Q1. Which type of port is used to support VLAN traffic between two switches?
A. Virtual port
B. WAN port
C. Trunk port
D. LAN port
Answer: C
Q2. What is a similarity between Layer 2 and Layer 3 switches?
A. Both provide a high level of security to the network.
B. Both use logical addressing to forward transmissions.
C. Both forward packets onto the network.
D. Both allow the implementation of VLANs.
Answer: C
Q3. Which subnet mask is valid?
A. 255.255.255.240
B. 255.255.255.228
C. 255.255.255.164
D. 255.255.255.245
Answer: A
Q4. The function of a router is to:
A. Provide IP subnet masks for hosts.
B. Forward traffic to other networks.
C. Broadcast routing tables to clients.
D. Store tables for name resolution.
Answer: B
Q5. The default port used for telnet is:
A. 23
B. 25
C. 80
D. 8080
Answer: A
Q6. This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the IPSec policy snap-in on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed
Answer: A
Q7. HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q8. DRAG DROP
Match each IP address to its corresponding IPv4 address class.
To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q9. A Media Access Control (MAC) address identifies a/an:
A. UPnP device.
B. Local broadcast domain.
C. Network interface card (NIC).
D. Local area network (LAN).
Answer: C
Q10. A Layer 2 device that connects multiple computers within a network is a:
A. Repeater
B. Switch
C. Router
D. Packet
Answer: B
Q11. This question requires that you evaluate the underlined text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as mobile ad hoc networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed
Answer: C
Q12. In which physical network topology is each computer connected to a central point?
A. Star
B. Mesh
C. Ring
D. Bus
Answer: A
Q13. This question requires that you evaluate the underlined text to determine if it is correct.
IPv4 multicast addresses range from 192.168.0.0 to 192.168.255.255.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. 127.0.0.0 to 127.255.255.255
B. 172.16.0.0 to 172.31.255.255
C. 224.0.0.0 to 239.255.255.255
D. No change is needed
Answer: C
Q14. Which of these is a public address space?
A. 192.168.0.0/16
B. 197.16.0.0/12
C. 10.0.0.0/8
D. 172.16.0.0/12
Answer: D
Q15. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
Answer: D