This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.
1) A system that uses a public network (Internet) as a means for creating private encrypted connections between remote locations is known as:
A Virtual Private Network (VPN) is used to have a secure connection over a public network.
This question is filed under objective 3, Network security
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network Encryption is a common, although not an inherent, part of a VPN connectionVPN technology was developed to provide access to corporate applications and resources to remote users, mobile users, and to branch offices For security, the private network connection may be established using an encrypted layered tunneling protocol, and users may be required to pass various authentication… Read More
2) A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is commonly referred to as:
A Wireless Local Area Network (WLAN) is a network connected through WiFi or another radio frequency.
This question is filed under objective 1, Network Architecture
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building This gives users the ability to move around within the area and remain connected to the network Through a gateway, a WLAN can also provide a connection to the wider Internet Most modern WLANs are based on IEEE 80211 standards and are marketed under the Wi-Fi brand name Wireless LANs have become popular for use in the home, due to their ease of installation and use… Read More
3) A standalone malicious computer program that replicates itself over a computer network is known as:
Worm is a self replicating malicious code. Trojan requires a trigger to execute, while spam is typically just a nuisance and spyware records your information.
This question is filed under objective 3, Network security
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers It often uses a computer network to spread itself, relying on security failures on the target computer to access it It will use this machine as a host to scan and infect other computers When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time… Read More
4) In which type of network topology do the main network cables become a single point of failure?
In a bus topology, all the workstations connect to one backbone. If the backbone fails, the entire network will go down.
This question is filed under objective 1, Network Architecture
A bus network is a network topology in which nodes are directly connected to a common half-duplex link called a busA host on a bus network is called a station In a bus network, every station will receive all network traffic, and the traffic generated by each station has equal transmission priority A bus network forms a single network segment and collision domain In order for nodes to share the bus, they use a medium access control technology such as carrier-sense multiple access (CSMA) or a bus master … Read More
5) A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:
Honeypot is a part of the infrastructure heavily monitored to attract hackers and learn about the exploits used on the network.
This question is filed under objective 3, Network security
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site that seems to contain information or a resource of value to attackers, but actually, is isolated and monitored and enables blocking or analyzing the attackers This is similar to police sting operations, colloquially known as "baiting" a suspect… Read More
6) What command would you use to display a MAC address if the administrator is using a Linux machine?
ifconfig can be used to display or modify all network interfances on Linux. Ipconfig is used for Windows systems.
This question is filed under objective 4, Troubleshooting
7) The process of combining multiple physical network adapters into a single logical interface is known as:
Network Interface Controller (NIC) teaming is a form of link aggregation that allows multiple connections for redundancy.
This question is filed under objective 2, Network operations
In computer networking, the term link aggregation refers to various methods of combining (aggregating) multiple network connections in parallel in order to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links should fail A link aggregation group (LAG) is the collection of physical ports combined together Other umbrella terms used to describe the method include trunking, bundling, bonding, channeling or teaming These umbrella terms encompass not only vendor-independent standards such as Link Aggregation Control Protocol (LACP) for Ethernet defined in IEEE 8021AX or the previous IEEE 8023ad, but also various proprietary solutions… Read More
8) What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)?
Blocking certain ports can restrict specific types of network traffic, for example blocking port 80 would restrict the HTTP protocol. It is important to know however that this only blocks the default HTTP port and another could be used to bypass this measure.
This question is filed under objective 3, Network security
9) Address Resolution Protocol (ARP) is a telecommunication protocol that provides what kind of resolution?
Address Resolution Protocol (ARP) will translate the IP address into a Media Access Control (MAC) address.
This question is filed under objective 5, Industry standards, practices, and network theory
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address This mapping is a critical function in the Internet protocol suite ARP was defined in 1982 by RFC 826, which is Internet Standard STD 37 ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X25, Frame Relay and Asynchronous Transfer Mode (ATM) In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor Discovery Protocol (NDP)… Read More
10) What would the administrator adjust in the WAP configuration settings so a user could not access the wireless signal from the parking lot?
The administrator would adjust the power level controls, so the signal does not extend into the parking lot.
This question is filed under objective 3, Network security
11) In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
The Chain of custody is a paper trail that shows who has possession of the object being tracked.
This question is filed under objective 5, Industry standards, practices, and network theory
Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence Of particular importance in criminal cases, the concept is also applied in civil litigation and more broadly in drug testing of athletes and in supply chain management, eg to improve the traceability of food products, or to provide assurances that wood products originate from sustainably managed forests It is often a tedious process that has been required for evidence to be shown legally in court Now however, with new portable technology that allows accurate laboratory quality results from the scene of the crime,… Read More
12) Which of the following solutions hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
Network Address Translation (NAT) hides the internal IP, but also is used to conserve IPv4 addresses, by using one IP address for the entire private network.
This question is filed under objective 3, Network security
Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device The technique was originally used to avoid the need to assign a new address to every host when a network was moved, or when the upstream Internet service provider was replaced, but could not route the networks address space It has become a popular and essential tool in conserving global address space in the face of IPv4 address exhaustion One Internet-routable IP address of a NAT gateway can be used for an entire private network… Read More
13) Which option could be used when describing Thinnet or Thinnwire?
Thinnet has a maxiumum transmition of 10 Mbit/s, baseband signaling, and 200 meter max length cable segment. That is why it is known as 10BASE2.
This question is filed under objective 5, Industry standards, practices, and network theory
10BASE2 (also known as cheapernet, thin Ethernet, thinnet, and thinwire) is a variant of Ethernet that uses thin coaxial cable terminated with BNC connectors to build a local area network During the mid to late 1980s this was the dominant 10 Mbit/s Ethernet standard, but due to the immense demand for high speed networking, the low cost of Category 5 cable, and the popularity of 80211 wireless networks, both 10BASE2 and 10BASE5 have become increasingly obsolete, though devices still exist in some locations As of 2011, IEEE 8023 has deprecated this standard for new installations… Read More
14) Multi-link Point-to-Point Protocol (MLPPP) provides a method for combining two or more physical communication links into one logical interface to improve speed and redundancy.
MLPPP is used for link aggregation. For example, it would allow two physical dial up lines to one company computer.
This question is filed under objective 1, Network Architecture
In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between It can provide connection authentication, transmission encryption, and data compression PPP is used over many types of physical networks, including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links, such as SONET Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own without some data link protocol that can identify where the transmitted frame starts and where it ends… Read More
15) Which of the following devices resides at the data link layer of the Open Systems Interconnections (OSI) model?
Ethernet switch is in layer 2 (data link) of the OSI model, while repeater/hub are in layer 1 (physical), and router is layer 3 (network).
This question is filed under objective 5, Industry standards, practices, and network theory
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer The data link layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer The data link layer is concerned with local delivery of frames between nodes on the same level of the network Data-link frames, as these protocol data units are called, do not cross the boundaries of a local area network… Read More
16) A software module on a managed device that sends Simple Network Management Protocol (SNMP) notifications to the managing station is called:
The agent is the software on the devices in need of monitoring on a network, that uses Simple Network Management Protocol (SNMP) to send a notification to the administrator.
This question is filed under objective 4, Troubleshooting
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and moreSNMP is widely used in network management for network monitoring SNMP exposes management data in the form of variables on the managed systems organized in a management information base (MIB) which describe the system status and configuration These variables can then be remotely queried (and, in some circumstances, manipulated) by managing applications Three significant versions of SNMP have been developed and… Read More
17) A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called:
Netstat shows incoming and outgoing connections, routing tables, and other network statistics.
This question is filed under objective 2, Network operations
In computing, netstat (network statistics) is a command-line network utility that displays network connections for Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics It is available on Unix, Plan 9, Inferno, and Unix-like operating systems including macOS, Linux, Solaris and BSD It is also available on IBM OS/2 and on Microsoft Windows NT-based operating systems including Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10 It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement… Read More
18) The end-to-end security scheme Internet Protocol Security (IPsec) resides at which layer of the OSI model?
IPsec is used for Internet Protocol communications. This means it has to reside on the Network layer.
This question is filed under objective 3, Network security
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network It is used in virtual private networks (VPNs) IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host) IPsec uses cryptographic security services to protect communications over Internet Protocol (IP) networks… Read More
19) A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:
In the Internet Protocol (IP) Time To Live (TTL) is the lifetime of the data being passed over the network before the information is dropped. This is to prevent an infinite loop. Is is defined as the number of hops a packet can go before being discarded. Each time an OSI layer 3 (routing) device handles a packet it deducts the TTL value of the packet by one. If a layer 3 device encounters a TTL of 0 the packet will be discarded. For IPv6 the TTL field has been renamed to hop limit.
This question is filed under objective 2, Network operations
Time to live (TTL) or hop limit is a mechanism that limits the lifespan or lifetime of data in a computer or network TTL may be implemented as a counter or timestamp attached to or embedded in the data Once the prescribed event count or timespan has elapsed, data is discarded or revalidated In computer networking, TTL prevents a data packet from circulating indefinitely In computing applications, TTL is commonly used to improve the performance and manage the caching of data … Read More
20) A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as Software as a Service (SaaS).
These are applications hosted over the internet so the user does not have to download them. An example is Google Apps, where you can access something similar to Microsoft Word or Excel, without having to download anything.
This question is filed under objective 5, Industry standards, practices, and network theory
Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft SaaS applications are also known as on-demand software and Web-based/Web-hosted softwareSaaS is considered to be part of cloud computing, along with infrastructure as a service (IaaS), platform as a service (PaaS), desktop as a service (DaaS), managed software as a service (Dancing Numbers)(MSaaS), mobile backend as a service (MBaaS), datacenter as a service (DCaaS), and information technology management as a service (ITMaaS)… Read More
You can go back and review your answers or grade your test.