ANSWERS
Your company has been assigned the 172.16.0.0/16 network for use at one of its
sites. You need to use a subnet mask that will accommodate 42 subnets while
simultaneously accommodating the maximum number of hosts per subnet. What
subnet mask will you use?
A. /16
B. /20
C. /22
D. /24
C. /22
Which of the following is a cross-connect block that was popular for cross-
connecting Cat 3 UTP cables for 10 Mbps Ethernet LANs, but does not support
higher-speed LAN technologies, such s 100 Mbps Ethernet LANs?
A. 66 Block
B. Smart Jack
C. 110 block
D. NT1
A. 66 block
Which of these is a connectionless transport layer protocol?
A. IP
B. TCP
C. UDP
D. SIP
C. UDP
,What is the common well-known TCP port used by SSH?
A. 20
B. 21
C. 22
D. 23
C. 23
Which global hierarchical system is used to resolve names to IP addresses?
A. TFTP
B. DHCP
C. NTP
D. DNS
D. DNS
The Network Layer of the OSI model corresponds to what layer of the TCP/IP
Stack?
A. Application
B. Network Interface
C. Internet
D. Transport
C. Internet
You are designing a small office/home office (SOHO) network, and you wish to
have four subnets, while maximizing the number of hosts per subnet. The
network you need to subnet is 192.168.5.0/24. Which of the following is one of the
four subnets you should create?
A. 192.168.5.8/28
B. 192.168.5.16/27
C. 192.16.5.64/26
D. 192.168.5.32/25
,C. 192.168.5.64/26
Which two of the following protocols are used to connect to a remote host via a
terminal emulator?
A. SSH
B. Telnet
C. SCP
D. TFTP
A. SSH and B. Telnet
What TCP port is used by RDP?
A. 443
B. 514
C. 554
D. 3389
D. 3389
What type of IPv4 address is 239.1.2.3?
A. Unicast
B. Experimental
C. Private use only
D. Multicast
D. Multicast
Which of the following protocols is used for transferring files with a remote host
in a non-secure fashion and without requiring user credentials?
A. SFTP
B. SSH
C. TFTP
D. SCP
C. TFTP
, Which of these components is used to make virtualization possible in the server
environment by permitting multiple systems to use the underlying hardware of
the host system?
A. vNIC
B. vSwitch
C. SD-WAN
D. Hypervisor
D. Hypervisor
Which of the following approaches to WLAN security uses RC4 as its encryption
algorithm?
A. WPA
B. WEP
C. WPA2
D. WPA Enterprise
B. WEP
Which of the following approaches to WLAN security involves the use of an
authentication server?
A. MAC address filtering
B. Disabling SSID broadcast
C. Pre-shared key
D. IEEE 802.1 X
D. IEEE 802.1 X
If a WLAN does not need a user to provide credentials to associate with a
wireless access point and access the WLAN, what type of authentication is in
use?
A. WEP
B. SSID