another command to connect
Address columns. sessions. network. to an FTP site so that
The Proto column you can download or
shows the Transport 7. What command 9. What command upload files.
layer protocol being clears the NetBIOS tests network
used for the name cache table? connectivity while 11. What command
connection; netstat, a) nbtstat -r showing you each do you use to
by itself, shows only b) nbtstat -R hop along the way connect to a remote
TCP connections in c) nbtstat -RR and the degree of computer so that you
this column. The d) nbtstat -s packet loss? can execute
Local Address a) ping commands?
column displays the Answer: b b) pathping a) ftp
local computer by Difficulty: Hard c) nbtstat b) nslookup
name (server2003), Section Reference: d) tracert c) telnet
followed by the Working with d) nbtstat
outbound port Advanced TCP/IP Answer: b
number. Commands Difficulty: Medium Answer: c
Explanation: The Section Reference: Difficulty: Easy
6. What command nbtstat -R command Working with Section Reference:
is used to display purges the contents Advanced TCP/IP Working with
NetBIOS over of the NetBIOS Commands Advanced TCP/IP
TCP/IP statistics? name cache table. Explanation: The Commands
a) nbtstat pathping command Explanation:
b) netstat 8. What command is similar to tracert, TELNET is used to
c) ipconfig tests network but it also computes take control of a
d) nslookup connectivity while the degree of packet remote computer.
showing you each loss. Any packet loss Basically, a network
Answer: b hop along the way? shows up in the administrator
Difficulty: Medium a) ping Lost/Sent column connects to a remote
Section Reference: b) nslookup along with a computer, server,
Working with c) nbtstat percentage. router, or switch by
Advanced TCP/IP d) tracert typing telnet
Commands 10. What command [IPAddress]. The IP
Answer: d do you use to address would either

14
display the C:\ Answer: a Short Answer
prompt of the remote Difficulty: Hard Answer: ipconfig
system (if Section Reference: 15. What command /renew
connecting to a Working with do you use to display Difficulty: Medium
Windows computer) Advanced TCP/IP the routing table on a Section Reference:
or a menu-based Commands local system? Working with
system (if Explanation: The Ipconfig and Ping
connecting to a netsh command is a Answer: route print Explanation: The
router or switch). built-in command- Difficulty: Hard ipconfig /renew
line scripting utility Section Reference: command retrieves
12. What command that enables you to Working with an IP address and
can you use to display and modify Advanced TCP/IP other IP
connect to a mail the network Commands configurations from
server so that you configurations of the Explanation: Route a DHCP server. It
can test SMTP? local computer. enables you to reconfigures the
a) ftp Netsh commands display and make computer with the
b) nslookup tend to be rather changes to the local same IP address it
c) telnet long and in depth, so IP routing table of used before. If the IP
d) nbtstat the utility gives you the computer, which address has been
the option to save displays IP released for only a
Answer: c configuration scripts connections to other short time, the
Difficulty: Hard for later use. networks as well as /renew option
Section Reference: testing networks. To reconfigures the
Working with 14. What command display the routing address based on
Advanced TCP/IP is used to add static table, you would use information stored in
Commands routes to a Windows the route option. the registry.
Explanation: In computer?
addition to using the a) nslookup 16. What command 18. What command
telnet command to b) telnet do you use to display do you use to
take control of a c) route the MAC address on register the
remote computer, d) nbtstat a system? computer’s name
you can use it to test and IP address with
protocols. For Answer: c Answer: ipconfig the nearest DNS
example, if you type Difficulty: Medium /all server?
telnet <host> 25, it Section Reference: Difficulty: Medium
will connect to the Working with Section Reference: Answer: ipconfig
server using SMTP Advanced TCP/IP Working with /registerdns
port 25. Commands Ipconfig and Ping
Explanation: The Explanation: If you Section Reference:
13. What command route command want to know the Working with
do you use to display enables you to MAC address of the Ipconfig and Ping
and modify the display and make network adapter, for Explanation: The
network changes to the instance, you can use /registerdns option
configuration of a computer’s local IP ipconfig./all. sends information to
local computer? routing table, which the DNS server with
a) netsh displays IP 17. What command the hosts name and
b) netstat connections to other do you use to IP address. This can
c) telnet networks as well as retrieve or update come in handy if you
d) nbtstat testing networks. your DHCP assigned change a static
configuration? address and want to

15
register the change configuration for a c) Authorize the properly to the
within DNS. client? server network.
a) DNS d) Register the
19. What command b) DHCP clients Answer: a
displays Ethernet c) WINS Difficulty: Medium
statistics? d) FTP Answer: c Section Reference:
Difficulty: Easy Working with DHCP
Answer: netstat -e Answer: b Section Reference: Explanation:
Difficulty: Hard Difficulty: Easy Working with DHCP Sometimes, APIPA
Section Reference: Section Reference: Explanation: can get in the way of
Working with Working with DHCP Installing a DHCP a client obtaining an
Advanced TCP/IP Explanation: The server consists of the IP address properly
Commands Dynamic Host following steps: (for example, when a
Explanation: The Configuration 1. Install client attempts to
command netstat -e Protocol (DHCP) ing the obtain an IP address
displays such sends IP information DHCP from a DHCP server,
Ethernet statistics as to clients service but the DHCP server
the number of automatically, 2. Confi is too busy). At that
packets and bytes making guring an IP point, APIPA would
sent and received. configuration of IP scope self-assign an IP
addresses on the 3. Activ address to the client
20. What option do network easier. ating the computer, and the
you use to ping scope computer would be
constantly until you 2. Which of these 4. Autho stuck with that
stop it? ports does DHCP rizing the address until you run
use? server ipconfig /release and
Answer: -t a) 80 ipconfig /renew from
Difficulty: Hard b) 67 4. You have a the command line.
Section Reference: c) 23 computer with an
Working with d) 500 address of 5. What name does
Advanced TCP/IP 169.254.32.23 and a Windows Server
Commands Answer: b subnet mask of 2008 R2 use for
Explanation: The Difficulty: Hard 255.255.0.0, yet you Terminal Services?
ping -t <host> Section Reference: cannot connect to a) MS Telnet Server
command keeps Working with DHCP your local file b) MS Primary
pinging a client until Explanation: DCHP servers. What is Services
you press Ctrl+C or uses ports 67 and 68. most likely the c) MS Thin Server
close the command- problem? d) Remote Desktop
prompt window. 3. After you install a) It cannot Services
DHCP servers and communicate with a
configure and DHCP server. Answer: d
Lesson 6: Working activate a scope, b) The DNS servers Difficulty: Medium
with Networking what is the last step specified are Section Reference:
Services in installing a DHCP incorrect or are Working with
server? down. Terminal Services
Multiple Choice a) Register the c) NetBIOS over Explanation:
scope TCP/IP has not been Terminal Services,
1. What protocol b) Register the enabled. also known as
automatically server d) The network card Remote Desktop
configures IP is not connected Services, is a type of

16
thin-client terminal Difficulty: Medium it). This protocol is also provides
server computing. It Section Reference: used with VPNs and protection against
allows client Defining More is an integral part of replay attacks.
computers to access Networking Services IPv6. Different form ESP,
and use applications Explanation: AH does not provide
loaded on the server, Originally used with 9. Which confidentiality.
as well as to connect dial-up services, component of IPSec
to and take control Microsoft RAS has is generates the 11. Which IPsec
of a server. morphed into RRAS, encryption and component includes
or Routing and authentication keys? the most security,
6. What port does Remote Access a) SA including
Remote Desktop Service. This b) AH confidentiality?
Services use? powerful service c) ESP a) SA
a) 443 allows clients to d) MPPE b) AH
b) 501 connect remotely to c) ESP
c) 389 a central network Answer: a d) MPPE
d) 3389 using dial-up and Difficulty: Medium
high-speed Internet Section Reference: Answer: c
Answer: d connections. It also Defining IPsec Difficulty: Medium
Difficulty: Hard allows connectivity Explanation: Section Reference:
Section Reference: through VPNs. Security association Defining IPsec
Working with (SA) generates the Explanation:
Terminal Services 8. What protocol is encryption and Encapsulating
Explanation: Thin- used with L2TP to authentication keys security payload
client computers and encrypt data? that are used by (ESP) provides the
PCs can connect to a) IPSec IPsec. same services as AH
servers running b) MS-CHAP but also provides
Terminal Services. c) MS-CHAPv2 10. Which IPsec confidentiality when
The service uses port d) MPPE component provides sending data.
3389 and is also connectionless
known as Microsoft Answer: a integrity and data 12. What port does
Windows-Based Difficulty: Easy authentication but DNS use?
Terminal (WBT) Section Reference: does not provide a) 443
Server. Defining IPsec confidentiality? b) 389
Explanation: a) SA c) 51
7. What would you Internet Protocol b) AH d) 53
use to create VPN Security (IPsec) is a c) ESP
tunnels so that users protocol within the d) MPPE Answer: d
can connect to your TCP/IP suite that Difficulty: Medium
internal network encrypts and Answer: b Section Reference:
while at home using authenticates IP Difficulty: Medium Defining DNS
Windows Server packets. It is Section Reference: Explanation: DNS
2008 R2? designed to secure Defining IPsec servers use inbound
a) Microsoft RAS any application Explanation: port 53 to accept
b) Microsoft RRAS traffic because it Authentication name-resolution
c) Microsoft RDC resides on the header (AH) requests.
d) Microsoft VPN Network layer (or provides
Server Internet layer, as connectionless 13. What service on
TCP/IP integrity and data a Windows network
Answer: b programmers refer to authentication. It is used to translate

17
between NetBIOS Explanation: When System (DNS) is a configuration that
names/computer RRAS is configured, worldwide service has been assigned by
names and IP it can be modified that resolves a DHCP server, you
addresses? further depending on hostnames to IP use the /renew
a) DNS what network addresses. This option. This will not
b) WINS adapters and IP facilitates proper change any static
c) DHCP addresses the server communication information.
d) LDAP has. Enabling LAN between computers.
routing turns on the DNS servers 19. What command
Answer: b concept known as IP communicate with do you use to
Difficulty: Easy forwarding, but only each other in a reacquire IP
Section Reference: if the server has two hierarchy in an effort configuration from a
Defining WINS or more network to teach each other DHCP server?
Explanation: adapters. their name
Windows Internet resolutions. Answer: ipconfig
Name Service Fill in the Blank /renew
(WINS) resolves 17. ________ Difficulty: Medium
NetBIOS names to 15. You use the allows a user to Section Reference:
IP addresses. It is ________ to connect connect to a Working with DHCP
Microsoft’s version to a terminal server. corporate network Explanation: To
of the NetBIOS using the Internet. renew a IP
Name Service Answer: Remote configuration
(NBNS) combined Desktop Connection Answer: VPN information that has
with a name server. (RDC) Difficulty: Medium been handed out by a
A Windows Difficulty: Medium Section Reference: DHCP server, you
computer name (for Section Reference: Defining RRAS use the ipconfig
example, Working with Explanation: With /renew command.
Computer1), can be Terminal Services VPNs, the inherent
considered a host Explanation: When power of the Internet 20. List the four
name and interact clients connect, they is exploited, and steps for a client to
with DNS, and/or a do so with the direct IP connections get an IP address
NetBIOS name by Remote Desktop are made from from a DHCP server.
working either alone Connection (RDC) clients to a VPN
or in concert with a program, which is server or router. Answer: Discover,
WINS server. based on the Remote Offering, Request,
Desktop Protocol Short Answer and Acknowledge
14. What feature (RDP). Difficulty: Easy
within Windows 18. What command Section Reference:
allows the server to 16. _________ do you use to release Working with DHCP
act as a router? provides name the IP configuration Explanation: DHCP
a) IPsec resolution between handed out by a sessions use a four-
b) DHCP domain names and DHCP server? step process known
c) IP forwarding IP addresses. as DORA. The four
d) RDC Answer: ipconfig steps are as follows:
Answer: DNS /release 1. Disco
Answer: c Difficulty: Medium Difficulty: Medium very: The
Difficulty: Medium Section Reference: Section Reference: client
Section Reference: Defining DNS Working with DHCP computer
Defining RRAS Explanation: The Explanation: To broadcasts
Domain Name release an IP out to the

18
network in a) RIP monitors the Section Reference:
order to find b) OSPF network for routers Defining Packet
a DHCP c) BGP that have a change in Switching
server. d) IGMP their link state, Explanation: Types
2. Offer meaning they were of packet-switching
ing: The Answer: a turned off, turned on, services include
DHCP server Difficulty: Medium or restarted. X.25 and Frame
sends out a Section Reference: Relay.
unicast Identifying Static 3. What technology
“offering” of and Dynamic takes data and breaks 5. What device acts
an IP address Routing them into packets as a high-speed
to the client Explanation: and sends them over modem for a LAN?
computer. Routing Information a network, a) analog modem
3. Requ Protocol (RIP) is a sometimes using b) telco incoming
est: The dynamic protocol different routes for router
client that uses distance- each packet? c) packet switcher
broadcasts to vector routing a) circuit switching d) CSU/DSU
all servers algorithms to b) connection
that it has decipher which route switching Answer: d
accepted the to send data packets. c) packet switching Difficulty: Medium
offer. In packet-switched d) network Section Reference:
4. Ackn networks, a distance- switching Defining Packet
owledge: vector routing Switching
The DHCP protocol uses the Answer: c Explanation: The
server sends Bellman-Ford Difficulty: Easy CSU/DSU is the
a final algorithm to Section Reference: equivalent of the
unicast to the calculate where and Defining Packet modem for the entire
client that how data will be Switching LAN. It is known as
includes the transmitted. Explanation: data communications
IP Packet switching is equipment (DCE).
information 2. What routing how data packets are
the client will protocol is the most moved over 6. What does X.25
use. popular link-state switched wide area use as its DTE
protocol used within networks. device?
a large organization? a) telco incoming
Lesson 7: a) RIP 4. X.25 and Frame router
Understanding b) OSPF Relay are examples b) packet switcher
Wide Area c) BGP of what type of c) analog modem
Networks d) IGMP WAN technology? d) PAD
a) circuit switching
Multiple Choice Answer: b b) connection Answer: d
Difficulty: Medium switching Difficulty: Hard
1. What routing Section Reference: c) packet switching Section Reference:
protocol is the most Identifying Static d) network Defining X.25
popular distance- and Dynamic switching Explanation: With
vector routing Routing X.25, the PAD (or
algorithm used to Explanation: Open Answer: c router) is known as
determine the best Shortest Path First Difficulty: Easy data-terminating
routes within a (OSPF) is a link- equipment (DTE).
network? state protocol that

19
7. What part of the Explanation: X.25 typical message of
network is the point is a legacy ten packets could be 13. In Europe, what
where the technology that spread over five circuit would be
responsibility of the involves a maximum circuits. Because similar to the T1
administrator ends 56K or 64K line. multiple circuits are found in the United
and the being used (and not States?
telecommunications 9. When a packet just one), the entire a) E1
provider’s traverses a network, circuit set is known b) J1
responsibility each router is a as the virtual circuit. c) T2
begins? _____. d) F1
a) last mile a) jump point 11. What replaced
b) demarc b) CSU/DSU X.25? Answer: a
c) router array c) jump switch a) Frame Relay Difficulty: Easy
d) PAD interface d) hop b) ATM Section Reference:
c) ISDN BRI Defining T-Carriers
Answer: d Answer: d d) DSL Explanation: T1 and
Difficulty: Medium Difficulty: Easy T3 are the names
Section Reference: Section Reference: Answer: a used in the United
Defining X.25 Defining X.25 Difficulty: Easy States. In Japan, they
Explanation: The Explanation: As Section Reference: are also known as
demarc is the point packets transverse a Defining Frame J1/J3, and in Europe,
where your network, the packet Relay they are denoted
responsibility as an is dissembled and Explanation: Frame E1/E3. Different
administrator ends reassembled at each Relay is the from a T1, E1 runs
and the router. Each stop is a advancement of at 2.048 Mbps.
telecommunications router, which is X.25 packet
or data known as a hop. switching. It is a 14. How many B
communications newer form of channels does an
provider’s 10. When you have packet switching ISDN PRI support?
responsibility multiple circuits designed for faster a) 2
begins. The demarc connected to a site, connections. b) 8
can also be a the entire circuit is c) 23
network interface known as a 12. At what speed d) 48
device or simple ___________. does a T3 line run?
networking jack. a) virtual circuit a) 1.5 Mbps Answer: c
b) emulated circuit b) 4.5 Mbps Difficulty: Medium
8. What is the c) joined circuit c) 44.7 Mbps Section Reference:
primary d) multitasked d) 128 Mbps Defining Other
disadvantage of circuit WAN Technologies
X.25? Answer: c and Internet
a) digital circuit Answer: a Difficulty: Medium Connectivity
b) small data Difficulty: Medium Section Reference: Explanation: A
payloads Section Reference: Defining T-Carriers primary rate ISDN
c) circuit switching Defining X.25 Explanation: T3 (PRI) is 1.536 Mbps,
d) slow speeds Explanation: A PSE stands for trunk and it runs on a T1
has thousands of carrier 3 and is the circuit. PRI has 23
Answer: d circuits from which equivalent of 28 T1s. equal 64 Kbps B
Difficulty: Easy to choose. These are It runs at 44.736 channels for data,
Section Reference: known as a circuit Mbps, using 672 64 along with one 64
Defining X.25 set. Therefore, a Kbps B channels.

20
Kbps D channel for broadband Internet manually defined on information provided
timing. connection? each router. by a circuit or line.
a) cable
15. What speed b) DSL Answer: Static Answer: CIR
does FDDI use? c) FDDI route Difficulty: Medium
a) 10 Mbps d) Frame Relay Difficulty: Medium Section Reference:
b) 44 Mbps Section Reference: Defining Frame
c) 54 Mbps Answer: b Understanding Relay
d) 100 Mbps Difficulty: Easy Routing Explanation: With
Section Reference: Explanation: Static Frame Relay, you
Answer: d Digital subscriber routing refers to the must commit to a
Difficulty: Medium line (DSL) is a manual certain amount of
Section Reference: family of configuration of a information over
Defining Other technologies that router. For example, time. This is the
WAN Technologies provides data when a routing entry committed
and Internet transmissions over is manually entered information rate
Connectivity local telephone into the routing table (CIR). The CIR is
Explanation: Fiber networks. with the route add assigned to each
distributed data command, this is PVC that services
interface (FDDI) is a Fill in the Blank known as static the organization’s
standard for routing. account. Because
transmitting data on 18. _________ is this transmission is
optical fiber cables used to send packets 20. _________ uses full duplex, each
at a rate of around from one network to a clocking circuit to PVC can have two
100 Mbps. another network. control the timing of CIRs. In addition to
communications the CIR are Burst
16. What topology Answer: Routing between two WAN Rate (Br), which is
does FDDI use? Difficulty: Easy devices such as equal to the CIR, and
a) bus Section Reference: routers. Burst Excess Rate
b) star Understanding (Be), which is
c) ring Routing Answer: Static 50percent above the
d) mesh Explanation: route Br.
Routing is the Difficulty: Medium
Answer: c process of moving Section Reference: Short Answer
Difficulty: Medium data across networks Defining X.25
Section Reference: or internetworks Explanation: Digital 22. What speed
Defining Other between hosts or lines have speeds of does a T1 run at?
WAN Technologies between routers 64K or greater. It is
and Internet themselves. also synchronous, Answer: 1.544
Connectivity Information is which means that a Mbps
Explanation: FDDI transmitted clocking circuit Difficulty: Medium
uses the ring according to the IP controls the timing Section Reference:
topology. networks and of communications Defining T-Carriers
individual IP between the different Explanation: A T1
17. What addresses of the routers. is an actual trunk
technology uses hosts in question. carrier circuit that is
wires from the 21. A ________ is brought into a
telephone company 19. _________ is a the guaranteed company. It can run
to provide route that must be certain amount of as a dedicated high-
speed link or have

21
other shared up that is another or WANs between server that allows
technologies running company’s internal each VPN device. incoming L2TP
on top of it, such as network? connections must
Frame Relay and a) intranet 3. Which VPN have inbound port
ISDN. It is b) extranet technology is the 1701 open.
considered 1.544 c) internet most common and
Mbps, but only d) DMZ the easiest to set up? 5. Which type of
1.536 Mbps of that is a) PPTP firewall blocks
for data. The Answer: b b) L2TP with IPSec packets based on
remaining 8 Kbps is Difficulty: Easy c) SSTP rules that are based
for T1 Section Reference: d) CHAP on IP addresses or
trimming/overhead. Defining Intranets ports?
and Extranets Answer: a a) packet filtering
23. How fast is a Explanation: An Difficulty: Medium b) stateful packet
DS0 circuit? extranet is similar to Section Reference: inspection
an intranet except Understanding VPNs c) NAT filtering
Answer: 64 Kbps that it is extended to Explanation: Point- d) Application-level
Difficulty: Medium users outside a to-Point Tunneling gateway
Section Reference: company, and Protocol (PPTP) is
Defining Other possibly to entire the more commonly Answer: a
WAN Technologies organizations that used protocol, but it Difficulty: Easy
and Internet are separate from or is also the less Section Reference:
Connectivity lateral to the secure option. PPTP Defining Firewalls
Explanation: A T- company. generally includes and Other Perimeter
carrier or security Security Devices
telecommunications 2. What technology mechanisms, and no Explanation: Packet
carrier system is a can you use additional software filtering inspects
cabling and interface temporarily to or protocols need to each packet that
system designed to connect networks be loaded. passes through the
carry data at high from two different firewall and accepts
speeds. The most companies? 4. What port does or rejects it based on
common of these is a) VPN L2TP use? a set of rules. A
the T1. The basic b) HTTP a) 501 stateless packet
data transfer rate of c) DHCP b) 1723 filter, also known as
the T-carrier system d) passive router c) 1701 pure packet filtering,
is 64 Kbps, which is d) 443 is based on IP
known as DS0, Answer: a addresses and port
which is the digital Difficulty: Easy Answer: b numbers.
signaling scheme. Section Reference: Difficulty: Hard
Understanding VPNs Section Reference: 6. What technology
Explanation: A Understanding VPNs used in firewalls
Lesson 8: virtual private Explanation: L2TP keeps tracks of
Designing Network network (VPN) is a is considered the conversations so that
Infrastructure and connection between more secure solution it knows what to
Network Security two or more compared to PPTP allow back into a
computers or devices because IPsec is network?
Multiple Choice that are not on the required in most a) stateless packet
same private L2TP inspection
1. What type of network. In fact, implementations. A b) stateful packet
network can you set there could be LANs VPN device or inspection

22
c) NAT filtering Explanation: A Explanation: In a
d) application-level proxy server acts as 9. What type of three-leg perimeter
gateway an intermediary device is designed to configuration, the
between a LAN and inspect traffic, detect DMZ is usually
Answer: b the Internet. By malicious activities, attached to a
Difficulty: Medium definition, proxy and take steps to separate connection
Section Reference: means “go- mitigate the of the company
Defining Firewalls between,” acting as malicious activity? firewall. Therefore,
and Other Perimeter such between a a) NIDS the firewall has three
Security Devices private and a public b) NIPS connections: one to
Explanation: A network. c) Internet content the company LAN,
firewall running filter one to the DMZ, and
stateful packet 8. What type of d) NAT server one to the Internet.
inspection is device is used to
normally not detect malicious Answer: b 11. What stage is
vulnerable to many network activities Difficulty: Medium the World Wide Web
attacks because it and reports only Section Reference: in?
keeps track of the those issues to the Defining Firewalls a) 1.0
state of network administrator? and Other Perimeter b) 1.1
connections by a) NIDS Security Devices c) 2.0
examining the b) NIPS Explanation: A d) 3.0
header in each c) Internet content network intrusion
packet. It should be filter prevention system Answer: c
able to distinguish d) NAT server (NIPS) is designed Difficulty: Easy
between legitimate to inspect traffic, Section Reference:
and illegitimate Answer: a and, based on its Defining the Internet
packets. Difficulty: Medium configuration or Explanation:
Section Reference: security policy, can Currently, the World
7. What acts as a Defining Firewalls remove, detain, or Wide Web is in a
middleman that and Other Perimeter redirect malicious stage known as Web
translates between Security Devices traffic. 2.0 (with Web 3.0
internal and external Explanation: A just under way). Web
addresses and that network intrusion 10. Which DMZ 2.0 is an interactive
caches previously detection system configuration uses type of web
accessed web pages (NIDS) is a type of one firewall with experience compared
so that it can provide IDS that attempts to three interfaces? to version 1.0. Web
those more quickly detect malicious a) back-to-back 2.0 allows users to
in the future? network activities configuration interact with each
a) NAT server (for example, port b) three-leg other as well as act
b) stateful packet scans and denial-of- perimeter as contributors to
inspector service attacks) by configuration websites.
c) proxy server constantly c) basic
d) NIDS monitoring network configuration 12. What protocol is
traffic. The NIDS d) perimeter used with L2TP to
Answer: c then reports any configuration provide encryption?
Difficulty: Easy issues that it finds to a) IPSec
Section Reference: a network Answer: b b) MPPE
Defining Firewalls administrator, as Difficulty: Medium c) HTTPS
and Other Perimeter long as it is Section Reference: d) MSC-CHAP
Security Devices configured properly. Redefining DMZ

23
Answer: a is established. When 15. When trying to Computers that
Difficulty: Easy the connection is protect your connect to the
Section Reference: made, packets can network, you should Internet use the
Understanding VPNs flow between hosts create your secure TCP/IP protocol
Explanation: Layer without further network based on suite. It is estimated
2 Tunneling Protocol checking. Circuit- _______. that there currently
(L2TP) is quickly level gateways hide a) multiple content are 2 billion Internet
gaining popularity information about filters users and an
due to the inclusion the private network, b) a master firewall estimated 650
of IPsec as its but they do not filter that all traffic flows million computers
security protocol. individual packets. through connected to the
Although this is a c) a NAT firewall Internet, although it
separate protocol 14. What type of and a proxy server is difficult to
and L2TP doesn’t firewall do you use d) layers estimate this due to
have any inherent to block access to NAT and other
security, L2TP is certain websites or Answer: d similar services.
considered the more instant messengers? Difficulty: Hard
secure solution a) Internet content Section Reference: 17. An _________
because IPsec is filter Defining Network is the internal
required in most b) NIDS Infrastructure and network for an
L2TP c) circuit-level Network Security organization.
implementations. gateway Explanation: Do not
d) NAT filtering depend on a single Answer: intranet
13. What type of network device or Difficulty: Easy
firewall works on the Answer: a technology to protect Section Reference:
Session layer that Difficulty: Easy your network. Defining the
creates a connection Section Reference: Instead, use a layer Intranets and
and allows packets Defining Firewalls approach so that if a Extranets
to flow between the and Other Perimeter hacker gets past one Explanation: An
two hosts without Security Devices layer of defense, intranet is a private
further checking? Explanation: other layers are in computer network or
a) proxy server Another example of place to stop the single website that
b) application a proxy in action is hacker. an organization
firewall Internet content implements to share
c) NAT filtering filtering. An Internet Fill in the Blank data with employees
d) circuit-level content filter, or around the world.
gateway simply a content 16. The
filter, is usually ____________ is the Short Answer
Answer: d applied as software largest WAN in the
Difficulty: Medium at the Application world. 18. What port does
Section Reference: layer and can filter PPTP use?
Defining Firewalls out various types of Answer: Internet
and Other Perimeter Internet activities, Difficulty: Easy Answer: 1723
Security Devices such as access to Section Reference: Difficulty: Hard
Explanation: A certain websites, Defining the Internet Section Reference:
circuit-level gateway email, instant Explanation: The Understanding VPN
works at the Session messaging, and so Internet is a Explanation: A
layer of the OSI on. worldwide system of VPN device or
model when a TCP connected computer server that allows
or UDP connection networks. incoming PPTP

24
connections must (DMZ) is a small
have inbound port network set up
1723 open. PPTP separately from a
works within the company’s private
Point-to-Point local area network
Protocol (PPP), and the Internet.
which is also used With the back-to-
for dial-up back configuration,
connections. the DMZ is situated
19. What device is between two firewall
used to protect one devices, which could
network from be black box
another by using appliances or
filtering packets? Microsoft Internet
Answer: firewall Security and
Difficulty: Hard Acceleration (ISA)
Section Reference: servers.
Defining Firewalls
and Other Perimeter
Security Devices
Explanation:
Firewalls are used
primarily to protect
one network from
another. They are
often the first line of
defense in network
security. Several
types of firewalls
exist: some run as
software on server
computers, some run
as stand-alone
dedicated
appliances, and some
work as just one
function of many on
a single device.
20. What type of
configuration creates
a DMZ between two
firewalls?
Answer: back-to-
back configuration
Difficulty: Medium
Section Reference:
Redefining the DMZ
Explanation: A
perimeter network or
demilitarized zone

25

Vous aimerez peut-être aussi