Network Pro Final Exam Questions and
Answers
Which of the following correctly describes the T1 carrier system? (select two.) - Answer-
T1 lines use 2 pairs of copper wire, A single T1 channel can transfer data at 64 Kbps
Which of the following cable classifications are typically used for cable and satellite
networking with coaxial cables? (Select two.) - Answer- RG-6 and RG-59
You want to connect your client computer to a wireless access point connected to your
wired network at work. The network administrator tells you that the access point is
configured to use WPA2 Personal with the strongest encryption method possible. SSID
broadcast is turned off. Which of the following must you configure manually on the
client? (Select three.) - Answer- Preshared key, AES, SSID
At which of the following OSI layers does a router operate? - Answer- Layer 3
Which of the following is the best device to deploy to protect your private network from a
public untrusted network? - Answer- Firewall
You want to implement a protocol on your network that allows computers to find the IP
address of a host from a logical name. Which protocol should you implement? - Answer-
DNS
You have a small network at home that is connected to the Internet. On your home
network you have a server with the IP address of 192.168.55.199/16. All computers on
your home network can connect to the Internet. From your work office, you try to access
your home computer using its IP address, but are unable to communicate with the
server. You can connect to other hosts on the Internet. Why can't you access the
server? - Answer- Private addresses are not accessible through the Internet.
What is the basic purpose of the OSI Physical layer? - Answer- Coordinates rules for
transmitting bits.
Which of the following do switches and wireless access points use to control access
through the device? - Answer- MAC filtering
You are troubleshooting a workstation connection to the network. During your
troubleshooting, you replace the drop cable connecting the computer to the network.
Which type of document should you update? - Answer- Change documentation
, The configuration document identifies specific configuration information for a device. It
might include information about the connection to the network. A network diagram might
include the location of the workstation on your site and its connection to the network. A
wiring schematic might include information about how the device connects to the
punchdown blocks or patch panels. For each of these documents, simply changing the
drop cable does not alter the information that would be in each document, so no change
would be required. - Answer- MAC flooding
You have a network that uses a logical bus topology. How do messages travel through
the network? - Answer- Messages are broadcast to all devices connected to the
network.
Which two of the following tasks do routers perform? - Answer- Maintain information
about paths through an internetwork and Route data based on logical network
addresses
Which three of the following are not valid IP addresses? - Answer- The min is 0 and the
max is 255.
In a variation of the brute force attack, an attacker may use a predefined list (dictionary)
of commonly used usernames and passwords to gain access to existing user accounts.
Which countermeasure best addresses this issue? - Answer- A strong password policy
You are adding new wires in your building for some new offices. The building has a
false ceiling that holds the lights. You would like to run your Ethernet cables in this area.
Which type of cable must you use? - Answer- Plenum
Ethernet 100BaseFX networks use what type of cabling? - Answer- Fiber optic
Which of the following terms are often synonymous with or made possible with CIDR?
(Select two.) - Answer- VLSM and Classless
Which of the following are true for the ISIS routing protocol? (Select two.) - Answer-
Supports IPv6 routing. Divides large networks into areas.
You have a small network that uses a hub to connect multiple devices. What physical
topology is used? - Answer- Star
Which of the following protocols allows hosts to exchange messages to indicate
problems with packet delivery? - Answer- ICMP
Which of the following physical topologies are used with Ethernet networks? (Select
two.) - Answer- Star and Bus
Which protocol is used for securely browsing a website? - Answer- HTTPS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.