--- - answers: - A message sent from a web client to a web server asking for a list of all available files. - A message sent from a web client to a web server requesting that a file be sent to the client. - A message sent to a Cisco device at the start of in-band administration. - A Hyper Text Transfer Protocol General Echo Time request. correct: - '1' question: 'What is an HTTP GET request? ' - answers: - Using NDP. - Using NTS. - Using DDT. - Using DNS. correct: - '3' question: 'How does a host discover the IP address of a website if it only knows the hostname. ' - answers: - The protocol is http, the hostname is boson.com, the name of the webpage is Product - The protocol is www, the hostname is boson.com, the name of the webpage is Product. - The protocol is http, the hostname is www.boson.com, the name of the webpage is Product - The protocol is http, the hostname is boson, the name of the webpage is Product. correct: - '2' question: 'Which statement is true about the following email address: http://www.boson.com/Product' - answers: - All the devices in the world that have an IP address. - All the devices in the world that enable packets to be sent from one host to another (i.e., cables, routers, switches, etc). - All the web servers in the world, plus all the web hosts that have web browsers. - All the Cisco-qualified network technicians in the world. correct: - '2' question: 'What is the World Wide Web. ' - answers: - If some VoIP packets are lost the end-to-end connection is interrupted and must be re-established before a conversation can resume. - VoIP can tolerate high packet loss with no noticeable effects. - If VoIP traffic experiences low packet loss a conversation can continue normally, although short breaks in sound may be noticed. - If some VoIP packets are lost, the VoIP application can usually perform error correction to recover the packets. correct: - '2' question: 'Some colleagues are talking about QoS and the effect of lost packets on VoIP calls. Which statement is true? ' - answers: - Jitter is a clicking noise that can be heard on some VoIP calls. It is caused by loss of UDP packets. - Jitter refers to the variation in delay experienced by packets. - Jitter is a flickering effect sometimes seen on streaming video. - Jitter is a predefined settings package that provides optimal QoS for IP telephony use. correct: - '1' question: Some colleagues are discussing QoS, and are interested in jitter. What is jitter? - answers: - VoIP can tolerate high levels of jitter without any effect on call quality. - VoIP can tolerate higher levels of jitter than data applications. - VoIP requires very low levels of jitter. - VoIP requires very high jitter to mask crackles on the line. correct: - '2' question: Some colleagues are discussing QoS. Which statement is true? - answers: - VoIP can tolerate high levels of delay without any effect on call quality. - As long some sound is made during each delay window a VOIP call will take place without interruption. - VoIP requires very low delay (typically lower than 2 milliseconds). If there is more delay, people will find it difficult to converse. - VoIP requires very low delay (typically lower than .2 seconds). If there is more delay, people will find it difficult to converse. correct: - '3' question: Which statement is true? - answers: - The time it takes for a packet to reach a default gateway. - The time it takes for a QoS ping test to reach a destination and return. - The time it takes for a packet to get from a sending host to a destination host. - The time it takes for a listener to understand what is being said. correct: - '2' question: When talking about QoS a colleague mentions "delay". What is meant by delay? - answers: - TCP has a higher overhead, because it sends packets used for sequencing, acknowledgement and error correction. - TCP is an older protocol that is inherently slow. - UDP does not have to wait for acknowledgments or hold data in memory until an acknowledgement arrives. - UDP can be used over fibre-optic media but TCP cannot. correct: - '0' - '2' question: 'Why is TCP slower than UDP (choose two)? ' - answers: - Some applications can perform the necessary error recovery. (e.g. Network File System). - Some applications can automatically switch to TCP if UDP results in too many errors. - Some applications can tolerate loss. (e.g. VoIP). - Some application close down if a certain percentage of packets are lost. correct: - '0' - '2' question: 'An application uses UDP and a few packets fail to reach a destination, which of the following is true (choose two)? ' - answers: - DNS uses TCP because DNS is vital to the operation of the world wide web. - If DNS used TCP it would be able to resolve names quicker. - DNS uses UDP because the DNS protocol was written before connection-oriented protocols were developed. - DNS uses UDP because if packets are lost and it fails to resolve a name it can try again until it is successful. correct: - '3' question: 'Which statement is true? ' - answers: - By referring to the IP address of the client. - By referring to the Globally Unique Identifier (GUI) of the browser in use on the client. - It does not need to know. - By referring to the random socket number assigned by the client. correct: - '3' question: A web server is connected to several clients simultaneously, using a unique socket for each client. How does the web server know which client sent which packets? - answers: - To make the server administrator\'s job easier. - So that new clients can gain access to the appropriate service without first finding out which port is allocated to the required service . - So that application developers can set the port number up so that it is the same for all users of the application. - So that no two applications attempt to use the same port number. correct: - '1' question: Why do servers use well-known port numbers? - answers: - An IP address, a transport layer protocol, and a port number. - An IP address, a MAC address, a transport layer protocol, and a port number. - An IP address and a port number. - A port number, an IP header, and a payload. correct: - '0' question: What does a socket consist of? - answers: - It sends the packet to all possible applications in random order until one application accepts the packet. - Packets intended for different applications are radically different so it is not difficult to know which application to send them to. - It refers to the Application Identification Code (AIC) within the payload data. - It bases this decision on the port number assigned to the packet. correct: - '3' question: A host receives a packet. How does it know which application the packet is destined for? - answers: - UDP. - Neither, they both consume the same amount. - TCP. - It depends on the payload and congestion on the network. correct: - '2' question: 'Which consumes more bandwidth, TCP or UDP? ' - answers: - A system that allows packets travelling between hosts to take a variety of different routes. - A system that allows a sending host to specify which application on a destination host receives the packet. - The process of breaking streams of packets from applications into blocks of data small enough to send over the network. - Buying a ticket for one movie and using it to watch several movies before leaving the cinema. correct: - '1' question: What is multiplexing? - answers: - VoIP traffic does not require error recovery so is suitable for UDP. - TCP is essential for VoIP traffic because an uninterrupted stream is required. - TCP is more suitable for VoIP traffic because it can be routed more consistently. - If VoIP traffic were routed over TCP, error recovery and variable transmission rates might result in the sound being distorted. correct: - '0' - '3' question: Which of the following statements are true (choose two)? - answers: - TCP is regarded as a cleaner and more efficient protocol than UDP. - TCP manages flow control more efficiently. - UDP packets stream over the network and are hence more suitable for voice and video traffic, whereas TCP packets take non-contiguous routes. - TCP checks that packets have arrived at their destination and resends packets which appear not to have arrived. UDP sends packet and does not attempt to check whether they have arrived at their destination or not. correct: - '3' question: What is the main difference between TCP and UDP? - answers: - They identify redundant routes and only send packets via those routes. - If they need to send multiple packets out of one port, they can buffer packets and send them one at a time. - They are able to route most packets so that they are only sent out of ports that lead to the packet\'s destination. - They attract and re-route packets which would otherwise be routed via hubs. correct: - '1' - '2' question: Switches prevent or reduce collisions in what ways (choose two)? - answers: - It is a half-duplex system so packets cannot be sent and received at the same time. - It requires the use of legacy equipment that cannot operate at the speed of modern media. - It frequently arranges for all devices to remain silent (i.e. not send or receive packets) while a random timer expires. - They attract and re-route packets which would otherwise be routed via hubs. correct: - '0' - '2' question: What are two reasons why CSMA/CD logic fails to make the best use of available Ethernet media? - answers: - Forget about the packet altogether and send some more before another host can take control of the media. - Send a "packet sent" notice to the Ethernet Logging Database (EDB). - Listen for collisions. - Wait until it receives confirmation from the destination host, then send another packet. correct: - '2' question: A host has just sent a packet using CSMA/CD logic. What does it do now? - answers: - Sends a discovery message out to find out if the destination host is on the same subnet. - Listens to see if the Ethernet is busy. - Sends a token out to instruct other devices not to send packets. - Sends a jamming signal out to prevent other hosts from sending packets. correct: - '1' question: A device on a network is ready to send a frame. What is the first thing that CSMA/CD logic does? - answers: - Pin 1 at one end connects to pin 2 at the other. Pin 2 at one end connects to pin 1 at the other. - Pin 1 at one end connects to pin 3 at the other. Pin 2 at one end connects to pin 6 at the other. - Pin 1 at one end connects to pin 4 at the other. Pin 2 at one end connects to pin 5 at the other. - Pin 1 at one end connects to pin 1 at the other. Pin 2 at one end connects to pin 2 at the other. - The word "crossover" is always written on the cable. correct: - '1' question: Which answer is true about an Ethernet crossover cable? - answers: - Physical layer - Layer 4 - Network layer - Internet layer correct: - '1' question: Which layer of the OSI model is associated with segments? - answers: - '110' - '42' - '200' - 1 kilometre correct: - '0' question: What administrative distance is usually used for OSPF? - answers: - '25' - '21' - '110' - '20' correct: - '3' question: What port number is used for FTP data? - answers: - '20' - '39' - '500' - '21' correct: - '3' question: What port number is used for FTP control? - answers: - '443' - '23' - '21' - '22' correct: - '3' question: What port number is used for SSH? - answers: - '23' - '22' - '25' - '20' correct: - '0' question: What port number is used for Telnet? - answers: - '22' - '25' - '161' - '110' correct: - '1' question: What port number is used for SMTP? - answers: - '35' - '25' - '69' - '53' correct: - '3' question: What port number is used for DNS? - answers: - '67' - '68' - '69' - '53' correct: - '0' - '1' question: What port number is used for DHCP? - answers: - '25' - '160' - '80' - '8' correct: - '2' question: What port number is used for HTTP? - answers: - '53' - '69' - '161' - '143' correct: - '1' question: What port number is used for TFTP? - answers: - '143' - '25' - '161' - '110' correct: - '3' question: What port number is used for POP3? - answers: - '161' - '25' - '68' - '22' correct: - '0' question: What port number is used for SNMP? - answers: - '110' - '161' - '443' - '404' correct: - '2' question: What port number is used for SSL? - answers: - 5GHz - 25GHz - 54Mbps - 2.4GHz correct: - '3' question: What frequency does 802.11g operate at? - answers: - '11' - '3' - '7' - none correct: - '1' question: How many non-overlapping channels does 802.11g provide? - answers: - 54Mbps - 54GHz - 11Mbps - 12mph correct: - '0' question: What is the maximum data transfer rate claimed by the 802.1a specification? - answers: - Yes, but only if an 802.11b device is on the same network. - No - Yes, always. - Yes, but only on non-overlapping channels. correct: - '0' question: Does 802.11g use DSSS? - answers: - 802.11g mode - Wi-fi protected mode with wide area network. - Infrastructure - Ad-hoc correct: - '2' question: What mode describes a Wi-fi connection where devices connect to each other via an access point, and are also capable of connecting to the internet or other networks? - answers: - Operational exchange mode. - Ad-hoc mode. - Infrastructure mode. - Basic Service Set mode. correct: - '1' question: If two laptops are exchanging data directly with each other using a 802.11g connection, there are said to be in what mode? - answers: - Change all the devices connecting to the access point to 802.11b. - Change the access point to mixed mode. - Re-boot all the laptops and PCs connecting to the access point. - Change the SSID on the access point and all devices. correct: - '1' question: If an 802.11b device is having difficulty connecting to an existing infrastructure mode WLAN network consisting only of 802.11g devices, which action would have the best potential to rectify the problem. - answers: - A device used to extend the range of a wi-fi network. - The mode used by an access point to provide an infrastructure connection. - A set of services used to allow devices to connect directly to each other using radio waves. - An security system used to prevent hackers connecting to a Wi-fi network. correct: - '2' question: What is an IBSS? - answers: - A group of access points create one WLAN covering a larger area than one access point could cover. - An access point extends the use of a WLAN so that a connection to the world wide web can be made. - An Extensible Security System that uses the MD5 algorithm. - A system that boosts the power output of a wireless access point so that a greater area can be covered correct: - '0' question: What best describes an ESS? - answers: - Overlapping coverage areas should be set to use non-overlapping channels, and have different identifier names. - All access points must be made by the same manufacturer - Overlapping coverage areas should be set to use non-overlapping channels, and have the same identifier name. - It does not matter what channels overlapping coverage areas use, but the identifier names must be the same. correct: - '2' question: If an Extended Service Set is in use on a WLAN, what is true if devices are to be able to roam from one AP to another? - answers: - 1.544Kbps - 1.544KHz - 1.544MHz - 1.544Mbps correct: - '3' question: What speed is a T1 connection? - answers: - The physical sublayer and the binary sublayer. - The MAC sublayer and the LLC sublayer. - The CSU sublayer and the DSU sublayer. - Analog and digital sublayers. correct: - '1' question: What two sub-divisions exist within OSI layer 2. - answers: - It uses copper cable and runs at 100Mbps. - It uses a token-ring architecture. - It uses copper cable and runs at 10Mbps. - It uses copper cable and devices must always connect directly to a hub or switch. correct: - '2' question: What is true about 10BASE-T? - answers: - It is capable of speeds of up to 1Gbps. - It can transfer data at up to 100Mbps and uses fibre-optic cable. - It uses token-ring architecture. - It uses copper cable can transfer data at up to 100Mbps. correct: - '3' question: What is true about 100BASE-TX? - answers: - It specifies a maximum cable length of 1000 metres. - It specifies the use of fibre-optic cable. - It is the luxury version of 1000BASE. - It is a way of converting existing UTP cable so that speeds of up to 1000Mbps can be achieved. correct: - '1' question: What is true of 1000BASE-LX? - answers: - Networks made of fibre-optic or copper cables that have a maximum theoretical data transfer rate of 1Gbps. - Networks made from copper cable that have a maximum theoretical data transfer rate of 1Gbps. - etworks that comply with the IEEE 802.3u standard. - Networks made from equipment that is approved by the Wi-Fi Alliance. correct: - '0' question: What best describes Gigabit Ethernet? - answers: - Carrier Sense Multiple Action with Collision Detonation. - Carrier Sense Multiple Action with Collision Detection. - Carrier Sense Multiple Access with Collisionless Delivery. - Carrier Sense Multiple Access with Collision Detection. correct: - '3' question: What does CSMA/CD stand for? - answers: - Identify and shut down devices which cause excessive collisions. - Identify cables that are damaged or too long and find alternative routes between devices connected to them. - Provide statistics that help an administrator identify problem network sectors. - Detect collisions on a cable, then arrange for one device to resend data whilst others remain silent. correct: - '3' question: What does CSMA/CD attempt to do? - answers: - Help students learn by constantly repeating facts while they sleep. - It receives a signal, amplifies it, then sends it out. - It receives a signal, cleans it up, then re-sends it at a higher (stronger) level. - It receives a signal on one port and sends it out of multiple exit ports without altering the signal. correct: - '2' question: What does a repeater do? - answers: - A Network Interface Card. - A Network Interpreter Card. - A Network Interface Container. - A Network Interpolation Chiller. correct: - '0' question: What is an NIC? - answers: - That an interaction occurs within a single layer of a networking model and that no other layers or devices take any part in the interaction - An interaction that progresses up or down only one level of a networking model. - That two computers use a protocol defined at the same layer of a networking model to communicate with each other. - That a packet is forwarded to a different host that resides in the same layer of the Cisco three layer hierarchical model. correct: - '2' question: What is meant by "same layer interaction". - answers: - Layer 1 interaction. - Adjacent layer interaction. - OSI interaction. - Client/server interaction. correct: - '1' question: What term is used to describe a communication between one layer of a networking model and the layer immediate above or below? - answers: - The modular components used to assemble modern Cisco routers. - Protocols used at specific layers of the TCP/IP model. - Key components of web pages. - Terms used to describe blocks of information as they progress up and down the OSI networking model. correct: - '3' question: What are "packets", "segments" and "frames"? - answers: - Application, Presentation, Session, Transport, Network Access, Data Link, Physical. - Application, Presentation, Session, Transport, Network, Data Link, Physical. - Application, Presentation, Internet, Transport, Network, Data Link, Physical. - Application, Presentation, Session, TCP/IP, Data Link, Network, Physical. correct: - '1' question: What are the seven layers of the OSI model? - answers: - Application, Transport, Internet, Network Access. - Association, Transport, Internet, Network Access. - Application, Transport, Internet, Physical. - Application, Transport, Interpretation, Network Access. correct: - '0' question: What are the four layers of the TCP/IP model? - answers: - Internet Layer. - Network Access Layer. - Transport Layer. - Network Layer. correct: - '2' question: Which layer of the TCP/IP model equates most directly to the Transport Layer of the OSI model? - answers: - Data Link Layer. - Transport Layer. - Network Access Layer. - Internet Layer. correct: - '3' question: Which layer of the TCP/IP model equates most directly to the Network Layer of the OSI model? - answers: - High Level Protocols Layer. - Application Layer. - Transport Layer. - Internet Layer. correct: - '1' question: Which layer of the TCP/IP model equates most directly to the Application, Presentation and Session layers of the OSI model? - answers: - IPX Layer - Transport Layer. - Network Access Layer. - The MAC and LLC layers. correct: - '2' question: Which layer(s) of the TCP/IP model equates most directly to the Data Link and Physical layers of the OSI model? - answers: - IPX Layer - Transport Layer. - Network Access Layer. - The MAC and LLC layers. correct: - '2' question: Which layer(s) of the TCP/IP model equates most directly to the Data Link and Physical layers of the OSI model? - answers: - The Application, Presentation, and Session Layers. - The Encryption, Presentation and Security Layers. - The High Level Protocol Layers. - There is no way to compare the layers of these models. correct: - '0' question: Which layer(s) of the OSI model equates most directly to the Application layer of the TCP/IP model? - answers: - The Data Link and Physical Layers. - The Internet Layer. - The Transport Layer. - The Network layer. correct: - '2' question: Which layer(s) of the OSI model equates most directly to the Transport layer of the TCP/IP model? - answers: - All the layers of the OSI model. - The Network Layer. - The Transport Layer. - The IPX layer. correct: - '1' question: Which layer(s) of the OSI model equate most directly to the Internet layer of the TCP/IP model? - answers: - The Network Layer - The Transport Layer. - The Session Layer. - The Data Link and Physical Layers. correct: - '3' question: Which layer(s) of the OSI model equate most directly to the Network Access layer of the TCP/IP model? - answers: - The Transport layer. - The Network layer. - The Data Link layer. - The Internet Layer. correct: - '1' question: Which layer of the OSI model is associated with IP? - answers: - The Network Layer. - The Transport Layer. - The Physical Layer. - The Data Link layer. correct: - '3' question: Which layer of the OSI model is associated with HDLC, Frame Relay and PPP? - answers: - The Network Layer. - The Session Layer. - The Transport Layer. - he Data Link layer. correct: - '2' question: Which layer of the OSI model is associated with TCP and UDP? - answers: - The Application layer. - The Physical layer. - The Network Access layer. - The Data Link layer. correct: - '1' question: Which layer of the OSI model is associated with RJ-45? - answers: - The Physical layer. - The Transport layer. - The Network layer. - The Data Link layer. correct: - '2' question: Which layer of the OSI model is associated with routers? - answers: - The Physical layer. - The Data Link layer. - The Network layer. - The Transport layer. correct: - '1' question: Which layer of the OSI model is associated with LAN switches? - answers: - The Physical layer. - The Data Link layer. - The Network layer. - The Transport layer. correct: - '0' question: Which layer of the OSI model is associated with LAN hubs? - answers: - Complex systems are broken into smaller parts and are therefore easier to understand. - People involved in developing the model get to go to conferences in far off locations. - Standard interfaces between the layers allow hardware manufacturers and software developers to create products that interact properly with products from other vendors. - The model ensures that all vendors do not implement new ideas which might impact on the efficient functioning of the internet. correct: - '0' - '2' question: ' What are the advantages of using a layered network model (choose 2)?' - answers: - The Security layer. - The Session layer. - The Application layer. - The Presentation layer. correct: - '2' question: Which layer of the OSI model is associated with authentication services? - answers: - The Security layer. - The Session layer. - The Application layer. - The Presentation layer. correct: - '3' question: Which layer of the OSI model is associated with encryption services? - answers: - The Transport Layer. - The Session layer. - The Network layer. - The Internet layer. correct: - '0' question: Which layer of the OSI model breaks large blocks or streams of data into smaller chunks that are suitable for transmission over the internet? - answers: - The Data Link layer. - The Internet layer. - The Network Layer. - The Transport layer. correct: - '2' question: Which layer of the OSI model is responsible for logical addressing and path determination? - answers: - The Physical layer. - The Data Link layer. - The Network layer. - The Transport layer. correct: - '1' question: Which layer of the OSI model defines how a forwarding decision is taken based on a unique hardware address? - answers: - The physical layer. - The Data Link layer. - The Network layer. - The Transport layer. correct: - '0' question: Which layer of the OSI model defines how electrical impulses are transmitted over copper wire? - answers: - Prevents viruses from moving any further through a network. - Examines packets and decides which ones should be allowed to pass from one network to another. - Maintains a table which maps the IP addresses of two network so that packets can be redirected between the networks. - Compares packets to virus signatures so that packets which are know to be dangerous can be identified and stopped. correct: - '1' question: 'What does a firewall? ' - answers: - An area where devices which do not require a very high level of security must be located. - An area where email servers are located. - An area where devices which need to be accessed from outside the network with minimal or no security can be located. - An area where all devices which do note require user authentication must be located. correct: - '2' question: What is a DMZ LAN (Demilitarized Zone)? - answers: - An IDS identifies suspect packets and reports their presence to another device but does not take direct actions against the packets. - An IPS is typically located so that packets have to transit through it before progressing to their destination. - An IDS can react swiftly by blocking suspect packets. - An IPS uses Internet Protocol Synergies to identify and block suspect packages. correct: - '0' - '1' question: IDS and IPS are both types of network security tool. Which statement two statements are true? - answers: - An IPS identifies suspect packets and takes direct action against them. - An IPS passes information about suspect packets to another device which can be programmed by an administrator to take specific actions. - An IDS is not usually located in the direct path of packets and and works by examining copies of packets. - IPS devices are considered to be slower at reacting to threats than IDS devices. correct: - '0' - '2' question: IDS and IPS are both types of network security tool. Which statement two statements are true? - answers: - VPNs can only be set up between hosts running Linux or Unix operating systems. - VPNs are no longer required as encryption algorithms are now so complex that they provide adequate security over a conventional network. - VPN is the most secure encryption method available because it uses self-signed certificates known only to the enterprise which is running the VPN. - VPNs authenticate endpoints and encrypt packets. correct: - '3' question: Which statement best describes VPNs? - answers: - An attempt to compromise a PC using DoS commands. - A attack whose main purpose is to break things or prevent them from working. - An attack that prevents users from changing the settings on a PC. - An attack that makes a server return a No Access message to a client. correct: - '1' question: 'What is a Denial of Service (DoS) attack? ' - answers: - All DoS attacks flood the network with packets. - A Flood Attack is a kind of DoS attack which attempts to overload a network or server with a huge amount of packets. - A decommissioned fire engine can be used to mount a Flood Attack. - Flood Attacks often target home users. correct: - '1' question: Which statement is true? - answers: - If an attempt is made to harm a host by erasing data it is known as a Destroyer Attack. - If an attack attempts to erase parts of the operating system of a host it is known as a Destroyer Attack. - Destroyer Attacks can be carried out by decommissioned naval vessels. - Any attack which attempts to cause a large corporation financial hardship can be called a Destroyer Attack. correct: - '2' - '3' question: 'Which two statements are false? ' - answers: - A Get Request Attack - A Reconnaissance Attack. - A DNS Attack - An Routing Targeted Attack. correct: - '1' question: An attack which attempts to learn an IP address would be know as? - answers: - A hacker takes control of a host and steals data. - Malware installs a firewall which prevents access to a host. - A virus on a PC sends data to the organisation that developed and released the virus. - Millions of requests are made to a server so that legitimate users cannot access it. correct: - '0' - '2' question: Which two scenarios would be described as an Access Attack? - answers: - Viruses are often spread through emails. - Viruses can always be easily detected. - iruses can be used to carry out many different kinds of attack. - Anti-virus software uses Signatures to detect viruses. correct: - '1' question: Which statement is not true? - answers: - Prevent rouge employees from stealing data. - Ensure that all network users have a valid username and password. - Detect viruses before they are installed and become active. - Ensure that packets not intended for a network are sent to the default gateway. correct: - '1' question: 'What does Network Access Control attempt to do? '