NETWORKING FINAL EXAM QUESTIONS
AND ANSWERS
CARP - correct answer-To ensure that your private network is always protected, you
decide to install three redundant firewalls. Which of the following would allow you to
assign the same IP address to all three?
1000Base-LX - correct answer-What type of network could use the type of connector
shown here?
Its tcp/ip stack is not installed properly - correct answer-While troubleshooting a
workstation connectivity problem, you enter the following command: ping 127.0.0.1. The
response indicates the test failed. What can you determine about that workstation?
protocol analyzer - correct answer-You have been asked to help improve network
performance on a store's small office network. The network relies on two switches, two
access points, and a router to connect its 18 employees to the Internet and other store
locations. You decide to determine what type of traffic the network currently handles. In
particular, you're interested in the volume of unnecessary broadcast traffic that might be
bogging down shared segments. Which of the following tools will help you identify the
percentage of traffic made up of broadcasts?
EAPoL - correct answer-Which of the following standards describes a security
technique, often used on wireless networks, in which a port is prevented from receiving
traffic until the transmitter's
credentials are verified by an authentication server?
53 - correct answer-Which of the following ports would be used during a domain name
lookup?
NIC teaming - correct answer-You are configuring a connection between two backbone
switches, and you want to make sure the connection doesn't fail or become
overwhelmed by heavy traffic. Which of the following techniques would help you
achieve both aims?
fingerprint scanner - correct answer-As a network admin, you have decided to install
additional physical security to the main office's data room. Due to the sensitivity of the
data held in this room, you decide it's critical to ensure two-factor authentication before
granting anyone access to the room. You already have a lock on the door. Which of the
following physical security measures would provide 2FA?
, bridged - correct answer-You have installed and configured two virtual web servers and
a virtual mail server on a physical server. What networking mode will you assign to each
server's vNIC to ensure that the virtual machines' clients on the Internet can access the
virtual machines?
onboarding - correct answer-At the beginning of the school year, students at your
school must configure their computers and other devices to obtain trusted access to the
student portion of the school's network. What is this process called?
It replaces each outgoing packet's source address field with a public IP address -
correct answer-When using NAT, how does an IP gateway ensure that outgoing traffic
can traverse public networks?
RADIUS - correct answer-Which of these authentication techniques only encrypts the
password when transmitting
sign-in credentials?
Establish a theory of probable cause - correct answer-You are a networking technician
in a radiology clinic, where physicians use the network to transmit and store patients'
diagnostic results. Shortly after a new wing, which contains X-ray and MRI (magnetic
resonance imaging) machines, is added to the building, computers in that area begin
having intermittent problems saving data to the file server. After you have gathered
information, identified the symptoms, questioned users, and determined what has
changed, what is your next step in troubleshooting this problem?
stateless firewall / packet-filtering firewall - correct answer-The software on a firewall
you recently installed on your network examines each incoming packet. It blocks or
allows traffic based on a set of criteria, including source IP address, source and
destination ports, and protocols. What type of system is this? Choose all that apply.
255.255.255.224 - correct answer-Suppose you have created six subnets on a network
that leases a group of Class C IPv4 addresses. What subnet mask must you specify in
your clients' configurations to adhere to your subnetting scheme?
Remove the workstation's route to the default gateway whose IP address is 192.168.5.1
- correct answer-What would the command route del default gw 192.168.5.1 eth1
accomplish on your Linux workstation?
TCP port 23 - correct answer-From your laptop, you need to remote into a switch to
make some configuration changes. Which Transport layer protocol and TCP/IP port
should you open in Windows Firewall to make this work using Telnet?
NIPS - correct answer-Recently, your company's WAN experienced a disabling DDoS
attack. Which of the following devices could detect such an attack and prevent it from
affecting your network in the future?
AND ANSWERS
CARP - correct answer-To ensure that your private network is always protected, you
decide to install three redundant firewalls. Which of the following would allow you to
assign the same IP address to all three?
1000Base-LX - correct answer-What type of network could use the type of connector
shown here?
Its tcp/ip stack is not installed properly - correct answer-While troubleshooting a
workstation connectivity problem, you enter the following command: ping 127.0.0.1. The
response indicates the test failed. What can you determine about that workstation?
protocol analyzer - correct answer-You have been asked to help improve network
performance on a store's small office network. The network relies on two switches, two
access points, and a router to connect its 18 employees to the Internet and other store
locations. You decide to determine what type of traffic the network currently handles. In
particular, you're interested in the volume of unnecessary broadcast traffic that might be
bogging down shared segments. Which of the following tools will help you identify the
percentage of traffic made up of broadcasts?
EAPoL - correct answer-Which of the following standards describes a security
technique, often used on wireless networks, in which a port is prevented from receiving
traffic until the transmitter's
credentials are verified by an authentication server?
53 - correct answer-Which of the following ports would be used during a domain name
lookup?
NIC teaming - correct answer-You are configuring a connection between two backbone
switches, and you want to make sure the connection doesn't fail or become
overwhelmed by heavy traffic. Which of the following techniques would help you
achieve both aims?
fingerprint scanner - correct answer-As a network admin, you have decided to install
additional physical security to the main office's data room. Due to the sensitivity of the
data held in this room, you decide it's critical to ensure two-factor authentication before
granting anyone access to the room. You already have a lock on the door. Which of the
following physical security measures would provide 2FA?
, bridged - correct answer-You have installed and configured two virtual web servers and
a virtual mail server on a physical server. What networking mode will you assign to each
server's vNIC to ensure that the virtual machines' clients on the Internet can access the
virtual machines?
onboarding - correct answer-At the beginning of the school year, students at your
school must configure their computers and other devices to obtain trusted access to the
student portion of the school's network. What is this process called?
It replaces each outgoing packet's source address field with a public IP address -
correct answer-When using NAT, how does an IP gateway ensure that outgoing traffic
can traverse public networks?
RADIUS - correct answer-Which of these authentication techniques only encrypts the
password when transmitting
sign-in credentials?
Establish a theory of probable cause - correct answer-You are a networking technician
in a radiology clinic, where physicians use the network to transmit and store patients'
diagnostic results. Shortly after a new wing, which contains X-ray and MRI (magnetic
resonance imaging) machines, is added to the building, computers in that area begin
having intermittent problems saving data to the file server. After you have gathered
information, identified the symptoms, questioned users, and determined what has
changed, what is your next step in troubleshooting this problem?
stateless firewall / packet-filtering firewall - correct answer-The software on a firewall
you recently installed on your network examines each incoming packet. It blocks or
allows traffic based on a set of criteria, including source IP address, source and
destination ports, and protocols. What type of system is this? Choose all that apply.
255.255.255.224 - correct answer-Suppose you have created six subnets on a network
that leases a group of Class C IPv4 addresses. What subnet mask must you specify in
your clients' configurations to adhere to your subnetting scheme?
Remove the workstation's route to the default gateway whose IP address is 192.168.5.1
- correct answer-What would the command route del default gw 192.168.5.1 eth1
accomplish on your Linux workstation?
TCP port 23 - correct answer-From your laptop, you need to remote into a switch to
make some configuration changes. Which Transport layer protocol and TCP/IP port
should you open in Windows Firewall to make this work using Telnet?
NIPS - correct answer-Recently, your company's WAN experienced a disabling DDoS
attack. Which of the following devices could detect such an attack and prevent it from
affecting your network in the future?