1.
A host with a public address can initiate a connection to a host with a private NAT address.
Correct Answer
B. False
Explanation
A host with a public address cannot initiate a connection to a host with a private NAT address. This is because private NAT addresses are not routable on the public internet. NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses and vice versa. It allows multiple devices on a private network to share a single public IP address. However, the translation is one-way, meaning that a host with a private NAT address can initiate a connection to a host with a public address, but not the other way around.
2.
Does a box working as a NAT router need to keep record of the state of each connection that passes through it?
Correct Answer
C. Yes and it creates state tables
Explanation
Yes, a box working as a NAT router needs to keep a record of the state of each connection that passes through it. This is because NAT routers perform network address translation, which involves mapping the private IP addresses of devices on a local network to a public IP address. In order to correctly translate the source and destination IP addresses in network packets, the NAT router needs to maintain state information about each connection. This information is stored in state tables, which keep track of the source and destination IP addresses, ports, and other relevant data for each connection.
3.
A layer 3 firewall is a router.
Correct Answer
A. True
Explanation
A layer 3 firewall is a router because a router operates at the network layer (layer 3) of the OSI model and is capable of filtering and controlling network traffic based on IP addresses, ports, and protocols. A layer 3 firewall uses these capabilities to enforce security policies by allowing or blocking specific types of traffic between different networks. Therefore, it is correct to say that a layer 3 firewall is a router.
4.
Can firewall rules be applied only to one of a firewalls interfaces or must they be applied to all of them?
Correct Answer
B. Yes it can be applied to only one
Explanation
Firewall rules can be applied to only one of the firewall's interfaces. This means that it is not necessary to apply the rules to all interfaces. By selectively applying rules to specific interfaces, organizations can have more control over the traffic that enters or leaves a particular interface. This allows for more granular security configurations and helps in protecting specific network segments or devices.
5.
Different interfaces on a firewall can't have different firewall rules.
Correct Answer
B. False
Explanation
This statement is false because different interfaces on a firewall can indeed have different firewall rules. Firewall rules are typically applied based on the source and destination IP addresses, ports, and protocols. Each interface on a firewall can be configured with its own set of rules to control the traffic that is allowed or denied. This allows for more granular control and customization based on the specific requirements and security policies of each network segment or interface.
6.
What are some examples of information in a datagram that might be used to decide weather to pass or drop a packet?
Correct Answer
E. All of the above
Explanation
The information mentioned in the options - source IP address, destination IP address, IP protocol, source TCP or UDP port, and destination TCP or UDP port - can all be used to make a decision on whether to pass or drop a packet. The source and destination IP addresses help identify the source and destination of the packet, while the IP protocol helps determine the type of protocol being used (ICMP, TCP, or UDP). The source and destination TCP or UDP ports provide additional information about the specific application or service the packet is intended for. Considering all of this information together allows for a more informed decision on whether to allow the packet to pass or drop it.
7.
The order is not important in firewall rules applied to an interface.
Correct Answer
B. False
Explanation
The statement is false because the order of firewall rules applied to an interface is important. Firewall rules are typically evaluated in a sequential manner, and the order in which they are applied can determine the outcome. If a rule that allows certain traffic is placed before a rule that blocks the same traffic, the traffic will be allowed. However, if the order is reversed, the blocking rule will take precedence and the traffic will be blocked. Thus, the order of firewall rules can significantly impact the effectiveness of the firewall configuration.
8.
What is the well known port for SMTP (email)?
Correct Answer
C. Mail= port 25/tcp
Explanation
The well-known port for SMTP (email) is port 25/tcp. SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages between servers. Port 25 is the standard port used for SMTP communication, and it is widely recognized and supported by email servers and clients.
9.
Ports < X are used for administrative/root services? X=?
Correct Answer
1024
Explanation
Ports below 1024 are commonly known as well-known ports or privileged ports. These ports are reserved for specific services that require administrative or root access to operate. These services include commonly used protocols such as HTTP (port 80), HTTPS (port 443), FTP (port 21), SSH (port 22), and many others. By reserving these ports for administrative/root services, it helps ensure that only authorized processes can access and utilize them, enhancing security and preventing unauthorized access to critical system functions.
10.
What are the basic types of routing protocols?
Correct Answer
E. A and C
Explanation
The basic types of routing protocols are IGP (Internal routing) and EGP (Exterior routing). IGP is used within an organization (Autonomous System) to route traffic within the network. EGP, on the other hand, is used between organizations to route traffic between different networks. Therefore, the correct answer is A and C, as both IGP and EGP are mentioned as the basic types of routing protocols.
11.
What are the types of Internal routing protocols?
Correct Answer
D. A and C
Explanation
The correct answer is A and C. The types of internal routing protocols are Distance Vector and Link State. Distance Vector protocols include RIP, RIP v2, and EIGRP. Link State protocols include OSPF and ISIS.
12.
What are examples of Internal routing protocols?
Correct Answer
E. Only B and C
Explanation
RIP Version 3 and RIP Version 2 are examples of internal routing protocols because they both understand modern classless networks, as stated in their respective RFCs (RFC1723). On the other hand, RIP (RFC1058) only understands old class a/b/c style networks, so it is not an example of an internal routing protocol. Therefore, the correct answer is "Only B and C," as they are the only options that meet the criteria of being internal routing protocols that understand modern classless networks.
13.
What IP protocol does RIP use to exchange information?
Correct Answer
D. UDP
Explanation
RIP (Routing Information Protocol) uses UDP (User Datagram Protocol) to exchange information. UDP is a connectionless protocol that allows for the transmission of data packets without establishing a formal connection between the sender and receiver. RIP utilizes UDP to send routing information updates and exchange routing tables between routers in a network. Unlike TCP, UDP does not provide error checking or reliable delivery of packets, making it suitable for RIP's purpose of exchanging routing information in a less complex and faster manner. ICMP is not the correct answer as it is a different protocol used for network troubleshooting. ARP is also not the correct answer as it is used for mapping IP addresses to MAC addresses.
14.
What IP protocol does OSPF use to exchange information?
Correct Answer
A. ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4)
IT USES IP PROTOCOL 89
Explanation
OSPF (Open Shortest Path First) uses its own IP protocol to exchange information. This means that it does not use UDP or TCP at layer 4, but instead has its own protocol. In the case of OSPF, it uses IP protocol 89 for communication.
15.
What IP protocol does BGP use to exchange information?
Correct Answer
B. TCP
Explanation
BGP (Border Gateway Protocol) uses TCP (Transmission Control Protocol) to exchange information. TCP is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error-checking mechanisms. BGP requires a reliable and secure communication channel for exchanging routing information between routers, making TCP the appropriate choice. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery, ICMP (Internet Control Message Protocol) is used for network troubleshooting, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses on a local network.
16.
Is BGP4 an example of a exterior routing protocol?
Correct Answer
B. Yes
Explanation
BGP4 is an example of an exterior routing protocol because it is designed to exchange routing information between different autonomous systems (AS) on the internet. It is used to determine the best path for data packets to travel across different networks, making it an essential protocol for interconnecting multiple networks.
17.
Does a host running RIP periodically send its entire routing table to its neighbor?
Correct Answer
A. Yes
Explanation
Yes, a host running RIP periodically sends its entire routing table to its neighbor. This is known as a routing update and it allows the neighbor to have an up-to-date view of the network topology. By sharing the entire routing table, the neighbor can make informed routing decisions and update its own routing table accordingly. This periodic exchange of routing information helps in maintaining a consistent and accurate routing infrastructure throughout the network.
18.
Does a host running OSPF periodically send its entire routing table to its neighbors?
Correct Answer
B. No
Explanation
A host running OSPF does not periodically send its entire routing table to its neighbors. OSPF routers exchange information about their directly connected networks, known as link-state advertisements (LSAs), rather than sharing their entire routing tables. This allows routers to have a more efficient and scalable way of exchanging routing information. By sharing LSAs, routers can build a complete and accurate representation of the network topology and calculate the best paths to reach different destinations.
19.
Can you use RIPv1 on modern classless networks?
Correct Answer
B. NO, IT ONLY UNDERSTANDS OLD CLASS a/b/c STYLE NETWORKS
Explanation
RIPv1 is an older routing protocol that only understands the old class a/b/c style networks. It does not support classless networks, which are more commonly used in modern networks. Therefore, RIPv1 cannot be used on modern classless networks.
20.
Can you use RIPv2 on modern classless networks?
Correct Answer
B. YES
Explanation
Yes, RIPv2 can be used on modern classless networks. RIPv2 is an enhanced version of the Routing Information Protocol (RIP) that supports classless routing, which means it can advertise and route to networks with variable length subnet masks (VLSM). This allows for more efficient and flexible network addressing. Therefore, RIPv2 is compatible with modern classless networks and can be used to exchange routing information between routers.
21.
What is the protocol used to exchange routing information between organizations (autonomous systems) on the Internet today?
Correct Answer
BGP
bgp
Explanation
BGP (Border Gateway Protocol) is the protocol used to exchange routing information between organizations or autonomous systems on the Internet. It is responsible for maintaining a table of IP networks and determining the best path for data packets to be forwarded. BGP allows different networks to communicate and exchange routing information, ensuring efficient and reliable data transmission across the Internet.
22.
What are two WAN technologies that use PPP for framing?
Correct Answer
B. Serial links - including dial-ups
POS - Packet over sonet (fiber optic)
Explanation
The two WAN technologies that use PPP for framing are serial links, including dial-ups, and POS (Packet over SONET) which uses fiber optic connections.
23.
What is the standard most cable modems use now?
Correct Answer
DOCSIS
docsis
Explanation
DOCSIS stands for Data Over Cable Service Interface Specification. It is a standard that most cable modems use to provide high-speed internet access over cable television networks. This standard allows for the transmission of data, voice, and video signals over the same coaxial cable line. It ensures compatibility and interoperability between different cable modems and cable network providers, allowing users to connect to the internet reliably and efficiently.
24.
Frame relay and ATM build virtual circuits on top of what underlying physical topology?
Correct Answer
STAR OR MULTIPLE STAR TOPOLOGY
star or multiple star topology
star or multiple star
Explanation
Frame relay and ATM build virtual circuits on top of a star or multiple star topology. This means that the physical connections between the devices form a star-shaped network, where all devices are connected to a central hub. This topology allows for efficient communication between devices by providing a centralized point for data transmission.
25.
The highest speed data connections over sonet are done with what framing?
Correct Answer
pos because it uses fiber optic connection
POS because it uses fiber optic connection
Explanation
The correct answer is POS because it uses a fiber optic connection. POS stands for Packet over SONET, which is a protocol that allows for the transmission of packetized data over a SONET network. Since it utilizes fiber optic connections, which have a higher bandwidth and faster speeds compared to other types of connections, it is capable of achieving the highest speed data connections over SONET.
26.
ADSL speeds are limited by distance
Correct Answer
A. True
Explanation
ADSL speeds are limited by distance because the farther away a user is from the telephone exchange, the weaker the signal becomes. This results in slower speeds as the signal has to travel a longer distance. The attenuation of the signal over distance is a limitation of ADSL technology, and it affects the overall performance and speed of the internet connection. Therefore, it is true that ADSL speeds are limited by distance.
27.
ATM cells are how many octets long?
Correct Answer
53 octets
53 OCTETS
53
Explanation
ATM cells are 53 octets long. Octets are units of digital information that consist of 8 bits. In the context of ATM (Asynchronous Transfer Mode) cells, each cell is composed of a fixed size of 53 octets, which is equivalent to 424 bits. These cells are used for transferring data in telecommunications networks and have a specific format that includes a 5-byte header and a 48-byte payload. The fixed size of 53 octets allows for efficient and predictable transmission of data in ATM networks.
28.
ADSL and cable modems are used primarily for what type of customer?
Correct Answer
B. Personal use and small businesses
Explanation
ADSL and cable modems are primarily used for personal use and small businesses. These types of customers require internet connectivity for their daily activities such as browsing, email, and streaming, but do not require the high bandwidth and dedicated lines that large businesses typically need. ADSL (Asymmetric Digital Subscriber Line) and cable modems provide a cost-effective solution for these customers, as they leverage existing telephone lines or cable TV infrastructure to deliver internet access at relatively high speeds. Therefore, personal use and small businesses are the main target customers for ADSL and cable modem services.
29.
OC3 is what data rate?
Correct Answer
(~155 Mbits)
~155Mbits
(~155Mbits)
Explanation
The correct answer is (~155 Mbits). OC3 refers to Optical Carrier 3, which is a type of network transmission speed commonly used in telecommunications. It has a data rate of approximately 155 Mbits, which means it can transmit data at a speed of around 155 megabits per second.
30.
OC12 is what data rate?
Correct Answer
(~622 Mbits)
~622 Mbits
(~622Mbits)
Explanation
The correct answer is "~622 Mbits", "~622Mbits", or "~622 Mbits". These options indicate that OC12 operates at a data rate of approximately 622 Mbits per second. The "~" symbol is used to represent "approximately" or "around," indicating that the exact data rate may vary slightly but is close to 622 Mbits.
31.
What is the data rate for OC48?
Correct Answer
(~2.4 Gbits)
~2.4 Gbits
(~2.4Gbits)
Explanation
The data rate for OC48 is approximately 2.4 Gbits.
32.
What is the data rate for OC 192
Correct Answer
(~9.6 Gbits)
~9.6 Gbits
(~9.6Gbits)
Explanation
The correct answer is (~9.6 Gbits), ~9.6 Gbits, (~9.6Gbits). These options all represent the data rate for OC 192, which is approximately 9.6 Gbits.
33.
Wireless uses CSMA/CA what does this stand for?
Correct Answer
Carrier Sense Multiple Access with Collision Avoidance
Explanation
CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance. In wireless networks, multiple devices share the same channel to transmit data. CSMA/CA is a protocol used to avoid collisions that may occur when multiple devices try to transmit data simultaneously. It works by having devices listen to the channel before transmitting, and if the channel is busy, they wait for a random amount of time before attempting to transmit again. This helps to minimize collisions and improve the overall efficiency of wireless communication.
34.
When wireless stations talk to an access point they are operating in what mode?
Correct Answer
infrastructure
Explanation
When wireless stations communicate with an access point, they operate in infrastructure mode. This mode refers to a network setup where the access point acts as a central hub, connecting multiple wireless devices to a wired network. In infrastructure mode, the access point manages the communication between the wireless stations and facilitates their connection to the internet or other network resources. This mode is commonly used in homes, offices, and public spaces to provide wireless connectivity to multiple devices simultaneously.
35.
When wireless stations talk directly to each other they are operating in what mode?
Correct Answer
ADHOC
adhoc
Explanation
When wireless stations communicate directly with each other, without the need for a centralized access point or infrastructure, they are operating in ad hoc mode. In this mode, devices can form a temporary network and communicate with each other on a peer-to-peer basis. This mode is commonly used in situations where a traditional infrastructure network is not available or practical, such as in emergency situations or in temporary setups.
36.
How many bits is a wireless Ethernet address?
Correct Answer
48 bits
48bits
Explanation
A wireless Ethernet address is typically 48 bits long. This address, also known as a MAC address, is a unique identifier assigned to each network interface card (NIC) in a wireless device. The 48-bit address is divided into two parts: the first 24 bits represent the organizationally unique identifier (OUI), which identifies the manufacturer or vendor of the NIC, and the remaining 24 bits represent the unique serial number assigned by the manufacturer.
37.
What are the two types of radio wireless transmission?
Correct Answer
DSSS and FHSS
FHSS and DSSS
Explanation
DSSS (Direct Sequence Spread Spectrum) and FHSS (Frequency Hopping Spread Spectrum) are both types of radio wireless transmission. DSSS divides the data into small pieces and spreads it across a wide frequency band, while FHSS rapidly switches frequencies during transmission. Both techniques are used to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.
38.
802.11g provides what data rate at what frequency band?
Correct Answer
2.4Ghz 54Mbps
2.4 Ghz 54 Mbps
Explanation
The correct answer is 2.4Ghz 54Mbps. 802.11g is a wireless networking standard that operates in the 2.4GHz frequency band and provides a maximum data rate of 54Mbps. The repetition of the frequency band and data rate in the answer options confirms this information.
39.
802.11a provides what data rate at what frequency band?
Correct Answer
5.0Ghz 54Mbps
5.0 Ghz 54 Mbps
Explanation
802.11a is a Wi-Fi standard that operates in the 5.0 GHz frequency band and provides a data rate of 54 Mbps.
40.
802.11b provides what data rate at what frequency band?
Correct Answer
2.4Ghz 11 MBPS
2.4 Ghz 11 MBPS
Explanation
The correct answer is 2.4Ghz 11 MBPS. 802.11b is a wireless networking standard that operates in the 2.4GHz frequency band and provides a data rate of 11 Mbps. This frequency band is commonly used for Wi-Fi networks and allows for decent range and penetration through walls and obstacles. The data rate of 11 Mbps is sufficient for basic internet browsing, email, and streaming of standard-definition videos.
41.
What is the IPSEC mode used to provide a true VPN tunnel?
Correct Answer
ESP tunnel
esp tunnel
Explanation
The correct answer is ESP tunnel or esp tunnel. ESP (Encapsulating Security Payload) is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authenticity of data in a VPN tunnel. It encrypts the entire IP packet, including the original IP header, and encapsulates it within a new IP packet. This ensures that the data transmitted over the VPN tunnel is secure and protected from unauthorized access or tampering.
42.
Weak space key space for the session encryption is the weakness of PPTPv2 session encryption.
Correct Answer
A. True
Explanation
The statement is true because the weak space key space for the session encryption is indeed a weakness of PPTPv2 session encryption. This means that the available keys used for encrypting the session are limited and can be easily guessed or cracked by attackers, making the encryption vulnerable to unauthorized access and data breaches.
43.
What would the protocol type in the GRE header be for a IPv4 packet encapsulated in a GRE packet?
Correct Answer
0800
Explanation
The protocol type in the GRE header for an IPv4 packet encapsulated in a GRE packet would be 0800. The value 0800 represents the protocol type for IPv4 in hexadecimal format. This indicates that the payload of the GRE packet is an IPv4 packet.
44.
What is the IP protocol of a GRE packet?
Correct Answer
47
Explanation
The IP protocol of a GRE (Generic Routing Encapsulation) packet is 47. GRE is a tunneling protocol that encapsulates packets from one network protocol within packets of another network protocol, allowing them to be transmitted over an intermediate network. The IP protocol number 47 is assigned specifically for GRE packets, indicating that it is the protocol used for encapsulation and transmission of GRE packets over IP networks.
45.
What are the two major packet encapsulation VPN standards in use today?
Correct Answer
GRE and IPsec
IPsec and GRE
ipsec gre
gre ipsec
Explanation
The two major packet encapsulation VPN standards in use today are GRE and IPsec. GRE (Generic Routing Encapsulation) is a tunneling protocol that encapsulates packets inside IP packets, allowing them to be transmitted over an IP network. IPsec (Internet Protocol Security) is a suite of protocols that provides secure communication over IP networks by encrypting and authenticating IP packets. Both GRE and IPsec are widely used in VPN implementations to ensure secure and private communication between networks.
46.
What are the 2 broad categories for software based VPN's
Correct Answer
D. B and C
Explanation
The correct answer is B and C. VPNs can be built by encapsulating each packet or by using TCP streams of bytes. Encapsulating each packet involves adding an additional header to the original packet, while using TCP streams of bytes involves encapsulating the entire packet within a TCP stream. Both methods allow for secure and private communication over a network.
47.
If you see an Ethernet multicast frame with a destination Ethernet address of 01-00-5e-10-10-10 what do you know about the IP address of the IP multicast packet within?
Correct Answer
A. The first three is a standard number
224-239.16.16.16
Explanation
The given correct answer suggests that the first three octets of the IP address of the IP multicast packet within the Ethernet multicast frame fall within the standard range of 224-239. The last octet is specified as 16.16.16. Therefore, the IP address of the IP multicast packet is 224.16.16.16.
48.
What would be the Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2?
Correct Answer
01-00-5E-02-02-02
Explanation
The Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2 would be 01-00-5E-02-02-02. In Ethernet, multicast packets are identified by the least significant bit of the first octet set to 1. The least significant bit of 01 in hexadecimal is 1, indicating a multicast address. The remaining octets are derived from the last 23 bits of the IP multicast address, which in this case is 02-02-02.
49.
Which routing protocol is used predominantly today?
Correct Answer
PIM-sm
PIM-SM
Explanation
PIM-SM (Protocol Independent Multicast-Sparse Mode) is the correct answer. It is a widely used routing protocol for multicast communication in modern networks. PIM-SM enables efficient and scalable multicast routing by dynamically creating distribution trees. It is designed to work in a sparse mode network where only a subset of routers are interested in receiving multicast traffic. PIM-SM allows for adaptive and flexible multicast routing, making it the predominant choice for multicast communication in today's networks.
50.
What are the two major multicast routing protocols?
Correct Answer
DVMRP and PIM-SM
PIM-SM and DVRMP
Explanation
The two major multicast routing protocols are DVMRP and PIM-SM. DVMRP (Distance Vector Multicast Routing Protocol) is a protocol that uses a distance-vector algorithm to determine the best path for multicast traffic. PIM-SM (Protocol Independent Multicast-Sparse Mode) is a protocol that allows for efficient distribution of multicast traffic in a sparse network topology. DVRMP is not a recognized multicast routing protocol, so it is not one of the major protocols.