CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 21

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

proxy servers can both provide Internet access to clients running any application.NAT servers and proxy servers both use public IP addresses.NAT servers and proxy servers both access Internet servers and relay the responses to network clients.Both NAT servers and proxy servers cache web data for later use.

      74 A multilayer switch can operate at which layers of the Open Systems Interconnection (OSI) model? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication

      75 Which of the following devices can an administrator use to monitor a network for abnormal or malicious traffic?IDSUPSRADIUSDoSRAS

      76 Which of the following is not a function that is typically provided by a unified threat management (UTM) appliance?Virtual private networkingNetwork firewallPacket forwardingAntivirus protection

      77 Which of the following features enables an Intrusion Detection System (IDS) to monitor all of the traffic on a switched network?Stateful packet inspectionPort mirroringTrunkingService-dependent filtering

      78 Which of the following network devices does not employ Access Control Lists (ACLs) to restrict access?RoutersHubsSwitchesWireless Access Points (WAPs)

      79 Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?WINS Server AddressesDefault GatewayDNS Server AddressesSubnet Gateway

      80 Which of the following routing protocols uses the packet format shown in the figure?RIPv1RIPv2OSPFEIGRPBGP

      81 Which of the following statements about the Enhanced Interior Gateway Routing Protocol (EIGRP) is not true?EIGRP does not support classless IPv4 addresses.EIGRP is a hybrid routing protocol.EIGRP can only transmit incremental routing table updates.EIGRP shares routes within an autonomous system.

      82 Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all that apply.)Bandwidth throttlingRate limitingBroadcast stormingNetwork Address Translation (NAT)

      83 Which of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?Port forwardingDynamic routingVLANsQoS

      84 Which of the following statements about Routing Information Protocol version 1 (RIPv1) is true? (Choose all that apply.)RIPv1 broadcasts the entire contents of the routing table every 30 seconds.RIPv1 advertises the subnet mask along with the destination network.RIPv1 broadcasts only the elements in the routing table that have changed every 60 seconds.RIPv1 does not include the subnet mask in its network advertisements.

      85 Which of the following mechanisms for prioritizing network traffic uses a 6-bit classification identifier in the Internet Protocol (IP) header?DiffservCoSTraffic shapingQoSAdministrative distance

      86 Which of the following statements about static routing are true? (Choose all that apply.)Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.Static routes adapt to changes in the network infrastructure automatically.Static routes are a recommended solution for large internetworks with redundant paths to each destination network.Static routes are a recommended solution for small internetworks with a single path to each destination network.

      87 Which of the following TCP/IP routing protocols does not include the subnet mask within its route update messages, preventing it from supporting subnetting?Routing Information Protocol, version 1 (RIPv1)Routing Information Protocol, version 2 (RIPv2)Border Gateway Protocol (BGP)Open Shortest Path First (OSPF)

      88 Which of the following terms refers to a routing protocol that does not rely on hop counts to measure the efficiency of routes?Interior gateway protocolEdge gateway protocolDistance vector protocolLink state protocol

      89 What is the maximum number of routes that can be included in a single RIP broadcast packet?202532Unlimited

      90 Which of the following routing protocols can you use on a TCP/IP internetwork with segments running at different speeds, making hop counts an inaccurate measure of route efficiency? (Choose all that apply.)Enhanced Interior Gateway Routing Protocol (EIGRP)Routing Information Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)

      91 Which of the following statements about the Open Shortest Path First (OSPF) routing protocol are true? (Choose all that apply.)OSPF is an interior gateway protocol.OSPF is a link state routing protocol.OSPF does not support Classless Inter-Domain Routing (CIDR).OSPF shares routes within an autonomous system.

      92 What is the term for the process by which dynamic routing protocols update other routers with routing table information?ConvergenceDistance vectoringRedistributionDissemination

      93 Which of the following TCP/IP routing protocols measures the efficiency of routes by the number of hops between the source and the destination?Routing Internet Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)Intermediate System to Intermediate System (IS-IS)

      94 Which of the following types of routing protocols route datagrams between autonomous systems?EGPRIPIGPOSPF

      95 Which of the following prevents packets on a TCP/IP internetwork from being transmitted endlessly from router to router?Open Shortest Path First (OSPF)Maximum Transmission Unit (MTU)Administrative distanceTime to Live (TTL)

      96 Which of the following command-line tools can you use to create and modify static routes on a Unix or Linux system? (Choose all that apply.)routeifconfigtracerouteip

      97 Routers that use the Open Shortest Path First (OSPF) routing protocol calculate the relative costs of routes through the network by exchanging which of the following specifications for each interface with other routers?Transmission speedData link layer protocolNetwork mediumIP address

      98 Which of the following statements about the Border Gateway Protocol (BGP) is not true?BGP is an exterior gateway protocol.BGP is a link state routing protocol.BGP supports Classless Inter-Domain Routing (CIDR).BGP shares routes among autonomous systems.

      99 In an IPv4 routing table, what is the network destination address for the host system's default route?0.0.0.0127.0.0.0127.255.255.255255.255.255.255

      100 Which of the following routing protocols uses the packet format shown in the figure?RIPv1RIPv2OSPFEIGRPBGP

      101 Which of the following routing protocols has both interior and exterior designations, based on whether it is used for routing within an autonomous system or on the Internet?RIPOSPFEIGRPBGP

      102 Which of the following network layer protocols includes a Time to Live (TTL) field? (Choose all that apply.)IPv4IPv6ICMPIGMP

      103 Which of the following is not a method of traffic shaping?Rate limitingWAN optimizationBandwidth throttlingSelf-limiting

      104 An enterprise network has been designed with individual departmental switches because, in most cases, the devices in a specific department exchange network traffic with other devices in the same department. Each of the departmental switches is also connected to a host switch, which enables devices to communicate with other departments. Which of the following terms describes this switching architecture?Distributed switchingPort forwardingTraffic shapingNeighbor discoveryFlow control

      105 Review the following figure. Note that each store-and-forward switch has three connected node ports and one port for switch-to-switch connections. All node ports and links are configured for half-duplex communication.

Скачать книгу