TEST BANK For CompTIA Network+ Guide to Networks 10th Edition by Jill West All Chapters 1-12

Page 1


Name:

Class:

Date:

Test Bank For CompTIA Network+ Guide to Networks 10th Edition 2025 by Jill West Chapter 1-12 Chapter 01 Introduction to Networking 1. Hennessy is studying for the Network+ certification exam. The question asked is, "What is the definition of a

network?" How does Hennessy answer? a. A network is a group of devices. b. A network is a group of computers and other devices (such as printers) that are connected by some

type of transmission media. c. A network is comprised of the wiring that flows throughout an office space or building. d. A network is computer hardware working together. ANSWER: RATIONALE:

b

Loosely defined, a network is a group of computers and other devices (such as printers) that are connected by some type of transmission media. In order for a group of computers to be considered a network, the device's hardware and software must work with a transmission media to allow data to be sent and received between each device. A network can be as small as a computer hooked up to the Internet or as big as the Internet itself.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.1 - Compare peer-to-peer and client-server network models. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. TOPICS: Exploring Network Operating Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 2. David is new at his networking job, and his supervisor quizzes him on the differences between physical and

logical network topology. What is the correct answer? a. Physical computer topology refers to how data is transmitted between devices in a network. Logical

topology deals with the actual layout of devices and cables. b. Peer-to-peer network topology refers to how data is transmitted between devices in a network. Star topology deals with the actual layout of devices and cables. c. Logical network topology refers to how data is transmitted between devices in a network. Physical topology deals with the actual layout of devices and cables. d. Bus network topology refers to how data is transmitted between devices in a network. Ring topology deals with the actual layout of devices and cables. ANSWER: RATIONALE:

c

Logical computer network topology refers to the way data is transmitted between devices in a network. This is determined by the network's protocols and Page 1


Name:

Class:

Date:

addressing schemes. Unlike physical topology, which deals with the actual layout of devices and cables, logical topology focuses on the flow of data and the communication between devices. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.1 - Compare peer-to-peer and client-server network models. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. TOPICS: Exploring Network Operating Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 3. Connie is configuring the network for a new restaurant that her company is about to open. She has five

desktop computers, four LaserJet printers, and three laptops. She plans on using a peer-to-peer environment. What makes peer-to-peer suitable for Connie's restaurant? Choose all that apply. a. Peer-to-peer is scalable, which means, as the network grows, it is easy to add and change elements. b. The computers on a peer-to-peer network can share folders and files without the need for an

expensive server. c. A peer-to-peer network is simple to configure and requires little technical expertise. d. A peer-to-peer network is practical for connecting more than a few computers, since it is not timeconsuming to manage network resources. ANSWER: RATIONALE:

b, c

Peer-to-peer networks are a cost-effective alternative to other network types. While a network operating system like Windows Server can be expensive, a peerto-peer network allows computers to share folders and files without requiring a costly server. The setup and configuration of a peer-to-peer network is relatively easy and does not require extensive technical skills.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.1 - Compare peer-to-peer and client-server network models. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. TOPICS: Exploring Network Operating Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 4. Irene enjoys working with a client-server architecture. Although it is typically more complex in design and

maintenance than its peer-to-peer counterpart, a client-server architecture offers many advantages. What are some of the benefits of working in a client-server environment? Choose all that apply. a. User accounts and passwords to the network are assigned in one place. b. A central server makes upgrading the network cheaper. Page 2


Name:

Class:

Date:

c. Problems on the network can be monitored, diagnosed, and often fixed from one location. d. Access to multiple shared resources (such as data files or printers) can be centrally granted to

individual users or groups of users. ANSWER: RATIONALE:

a, c, d

Client-server architecture provides several advantages to network management. First, user accounts and passwords can be assigned in a centralized location. Second, access to shared resources such as data files or printers, can be centrally granted to individual users or groups of users. Third, network issues can be monitored, diagnosed, and often resolved from one location. This eliminates the need for administrators to go from workstation to workstation.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.1 - Compare peer-to-peer and client-server network models. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. TOPICS: Exploring Network Operating Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 5. Emmi is her company's IT manager. Since her company is growing, she wants to switch from a peer-to-peer

(P2P) networking architecture to a client-server architecture. The company has grown to 30 users, so why is it better for her to use a client-server architecture over peer-to-peer? Choose all that apply. a. Client-server users can sign on to the network from any computer and get access to the resources that

Active Directory allows. This process is managed by AD DS (Active Directory Domain Services). Sharing files on a peer-to-peer network means creating 30 user accounts to share documents and then set up each workstation with the same user accounts. b. In a client-server network, an administrator can ensure only authorized users can access the network. c. In a client-server network, an administrator can control what files a user can open, read, or edit. d. In a client-server network, servers only need as much memory as the clients since their workload is the same. ANSWER: RATIONALE:

a, b, c

In a client-server network, users can log in from any computer that's connected to the network and gain access to the resources that Active Directory permits. The process is managed by AD DS (Active Directory Domain Services). With the help of an administrator, only authorized users can access the network. Moreover, the administrator can control which files a user can open, read, or edit.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.1 - Compare peer-to-peer and client-server network models. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. TOPICS: Exploring Network Operating Systems Page 3


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Apply 8/2/2024 10:18 PM 8/2/2024 10:18 PM

6. Protocols are rules used between networked devices for communication. a. True b. False ANSWER: RATIONALE:

a

Network protocols are a set of rules that govern communication between devices over a network. These protocols define how data is formatted, transmitted, received, and interpreted between devices to ensure successful communication.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 7. Jackson is currently preparing for his Network+ certification exam and has encountered a question regarding

the communication of computers on a network via common protocols. The question asks about the two primary network protocols that are used for communication. What are those primary protocols? a. SSL/TLS b. SMPT/POP3 c. TCP/IP d. TCP/UDP ANSWER: RATIONALE:

c

The computers on a network communicate with each other via the protocols that they have in common. The two primary network protocols are TCP (Transmission Control Protocol) and IP (Internet Protocol), and the suite of all the protocols an OS uses for communication on a network is the TCP/IP suite of protocols.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Remember/Understand Page 4


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/2/2024 10:18 PM 8/2/2024 10:18 PM

8. Larkyn is in the process of setting up his email account and is being prompted for his SMTP server address.

What is the SMTP server address for? a. The SMPT server address downloads messages to Larkin's computer. b. The SMTP server address encrypts email as it sends it. c. The SMTP server address decrypts email as it is received. d. The SMTP server address is used whenever Larkin's sends email. ANSWER: RATIONALE:

d

The client uses SMTP (sometimes called the SMTP server) to send an email message to the first server, which is the sender's mail server. The SMTP server address is used whenever Larkyn sends email.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 9. Mace is in the process of setting up his email account and is being prompted for his POP3 server address.

What does the POP3 server do when email is sent to it? a. The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3

server will download the email to his email client, such as Outlook, and then typically remove it from the server. b. The POP3 server is responsible for sending emails to the mail server when Mace sends email. c. The POP3 server is responsible for receiving email on the mail server. When Mace logs on, the POP3 server will download the email to Mace's client and keep it on the email server. d. The POP3 server will encrypt email as it is sent from Mace's client. ANSWER: RATIONALE:

a

The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3 server will download the email to his email client, such as Outlook, and then typically remove it from the server.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. Page 5


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Network Protocols Bloom's: Remember/Understand 8/2/2024 10:18 PM 8/2/2024 10:18 PM

10. When using IMAP4, email is downloaded to the client computer and then usually deleted from the server. In

contrast, with POP3, the client application manages the email while it remains on the server, making it ideal for accessing email from multiple devices. a. True b. False ANSWER: RATIONALE:

b

When using POP3, email is downloaded to the client computer and then usually deleted from the server. In contrast, with IMAP4, the client application manages the email while it remains on the server, making it ideal for accessing email from multiple devices.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 11. DNS (Domain Name System) helps clients find web servers over a network such as the Internet. It translates

domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network. a. True b. False ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network.

DNS (Domain Name System) helps clients find web servers over a network such as the Internet. It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network. Often, companies will run their own DNS servers, especially for their employees' computers to find resources within the corporate network. Internet providers also run DNS services for their customers, and many public DNS servers, such as Google or CloudFlare, are available for anyone to use.

Page 6


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 12. Katherine goes to her banking website to transfer money between her checking and savings accounts. Before

she makes a transaction, she looks at the top left of her browser's navigation bar and sees that the website is using HTTP and not HTTPS. What should Kathrine do? a. Continue with her transaction; it doesn't matter if the website is secure as she has virus protection. b. Try another browser to see if the website is secure through the other browser. c. Leave the website since HTTPS is not secure. d. Call her bank to complain about the website. ANSWER: RATIONALE:

c

It is important for a website to have a secure connection using HTTP layered on top of an encryption protocol such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security). This creates HTTPS (HTTP Secure), which ensures that all data sent between the website and user is encrypted and cannot be accessed by unauthorized parties. If a website is not encrypted with HTTPS, it is highly recommended to leave the site immediately as the data shared between the website and user can be easily accessed by others. Therefore, if HTTPS is not used to encrypt the bank's website, Katherine should leave the site immediately to prevent others from accessing her sensitive data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 13. Gael wants to remote into a client's computer using Telnet, but the client refuses. Why is the client refusing

to allow Gael to use Telnet? a. Telnet is an old protocol and is no longer used. b. A user license for Telnet is required. c. Telnet is not an encrypted application. Therefore, transmissions can be subject to spying. d. Telnet has been known to have multiple vulnerabilities that make it susceptible to attack. ANSWER: RATIONALE:

c

Telnet is not an encrypted application. Therefore, transmissions can be subject to Page 7


Name:

Class:

Date:

spying. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.2 - Identify types of applications and protocols used on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. TOPICS: Network Protocols KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 14. Hal is deciding whether to use the switch or hub in his network. So, he asks his best friend, a network

technician, for advice. Hal asks his friend, "What's the main difference between a switch and a hub?" How does his friend answer? a. There's no difference between the two except switches move data faster than hubs. b. A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that

will send it to its intended destination within the local network. c. A switch broadcasts incoming data to all ports, while a hub directs incoming data to the port(s) that will send it to its intended destination within the local network. d. Hubs can only be used in a star topology, whereas switches can only be used in a mesh topology. ANSWER: RATIONALE:

b

A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that will send it to its intended destination within the local network.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 15. Jacoby arranged five computers and two network-capable Laserjet printers in his office and connected them

to a switch. What is this physical topology called? a. ring topology b. mesh topology c. star topology Page 8


Name:

Class:

Date:

d. hybrid topology ANSWER: RATIONALE:

c

When connecting five computers to network-capable LaserJet printers via a switch, the physical topology is a star topology because all devices connect to one central point, in this case, the switch.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 16. Jenney wants to connect all her devices to one another without a central device, creating a fully

interconnected network. What is this physical topology called? a. ring topology b. hybrid topology c. star topology d. mesh topology ANSWER: RATIONALE:

d

Jenney is creating a mesh topology which is a type of network topology where each device in the network is connected to every other device, forming a fully interconnected network.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 17. Which of the following devices have NICs (network interface cards) either on board or attached to an Page 9


Name:

Class:

Date:

expansion slot not including wireless adapters? Choose all that apply. a. desktop computer b. printer c. standalone scanner d. router ANSWER: RATIONALE:

a, b, d

Desktop computers, printers, and routers all have NICs because they need to be networked to work properly. A device like a standalone scanner may not support network functionality and therefore does not require a NIC.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 18. Kenneth toured the new building's telecom room and saw a dozen switches connected with a fiber

connection on one port and the rest of the ports connected to Cat 8 cable. What is the fiber conduit called? a. spine b. wide area network c. campus area network d. backbone ANSWER: RATIONALE:

d

A backbone is a central conduit that connects the segments (pieces) of a network and is sometimes referred to as "a network of networks." The backbone might use higher transmission speeds and different cabling than network cables connected to computers because of the heavier traffic and the longer distances it might span.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. Page 10


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

LANs and Their Hardware Bloom's: Remember/Understand 8/2/2024 10:18 PM 8/2/2024 10:18 PM

19. Tia is using a smartwatch, a Bluetooth headset, and carrying her phone. What type of network is this an

example of? a. WAN (wide area network) b. PAN (personal area network) c. BAN (body area network) d. WLAN (wireless local area network) ANSWER: RATIONALE:

b

A PAN (personal area network) is a network of personal devices, such as the network you use when you connect your smartphone, watch, earpiece, and computer to each other.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 20. Maddox is setting up two separate networks on different floors of a building for the sales and marketing

departments. Although the networks are completely separate, they need to be able to communicate with each other. Which device should be used so the networks can communicate? a. switch b. hub c. router d. node ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE:

1 Multiple Choice

Maddox is setting up two different networks that need to speak with each other. In order for them to communicate, he needs to use a router. A router is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

Page 11


Name:

Class:

Date:

HAS VARIABLES: LEARNING OBJECTIVES:

False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 21. Nan is the IT manager for a company that's expanding into new offices. She has three business units in

different offices: sales, engineering, and accounting. She wants to keep the networks separate but also wants the devices on each network to communicate with each other in the same office. How should the office be set up? a. A router with three routing ports serving the three offices and a switch for the hosts. b. A switch with three switching ports serving the three offices and a router for the hosts. c. Four switches, one for each office and one to connect the offices. d. Four routers, one for each office and one to connect the offices. ANSWER: RATIONALE:

a

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more networks. The router acts as a gateway between multiple networks, but a basic switch (even if there are multiple switches) can only communicate within a single network.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 22. Xander is the IT manager for SimCo, which has offices located in both San Francisco and New York.

Today, he is planning to test a new employee on their knowledge of how the network connects between the two offices. This is a standard connection; no encryption is involved. So, new hire, what is involved in making the connections between the San Francisco and New York offices? a. San Francisco LAN-New York LAN b. San Francisco WAN-ISP-New York WAN Page 12


Name:

Class:

Date:

c. San Francisco-ISP-New York d. San Francisco LAN-WAN/ISP/WAN-New York LAN ANSWER: RATIONALE:

d

Data is transmitted through the SimCo San Francisco LAN and sent to the SimCo router. The router forwards the data to a WAN provided by the Internet Service Provider (ISP). The data then travels through the WAN to New York, where it is delivered to the SimCo New York router. The New York SimCo router then sends the data to the New York LAN.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.3 - Describe various networking hardware devices and the most common physical topologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. TOPICS: LANs and Their Hardware KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 23. Erin was studying for her Network+ certification exam when she encountered this question, "Which OSI

model layer is responsible for reformatting, compressing and encrypting data in a way that the application on the receiving end can read?" What is Erin's answer? a. Session Layer (Layer 5) b. Presentation Layer (Layer 6) c. Transportation Layer (Layer 4) d. Network Layer (Layer 3) ANSWER: RATIONALE:

b

The presentation layer (Layer 6) is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. For example, an email message can be encrypted at the presentation layer by the email client or by the operating system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Remember/Understand Page 13


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/2/2024 10:18 PM 8/2/2024 10:18 PM

24. Which layer of the OSI model describes how data between applications is synced and recovered if messages

don't arrive intact at the receiving application? a. Application (Layer 7) b. Presentation (Layer 6) c. Session (Layer 5) d. Transport (Layer 4) ANSWER: RATIONALE:

c

The session layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application. For example, the Zoom application works with the operating system to establish and maintain a session between two endpoints for as long as a voice conversation or video conference is in progress.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 25. Melanie is currently preparing for her Network+ certification exam, and she has been presented with the

following question, "What are the primary transport layer protocols, and what is their function in transporting application layer payloads from one application to another?" How does Melanie answer? Choose all that apply. a. SNMP (Simple Network Management Protocol) programs, which monitor and gather information

about network traffic and can alert network administrators about adverse conditions that need attention. b. TCP (Transmission Control Protocol) is a connection-oriented protocol used by apps like web browsers and email. It ensures data delivery by making a connection with the end host, checking if the data is received, and resending it if required. c. The principal protocol is the IP (Internet Protocol). IP adds its own network layer header to the segment or datagram. d. UDP (User Datagram Protocol) is a connectionless protocol that doesn't guarantee delivery and is used for broadcasting, streaming video/audio over the web, and monitoring network traffic where guaranteed delivery is not as important as fast transmission. UDP is called a connectionless protocol or best-effort protocol and is also referred to as the fire-and-forget protocol. Page 14


Name:

ANSWER: RATIONALE:

Class:

Date:

b, d

The transport layer has two main protocols: TCP and UDP. They help transfer data between different applications. TCP (Transmission Control Protocol) creates a connection with the host, checks whether data has been received and resends it if needed. This makes TCP a connection-oriented protocol. TCP is used for applications such as web browsing and email. It takes longer, but it's important for data to arrive safely. UDP (User Datagram Protocol) on the other hand does not guarantee delivery because it doesn't maintain a connection to check whether data has been received. UDP is, therefore, called a connectionless protocol or besteffort protocol. UDP is used for broadcasting, such as streaming video or audio over the web, where speed is more important than guaranteed delivery. It's also used to track network traffic.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 26. Idris has recently started as an intern at a network outsourcing firm. His supervisor is conducting a quiz for

all the new interns to test their understanding of networking and the OSI model. One of the questions posed to the interns is: "Which OSI layer is responsible for transmitting messages from one node to another until they reach their intended destination host?" How should Idris answer? a. the physical layer (Layer 1) b. the data link layer (Layer 2) c. the transport layer (Layer 4) d. the network layer (Layer 3) ANSWER: RATIONALE:

d

The network layer, sometimes called the Internet layer, is responsible for transmitting messages from one node to another until they reach the destination host. This is the layer where routers typically function.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. Page 15


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

The Seven Layer OSI Model Bloom's: Remember/Understand 8/2/2024 10:18 PM 8/2/2024 10:18 PM

27. An IP address is an address assigned to each node on a network, which the network layer uses to uniquely

identify them across multiple networks. a. True b. False ANSWER: RATIONALE:

a

The network layer header identifies the sending and receiving hosts by their IP addresses. An IP address is an address assigned to each node on a network, which the network layer uses to uniquely identify them across multiple networks.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 28. Emei has recently been hired as a technical assistant by a major network component manufacturer. She will

be part of a quality control team responsible for checking network interface cards (NICs) for any damage or defects. However, before starting her actual work, her supervisor has asked her a basic question related to NICs. The question is: "On which layer or layers does the NIC operate, and what are some examples of the protocols that a NIC uses for communication?" Choose all that apply. a. NICs work at the physical layer (Layer 1) b. NICs work at the physical layer (Layer 1) and the data link layer (Layer 2) c. Ethernet protocol d. Wi-Fi protocol ANSWER: RATIONALE:

b, c, d

NICs work at the physical layer (Layer 1) and the data link layer (Layer 2). Two of the protocols they use are ethernet and Wi-Fi.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection Page 16


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

(OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. The Seven Layer OSI Model Bloom's: Remember/Understand 8/2/2024 10:18 PM 8/2/2024 10:18 PM

29. A physical address is embedded on every network adapter on the globe. This is called a NAC (Network

Access Control) address. a. True b. False ANSWER: RATIONALE:

b

A physical address is embedded on every network adapter on the globe. This is called a MAC (Media Access Control) address.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 30. Diana is seeking ways to effectively manage her network. There are protocols available that allow network

managers to check, monitor, and gather information about network traffic. These protocols can alert network administrators about any adverse conditions that require attention to maintain the health of their network and host devices without relying on third-party software. Which protocol offers this capability? a. API (application programming interface) b. SNMP (Simple Network Management Protocol) c. ICMP (Internet Control Message Protocol) d. ARP (Address Resolution Protocol) ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

SNMP (Simple Network Management Protocol) monitors and gathers information about network traffic and can alert network administrators about adverse conditions that need attention.

Page 17


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 31. Darwin is planning to set up five different networks for five different offices for the same company and in

the same building, all of which will be connected to a single ISP. Each network will be confined to a single large office, which will have five computers and a LaserJet printer. All devices within the individual offices will be interconnected. Darwin needs to know how many NICs in the router and how many switches will be needed for his plan to work? For the time being, there will be no communication between networks. a. Darwin needs four NICs for the router. One for every two networks and one for the ISP connection,

and he needs five switches one port on each switch will be dedicated to the NIC on the router. b. Darwin needs two NICs for the router. One for a network port and one for the ISP connection, and he needs six switches, one for each office and as a central switch each office will connect to. One port on the switch will be dedicated to the NIC on the router. c. Darwin needs two NICs for the router. One for the network and one for the ISP connection, and he can use one 35 port switch to connect all of the devices in all of the offices. d. Darwin needs six NICs for the router. One for each network and one for the ISP connection, and he needs five switches; one port on each switch will be dedicated to the NIC on the router. ANSWER: RATIONALE:

d

Darwin needs six NICs for the router. One for each network and one for the ISP connection, and he needs five switches; one port on each switch will be dedicated to the NIC on the router.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.1.4 - Compare the seven layers of the OSI model. ACCREDITING STANDARDS: WEST.N10-009.25.1.1 - Explain concepts related to the Open Systems Interconnection (OSI) reference model. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: The Seven Layer OSI Model KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 32. Adrian is a new employee and as per company policy, he must undergo emergency training for the building,

regardless of the company he works for. During the training, he was shown around the building and saw the fire sprinklers and fire extinguishers. He was also shown the gas system suppression system and saw how it is activated. Later, when he reached his department, they discussed targeted fire suppression and detection Page 18


Name:

Class:

Date:

methods. They explained how they suppress fire without damaging sensitive electronics. Adrian is then given a test about the emergency systems. The question asked was "At what level to you find gas suppression systems?" How did Adrian answer? a. building level b. room level c. rack level d. ground level ANSWER: RATIONALE:

b

Room level: This system incorporates a sprinkler or gas system with at least two detection points to activate the system, which provides fire suppression in parts of a room or throughout the entire room. Instead of water, data centers often use a foaming agent or gas suppression agent that decreases oxygen levels to suffocate a fire or absorb heat, which suppresses the fire without damaging sensitive electronics. For example, the popular FM-200 system combines carbon, fluorine, and hydrogen to absorb heat without leaving a residue and without generating any toxic fumes.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.5 - Explain best practices for safety when working with networks and computers. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: Emergency Procedures KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 33. Lani just started working at a Network Operations Center (NOC) and must follow certain guidelines

whenever she uses tools in her job. Which government agency provides these guidelines? a. EPA b. NHTSA c. OSHA d. FDA ANSWER: RATIONALE:

c

POINTS:

1

OSHA (Occupational Safety and Health Administration) is the governmental agency that provides guidelines for workplace safety. Here are some of the guidelines for safe tool use in the workplace: Wear PPE (Personal Protective Equipment), keep tools in good condition, inspect tools before use, use the right tool for the job, only use tools if trained and authorized, and watch for trip hazards.

Page 19


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Choice False WEST.NET+.25.1.5 - Explain best practices for safety when working with networks and computers. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: Emergency Procedures KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 34. Anwar was working on his desktop computer and left it on while he worked on it. Suddenly, the screen went

blank, and the computer restarted. Just before this happened, Anwar felt a slight shock. What might have caused the computer to restart? Choose all that apply. a. He was working on his computer while it was turned on and the electronics inside were generating

static electricity. b. He accidentally hit the reset switch, so the computer rebooted. c. He accidentally jiggled the power cord, so the power momentarily went off and on. d. He discharged static electricity onto the motherboard because he wasn't grounded, which shocked the board and caused it to reboot. ANSWER: RATIONALE:

a, d

This is a true story. It is important to turn off and unplug the computer before working on it, as it can be hazardous to work on a computer that is on. Additionally, Anwar failed to ground himself before working on the computer, which led to the discharge of static electricity. This discharge hit the motherboard and triggered a restart, which did not cause any immediate damage to the computer but could have resulted in a catastrophic loss.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.1.5 - Explain best practices for safety when working with networks and computers. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: Emergency Procedures KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 35. Willanda had a passion for working with computers. In fact, she loved it so much that she would

occasionally build them from scratch for her friends. One of her golden rules was to never work without an ESD wrist strap, which protects the computer from static electricity. However, one day a friend called her in need of help because a memory chip had died. Willanda went to her friend's house to fix it, but she realized that she had Page 20


Name:

Class:

Date:

forgotten her ESD wrist strap at home. Despite this, she was still determined to complete the task. She proceeded very carefully, taking all necessary precautions to avoid any potential damage to the computer. How was Willanda able to accomplish her task without damaging the computer or injuring herself even though she did not have the wrist strap? a. She wore rubber gloves. b. She worked on a wooden workbench. c. She took out the power supply. d. She unplugged the computer and grounded herself by touching the metal chassis and sometimes the

power supply. ANSWER: RATIONALE:

d

If you don't have an ESD strap handy, be sure to keep touching the metal parts of the case before you touch any component inside the case. This is not as effective as wearing an ESD strap, but it can reduce the risk of ESD.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.5 - Explain best practices for safety when working with networks and computers. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: Emergency Procedures KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 36. As in life, just as a journey starts with a first step, in troubleshooting that journey starts with the very first

question. To identify the problem and its symptoms, you first have to ask one simple but very important question. What is that question? a. What did you do? b. What happened? c. What has recently changed? d. Did you add or take anything off your computer? ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting

Identify the problem and its symptoms. "What has recently changed?" is a small yet crucial question that can encompass various possibilities. For instance, has any new software been added? Has a new device been installed or removed? Has anything been deleted? This open-ended question will be your first step down the path to troubleshooting the problem and determining a solution.

Page 21


Name:

Class:

Date:

network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 37. Francisco worked in a Network Operations Center (NOC) for a medium-sized business. Everything was

working fine on Friday, but on Monday, he received some technical service tickets complaining about the Internet being down. He started investigating the issue by looking through the visitor logs. He knew that a cleaning crew comes once a week to clean the floors of the NOC and make sure there is no dust around the desks. He discovered that the cleaning crew had been inside the NOC on Saturday. Francisco then checked every rack and noticed that some cables were unplugged, which were connected to a router connected to the WAN. He plugged the cable back in, and the Internet came back online. What troubleshooting step was Francisco on? a. Establish a plan for resolving the problem. b. Test your theory to determine the cause. c. Identify the problem and its symptoms. d. Establish a theory of probable cause. ANSWER: RATIONALE:

d

Establish a theory of probable cause. For Francisco, his theory of probable cause was that the cleaning crew might have accidentally unplugged a cable that was supposed to be connected to the NIC in a router. He checked the area and found that this was indeed the case. He plugged the cable back in, and the Internet was restored. Remember to always consider the obvious and simple things first before moving on to more complex solutions.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 38. Orien has recently discovered that two ports on one of his company's managed Layer 3 switches are

intermittently failing. Since all ports on the switch are already in use, replacing the switch would cause significant disruption to the majority of the office staff. Orien must adhere to the change management policy in place and develop a plan that will minimize any potential disruption to the staff. What troubleshooting step is Orien on? Page 22


Name:

Class:

Date:

a. Implement the solution or escalate the problem. b. Establish a plan for resolving the problem. c. Document findings, actions, and outcomes. d. Test your theory to determine the cause. ANSWER: RATIONALE:

b

Establishing a plan for resolving the problem. When dealing with network problems, it is important to establish a plan for resolving the issue. Changes to a network can potentially disrupt a lot of people's work. Therefore, before implementing a fix, it is crucial to consider the scope of your change and how it will affect users, their applications, and their data. If the problem is not urgent, it is best to make changes when the least number of users are on the network. In many cases, specific change management procedures must be followed to implement a change. Change management includes well-defined processes that evaluate the need for a change, the cost of the change, a plan for implementing the change with minimal disruption, and a backup plan in case the change does not work as expected.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 39. Warda just finished repairing a company desktop computer. There seemed to be a power supply issue. The

user told Warda that sometimes the computer would shut down for no reason and occasionally they would hear strange noises coming from the power supply fan. Once there was a burning smell coming from the computer. So after hearing those symptoms, Warda replaced the power supply with a new, more powerful one. She then ran tests on the power supply through the CMOS utilities, and the problem disappeared. What troubleshooting step was she on? a. Document findings, actions, and outcomes. b. Establish a plan for resolving the problem. c. Implement the solution or escalate the problem. d. Verify functionality and implement preventive measures. ANSWER: RATIONALE:

d

Verify functionality and implement preventive measures. Warda verified the power supply was the issue and then replaced it. She replaced it with one that could handle a higher electrical load so that any additions to the computer would not tax the power supply. And finally, she ran tests on the power supply using the CMOS utilities to determine if there were any more potential problems. Page 23


Name:

Class:

Date:

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM 40. Rayco just finished repairing a company laptop. There seemed to be a memory chip issue. Sometimes, while

the user traveled with the laptop, the system would randomly crash and get a blue screen of death (BSOD), and occasionally the system became unstable or would sometimes lose data. This only happened when the laptop was traveling, such as in an airplane, or was just taken out of luggage after traveling. When the laptop was at the office, everything was fine. After the user explained the symptoms to Rayco, he believed he knew most likely what the problem was. So, he took apart the laptop and checked the memory modules. One of the chips was not all the way pressed into its slot. So, he pushed the chip back in its slot and checked the other chips; everything else was fine. Rayco then put the machine back together. What would be a good way for Rayco to test the laptop to see if he can get the same errors to happen again? a. Hand it back to the user and tell her it's fixed, and they can take it on their next trip. b. Handle it like you would if you were on a trip. Roll it over different terrain in a suitcase for a couple

of days, put it in and take it out of the car, and then check it again for errors by using the onboard diagnostic utilities. c. Roll it around in luggage for an hour or two and maybe into the parking lot and then check it for errors. d. Shake it vigorously for a few minutes to see if that dislodges the memory chips. ANSWER: RATIONALE:

b

As a technician, Rayco should do everything in his power to make sure that the laptop is fixed. Using it as the user would by placing it in a rolling bag and putting it in the car, taking out of the car, rolling it over different types of terrain, everything short of getting on an airplane can almost guarantee that it will not break again if his theory is correct.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM Page 24


Name:

DATE MODIFIED:

Class:

Date:

8/2/2024 10:18 PM

41. Isabel has been a part of her company's IT team for several years. During her tenure, she has added some

unusual items to the company's knowledge base. Some of the following answers are actual data in the knowledge base. Can you guess which ones are real knowledge base material? a. LaserJet A only works with new paper; it jams if you try to use recycled paper. b. Inkjet printer B will not work on WiFi unless the SSID is on. It throws a cannot connect error

message if the SSID is hidden. c. The blue cable is a straight through cable, and the red cable is cross-over cable. d. Alienware x14 R2 is from Dell Computer. ANSWER: RATIONALE:

a, b

LaserJet A refuses to print with paper that is considered mostly recycled. It will only print with standard quality paper. Inkjet B would not work on the network without the Network SSID on. Turning on the Network SSID allowed the printer to work. Turning off the SSID would cause the printer to lose communication.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.1.6 - Apply the seven-step troubleshooting model for troubleshooting network problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.1 - Explain the troubleshooting methodology. TOPICS: Troubleshooting Network Problems KEYWORDS: Bloom's: Apply DATE CREATED: 8/2/2024 10:18 PM DATE MODIFIED: 8/2/2024 10:18 PM

Page 25


Name:

Class:

Date:

Chapter 02 Infrastructure and Documentation 1. A common application layer protocol used by voice gateways to initiate and maintain connections is the

TCP/IP protocol. a. True b. False ANSWER: RATIONALE:

b

A common application layer protocol used by voice gateways to initiate and maintain connections is the signaling protocol SIP (Session Initiation Protocol).

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 2. Christina works for a managed service provider specializing in network infrastructure for medium-to-large-

size companies. The first thing she does when she arrives at a client's site is to look for the EF (entrance facility). What is the purpose of the EF? a. The EF is where the power cutoff from the building is located. b. The EF is where all the building's network cabling is located. c. The EF is where the telecom company accepts responsibility for the external connection. d. The EF is where the server room is located. ANSWER: RATIONALE:

c

The EF is where a telecommunications service provider (whether it is a local phone company, long-distance carrier, dedicated Internet service provider, cable company, or satellite company) accepts responsibility for the external connection.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand Page 26


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM 8/16/2024 12:21 PM

3. Jaymes is told by his supervisor that he needs to go to the ER to check the LAN connections. What's the ER? a. The ER or equipment room is also known as the MDF (main distribution frame). It is the centralized

point of interconnect for an organization's LAN, CAN, or WAN. b. The ER or event recorder is a device or system that records events or logs related to network activity for monitoring and troubleshooting purposes. c. The ER or ethernet room is where all the ethernet cable is stored. d. The ER or electronic repair room is where networking equipment gets repaired. ANSWER: RATIONALE:

a

Also known as the ER (equipment room), the MDF is an environmentally controlled space that hosts the MC (main cross connect) and is the centralized point of interconnection for an organization's LAN, CAN, or WAN. In practice, the term "MDF" can refer either to the racks holding the network equipment or to the room that houses both racks and equipment.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 4. Alfredo visits a client's site to work on their network equipment. What is the name of the room designated for

this equipment? Choose all that apply. a. IDF (intermediate distribution frame) b. telecommunications room c. MDF (main distribution frame) d. data closet ANSWER: RATIONALE:

b, d

POINTS:

1

The network equipment room is called the TR (telecommunications room), TE (telecommunications enclosure), or data closet; a data room is an enclosed space that holds network equipment. These spaces might require size, clearance around equipment, wall materials, and physical security (such as a locked door). Larger data rooms (also called TR) and smaller data closets (also called TE) require good cooling and ventilation systems to maintain a constant temperature. Page 27


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Response False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 5. Stephen was installing a new patch bay in the server room. What's the purpose of a patch bay? a. It can hold various network equipment, such as servers, routers, switches, and firewalls. b. It is a panel of network connections that can be mounted to a wall or a rack and provides a central

termination point where many patch cables converge in a single location. c. It is a panel of slots to increase the number of NICs in a switch or a router. d. It allows multiple switches to be patched together to increase the size of a network. ANSWER: RATIONALE:

b

A patch panel, also called a patch bay, is a panel of network connections that can be mounted to a wall or a rack and provides a central termination point where many patch cables converge in a single location.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 6. Joe works for a drug manufacturer with six buildings on campus. Each building has two floors, and each floor

has an IDF (intermediate distribution frame) for a total of 12 IDFs. How many MDFs does that allow the company to have on campus? a. 6 b. 3 c. 2 d. 1 ANSWER:

d Page 28


Name:

RATIONALE:

Class:

Date:

There can only be one MDF per campus, but there can be many IDFs connecting internal portions of the network. The ANSI/TIA standards specify at least one IDF per floor, although large organizations may have several data rooms or closets per floor to better manage the data feed from the main data facilities.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 7. Shawn is a network technician and works in the server room for a Fortune 500 company. There are 20 racks

of servers in the room, and all of them need to be monitored, controlled, updated, and occasionally rebooted. How does Shawn service those servers in all those racks? a. Use a separate console for each rack and no KVM (keyboard, video, and mouse) switch. He will plug

the cables in manually. b. Use KVM (keyboard, video, and mouse) switch to alternate between all servers on one console. c. Use KVM (keyboard, video, and mouse) switch and console for each rack. d. Use a keyboard, monitor, and mouse on each server.. ANSWER: RATIONALE:

b

It's impractical to install a separate console for every device on a rack. Typically, racks have one or more KVM (keyboard, video, and mouse) switches, which connect to a single console to provide a central control portal for all devices on the rack. In fact, a KVM switch can be used to control multiple servers across different server racks.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM Page 29


Name:

Class:

Date:

8. Devon needs to purchase new racks for his server room. The industry standard measures racks in rack units

(RU or U). He plans to buy racks that are 42U tall, and one rack unit is equivalent to 1.75 inches. How tall are the racks Devon plans on purchasing? a. 3 feet b. 4 feet c. 5 feet d. 6 feet ANSWER: RATIONALE:

d

Rack height is measured in rack units (RU or U) with the industry standard being 42U tall-about 6 feet. One RU is 1.75 inches.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. TOPICS: 2-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 9. Jonas is laying cable in the ceiling (space above the tile) of an office space for a client. Because of the

location, it has to be a specific type of cable. What type of cable is it, and why is this type of cable used? Choose all that apply. a. STP cabling b. Plenum cabling c. This high-grade cable incorporates shielding around the wire pairs and around all the pairs for

improved performance. d. This cable is coated with a flame-resistant jacket that produces less smoke than regular cable coated with PVC (polyvinyl chloride), which is made from a cheaper plastic that is toxic when burned. ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in

When installing cables in areas above ceiling tiles or below subflooring, it is important to use plenum cabling. The cable sheath should be plenum-rated. It is recommended to consult with local electrical installation codes to ensure proper installation. Plenum-rated cables have a flame-resistant jacket that produces less smoke than regular cables coated with PVC (polyvinyl chloride). PVC is a cheaper plastic that is toxic when burned.

Page 30


Name:

Class:

Date:

commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: 2-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 10. Warda is planning to install fiber optic cables throughout her campus. However, there are several issues that

she needs to address before executing the installation. One of the main issues is deciding whether to use multimode or single-mode fiber. If she considers price, multimode would be the cheaper option. However, if she wants to cover a longer distance, single-mode fiber would be the best choice. Warda's campus is extensive, so it requires a long distance to be covered. Moreover, there has been a significant increase in data traffic since the addition of new programs like robotics, ethical hacking, and networking to the curriculum. Lastly, legacy systems are still in place, which is an important factor to consider when deciding which product to use. Which option do you think Warda should choose, and why? a. Warda should opt for single-mode fiber since it offers a higher bandwidth despite the fact that it has a

higher cost per foot to install. Over time, Warda will recover the cost as single-mode fiber is easy to maintain and can handle higher data rates as more programs come online. b. Warda should opt for multimode fiber since there are some existing legacy systems in place. Choosing this option would mean that only the cable would need to be upgraded without having to replace the legacy systems, which would otherwise increase the project cost. Although there may be some signal fade issues with multimode fiber over long distances, a signal booster can be used to address this, and the installation process is relatively simple compared to single-mode fiber installation. c. Warda should opt for single-mode fiber since it is durable and will last much longer than multimode fiber. While the cost is higher, since it lasts longer, the cost for the installation will be reduced over time. d. Warda should choose the multimode fiber because it has a longer lifespan and is versatile so that it can be operated with either colored LEDs or laser light depending on the desired data transfer speed. ANSWER: RATIONALE:

b

Warda should opt for multimode fiber since there are some legacy systems in place. Choosing this option would mean that only the cable would need to be upgraded without having to replace the legacy systems, which would otherwise increase the project cost. Although there may be some signal fade issues with multimode fiber over long distances, a signal booster can be used to address this, and the installation process is relatively simple compared to single-mode fiber installation.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.3.5 - Compare and contrast network access and management Page 31


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

methods. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. 2-1 Bloom's: Analyze/Create/Evaluate 8/16/2024 12:21 PM 8/16/2024 12:21 PM

11. Servers and switches contain temperature sensors within each device's chassis, which can alert network

technicians if a device is becoming overheated. a. True b. False ANSWER: RATIONALE:

a

Many devices, such as servers and switches, might contain temperature sensors within each device's chassis. These sensors can alert network technicians if a device is becoming overheated.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: 2-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 12. Jacqulyn is employed by the Jefferson County Unified School District, which comprises 15 schools. All

these schools have duplicate mechanical systems that need constant monitoring to ensure immediate repair in case of any failures. One day, while Jacqulyn was at the district office, she noticed that the air conditioning system at Public School Number 5 was about to fail and would require repair within the next few days. She discovered this problem promptly and without any notification or intervention from either the school or the district. How did Jacqulyn make this discovery without any intervention? a. Jacqulyn had been hearing complaints for some time. She knew what was going to happen based on

her experience with the equipment that the school system owned. b. Jacqulyn made an educated guess. When she was at the school last week, it was making the same kind of noise that another HVAC system was at a different school before it broke down. c. Each school had its HVAC monitored by a SCADA (supervisory control and data acquisition) system. Jacqulyn was able to see the problem presenting in real time due to the HVAC company's dashboard that was tied into the SCADA system. d. When the temperature gets too high in some classes at other schools, someone at that school will set off an alarm in the district letting the district know something is wrong with the HVAC. ANSWER:

c Page 32


Name:

RATIONALE:

Class:

Date:

Each school had its HVAC interfaced with a SCADA (supervisory control and data acquisition) system. Jacqulyn was able to see the problem presenting in real time due to the HVAC company's dashboard that was tied into their SCADA system.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: 2-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 13. Mark was hired as a network technician for a major technology firm. On his first day at work, he received an

ID badge that was a swipe card on a lanyard and a PIN. He was informed that, to enter any restricted area on campus, he must use his swipe card and the assigned PIN. Moreover, he was told that every swipe with his card and PIN would be logged and kept. It was emphasized that he must not allow anyone to enter behind him. He should always close the door behind him, and the next person must use their swipe card to enter. Any violation of this policy could lead to suspension without pay. A couple of months later, Mark enters a meeting room with his swipe card when a person walked up behind him and asked him to hold the door. This person had boxes in their hands. If you were Mark, what would you do? a. Close the door on the person without any acknowledgement. b. Carry the boxes to help them out and let them in, no one will find out. c. Explain why you cannot hold the door and then close it on them. d. Ask someone else to help them and stay out of it. ANSWER: RATIONALE:

a

If the person works at the company, then they should know the rules and there should be no explanation necessary. If they don't work at the company, then they should have a chaperone with them. If you do not follow the rules as laid out in the company handbook, the company has the right to suspend you without pay.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.1 - Describe the roles of various network and cabling equipment in commercial buildings. ACCREDITING STANDARDS: WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: 2-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate Page 33


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM 8/16/2024 12:21 PM

14. Roberto is a specialist in creating complex layer 3 network diagrams. His company sends him to clients

during the design phase of network infrastructure projects. What does a layer 3 network diagram usually contain? Choose all that apply. a. IP addressing schemes b. subnetting c. desktop computers d. router configuration ANSWER: RATIONALE:

a, b, d

Layer 3 network diagrams are typically created to illustrate the logical layout of a network, focusing on the routing and addressing aspects. These diagrams are made to document how data flows through the network at the network layer (Layer 3 of the OSI model). A layer 3 network diagram will detail IP address spaces, routing between networks, and subnets within LANs.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 15. Katlin is working on a network map and needs the symbol that represents a firewall. What is that symbol? a. a hockey puck shape with two arrows pointing inward and two arrows pointing outward b. a small rectangular box with four arrows pointing in opposite directions c. a brick wall symbol d. a cloud ANSWER: RATIONALE:

c

The firewall is a brick wall symbol.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 Page 34


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

16. Jeremy's company follows a yearly procedure of updating and maintaining a network inventory of all

important assets that it owns. The nonconfidential information is then transferred to an internal wiki, which allows the IT department to access it throughout the year and make necessary changes as hardware and software are retired and replaced. What are some examples of items that would be included in the network inventory documentation? Choose all that apply. a. procedures b. proprietary information c. software d. network configuration ANSWER: RATIONALE:

a, c, d

This is a small list of some of the documentation required for a network inventory: procedures, task details, workflows, role assignments, essential equipment and supplies, compliance requirements, software, operating systems (including configurations), applications (including configurations), Active Directory (security groups, domains, etc.), network configuration protocols, backups, IP addressing (static assignments and DHCP scopes), subnets, VLANs, server roles, access methods, transmission details, and baseline configurations. Depending on the size of the company, there will be more added to this list.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 17. The term inventory management refers to the monitoring and maintaining of all assets that make up a

network. a. True b. False ANSWER: RATIONALE:

a

POINTS:

1

The term inventory management refers to the monitoring and maintaining of all assets that make up a network. A major part of this process is the removal and disposal of outdated assets and the addition of compatible, updated devices.

Page 35


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 18. Jessica and her team received a notice stating that the router they had purchased a year ago had a security

vulnerability with a Common Vulnerabilities and Exposures (CVE) score of 9.0 out of 10. Due to the severity of the rating, it was recommended that they immediately update the firmware to fix the problem. While updating the firmware, they also accessed the inventory control system to gather more information. What are some additional details about the router that Jessica and her team discover by reviewing the inventory list? a. the router configurations b. how many of those routers they have c. configuration files of those routers d. location of where the routers are installed ANSWER: RATIONALE:

b, d

Some of the things on the inventory control list that Jessica and her team will find include how many of that type of router is on the network and where they are installed on the network.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 19. Benjamin, who works in the IT department, is receiving multiple calls about LCD monitors flickering

intermittently. He sends out a technician to adjust the controls, and the issue stops for a while but keeps happening. When they checked the inventory list, they discovered that 10 people have the same make and model of monitor, and three of those employees have been experiencing the same problem. This means that 30% of the user base is having issues with those monitors. What should Benjamin do? a. Notify the network administrators to see if all 10 monitors should be replaced. b. Since it is only three monitors, and the problem is intermittent, ignore the problem for now and fix Page 36


Name:

Class:

Date:

them when errors occur. c. Swap the bad monitors with others from previous users. d. Price out new monitors of the same type and present the cost to the network administrators with a review of the situation. ANSWER: RATIONALE:

a

Notify the administrators to see if all 10 monitors should be replaced. It is not Benjamin's responsibility to get a price for new monitors, and there may be a preferred vendor the company uses to make these types of purchases.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 20. Joe recently purchased a new Wi-Fi router for his small company of 10 people. It's his first time using Wi-

Fi, and he only needs one router to cover his entire office. Now he needs to name his network. His friends suggested that he should name it something recognizable, but when he connected and turned it on, it worked flawlessly, so he left it alone. Joe doesn't have a computer background and doesn't want to mess with it. Why is it a bad idea to keep the default name on a Wi-Fi router? Choose all that apply. a. Reflection attacks are possible. b. The default SSID is usually the router's make and model. c. Default password and username for routers can be found on the dark web. d. Someone with the same router could accidently link to your network. ANSWER: RATIONALE:

b, c

The default SSID on a router is usually the make and model of the router. Someone seeing this could find the make and model on the dark web and plug that information in and discover the username and password for the router.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM Page 37


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM

21. Martin's company is in the market for a new printing press, and given that these machines cost over

$500,000, the chosen company must be vetted carefully. There are certain requirements that must be met before a decision can be made. Here are some of the things that Martin's company is looking for: smart sensors that can notify the repair company when a repair is needed, a machine that fits within a specific size footprint, and when running at full speed, produces no more than 45 dB of noise. What is the document Martin is sending to vendors? a. RFP b. MOU c. MSA d. SOW ANSWER: RATIONALE:

a

Martin is distributing an RFP (request for proposal). He is asking vendors to submit a proposal for a new printer his company wants to purchase. Some items in Martin's RFP include smart sensors that can notify the repair company when a repair is needed, a machine that fits within a specific size footprint, and when running at full speed, produces no more than 45 dB of noise.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 22. Lani and her best friend Annabelle had plans to start a bakery together. Since they were co-owners, they

decided to enter into a memorandum of understanding (MOU) to keep their finances organized. They believed that an MOU would be less costly than hiring a lawyer who specializes in contracts. Additionally, since they were best friends, they did not think they needed a formal contract. The MOU outlined the objective of starting a bakery and how they would collaborate on various aspects, such as which family recipes would be used and who would be responsible for back-office operations. They agreed to a duration of 10 years, hoping that the business would stay in the family and their children would take it over someday. They also established some rules regarding the confidentiality of family recipes and termination agreements if the need arose. Unfortunately, a few years later, the business venture failed, and they decided to seek legal counsel. They showed their individual lawyers the MOU hoping it would help, but both of their lawyers said they couldn't assist the two now ex-best friends. Why couldn't the lawyers help them? Choose all that apply. a. The MOU does not grant extensive rights to either party. b. The MOU is usually not a legally binding document. c. Lawyers don't like working on documents that they did not make themselves. Page 38


Name:

Class:

Date:

d. The MOU provides no legal recourse. ANSWER: RATIONALE:

a, b, d

The MOU can be helpful in pushing along contract negotiations and in defining specific concerns of each party, but it is usually not a legally binding document, does not grant extensive rights to either party, provides no legal recourse, and is not intended to provide detailed coverage of the agreement to come.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 23. An MSA (master service agreement) is a contract that defines the terms of present contracts between parties,

such as payment terms or arbitration arrangements. a. True b. False ANSWER: RATIONALE:

b

An MSA (master service agreement) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 24. Alvin is an independent contractor who works for a major book publishing company that specializes in

scholastic books. His responsibility is to create test questions for some of those books. Before starting any project, Alvin has to sign a legal document that lays out his duties, including specific tasks, deliverables, standards, payment schedule, and project timeline. This document is legally binding, which means that it can be enforced in a court of law. What type of document is this? a. MOU Page 39


Name:

Class:

Date:

b. MSA c. SOW d. SLA ANSWER: RATIONALE:

c

Alvin signed a SOW (statement of work), which describes in detail the work to be completed for a particular project and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. An SOW is legally binding, which means it can be enforced in a court of law.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.2 - Maintain network documentation. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 25. Francisco is a sales engineer for Telco ISP, where he sells his company's ISP service to major corporations.

He promotes the company's fast Internet speeds of up to 50 GB per second. Telco also guarantees high availability with 99.999% uptime, which means there will only be 26 seconds of downtime per month. Telco offers a personal account representative who is available 24/7 to handle any problems that may arise. If a customer is not satisfied with the service, they can cancel their contract within the first 30 days at no charge or after 30 days with a 60-day notice and a $1000 cancellation fee. Of course, Francisco is giving a sales pitch; once a company decides they want Telco's services, then they will want, in plain language and in measurable terms, the aspects of the services provided to them, contract duration (minimum or maximum), guaranteed uptime, options for compensation if outages exceed defined thresholds, problem management, performance benchmarks, and termination options. Depending on the company, there may be more requirements. What is this document called that defines the performance matrix and relationship between the vendor and the client? a. SLA b. MOU c. MSA d. SOW ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.2.2 - Maintain network documentation.

The document that defines the performance matrix and relationship between the vendor and the client is called a service level agreement (SLA). This is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer.

Page 40


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 2-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 26. Georgy's company has a policy of purchasing only one brand of hard drive when buying spare parts. When

Georgy asked his supervisor about the reason, the supervisor explained that it is because the advertised mean time between failures rate of that particular brand is usually very reliable. Why is the reliability of the advertised mean time between failures rate important? Choose all that apply. a. Giving devices an MTBF (mean time between failures) allows technicians and others with fiduciary

responsibility to determine if a device is a worthwhile investment because of how often it might need replacement. b. MTBF considers the time required to repair a failed system or component. If the repair time is significant, it can greatly impact the overall downtime experienced by the system. c. While any single device might experience a failure much sooner or later, vendors and technicians budget for repairs or replacement of devices based on the advertised MTBF. d. MTBF assumes a constant failure rate over time, which holds true for all systems. ANSWER: RATIONALE:

a, c

Devices on a network typically have a calculated MTBF (mean time between failures). This is the average amount of time that will pass, of devices of the same make and model, before the next failure is expected to occur. While any single device might experience a failure much sooner or later, vendors and technicians budget for repairs or replacement of devices based on the advertised MTBF.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 27. Gino has two power supplies for each mission critical server. What is this an example of? a. redundancy b. single point of failure c. multi-tenancy Page 41


Name:

Class:

Date:

d. uninterruptable power supply (UPS) ANSWER: RATIONALE:

a

This is called redundancy and refers to an implementation in which more than one component is installed and ready to use for storing, processing, or transporting data or keeping data safe.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 28. Hesperia's company does not have uninterruptible power supplies (UPSs) on their server racks. If the power

goes out, the power to the racks goes out too. What is this an example of? a. fault tolerance b. redundancy c. single point of failure (SPoF) d. hot-swappable ANSWER: RATIONALE:

c

A single point of failure (SPoF) refers to a component or part of a system whose failure would cause the entire system to malfunction or catastrophic system failure. Essentially, it's a critical element within a system where the failure of that one component would result in a cascading failure throughout the system, leading to downtime, reduced performance, or even complete system failure. To maximize availability, you should ensure that critical network elements, such as your connection to the Internet, your file server's hard disk, and your power are redundant.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 Page 42


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

29. Jai is responsible for ensuring that his company's network hardware remains operational at all times. He

oversees network operations, which include managing servers, routers, and everything in between. To ensure that these devices function properly, Jai and his team make sure that each mission-critical hardware device has at least one duplicate critical component, such as a NIC, fan, or processor. Then, if a component fails, another one will take over without any loss of connectivity. What is this an example of? a. redundancy b. hot-swappable c. automatic failover d. fault tolerance ANSWER: RATIONALE:

c

To achieve the utmost fault tolerance, each critical device requires redundant NICs, power supplies, cooling fans, and processors. All of these should, ideally, be able to immediately assume the duties of a failed component, a capability known as automatic failover. If one NIC in a router fails, for example, automatic failover ensures that the router's other NIC can automatically handle the first NIC's responsibilities.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 30. The process of designing, implementing, and maintaining any of the systems including operating systems,

network services, databases, and applications is called the system life cycle. a. True b. False ANSWER: RATIONALE:

a

In addition to hardware, networks are comprised of many kinds of systems, including operating systems, network services, databases, and applications. The process of designing, implementing, and maintaining any of these systems is called the system life cycle. Page 43


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 31. What are some of the life cycle phases that network components progress through so that the network is

constantly being improved? Choose all that apply. a. design planning b. requirements analysis c. development and testing d. personnel analysis e. evaluation ANSWER: RATIONALE:

a, b, c, e

Network components go through a series of phases to improve the overall network. These phases are: 1. Requirements analysis: Identify the network requirements and business needs. 2. Design planning: Move from big picture goals to detailed decisions. 3. Development and testing: Purchase equipment and test it before deploying it. 4. Implementation: Deploy new equipment to replace old equipment and continue testing to achieve a new, stable baseline. 5. Documentation and maintenance: Apply effective monitoring techniques to detect and address problems, and keep documentation updated. 6. Evaluation: As improvements are needed or devices break down, perform a cost-benefit analysis to identify devices reaching the end of their life cycle and determine whether to discard, replace, or upgrade.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand Page 44


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM 8/16/2024 12:21 PM

32. What is the process called that efficiently, effectively, and securely handles system configurations to

maintain a desired state and to track configuration changes over time? a. change management b. configuration management c. incident management d. document management ANSWER: RATIONALE:

b

CM (configuration management) is the process of efficiently, effectively, and securely handling system configurations to maintain a desired state and tracking configuration changes over time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 33. To establish configuration management (CM), the first step is to take inventory of existing systems and their

current configurations. Once a system functions effectively in a production environment, it is considered to be in its baseline configuration. The next step is to gather the data files into a central repository. What is this repository called? a. Database repository b. OSOT (original source of truth) c. OSOT (official source of truth) d. SSOT (single source of truth) ANSWER: RATIONALE:

d

CM is first established by taking inventory of existing systems and their current configurations. The beginning state for each system, where the system functions effectively in a production environment, is considered its baseline configuration. This information is collected as data files, which are gathered into a central repository called the SSOT (single source of truth). Source control ensures that changes are tracked and logged for future reference, and only authorized people can make changes to that information. Page 45


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 34. Consider this scenario: A network administrator has carefully designed and implemented quality of service

(QoS) policies to ensure that VoIP applications receive sufficient bandwidth and low latency. However, over time, the routers receive firmware updates and patches that modify some settings. On another occasion, another network administrator makes manual adjustments to some QoS settings on one router but does not update the central configuration management system. Eventually, a router fails and is replaced with a different model of router. Finally, a junior network technician mistakenly makes changes to the QoS settings on one of the routers while attempting to perform a maintenance task. As a result, over time, the VoIP applications for which the original network administrator designed and implemented the QoS policies are not working properly. Calls are being dropped, and the lines begin to get staticky when there are a lot of phone calls coming in simultaneously. What is this an example of? a. configuration drift b. version drift c. life cycle failure d. configuration permission drift ANSWER: RATIONALE:

a

Configuration drift is what happens when small changes are made from time to time, perhaps without the proper approval process or documentation. It is the slow movement away from the intended configuration.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM Page 46


Name:

Class:

Date:

35. Windows 10 will no longer be serviced effective October 14, 2025, with the current version, 22H2, as the

final version. All editions of Windows 10 will remain in support with monthly security update releases through that date. What is this date called? a. EOS (end-of-system) b. EOS (end-of-support) c. EOL (end-of-line) d. EOC (end-of-cycle) ANSWER: RATIONALE:

b

A metric related to life expectancy of a system is its EOS (end-of-support) date. Vendors and manufacturers typically provide ongoing support for current and recent versions of their applications, OSs, or firmware on hardware devices. At some point, this support is withdrawn for older systems, and this date is labeled the EOS (end-of-support) for that system. Once support is terminated for a system, that system typically is no longer safe to continue running in a production environment because it no longer receives security updates or bug fixes.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 36. Jamee has been asked to install an update that fixes a few bugs and zero-day vulnerabilities in the latest

version of Windows. What type of software change is this? a. upgrade b. update c. hotfix d. patch ANSWER: RATIONALE:

d

Jamee has been asked to install a patch. A software patch is a correction, improvement, or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to part of the software, leaving most of the code untouched. The process of monitoring the release of new patches, testing them for use on networked devices, and installing them is called patch management. Page 47


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 37. Kimberly has just started her new job on Patch Tuesday. In her previous job, she always allowed her

systems to auto-update, but her new supervisor has instructed her not to do so. Why would it be better, in some circumstances, not to allow auto-updating? Choose all that apply. a. The impact of the change must be fully understood before it is allowed to happen. b. The risk of encountering software bugs or compatibility issues associated with outdated software

versions is reduced. c. A determination needs to be made as to whether the patch or upgrade is necessary. Simply adding new features or functionality to software might cause more work than it's worth in time and money. d. The network receives the latest security updates, which help protect it from vulnerabilities and potential cyberattacks. ANSWER: RATIONALE:

a, c

It is crucial to fully understand the potential impact of any changes before implementing them. It is important to determine whether a patch or upgrade is truly necessary, since adding new features or functionality to software can often result in more work and expenses than it's worth.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 38. Project management is the application of specific skills, tools, and techniques to manage projects within the

planned project scope, scheduled time, and budgeted cost. Page 48


Name:

Class:

Date:

a. True b. False ANSWER: RATIONALE:

a

Project management is the application of specific skills, tools, and techniques to manage projects in such a way that the desired outcome is achieved within the planned project scope, scheduled time, and budgeted cost. IT professionals use project management extensively to handle the application and oversight of changes to a system or the development of new systems.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 39. Shawn previously worked for a small networking company but now works for a Fortune 500 firm. He wants

to add some RAM to a server, but his supervisor told him that he would have to submit a change request form first. Shawn was surprised by this, as in his previous company, he could make changes without such formalities. When he asked his supervisor about this, he was told that a change request was needed because the server would have to be taken offline. However, Shawn was unsure why taking the server offline would require a change request. Why do you think taking a server offline requires a formal change request? a. In order to purchase memory for the server, a purchase request would need to be generated. b. Shawn needs to determine the server's downtime threshold so he does not disrupt daily operations. c. Large companies have a bureaucracy, and all departments need to know what is going on. d. When making changes to a mission-critical device, such as a server, change request documents are

needed to protect everyone involved by documenting the processes. This ensures changes will not disrupt workflow or blame a specific employee. ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Generally, the larger an organization, the more documentation is necessary when making changes. Required processes and how these processes are documented are designed to protect the person making the change, users, managers, and the organization so that changes do not unnecessarily disrupt normal workflow or put undue responsibility for a problem on any single employee.

Page 49


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 40. True life story: Allan was an employee of a small company that had 15 people, five desktops and 10 laptops.

One of the laptop's OEM management software systems had recently notified Allan about the availability of a new BIOS update that needed to be installed. The first step was to save a copy of the old BIOS, and then the ROM was flashed with the new BIOS firmware. However, after installing the new BIOS firmware, the laptop would not turn off automatically, so the old BIOS firmware had to be reflashed. The problem was that there were 10 laptops of the same make and model in the office, all of which needed a firmware update, according to the OEM management software. Now, Allan was facing a risk. Should he update the firmware of the remaining laptops and hope the same problem doesn't occur? Or should he disable BIOS updates for all the affected laptops to prevent this problem from happening altogether? a. Shut off BIOS updates for all of the laptops. b. Take three laptops (30%) at random and see if they have the same problem. If they don't, continue

with the updates for all the laptops. If they do, stop updates for all the laptops. c. Ignore the issue and hope the next firmware update will fix the problem. d. Since there are only 10 laptops, shut off BIOS updates for the ones with the issue and continue to update for the rest of the laptops. ANSWER: RATIONALE:

d

Since there were only 10 laptops, Allan went ahead and flashed the rest of the laptops. Only one other laptop had that same problem. The two laptops that had the BIOS issues were tagged and decommissioned first and then replaced.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.2.3 - Manage assets on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) TOPICS: 2-3 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM

Page 50


Name:

Class:

Date:

Chapter 03 Addressing 1. The MAC (Media Access Control) address is on the physical layer (layer 1) of the OSI Model. It is embedded

in every NIC and is assumed to be unique to that NIC. a. True b. False ANSWER: RATIONALE:

b

The MAC (Media Access Control) address is on the Data link layer (layer 2) of the OSI Model. It is embedded in every NIC and is assumed to be unique to that NIC.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.1 - Investigate MAC addresses. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 2. What type of address is used only at the network layer for routing purposes? a. MAC address b. IP address c. AO address d. AC address ANSWER: RATIONALE:

b

An IP address is used only at the network layer for routing purposes. Routers, which function primarily at layer 3, check IP addresses to determine which network a message is destined for.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.1 - Investigate MAC addresses. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-1 KEYWORDS: Bloom's: Remember/Understand Page 51


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM 8/16/2024 12:21 PM

3. What does a switch learn when it stores a device's MAC address in its MAC address table? a. Switches use MAC addresses to identify devices not on the local network. b. Switches use MAC addresses to identify devices on the local area network. c. Switches use MAC addresses for VLAN routing. d. Switches use MAC addresses to prevent loops in ethernet networks. ANSWER: RATIONALE:

b

Switches use MAC addresses to identify devices on the local area network. As each device communicates on the network, the switch identifies the sending device's MAC address from its transmitted message.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.1 - Investigate MAC addresses. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 4. Pacheco is setting up a new router for his network. The router will also work as the DHCP server. Normally,

most routers use a Class C block of IP addresses for devices on a network, as most networks do not have more than 254 devices connected to them. However, Pacheco wants to limit the amount of IP addresses available to the network without the use of CIDR notation. Thus, he decides to define a specific range of IP addresses for the router to use. What is the defined range of IP addresses called? Choose all that apply. a. DHCP reservation b. DHCP scope c. DHCP lease d. DHCP pool ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers.

Pacheco will define a range of IP addresses for his network, called a DHCP scope or DHCP pool, to be assigned to clients when they request an address.

Page 52


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 5. Gale is using Wireshark to inspect their network and has identified an IP address of 192.168.1.10:8080. What

does this address signify? a. The host with that address is using an FTP site, and the network is utilizing SNAT (Source Network

Port Address Translation). b. The host with that address is using its web browser, and the network is utilizing PAT (Port Address Translation). c. The host with that address is receiving email, and the network is utilizing DNAT (Destination Network Address Translation). d. The host with that address is sending email, and the network is utilizing PAT (Port Address Translation). ANSWER: RATIONALE:

b

PAT (Port Address Translation) assigns a separate TCP port to each session between a local host and an Internet host. When the Internet host responds to the local host, the gateway uses PAT to determine which local host is the intended recipient.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM Page 53


Name:

Class:

Date:

6. Landers is facing issues with his networked printer. Initially, it works properly, but after a while, users are

unable to print. They receive an error message indicating that the printer cannot be found. How can Landers prevent this issue from occurring in the future? a. Landers should try a different printer. b. Landers should hardwire (USB connection) a printer to each computer and avoid the issue altogether. c. Landers should use a persistent or static IP address. d. Landers should check for issues with his DHCP server. ANSWER: RATIONALE:

c

Landers should use a persistent or static IP address for all printers. This will ensure that printer applications always locate the printer without any issues. Typically, IP addresses are leased from the DHCP server for a fixed duration of time. However, by using a static IP address, the DHCP server will not change it, providing a more reliable connection.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 7. Madian is having trouble with a computer communicating on the network. So, they check the NIC and the IP

address to determine if there is an issue. Assuming the NIC is working properly, and the IP address is accurate, why does the computer not communicate with the rest of the network? a. The default gateway is wrong. b. There is no default gateway added. c. The router has the wrong network settings. d. The subnet mask is not correct for this network. ANSWER: RATIONALE:

d

POINTS:

1

When devices on a network have different subnet masks, there are communication issues. This is because they may not agree on which addresses are part of the local network and which are remote. Such disagreements can result in certain devices being unreachable or communication being misrouted. Page 54


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 8. Which address can be routed on the Internet and is similar to public IPv4 addresses? Most begin with the

prefix 2000::/3. a. unicast address b. global address c. link local address d. loopback address ANSWER: RATIONALE:

b

The global address can be routed on the Internet and is similar to public IPv4 addresses. Most begin with the prefix 2000::/3, although other prefixes are being released. The /3 indicates that the first three bits are fixed and are always 001.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM

Page 55


Name:

Class:

Date:

9. Which IPv6 address delivers packets to all nodes in a targeted, multicast group? a. anycast address b. multicast address c. unique local unicast address d. link local unicast address ANSWER: RATIONALE:

b

The multicast address delivers packets to all nodes in a targeted, multicast group.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 10. Which IPv6 address identifies multiple destinations, with packets delivered to the closest destination? a. multicast address b. unique local unicast address c. anycast address d. link local unicast address ANSWER: RATIONALE:

c

The anycast address identifies multiple destinations, with packets delivered to the closest destination.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. Page 56


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. 3-2 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

11. What is established when a host receives a request to communicate on a port? a. socket b. session c. process d. host ID ANSWER: RATIONALE:

b

When the host receives a request to communicate on a port, it establishes or opens a session, which is an ongoing conversation with a service.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.3 - Identify the ports of several common network protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 12. What is the combination of a host's IP address and a process's TCP or UDP port, separated by a colon

called? a. socket b. session c. process d. server ID ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

A socket consists of a host's IP address and a process's TCP or UDP port, separated by a colon. For example, the standard port for the SSH (Secure Shell) service is TCP 22. If a host has an IP address of 10.43.3.87, the socket for SSH running on that host is 10.43.3.87:22.

Page 57


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.3.3 - Identify the ports of several common network protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 13. In order for an application or service to receive data, a port number must be assigned to it. What is it? a. process b. socket c. session d. process ID ANSWER: RATIONALE:

a

A port is a number that must be assigned to a process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.3 - Identify the ports of several common network protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 14. Port numbers range from 0 to 65535 and are categorized by IANA into three types. What is the port range

called ranging from 1024 to 49151 and can be used temporarily by processes for nonstandard assignments to increase security? a. dynamic and private ports b. registered ports c. private ports d. well-known ports ANSWER: RATIONALE:

b

Registered ports range from 1024 to 49151 and can be used temporarily by processes for nonstandard assignments to increase security. Default assignments of these registered ports must be registered with IANA. Page 58


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.3 - Identify the ports of several common network protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 15. Port numbers range from 0 to 65535 and are categorized by IANA into three types: What is the port range

called ranging from 0 to 1023 and is assigned by IANA to widely used and well-known utilities and applications, such as SSH, Telnet, FTP, and HTTP? a. dynamic and private ports b. registered ports c. private ports d. well-known ports ANSWER: RATIONALE:

d

Well-known ports range from 0 to 1023 and are assigned by IANA to widely used and well-known utilities and applications, such as SSH, Telnet, FTP, and HTTP.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.3 - Identify the ports of several common network protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 16. Which DNS server is contacted by clients, both local and over the Internet, to resolve DNS queries for the

organization's domains? a. forwarding DNS server b. secondary DNS server c. primary DNS server Page 59


Name:

Class:

Date:

d. caching DNS server ANSWER: RATIONALE:

c

The primary DNS server is the authoritative name server for the organization, which holds the authoritative DNS database for the organization's zones. This server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 17. DNS servers can coexist on the same machine depending on the needs of the network. a. True b. False ANSWER: RATIONALE:

a

Any of the DNS server types can coexist on the same machine, depending on the needs of the network. For example, a primary DNS server for one zone might be a secondary DNS server for a different zone within the same organization. A primary DNS server might also serve as a caching server for its local network clients. A caching server might also rely on forwarding for certain clients or certain types of traffic.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM

Page 60


Name:

Class:

Date:

18. Jaklyn attempted to access a website but was unsuccessful. Even after trying the website's name, the website

couldn't be found. However, when Jaklyn used the IP address, the website was accessible. What could be the reason that a website can be accessed using an IP address but not its name? a. The DNS servers were corrupted. b. The DNS servers were malfunctioning. c. The DNS servers were offline. d. The router was pointed to the wrong address. ANSWER: RATIONALE:

c

A few years ago, an outage occurred in the DNS system in the western region of the United States, which resulted in the name service being down for several major Internet companies for most of the day. During this time, the only way to reach these companies was if you had their IP address. Once the issue was resolved, all URL addressing returned to normal.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 19. What information does the CNAME record hold in a DNS resource record? a. holds the name-to-address mapping for IPv6 addresses b. indicates the authoritative name server for a domain c. stores the name-to-address mapping for a host d. holds alternative names for a host, such as blog.mycompany.com or shop.mycompany.com ANSWER: RATIONALE:

d

The CNAME or canonical name holds alternative names for a host, such as blog.mycompany.com or shop.mycompany.com. These names can be used in place of the canonical name, which is the complete and properly formatted name, such as www.mycompany.com.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. Page 61


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. 3-4 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

20. What is the most popular DNS server software on the market today? a. Microsoft DNS b. NDS (Name Server Daemon) c. BIND (Berkeley Internet Name Domain) d. PowerDNS ANSWER: RATIONALE:

c

BIND is one of the most widely used DNS server software. It is open-source and maintained by the Internet Systems Consortium (ISC). BIND supports all standard DNS features, including DNSSEC (Domain Name System Security Extensions) and is highly configurable. It is commonly used for authoritative DNS servers and caching resolvers. BIND is free, open-source software that runs on Linux, UNIX, and Windows platforms.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 21. Garry recently upgraded to Windows Server 2022 for his small business. Like many small businesses, he

was using outdated versions until now. During his exploration, he came across a new feature called DNS server, which is a built-in DNS service that works in conjunction with Active Directory Services. In the past, he needed two DNS servers-one for internal clients and one for external clients. However, now he can handle both types of clients with a single DNS server. What is this configuration known as? Choose all that apply. a. split-level b. split-brain c. split-control d. split-horizon Page 62


Name:

ANSWER: RATIONALE:

Class:

Date:

b, d

Today, Windows Server is capable of more nuanced configuration, called splitbrain or split-horizon deployment, to handle these two populations differently. For example, consider a fictional website, careers.example.com, that lists internal job postings for employees and different job postings and information posted to the public. DNS policies differentiate between internal and external clients, sending their requests for name resolution on the same FQDN to different IP addresses, and, therefore, different information on the website.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.3.4 - Describe domain names and the name resolution process. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. TOPICS: 3-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 22. What is the reason for pinging the IP address 127.0.0.1? Choose all that apply. a. Check to see if the router is communicating. b. Check to see if the NIC in the host is working. c. Check to see if TCP/IP services are running on the host. d. Check to see if one workstation can communicate with another workstation. ANSWER: RATIONALE:

b, c

127.0.0.1 is the loopback address. It is used to see if TCP/IP services are running on a workstation and to check the status of the NIC itself. Even though TCP/IP may be running, if the NIC is bad, there will be communication issues regardless.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand Page 63


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM 8/16/2024 12:21 PM

23. Jessie wants to check the status of all network adapters on a host. Which switch will they use with ipconfig? a. /? b. /displaydns c. /renew d. /all ANSWER: RATIONALE:

d

To display TCP/IP configuration information for each network adapter, Jessie will need to use ipconfig /all.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 24. What command is used to elevate privileges in Linux? a. enp03 b. sudo ip c. sudo d. show ANSWER: RATIONALE:

c

Elevating privileges in Linux and UNIX systems is accomplished by logging in as the root user or by temporarily elevating the current user's privileges with the sudo (superuser do) command.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and Page 64


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. 3-5 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

25. Ifconfig has been deprecated in many Linux distros. What does deprecate mean in this instance? a. is not installed by default b. can no longer be used in UNIX/Linux c. has been modified to work with newer Linux distros d. only works with certain Linux distros ANSWER: RATIONALE:

a

Ifconfig has been deprecated in many Linux distributions, including Ubuntu. This means it's not installed by default, and users are expected to use the ip command instead.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 26. Jill was conducting her weekly network check when she observed an unfamiliar IP address. She resolved to

investigate the origin of the IP address. Which network tool would be most suitable for her investigation on a Windows network? a. iplookup b. nslookup c. ipconfig d. dig Page 65


Name:

ANSWER: RATIONALE:

Class:

Date:

b

The nslookup (name server lookup) utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 27. When working on a UNIX/Linux device and needing to display basic TCP/IP information, which commands

can be used? Choose all that apply. a. ifconfig b. ipconfig c. hostname d. ip ANSWER: RATIONALE:

a, d

Similar to ip, the ifconfig utility allows you to view and manage TCP/IP settings on UNIX and Linux systems. As with ipconfig on Windows systems and ip on UNIX/Linux systems, you can use ifconfig to view and modify TCP/IP settings; however, ifconfig is older and more limited than ip.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 Page 66


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

28. Alice worked with both Linux and Windows environments and required help with TCP/IP settings. What

commands should she use to obtain help documentation? Choose all that apply. a. ipconfig /? b. hostname c. ip link show d. man ifconfig ANSWER: RATIONALE:

a, d

The man ifconfig displays the manual pages, called man pages, for the ifconfig command, which tells you how to use the command and about command parameters. This is similar to the ipconfig /? command in Windows.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 29. What is the one command that is common to Windows, UNIX, and Linux systems? a. ipconfig b. ifconfig c. ip d. hostname ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE:

1 Multiple Choice

The hostname utility offers very basic commands used to display a device's host name, either in Windows, UNIX, or Linux systems. In Windows, hostname has no additional parameters. In UNIX and Linux, hostname offers a few more options, including the ability to change the computer's name.

Page 67


Name:

Class:

Date:

HAS VARIABLES: LEARNING OBJECTIVES:

False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 30. What is the purpose of ping localhost? a. It is another way to ping the IPv6 loopback address. b. It is another way of pinging until you interrupt the ping. c. It is another way of pinging your loopback address. d. It is another way to define the number of echo requests to send. ANSWER: RATIONALE:

c

It is another way to ping the loop back address of 127.0.0.1.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 31. IPv6 is not the protocol used most for communications over the Internet. a. True b. False ANSWER: RATIONALE:

a

The majority of the Internet still uses IPv4. To access the IPv6 Internet, you can Page 68


Name:

Class:

Date:

use an IPv6 tunnel broker or an ISP or business that uses dual-stack technology, enabling communication with either IPv4 or IPv6. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 32. To see an abbreviated summary of configuration information, what tool is used? a. ipconfig /all b. ipconfig c. ifconfig /renew d. ipconfig /? ANSWER: RATIONALE:

b

The ipconfig command shows an abbreviated summary of configuration information.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 33. Jirair wants to display all IP addresses associated with a Linux device. He types "Ip address show" Page 69


Name:

Class:

Date:

and gets the message "Ip: command not found." What is the reason for this response? a. IP should have been capitalized. b. Ip address show is a Windows PowerShell command. c. He was using the wrong command. d. Linux/UNIX commands are case sensitive. ANSWER: RATIONALE:

d

Linux and UNIX commands are case sensitive. Be sure to type ip and not Ip or IP.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 34. Which utility is used by default to perform a DNS lookup in Ubuntu? a. man dig b. dnsutils c. dig d. nllookup ANSWER: RATIONALE:

c

The dig (domain information groper) utility is available on Linux and macOS and provides more detailed domain information than nslookup. It's installed by default in Ubuntu.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve Page 70


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

networking issues. 3-5 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

35. There are several computers on the network that are not keeping time properly. Since it is more than one, it

is most likely that it isn't the CMOS battery. So going from the simplest issue to the more complex, in what order should you try to resolve the issue? Trying changing to a different NTP server in case there is a network bottleneck. Check to make sure NTP port 123 is open on any relevant firewalls. Confirm the system is configured to set its time from a valid NTP server. a. 1, 2, 3 b. 3, 2, 1 c. 2, 3, 1 d. 1, 3, 2 ANSWER: RATIONALE:

c

The answers in order are: 2. Check to make sure NTP port 123 is open on any relevant firewalls. 3. Confirm the system is configured to set its time from a valid NTP server. 1. Try changing to a different NTP server in case there's a network bottleneck slowing down NTP messages from the original NTP server.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 36. Garrett is a network administrator for a business that has 200 employees with approximately thirty

employees offsite at any given time. Lately, Garrett has noticed that some employees are having trouble logging into the network, particularly during the later part of the day when more people are trying to log in. Garrett is working with a class C address scheme. What may be causing this problem? Choose all that apply. a. leases set to short Page 71


Name:

Class:

Date:

b. DHCP scope exhaustion c. DHCP pool exhaustion d. leases are set too long ANSWER: RATIONALE:

c, d

Garrett should consider increasing the size of his DHCP pool; given that he is using a class C address scheme, he may want to consider switching to CIDR. Additionally, it seems that his leases may be set too long, as not all 230 people are online or in the office at the same time. It might make more sense to set DHCP leases to last only four to eight hours, so that leases are renewed each workday instead of for a longer period.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 37. Patty was having an issue with one of her computers at the office. She was unable to access the Internet

despite having a correct DNS and static IP set up on the workstation. What could be causing the issue? a. Default DHCP gateway IP address was wrong. b. DHCP server information was missing. c. Default gateway was not set. d. Client had a bad cable. ANSWER: RATIONALE:

c

The key words are "one of her computers." The IP address was static, and only one computer was involved, so the default gateway had to be set manually.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. Page 72


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. 3-5 Bloom's: Analyze/Create/Evaluate 8/16/2024 12:21 PM 8/16/2024 12:21 PM

38. Roger is troubleshooting a computer that cannot connect to the Internet, even though the IP and subnet mask

are correct. What could be the issue? a. NIC misconfigured b. TCP/IP protocols not installed c. incorrect default gateway IP address d. DNS issues ANSWER: RATIONALE:

c

An incorrect default gateway IP address will prevent communication outside the local network, including public DNS.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 39. Delilah is experiencing difficulty with one of the workstations on her network. Although the workstation has

connectivity with other devices on the network and the Internet, most devices on the network are unable to detect it. How can this issue be resolved? a. change subnet mask b. change IP address c. change default gateway d. look for duplicate IP address ANSWER:

a Page 73


Name:

RATIONALE:

Class:

Date:

An incorrect subnet mask will result in a failed or extremely limited connection to the network. Depending on the exact misconfiguration, the computer might have outgoing connectivity with other network devices and even with the Internet. But most other network devices won't be able to find the misconfigured node for purposes of normal network communication.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 3-5 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 40. Aloise is experiencing network issues. It appears that a workstation is showing an error message upon

booting up, indicating that the IP address is already in use. What can be the issue? Choose all that apply. a. Two workstations have the same static IP address. b. Block of IP addresses has been assigned incorrectly. c. The network is suffering from DHCP pool exhaustion. d. One IP address was not reserved by DHCP. ANSWER: RATIONALE:

a, d

The duplicate IP address error message indicates that two devices on the same network are trying to use the same IP address. Usually this happens when at least one node is configured with a static IP address, and (1) another node is configured with the same static IP address, or (2) this IP address was not reserved in DHCP, and the server is attempting to assign the IP address to another node.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.3.5 - Use command-line tools to troubleshoot common network problems. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve Page 74


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

networking issues. 3-5 Bloom's: Analyze/Create/Evaluate 8/16/2024 12:21 PM 8/16/2024 12:21 PM

Chapter 04 Protocols 1. TCP/IP is a suite of protocols, or standards, that includes TCP, IP (IPv4 and IPv6), UDP, ARP, and many

others. Many of these protocols function by adding information at the end of messages transported across the network in fields called footers. a. True b. False ANSWER: RATIONALE:

b

TCP/IP is a suite of protocols, or standards, that includes TCP, IP (IPv4 and IPv6), UDP, ARP, and many others. Many of these protocols function by adding information at the beginning of messages transported across the network in fields called headers.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 2. If a router that reads and processes the network layer header and leaves alone the transport layer header. At

what layer is the router working? a. layer 3 b. layer 4 c. layer 7 d. layer 2 ANSWER: RATIONALE:

a

A router that reads and processes the network layer header and leaves alone the transport layer header is known as a layer 3 device. Page 75


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 3. Tommy is currently in the process of selecting a firewall to purchase. With several options available, each

specializing in different layers of the OSI model, he has decided to opt for a layer 7 firewall over a layer 4 firewall. Why would Tommy choose a layer 7 firewall? a. A layer 7 reads and processes the data link and higher-layer headers. b. A layer 7 firewall reads and processes the network layer header and leaves alone the transport layer

header. c. A layer 7 firewall will dig deep enough to read the transport layer header to check which port a message is directed to. d. A layer 7 firewall can read through the entire message to check for signs of malware. ANSWER: RATIONALE:

d

A layer 7 firewall is "application aware." It can identify and understand specific applications and services running on the network, such as web browsers, email clients, and instant messaging applications. This enables it to enforce policies based on the application or service being accessed, and it can read through the entire message to check for signs of malware.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM Page 76


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM

4. At the beginning of a Transmission Control Protocol (TCP) segment, TCP manages several elements by

posting data to fields in the TCP headers. What are some of these elements? Choose all that apply. a. segmenting b. sequencing c. checksum d. flow control ANSWER: RATIONALE:

b, c, d

TCP manages the following elements-the three-way handshake, checksums, sequencing, and flow control-by posting data to fields in the TCP header at the beginning of a TCP segment.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 5. Why is the ISN (Initial Sequence Number) of the first SYN message in the three-way handshake considered a

security risk? a. The ISN is outdated and full of vulnerabilities. b. The ISN is not encrypted. c. The ISN is calculated by a predictable clock-based algorithm. d. The ISN is too random. ANSWER: RATIONALE:

c

The ISN is calculated by a predictable clock-based algorithm. The existence of these algorithms, and their predictability, is actually a security loophole that hackers can use to undermine a host's availability for connections.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and Page 77


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. 4-1 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

6. Bianca is live-streaming from her friend's birthday party. What Internet protocol is most likely being used for

this service? a. TCP b. UDP c. HTTP d. SMPT ANSWER: RATIONALE:

b

User Datagram Protocol (UDP) is useful when a great volume of data must be transferred quickly, such as live audio or video transmissions over the Internet. UDP is favored for live streaming on platforms because it offers lower latency compared to Transmission Control Protocol (TCP).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 7. Which OSI layer protocols collaborate with User Datagram Protocol (UDP) to emulate some of the reliability

provided Transmission Control Protocol (TCP)? a. presentation layer b. transport layer c. physical layer d. application layer Page 78


Name:

ANSWER: RATIONALE:

Class:

Date:

d

Application layer protocols can collaborate with UDP to emulate some of the reliability normally provided by TCP. For example, RTP (Real-time Transport Protocol), which is used to transmit audio and video on the web, operates at the application layer of the OSI model and relies on UDP at the transport layer.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 8. What is the protocol that can traverse (internetwork) more than one LAN segment and more than one type of

network through a router? a. SMPT b. IP c. UDP d. MTP ANSWER: RATIONALE:

b

Internet Protocol (IP) is the protocol that enables TCP/IP to internetwork-that is, to traverse more than one LAN segment and more than one type of network through a router.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM Page 79


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM

9. Jeremy was sitting in the network operations center (NOC) watching a live stream from the president of his

company. As he was watching the feed, he noticed that the picture was a little "glitchy," occasionally patches of color would be missing from the feed. There was nothing he could do about it because of the way the feed was being transmitted. What protocol could the feed be transmitting in, and why would it look like there were errors in the feed? a. IP. It specifies where data should be delivered, identifying the data's source and destination IP

addresses, but it only provides error checking, not a correction mechanism. Not having a correction mechanism caused the packet loss. b. TCP. It provides error checking and correction mechanisms, but data streams are too big not to have any problems during broadcasting. The large size of the data stream caused the packet loss. c. UDP. It does not provide error checking or correction mechanisms, so if a packet is lost or corrupted during transmission, it will not be retransmitted, which is why the image had data packets dropping out of it. d. HTTP. Jeremy had no control over how the live feed came in, and it switched between multiple protocols including HTTP. The switching between protocols caused the packet loss. ANSWER: RATIONALE:

c

In User Datagram Protocol (UDP), each message, known as a datagram, is treated independently, and there is no built-in mechanism to ensure that they arrive in the same order that they were sent or if they arrive at all. Additionally, UDP does not provide error checking or correction mechanisms, so if a packet is lost or corrupted during transmission, it will not be retransmitted, and it's up to the application layer to handle any errors or issues. The packet loss is what causes pieces of the video and/or audio to drop out.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 10. Why is there no fragment offset field in an IPv6 packet? a. IPv6 is designed not to fragment. b. IPv6 hosts adjust their packet sizes to fit the requirements of the network. Page 80


Name:

Class:

Date:

c. Router processing does not allow for IPv6 fragmenting so there is no reason to have a fragment offset

field. d. Not having a fragment offset helps prevent certain denial-of-service (DDoS) attacks. ANSWER: RATIONALE:

b

IPv6 hosts adjust their packet sizes to fit the requirements of the network before sending IPv6 messages.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 11. Besides IP, what other protocol plays a significant role on both IPv4 and IPv6 networks? a. ARP b. NDP c. TTL d. ICMP ANSWER: RATIONALE:

d

The layer 3 protocol, Internet Control Message Protocol (ICMP), plays a significant role on both IPv4 and IPv6 networks.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM Page 81


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:21 PM

12. What is the reason as to why ARP (Address Resolution Protocol) is sometimes said to function at layer 2.5? a. It touches TCP port and IP address information at both layers. b. It touches IP and MAC address information at both layers. c. It touches MAC and router address information at both layers. d. ARP is a flexible protocol that can work in two layers at once. ANSWER: RATIONALE:

b

ARP is a layer 2 protocol that works with IPv4 in layer 3. It's sometimes said to function at layer 2.5 because it touches information (IP addresses and MAC addresses) at both layers.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 13. What are the multiple types of Address Resolution Protocols (ARP) entries? Choose all that apply. a. Dynamic ARP table entries b. Singular ARP table entries c. Multipath ARP table entries d. Static ARP table entries ANSWER: RATIONALE:

a, d

There are two types of ARP table entries: Dynamic and Static. Dynamic ARP table entries are created when a client requests information that cannot be fulfilled by data already present in the ARP table. The new information is then recorded in the table for future reference. Static ARP table entries are manually entered into the ARP table by someone using the ARP utility.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and Page 82


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. 4-1 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

14. What is the difference between an Address Resolution Protocol (ARP) table and a Media Access Control

(MAC) table? Choose all that apply. a. An ARP table maps layer 2 IP addresses to layer 1 MAC addresses. b. An ARP table maps layer 3 IP addresses to layer 2 MAC addresses. c. A MAC address table maps layer 4 IP addresses to layer 3 MAC addresses to layer 1 physical

interfaces on a device. d. A MAC address table maps layer 2 MAC addresses to layer 1 physical interfaces on a device. ANSWER: RATIONALE:

b, d

An ARP table maps layer 3 IP addresses to layer 2 MAC addresses. A MAC address table maps layer 2 MAC addresses to layer 1 physical interfaces on a device.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 15. If Address Resolution Protocol (ARP) is responsible for IPv4 network host discovery through Internet

Control Message Protocol (ICMP),, how do IPv6 devices learn about other devices on their networks? a. NS (Neighbor Solicitation) b. NDP (Neighbor Discovery Protocol) c. NA (Neighbor Advertisement) d. RA (Router Advertisement) Page 83


Name:

ANSWER: RATIONALE:

Class:

Date:

b

On IPv4 networks, host discovery is managed by ARP with help from ICMP. However, IPv6 devices learn about other devices on their networks through a process called neighbor discovery. NDP (Neighbor Discovery Protocol) information carried in ICMPv6 messages automatically detects neighboring devices and automatically adjusts when neighboring nodes fail or are removed from the network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 16. What is the purpose of the Link Layer Discovery Protocol (LLDP)? Choose all that apply. a. discover neighboring networking devices b. assign IPv6 address to its host c. discover default routers d. discover information about neighboring networking devices such as configurations or capabilities ANSWER: RATIONALE:

a, d

Networking devices might use LLDP (Link Layer Discovery Protocol) to discover neighboring networking devices along with information about those devices, such as configurations or capabilities. It is not a protocol specifically designed for router discovery.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 Page 84


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

17. The data link layer is unique because it can be divided into sublayers. What are those sublayers? Choose all

that apply. a. MAC sublayer b. LLC (logical link control) sublayer c. IP sublayer d. Ethernet sublayer ANSWER: RATIONALE:

a, b

The data link layer of a network can be divided into two sublayers, namely the LLC (logical link control) sublayer and the MAC sublayer. The LLC sublayer is responsible for identifying the type of message in an Ethernet II frame as well as handling multiplexing, flow and error control, and reliability, which requires other types of Ethernet frames. The MAC sublayer is responsible for identifying the destination and source MAC addresses, including the message, and providing the checksum in the frame's trailer.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 18. What defines the maximum payload size that a layer 2 frame can encapsulate? a. FCS (frame check sequence) b. JFU (jumbo frame unit) c. MTU (maximum transmission unit) d. FTU (frame transmission unit) ANSWER: RATIONALE:

c

MTU (maximum transmission unit) is the largest size, in bytes, that routers in a message's path will allow at the network layer. Therefore, this defines the maximum payload size that a layer 2 frame can encapsulate. Page 85


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 19. What is fragmentation and why does it happen? a. Fragmentation is the process of dividing packets that are too large for a network's hardware into

smaller packets that can safely traverse the network. b. Fragmentation is the process of making packets smaller when they traverse from one network to another with the same MTU (Maximum Transmission Unit). c. Fragmentation is the process of making packets smaller when the "Don't Fragment" flag is not set in the frame. d. Fragmentation is the process of making packets smaller when the network layer accidently makes them too big for the network. ANSWER: RATIONALE:

a

Fragmentation is the process of dividing packets that are too large for a network's hardware into smaller packets that can safely traverse the network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.1 - Describe the functions of core TCP/IP protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 20. In terms of security, data exists generally in three states. In what state is data being moved? Page 86


Name:

Class:

Date:

a. at rest b. in use c. in stasis d. in transit ANSWER: RATIONALE:

d

Data is in transit (or in motion) when it is being moved, whether that is movement from the hard drive to memory inside a computer, across a network, or across the Internet.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 21. Antonella wants to send a private email to her friend Margaret. To ensure the privacy of the email, she uses

GnuPG (GNU Privacy Guard) to create a key. She then sends the email to Margaret, and later sends the key to her. What type of encryption is Antonella using in this scenario? a. symmetric encryption b. asymmetric encryption c. authentication encryption d. AES encryption ANSWER: RATIONALE:

a

Symmetric encryption uses the same key during both the encryption and decryption of the data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Page 87


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

4-2 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

22. Danika frequently uses online banking to check her account balance, transfer funds, and pay bills. However,

she has never paid attention to the mechanism that authenticates her identity when logging in or how the system recognizes that she is using a different computer. For instance, she wonders why she receives a notification on her phone when she logs in from a new browser on a different device than she has previously used. What is this a function of? a. symmetric encryption b. asymmetric encryption c. authentication encryption d. AES encryption ANSWER: RATIONALE:

b

Asymmetric encryption protocols exist between Danika's computer and the bank's servers. The bank's server holds the public key, while Danika's browser holds the private key. In case Danika logs in from a different computer or browser, the private key is not the same. Hence, the bank's servers need to verify whether it is indeed Danika who has used her credentials to log in to the bank's website.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 23. What are digital certificates primarily used for? a. encrypting sensitive data transmitted over the Internet b. authenticating user identity during online transactions c. signing digital documents d. certifying and securing web servers where sensitive information is exchanged ANSWER: RATIONALE:

d

Digital certificates are primarily used to certify and secure web servers, especially those where financial and other sensitive information is exchanged. Page 88


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 24. Authentication is a process of ensuring that an entity is who they say they are. a. True b. False ANSWER: RATIONALE:

a

Authentication is a process of ensuring that an entity (such as a user, device, or application) is who they say they are.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 25. It is important to regularly rotate keys, replacing old keys with new ones and re-encrypting data previously

encrypted with the old key using the new one. Why is it important to rotate keys? a. Key rotation reduces the risk of data being compromised. b. Key rotation reduces the risk of losing data if a key is lost. c. Key rotation reduces the risk of an insider stealing data. d. Key rotation reduces the risk of losing an active key. ANSWER:

a Page 89


Name:

RATIONALE:

Class:

Date:

Key rotation reduces the risk of data being compromised if an attacker gains access to private keys.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 26. Effective and secure key management is critical to the safety of an organization's data, which is encrypted

using keys. Where should keys never be kept? Choose all that apply. a. code b. documents c. scripts d. secured storage device ANSWER: RATIONALE:

a, b, c

Keys should never be included in code, documents, or scripts. Instead, keys should always be stored in highly secure locations, typically on storage devices protected by HSMs (hardware security modules).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 27. DoT (DNS over TLS), pronounced dot, is the practice of securing DNS resolution requests directly using

SSL/TLS. What port does DoT use by default? Page 90


Name:

Class:

Date:

a. 443 b. 993 c. 22 d. 853 ANSWER: RATIONALE:

d

If SSL/TLS is used directly to secure DNS resolution requests, it's called DoT (DNS over TLS) and pronounced dot. By default, it uses port 853 to negotiate the connection and encrypt these DNS messages.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 28. True story: Fred was the marketing manager for a non-profit organization that collected donations through

an online portal. One day, he received a message from a donor reporting an error message that appeared when attempting to make a donation: "NET::ERR_CERT_DATE_INVALID." The donor expressed their regret that they could not donate online due to this problem, which caused the organization to lose money. Fred was uncertain about the cause of the error and involved the IT team in investigating the issue. What did the IT team discover? a. the donation software used was outdated b. error on the page c. expired SSL certificate d. expired HTTPS certificate ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols.

To ensure security, the pages used for donations required an SSL certificate. Unfortunately, the IT team discovered that the non-profit organization forgot to renew the certificate, and it expired, resulting in an error message. This caused potential donors to hesitate and refrain from making any donations. However, once the Certificate Authority (CA) holding the SSL certificate received payment, it was reinstated, and the error message disappeared.

Page 91


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 29. IPSec is an enhancement to IPv6. a. True b. False ANSWER: RATIONALE:

b

IPSec is native to IPv6.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 30. IPSec creates secure connections in five steps. Put the following steps in order of operation.

1. Key management 2. Data transfer 3. Security negotiations 4. IPSec initiation 5. Termination a. 1, 3, 2, 5, 4 b. 3, 1, 5, 2, 4 c. 4, 1, 3, 2, 5 d. 2, 4, 3, 1, 5 ANSWER: RATIONALE:

c

IPsec creates secure connections in five steps, as follows: (4) IPSec initiation, (1) Page 92


Name:

Class:

Date:

Key management, (3) Security negotiations, (2) Data transfer, (5) Termination. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 31. During the data transfer step in IPSec, a secure channel is established to facilitate secure transmissions and

then the data is encrypted before transmission. Which types of encryption can be used? Choose all that apply. a. AES (Advanced Encryption Standard) b. AH (authentication header) encryption c. SSH (Secure Shell) encryption standard d. ESP (Encapsulating Security Payload) encryption ANSWER: RATIONALE:

b, d

Data is encrypted and then transmitted. Either AH (authentication header) encryption or ESP (Encapsulating Security Payload) encryption may be used. Both types of encryption provide authentication of the IP packet's data payload through public key techniques. In addition, ESP encrypts the entire IP packet for added security.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 32. Lynn is sending a message to a colleague, who is located on the other side of the country. The message

contains information about some intellectual property that their company has recently designed. It is crucial that Page 93


Name:

Class:

Date:

the data remains confidential and is not leaked to anyone. In this scenario, which IPSec transmission mode would be the most suitable for ensuring secure communication? a. multimode b. transport mode c. tunnel mode d. dual mode ANSWER: RATIONALE:

c

To ensure secure transmission of data, the best method to use is tunnel mode, which involves a VPN. Tunnel mode encrypts the entire IP packet, allowing for secure communication to pass through the untrusted network or the Internet without exposing the original IP headers and payload to potential tampering or eavesdropping.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 33. What are the main differences between TLS and SSL? Choose all that apply. a. TLS operates at the transport layer and SSL operates at the application layer. b. TLS uses slightly different encryption algorithms than SSL. c. TLS has been depreciated and should be disabled whenever possible, but both are often enabled for

backwards compatibility. d. TLS is a weaker encryption protocol than SSL. ANSWER: RATIONALE:

a, b

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.4.2 - Secure network data and transmissions using encryption protocols.

TLS operates in the transport layer and uses slightly different encryption algorithms than SSL, but otherwise is essentially the updated version of SSL. SSL operates at the application layer and has now been deprecated and should be disabled whenever possible, leaving the more secure TLS to provide protection. In reality, you'll often see them both enabled for backward compatibility.

Page 94


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: 4-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 34. Ron received a call from one of his clients, who was experiencing issues with a workstation and needed

assistance. However, due to the distance between Ron's location and the client's office, which was over 50 miles away, Ron couldn't make it to the client's office on the same day. To solve the problem, Ron requested the client's permission to log into their computer so he could troubleshoot the issue. This is an example of what type of function? a. terminal emulation b. out-of-band management c. virtual private network d. HTTPS virtualization ANSWER: RATIONALE:

a

A terminal emulator is software that allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.3 - Configure remote access connections between devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: 4-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 35. The Telnet protocol is a utility used for terminal emulation in Telnet client-server applications that permit an

administrator or another user to remotely control a computer. However, it is no longer considered safe to use Telnet for controlling other computers. What are the reasons for this issue? Choose all that apply. a. difficult to set up compared to other protocols b. deprecated protocol c. poor authentication Page 95


Name:

Class:

Date:

d. no encryption ANSWER: RATIONALE:

c, d

Telnet provides little security for establishing a connection (poor authentication) and no security for transmitting data (no encryption).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.3 - Configure remote access connections between devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: 4-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 36. Ingrid is in charge of managing one division of her company's IT department, which is responsible for out-

of-band management. The other division of the department handles in-band management help desk issues. Ingrid likes to work in the out-of-band management division since it provides remote options that are not accessible when working in-band. What are some of the functions that are unique to an out-of-band scenario? a. power up a device b. handle software failures c. reinstall an operating system d. troubleshoot boot problems ANSWER: RATIONALE:

a, c, d

The dedicated out-of-bounds connections might allow network administrators to remotely do some of the following: power up a device, reinstall an operating system, and troubleshoot boot problems.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.4.3 - Configure remote access connections between devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: 4-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM Page 96


Name:

Class:

Date:

37. Briar needs to look up the port on which a TCP/IP service is running. Which utility should they use? a. netstat b. tracert c. tcpdump d. ifconfig ANSWER: RATIONALE:

a

The netstat utility will display the port on which a TCP/IP service is running.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 38. Diya, a network administrator, prefers using command-line tools to monitor traffic on Linux servers in her

network. What utility would Diya use to do this? a. netstat b. tracert c. tcpdump d. ping ANSWER: RATIONALE:

c

The tcpdump utility is a free command-line packet sniffer that runs on Linux and other UNIX operating systems. Because of its robust configuration options and straightforward, command-line interface, it's a popular tool among security professionals and hackers alike. When used on a network device, such as a router or switch, tcpdump can become a very powerful tool.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve Page 97


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

networking issues. 4-4 Bloom's: Remember/Understand 8/16/2024 12:21 PM 8/16/2024 12:21 PM

39. Dixon wants to confirm that the new NIC (network interface card) that he installed on a Windows computer

is working properly. What command-line utility will he use to test it? a. netstat b. tracert c. tcpdump d. ping ANSWER: RATIONALE:

d

Dixon would ping 127.0.0.1 (loopback address) to determine if the NIC was working properly.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM 40. While conducting a network audit, Hamid discovered that the Media Access Control (MAC) address of a

workstation had changed since the previous audit. What could be the explanation for this change? a. The workstation had been replaced. b. The MAC address was manually changed. c. The NIC was replaced. d. It was a virtual machine, so the virtual machine manager changed it. ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE:

1 Multiple Choice

The network interface card (NIC) of a workstation was replaced. There was no notification on the network audit about the workstation itself being replaced, and since the workstation was live and not a virtual machine (VM), the MAC address could not have been changed manually.

Page 98


Name:

Class:

Date:

HAS VARIABLES: LEARNING OBJECTIVES:

False WEST.NET+.25.4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: 4-4 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:21 PM DATE MODIFIED: 8/16/2024 12:21 PM

Chapter 05 Cabling 1. In networking, "bandwidth" can be used in multiple contexts. What are they? Choose all that apply. a. When discussing frequencies, bandwidth identifies the full range of available frequencies (the width

of the band) for a specific application. b. When discussing data rates, bandwidth identifies the full range of available frequencies (the width of the band) for a specific application. c. When discussing frequencies, bandwidth identifies the theoretical maximum number of bits per second. d. When discussing data rates, bandwidth identifies the theoretical maximum number of bits per second. ANSWER: RATIONALE:

a, d

In networking, "bandwidth" can be used in multiple contexts. When discussing frequencies, bandwidth identifies the full range of available frequencies (the width of the band) for a specific application; and when discussing data rates, bandwidth identifies the number of bits per second.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 2. Given the same maximum frequency, what new technologies offer innovative methods for increasing

theoretical bandwidth and effective data throughput? Choose all that apply. Page 99


Name:

Class:

Date:

a. modulation (converting data into a digital signal for transmission) b. modulation (sending data over an analog signal) c. encoding (converting data into a digital signal for transmission) d. encoding (sending data over an analog signal) ANSWER: RATIONALE:

b, c

New technologies such as modulation and encoding offer innovative methods for increasing theoretical bandwidth and effective data throughput given the same maximum frequency. Using modulation (sending data over an analog signal) and encoding (converting data into a digital signal for transmission), a lot more bits of data can be packed into each signal's state change. These technologies improve theoretical throughput without necessarily changing frequency or bandwidth.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 3. Why is it important to understand the difference between bits and bytes when describing data quantities

versus throughput? Choose all that apply. a. Data storage quantities are more commonly expressed in multiples of bits with a small "b" as in Gb,

such as 100 Gb hard drive. b. Data storage quantities are typically expressed in multiples of bytes and use a capital "B" as in GB for gigabytes. c. Data transmission quantities are typically expressed in multiples of bytes and use a capital "B" as in GB for gigabytes, such as 1 GBps (gigabytes per second) d. Data transmission quantities (in other words, throughput) are more commonly expressed in multiples of bits per second with a small "b" as in Gbps, such as 1 Gbps (gigabits per second). ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE:

1 Multiple Response

Data storage quantities are typically expressed in multiples of bytes. Data transmission quantities (in other words, throughput) are more commonly expressed in multiples of bits per second, although some measurements are made in bytes per hour. When representing different data quantities, a small "b" represents bits, while a capital "B" represents bytes. To put this into context, a fast Internet connection might transmit data at 1 Gbps (gigabit per second), while an SD movie file might be 1-2 GB (gigabytes) in size.

Page 100


Name:

Class:

Date:

HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 4. What are the differences between data storage and data throughput measurements? Choose all that apply. a. In data storage, the prefix "kilo" means 2 to the 10th power (written and 210), or 1024. b. In data storage, the prefix "kilo" means 10 to the 3rd power (written as 103), or 1000. c. In data throughput, the prefix "kilo" means 2 to the 10th power (written and 210), or 1024. d. In data throughput, the prefix "kilo" means 10 to the 3rd power (written as 103), or 1000. ANSWER: RATIONALE:

a, d

The difference between data storage and data throughput measures is that, with th 10 data storage, the prefix "kilo" means 2 to the 10 power (written as 2 ), or 1024. rd 3 With data throughput, "kilo" means 10 to the 3 power (written as 10 ), or 1000. In other words, data storage measurements use powers of 2, while data throughput measurements use powers of 10.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 5. What factors can cause signal degradation? Choose all that apply. a. physical media b. noise c. attenuation d. latency ANSWER:

b, c, d Page 101


Name:

RATIONALE:

Class:

Date:

Signal degradation is the reduction of signal quality or strength between the time it is transmitted and the time it is received. Three factors that can cause signal degradation are noise, attenuation, and latency.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 6. Noise, or interference, can distort a signal on a network. Signal strength changes are measured to determine

signal loss (negative) or gain (positive). How is signal strength measured? a. the change in signal strength is measured in dB (decibels) b. the change in frequency of the electromagnetic waves c. the change in signal strength is based on the signal-to-noise ratio d. the change in modulation depth or modulation index of the signal ANSWER: RATIONALE:

a

Noise, or interference, can degrade or distort a signal on a network. The change in signal strength is measured in dB (decibels). A decibel is a relative measure of signal loss (a negative number) or gain (a positive number). In other words, the loss or gain is measured as a comparison between the signal's strength at transmission versus its strength when it arrives at its destination.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 7. What are the common sources of noise that can cause interference on a network during transmission? Choose

all that apply. Page 102


Name:

Class:

Date:

a. malfunctioning network hardware b. EMI (electromagnetic interference) c. cross platform compatibility issues d. crosstalk ANSWER: RATIONALE:

b, d

There are two common sources of interference that can occur during network transmission. The first is EMI, which is caused by electrical activity from various sources including power lines, televisions, motors, copiers, fluorescent lights, microwave ovens, manufacturing machinery, and severe thunderstorms. The second source of interference is called crosstalk, which happens when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable. This interference is known as noise, and it is equal to a portion of the second line's signal.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 8. What is the transmission flaw that is the loss of a signal's strength as it travels away from its source? a. crosstalk b. FEXT c. NEXT d. attenuation ANSWER: RATIONALE:

d

The transmission flaw that is the loss of a signal's strength as it travels away from its source is attenuation.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 Page 103


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

9. Although electrons travel rapidly, they still must travel, and a brief delay takes place between the instant

when data leaves the source and when it arrives at its destination. This delay is called latency. What are some of the factors that can cause latency? Choose all that apply. a. the amount of bandwidth b. network traffic congestion c. processing delays d. transmission conversions ANSWER: RATIONALE:

b, c, d

There are several factors that can cause an increase in latency. For instance, traffic congestion that overwhelms network devices, processing delays (such as those caused by intervening firewalls or DNS resolution), collisions with other transmissions, and conversion from one type of transmission to another (such as converting from wired to wireless transmission). All these factors and more, can contribute to a delay in the transmission of data and affect the overall performance of the network.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 10. What is the most common way to measure latency on a data network? a. calculating a packet's attenuation b. calculating a packet's TTL (time to live) c. calculating a packet's hop count d. calculating a packet's RTT (round trip time) ANSWER: RATIONALE:

d

POINTS:

1

The most common way to measure latency on data networks is by calculating a packet's RTT (round trip time), or the length of time it takes for a packet to go from sender to receiver and then back from receiver to sender. RTT is usually measured in milliseconds. Page 104


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 11. A network signal may weaken as it travels due to interference. What device strengthens it? a. amplifier b. transmitter c. receiver d. switch ANSWER: RATIONALE:

a

The signal might get weaker due to noise (interference), but an amplifier can help strengthen it again.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 12. What type of crosstalk occurs between two cables? a. NEXT (near end crosstalk) b. alien crosstalk c. FEXT (far end crosstalk) d. EMI (electromagnetic interference) ANSWER: RATIONALE:

b

POINTS:

1

Alien crosstalk refers to where signals from one cable interfere with signals in another nearby cable. This interference can occur when cables are bundled together or run parallel to each other. Page 105


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 13. Whitley was watching their favorite show on one of the streaming services when suddenly the image started

to jump, and the sound began to cut in and out. What is this problem known as? Choose all that apply. a. white noise b. round trip time variance c. jitter d. packet delay variation (PDV) ANSWER: RATIONALE:

c, d

When packets arrive out of order, also known as jitter or packet delay variation (PDV), it can cause streaming video or voice transmissions to pause repeatedly, jump around, or stall out completely.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 14. Each dB up or down represents a change in power. Typically, a 3 dB loss (i.e., -3 dB) indicates that the

signal has lost half its power between the transmitter and receiver. However, it's important to note that dB loss or gain is a relative measure. Which of the following are correct answers for a loss of -3 dB? Choose all that apply. a. -3dB on 2000 watts = 1000 watts b. -3 dB on 2000 watts = 500 watts c. -3 dB on 1500 watts = 750 watts d. -3 dB on 1500 watts = 800 watts Page 106


Name:

ANSWER: RATIONALE:

Class:

Date:

a, c

As a general rule, a loss of 3 dB (that is, -3 dB) between the transmitter and receiver indicates that the signal has lost half of its power. But again, dB loss or gain is a relative measure. So in this instance, -3 dB on 2000 watts equals 1000 watts, and -3 dB on 1500 watts equals 750 watts.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 15. What is the network interface card (NIC) setting that allows signals to travel in both directions over a

medium simultaneously? a. simplex b. half-duplex c. duplex d. bi-duplex ANSWER: RATIONALE:

c

Full-duplex, also called duplex, allows signals to travel in both directions over a medium simultaneously.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 16. What is the network interface card (NIC) setting that allows signals to travel in both directions over a

medium but only in one direction at a time? a. half-duplex Page 107


Name:

Class:

Date:

b. full-duplex c. simplex d. duplex ANSWER: RATIONALE:

a

Half-duplex allows signals to travel in both directions over a medium but in only one direction at a time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 17. What network interface card (NIC) setting allows travel in only one direction? a. duplex b. simplex c. half-duplex d. full-duplex ANSWER: RATIONALE:

b

Simplex signals may travel in only one direction, which is sometimes called oneway, or unidirectional, communication.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 18. What is the term used to describe what happens when speed and duplex settings are not supported by a

neighboring device and result in a slow or failed transmission? a. speed and duplex error Page 108


Name:

Class:

Date:

b. speed and duplex fault c. speed and duplex mismatch d. speed and duplex misalignment ANSWER: RATIONALE:

c

Specifying a particular speed and duplex that's not supported by the neighboring device results in a speed and duplex mismatch and, therefore, slow or failed transmission.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 19. What form of transmission allows many signals to travel simultaneously over one medium? a. half-duplexing b. duplexing c. simplexing d. multiplexing ANSWER: RATIONALE:

d

A form of transmission that allows multiple signals to travel simultaneously over one medium is known as multiplexing. Where duplexing allows communication in two directions at once, multiplexing increases the amount of data that can be transmitted in one direction.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM

Page 109


Name:

Class:

Date:

20. What is the best way to ensure a strong signal and eliminate, or at least mitigate, noise from signal

transmissions? Choose all that apply. a. keep cables far away from each other b. proper cable design and installation c. ensure that the strength of the signal exceeds the strength of the noise d. only use brand name cable ANSWER: RATIONALE:

b, c

One way is to ensure that the strength of the signal exceeds the strength of the noise. Proper cable design and installation are also critical for protecting against noise effects.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 21. What type of crosstalk occurs between wire pairs near the source of a signal? a. alien crosstalk b. FEXT c. NEXT d. EMI ANSWER: RATIONALE:

c

NEXT (near end crosstalk) is crosstalk that occurs between wire pairs near the source of a signal.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM Page 110


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM

22. Axel is the network administrator for a mid-sized company that has offices on five nonconsecutive floors in

a 50-story building. The company is located on floors 30, 35, 36, 40, and 41, and each floor has a "telecom closet" where all of the switches and routers are located. However, the "telecom closets" on floors 30 and 41 are th vacant. The company also has an actual server room situated on the 35 floor. Lately, Axel has been receiving th st st complaints about data errors from the 30 and 41 floors. On the 41 floor, Wi-Fi users have noticed their signal strength dropping to almost zero, and their network connections frequently drop. They must resend th emails because they fail to send the first time. On the 30 floor, file transfers slow down significantly and sometimes time out. Additionally, employees experience a lot of jitter in the signal when they are streaming live presentations. How can Axel resolve this situation? a. add 1 router b. add 2 hubs c. add 1 repeater d. add 2 repeaters ANSWER: RATIONALE:

d

To compensate, Axel needs to boost the signals en route using two repeaters, one for the 30th floor and one for the 41st floor. The repeaters will regenerate a digital signal in its original form without the noise it might have previously accumulated and caused the issues that Axel had on those two floors.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 23. Eric is a sales manager at a local TV station. During conference calls with clients, he faces a frustrating

problem: he cannot have two-way conversations with them. The communication is one-sided, where he speaks first, and then the client speaks. Unfortunately, this often creates a challenge for Eric, as he sometimes needs to interrupt his clients while they are talking. Since his calls go through his computer, how can this issue be fixed? a. change his NIC settings to half-duplex b. change his NIC settings to duplex c. change his NIC settings to simplex d. change his NIC settings to bi-plex ANSWER: RATIONALE:

b

Since the calls route through Eric's computer, it is likely that his NIC needs to Page 111


Name:

Class:

Date:

have its settings changed to full-duplex, also called duplex. This way, communications can travel in both directions simultaneously. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.1 - Explain basic data transmission concepts. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 5-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 24. What is impedance, and how is it expressed? Choose all that apply. a. It refers to the measure of opposition to a current's flow through a cable. It combines resistance,

inductance, and capacitance. b. It refers to a unit of power, measuring the rate at which energy is transferred or converted. It indicates the amount of work done per unit of time. c. It is expressed in amps. d. It is expressed in ohms (Ω). ANSWER: RATIONALE:

a, d

Impedance is a measure of the opposition to a current's flow through a cable, as expressed in ohms (Ω). It combines resistance, inductance, and capacitance.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 25. Which impedance rating is better for computer networks? a. 50 ohms b. 25 ohms c. 75 ohms Page 112


Name:

Class:

Date:

d. 100 ohms ANSWER: RATIONALE:

a

An impedance of 50 ohms was determined to be a good compromise in these factors for computer networks and CB (citizens band) or ham radio connections where the effectiveness of the cable is more focused on a device's ability to transmit a signal. In contrast, 75 ohms better sustains the strength of a signal, and therefore, yields better performance for receiving devices, such as satellite and cable TV receiver boxes, televisions, radio receivers, police scanners, and audio connections in a home theater system.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 26. What type of connector is most often used with RG-6 cables? a. BNC b. F-type c. Ethernet d. Fiber ANSWER: RATIONALE:

b

F-type connectors are most often used with RG-6 cables.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM Page 113


Name:

Class:

Date:

27. Billie is a systems administrator and recently installed new coaxial cable in his office due to issues with jitter

with the exiting cable installation. He had some connectors left over from the last installation and ordered new cable. The cable was installed properly, However, after completing the installation, the jitter worsened, and employees were unable to host or participate in video meetings. How could Billie have avoided this situation? a. The connectors should have been double checked first. b. The cable run should have been checked for kinks. c. The connectors should have been specific to the cable. d. The wrong cable was installed. ANSWER: RATIONALE:

c

When sourcing connectors for coaxial cable, Billie should have specified the type of cable he needed. For instance, since he had F-type connectors, he should have made sure that he had RG-6 coax, and that F-type connectors were made specifically for RG-6 cables. That way, the connectors and cable shared the same impedance rating. If impedance ratings do not match, data errors will occur, and transmission performance will suffer.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 28. Edsel's electrical engineering firm is collaborating with an architectural firm to create a new twenty-story

building. At present, they are in the process of determining where the cable and wire locations will be for the building. What type of cable will Edsel's firm use when running it between floors? a. plenum-grade b. shielded twisted pair (STP) c. unshielded twisted pair (UTP) d. riser-rated ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE:

1 Multiple Choice

Riser-rated cable is coated with a fire-retardant jacket and is a thicker cable to make it easier to push or pull through risers in buildings or between floors. A riser is a vertical space in a building that is not designed for managing airflow, such as elevators, pipes, conduits, or ducts intended for pipes and cables.

Page 114


Name:

Class:

Date:

HAS VARIABLES: LEARNING OBJECTIVES:

False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 29. Shielded twisted pair (STP) cable and unshielded twisted pair (UTP) cable can both transmit data at the

same speeds up to a point. At what speed does STP surpass UTP? a. over 10 Mbps b. over 10 Gbps c. over 100 Mbps d. over 1 Gbps ANSWER: RATIONALE:

b

STP and UTP can both transmit data at 10 Mbps, 100 Mbps, 1 Gbps, and 10 Gbps, depending on the grade of cabling and the transmission method in use. Only STP can transmit at rates faster than 10 Gbps.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 30. Electrical signals travel at a speed supported by the conductor material, such as copper, and can approach the

speed of light. However, there are other factors that can affect the rate of data transfer. What are some of these factors? Choose all that apply. a. location of cables b. shielding c. data transmission methods d. signal frequency Page 115


Name:

ANSWER: RATIONALE:

Class:

Date:

b, c, d

Some of the factors that can affect the rate of data transfer are shielding, data transmission methods, signal frequencies, number of wires used, and errors.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 31. Fabian was requested to help resolve a wiring issue for one of his clients. It turns out that the new network

technician that they hired had manually made the cables, but the company discovered that these cables were not functional with the devices. What's the first thing that should be examined in this scenario? a. that the cables were wired to their plugs properly to T568A or T568B standards b. that there were no kinks in the cable c. that the plugs were crimped properly d. that the wires were all connected ANSWER: RATIONALE:

a

Determine if the wiring was done according to T568A or T568B standards on both sides of the cable. If the wiring is different from what is correct for the network, there will be issues with the sending and receiving of data. T568B is more common and is likely what you'll find on home and business networks. However, the federal government requires T568A on all federal contracts for backward-compatibility.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM Page 116


Name:

Class:

Date:

32. A local school district is in the process of installing new ceiling-mounted projectors in each classroom.

However, some of the classrooms have drop ceilings, and there is no power outlet in close proximity to where the projectors will be placed. How should the IT department install projectors in these rooms that lack a close proximity to a power outlet? a. pay to have power outlets installed b. use long extension cords c. use PoE (Power over Ethernet) d. do not install projectors in those rooms ANSWER: RATIONALE:

c

The school's IT department can utilize the networking infrastructure already present throughout the campus to operate power sourcing equipment (PSE) and buy projectors that are compatible with PoE, which are powered devices (PDs). By doing this, the school will not need to install any extra outlets and can make use of the existing infrastructure.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.2 - Describe various types of network cables and their related connectors. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 33. How is data transmitted through fiber-optic cable? Choose all that apply. a. sound b. laser c. electric pulses d. light-emitting diode (LED) ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.5.3 - Compare the benefits and limitations of various networking media.

Data is transmitted through fiber-optic cables by pulsing light. There are two possible light sources: Laser, which is an intense and focused light that can travel long distances with high data throughput; and LED (light-emitting diode), which is a cool-burning technology that is used on shorter connections such as between floors in a building or between a switch and a router.

Page 117


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 34. Fiber-optic cable only requires one strand of cable for full-duplex communications. a. True b. False ANSWER: RATIONALE:

b

Because each strand of glass in a fiber-optic cable usually transmits in one direction only-in simplex fashion-two strands are often needed for full-duplex communication.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.3 - Compare the benefits and limitations of various networking media. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 35. Fiber-optic cable is the industry standard for high-speed networking. What are some of the benefits of fiber-

optic cable? Select the benefits from the following list. 1. Extremely high throughput 2. Power over Ethernet (PoE) 3. Very high resistance to noise 4. Low latency 5. Excellent (though not perfect) security 6. Fast repair time 7. Ability to carry signals for much longer distances before requiring repeaters 8. Low cost a. 3, 5, 7, 8 b. 5, 7, 1, 2 c. 2, 4, 6, 5 d. 1, 3, 5, 7 Page 118


Name:

ANSWER: RATIONALE:

Class:

Date:

d

Fiber-optic cable is widely considered the best option for high-speed networking and provides the following benefits over copper cabling: (1) Exceptionally high data transfer rates. (2) Significantly less susceptibility to external interference. (3) Enhanced security features (though not completely foolproof). (4) Capability to transmit signals over much longer distances without the need for repeaters.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.3 - Compare the benefits and limitations of various networking media. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 36. Which fiber type consists of a narrow core of 8 to 10 microns in diameter and can accommodate the highest

bandwidths and longest distances (without requiring repeaters) of all wired network transmission media? a. MMF (multimode fiber) b. duplex mode fiber c. SMF (single mode fiber) d. simplex mode fiber ANSWER: RATIONALE:

c

SMF (single mode fiber) consists of a narrow core of 8 to 10 microns in diameter. Laser-generated light travels a single path over the core, reflecting very little. Because it reflects little, the light does not disperse as the signal travels along the fiber. This continuity allows SMF to accommodate the highest bandwidths and longest distances (without requiring repeaters) of all wired network transmission media.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.5.3 - Compare the benefits and limitations of various networking media. ACCREDITING STANDARDS: WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. TOPICS: Section 5-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM Page 119


Name:

Class:

Date:

37. Jeremy has recently moved to a new office space. During his visit to the network room, he noticed that none

of the cables were labeled to indicate which port they were connected to in the wall sockets located around the rooms. Which tool will Jeremy use to find the correct connections? a. multimeter b. toner and probe c. cable continuity tester d. cable performance tester ANSWER: RATIONALE:

b

Jeremy would use a toner and probe kit to find the connections. He would place the toner generator at the port in the wall and then use the locator to find which cable belongs to that port.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.4 - Apply the appropriate tool to troubleshoot common cable problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 5-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 38. Madison was summoned to a client's office due to cable connection issues. Upon arrival, Madison identified

that one of the cables had been rolled over and had acquired a dent. Therefore, she decided to measure the voltage before proceeding with the troubleshooting process. Which tool will Madison use to measure the voltage on the cable? a. multimeter b. toner and probe c. cable continuity tester d. cable performance tester ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.4 - Apply the appropriate tool to troubleshoot common cable

A multimeter is used to measure voltage to verify that a cable is properly conducting electricity-that is, whether its signal can travel unimpeded from one node on the network to another.

Page 120


Name:

Class:

Date:

problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 5-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 39. As a standard procedure, Kim checks cable connections before she plugs anything into her network. As she

is checking a cable, she discovers that the wire has a crossed pair. Which is the tool she is using to make this determination? a. toner and probe b. cable performance tester c. multimeter d. cable continuity tester ANSWER: RATIONALE:

d

In troubleshooting a physical layer problem, the cause of a problem might be found by simply testing a cable's continuity (cable continuity tester)-that is, whether it is carrying a signal to its destination. As an example, two pairs are reversed with each other when they shouldn't be. For example, perhaps the wires of the green pair starting at pins 3 and 6 are inserted where the wires of the blue pair should go at pins 4 and 5, and vice versa.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.4 - Apply the appropriate tool to troubleshoot common cable problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 5-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 40. Joel is experiencing problems with a segment of his fiber-optic network. He had some work done on one of

the cables recently and the cable had to be spliced. However, he suspects that the splice might be faulty and wants to test it to confirm. Which tool should Joel use to determine if there is a faulty splice or any other issues with his fiber-optic network? Page 121


Name:

Class:

Date:

a. toner and probe b. cable performance tester c. OTDR (optical time domain reflectometers) d. cable continuity tester ANSWER: RATIONALE:

c

Performance testers working with fiber-optic connections often use a device called an optical time domain reflectometer (OTDR). This tool sends light-based signals of different wavelengths over the fiber. By analyzing the return light signal, the OTDR can determine the location of faulty splices, breaks, bad or mismatched connectors, or bends, among other issues.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.5.4 - Apply the appropriate tool to troubleshoot common cable problems. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 5-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM

Chapter 06 Wireless Networking 1. The wireless spectrum is defined by the Federal Communication Commission (FCC) as a range of

frequencies or bands. What is the range of frequencies? a. 50 kHz and 500 kHz b. 9 mHz and 300 THz c. 9 kHz and 300 GHz d. 1 kHz and 300 GHz ANSWER: RATIONALE:

c

As defined by the FCC, which controls its use in the United States, the wireless spectrum spans frequency ranges or bands between 9 kHz and 300 GHz.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. Page 122


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 6-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

2. When multiple wireless devices transmit a signal at the same time on the same frequency, signals can

interfere with one another, which is called a collision. Why do collisions reduce network performance? a. the signal breaks apart b. the signal degrades c. the signal bounces around the network d. the signal must be retransmitted ANSWER: RATIONALE:

d

Collisions reduce network performance because the signals must be retransmitted.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 3. Which wireless technology transmits short bursts of data on a particular frequency within the band and then

moves to the next frequency in the sequence? a. FHSS (frequency hopping spread spectrum) b. DSSS (direct sequence spread spectrum) c. MIMO (multiple input multiple output) d. OSPF (open shortest path first) ANSWER: RATIONALE:

a

Frequency hopping spread spectrum (FHSS) is a short burst of data transmitted on a particular frequency within the band, and the next burst goes to the next frequency in the sequence. Frequency hopping can happen hundreds of times a second.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and Page 123


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. Section 6-1 Bloom's: Apply 8/16/2024 12:22 PM 8/16/2024 12:22 PM

4. Which wireless technology divides data streams and encodes them into small chunks called chips, which are

spread over all available frequencies at the same time? a. FHSS (frequency hopping spread spectrum) b. MIMO (multiple input multiple output) c. DSSS (direct sequence spread spectrum) d. Omnidirectional sequence ANSWER: RATIONALE:

d

Direct sequence spread spectrum (DSSS) data streams are divided and encoded into small chunks, called chips, which are spread over all available frequencies, all at the same time. The process of dividing and encoding the data is called chipping, and the spreading ratio used to transform the data is called the chipping code, which is unique to each device.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 5. What is the term for the geographic area that can be covered by an antenna or wireless system? a. omnidirectional location b. frequency c. reach d. range ANSWER: RATIONALE:

d

POINTS:

1

The geographical area that an antenna or wireless system can reach is known as its range. Receivers must be located within a transmitter's range to consistently receive accurate signals. Page 124


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 6. Jackson needs to set up a dedicated Wi-Fi signal for his company's conference room using a point-to-point

transmission. Which antenna should he use? a. unidirectional b. omnidirectional c. narrow directional d. DSSS directional ANSWER: RATIONALE:

a

Point-to-point links operate in a single direction, allowing for greater energy to be applied to signal propagation through a unidirectional antenna. Additionally, the unidirectional antenna focuses a narrow beam to ensure that the signal only travels to the specific area chosen by the company.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 7. RSSI measures the power of the signal on the receiver's end and is displayed as negative dBm values. The

scale used for RSSI measurement varies by manufacturer but typically, RSSI is displayed as negative numbers. What would be the best rating of the four numbers below? a. -90 dBm b. -70 dBm c. -50 dBm d. -30 dBm Page 125


Name:

ANSWER: RATIONALE:

Class:

Date:

d

The scale used for this measurement varies by manufacturer, but typically, because RSSI is displayed as negative numbers, closer to 0 is better.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 8. As a wireless signal moves away from the transmission source, it becomes weaker. What is this phenomenon

called? a. fading b. interference c. attenuation d. refraction ANSWER: RATIONALE:

c

After a signal is transmitted, the farther it moves away from the transmission source, the weaker it becomes. This is called attenuation.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 9. As a wave travels into and through a different transmission medium, such as when traveling through glass or

other solids, the wave's direction, speed, and wavelength are altered. What is this phenomenon called? a. fading b. reflection c. interference Page 126


Name:

Class:

Date:

d. refraction ANSWER: RATIONALE:

d

As a wave travels into and through a different transmission medium, such as when traveling through glass or other solids, the wave's direction, speed, and wavelength are altered. This is called refraction.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 10. When the wave encounters an obstacle and reflects, or bounces back, toward its source, a wireless signal

will bounce off objects whose surface dimensions are large compared with the signal's average wavelength. What is this phenomena called? a. fading b. reflection c. interference d. refraction ANSWER: RATIONALE:

b

When the wave encounters an obstacle and reflects, or bounces back, toward its source a wireless signal will bounce off objects whose surface dimensions are large compared with the signal's average wavelength. This is called reflection.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 11. Jenine was having issues with her home network, i.e., getting one segment of her wireless network to

connect to her wired network. One segment worked fine, but the other would not connect, even though the Page 127


Name:

Class:

Date:

network name on both segments and the wired network were the same. What can be causing this issue? Choose all that apply. a. incompatible wireless APs (Access Points) b. access points too far from router c. channel mismatch d. password is incorrect ANSWER: RATIONALE:

c, d

There could be two possible reasons why Jenine is unable to connect to the Wi-Fi. First, the channel selection needs to be set to auto on all devices. If it's not, then it's possible that the access point is on the wrong channel. Second, it's possible that the password that Jenine is using to connect is incorrect. If the password is incorrect, then the access point will not connect. Since this is a home network, it's unlikely that the coverage area is too large for the access points to connect to the router. Additionally, all Wi-Fi routers are backwards-compatible so that should not be a problem.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.1 - Describe characteristics of wireless transmissions. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 12. In what order were the Wi-Fi standards released?

1. 802.11a 2. 802.11g 3. 802.11b 4. 802.11ac 5. 802.11n 6. 802.11ax 7. 802.11be a. 1, 2, 3, 4, 5, 6, 7 b. 3, 1, 2, 5, 4, 6, 7 c. 2, 1, 5, 4, 3, 6, 7 d. 5, 6, 7, 3, 4, 2, 1 ANSWER: RATIONALE:

b

The order in which Wi-Fi standards were released was 802.11b (3), 802.11a (1), Page 128


Name:

Class:

Date:

802.11g (2), 802.11n (5), 802.11ac (4), 802.11ax (6), and 802.11be (7). POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.2 - Explain 802.11 standards. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 13. What are some of the factors that influence the effective range of wireless technology? Choose all that

apply. a. power of the antenna b. magnetic fields c. physical barriers d. interference in the environment ANSWER: RATIONALE:

a, c, d

Some of the factors that can affect the range of wireless technology include the power of the antenna, physical barriers or obstacles between sending and receiving nodes, and interference in the environment.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.2 - Explain 802.11 standards. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 14. Jason has a problem with his network. He recently switched to Wi-Fi from Ethernet since he thought it

would be much easier to manage, as he would add workstations with Wi-Fi NICs as his company grew, instead of adding a cable drop for each new employee that needed a computer. He has a large office space that was not a standard shape and had many out-of-the way offices that needed coverage. As he started adding people, but not nodes, he noticed his network was having many more packet collisions issues than during his original Page 129


Name:

Class:

Date:

baseline network assessment. What is this problem called, and how can he fix it? a. the Wi-Fi paradox b. AP overload barrier c. the hidden node problem d. concealed AP dilemma ANSWER: RATIONALE:

c

This is called the hidden node problem, where a node is not visible to other nodes on the other side of the coverage area. Nodes that are physically located far apart from each other on a wireless network present a particular challenge to avoiding collisions because they are too far apart to detect each other's transmissions to a central AP. As employees moved into the office they moved farther away, and the nodes became less visible to each other, causing the increase in packet collisions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.2 - Explain 802.11 standards. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. TOPICS: Section 6-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 15. What are some examples of IoT devices? Choose all that apply. a. bathroom scale b. garage doors c. DVD player d. radio ANSWER: RATIONALE:

a, b

An IoT device can be any sensor, computer, or wearable device that talks to other devices over a network. However, a device that is not considered an IoT (Internet of Things) device typically requires human interaction or control and is not primarily focused on collecting and transmitting data from the environment.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 Page 130


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

16. In an enterprise setting, configuring wireless access for clients to the network can be a complex process.

What is involved in the onboarding process? Choose all that apply. a. The agent scans the device for any inappropriate materials and flags them to be removed from the

device. b. Users or network technicians install a specific app called an agent on a user's device, which gives the device trusted access to certain portions of the network. c. Certain network administrative features might all be controlled by the device's permission levels enabled by on boarding that device. d. The agent might also scan the device for any needed OS or security updates, required security settings (such as timeouts or sign-in requirements), and any existing malware. ANSWER: RATIONALE:

b, c, d

Users or network technicians install a specific app called an agent on a user's device, whether the device is a smartphone, laptop, or tablet. This gives the device trusted access to certain portions of the network. Access to email services, filesharing services, and certain network administrative features might all be controlled by the device's permission levels enabled by onboarding that device. The agent might also scan the device for any needed OS or security updates, required security settings (such as timeouts or sign-in requirements), and any existing malware.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 17. When setting up a network router, the first step that any networking professional should take is to change the

default SSID, username, and password of the device. These are crucial steps that should be followed whether setting up a SOHO network or a corporate network. Why are these steps so crucial? a. Default usernames and passwords can be easily guessed. b. Default SSIDs are easy to fake. c. Default SSIDs and their accompanying usernames and passwords are easily found. d. Usually, with brand new routers, there is no username or password, it's just the SSID. ANSWER: RATIONALE:

c

It is essential to change the default SSIDs, usernames, and passwords of routers; Page 131


Name:

Class:

Date:

they are easily accessible on both the dark web and genuine websites. Typically, the default SSID is the make and model of the router, and it becomes visible as soon as it starts broadcasting. Anyone can see it, and a malicious actor could leverage that information to access the router and cause significant damage. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 18. When an employee leaves a company, IT is responsible for offboarding. What is IT's role in offboarding? a. collecting company property from the departing employee, such as access badges or keys b. facilitating knowledge transfer from the departing employee to their successor or colleagues to ensure

continuity of work and mitigate knowledge loss c. conducting exit interviews to gather feedback from the departing employee and identifying areas for improvement d. revoking access to company data and removing company-related software from the employee's devices ANSWER: RATIONALE:

d

IT's role in offboarding is the process of revoking access to company data and removing company-related software from the employee's devices.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 19. Gavin just lost his company phone and reported the loss to the IT department. Since IT does not have

physical access to the device, what will they do to ensure that their data does not fall into the wrong hands? a. remote call b. remote lock c. remote wipe Page 132


Name:

Class:

Date:

d. remote access ANSWER: RATIONALE:

c

Remote wipe allows for complete device erasure, including data, apps, and permissions, without physical access. It may also disable the device and block network access.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 20. Why are onboarding and offboarding policies especially critical in a BYOD (bring your own device)

environment? Choose all that apply. a. It gives the IT department permission to monitor device activity or to wipe data from the device with

or without further notice. b. The IT staff can ensure the safety of the network while allowing access to a wide range of employeeowned devices using network resources. c. It allows IT staff to monitor employee conduct to prevent them from engaging in illegal activities. d. It allows for IT staff to monitor company data on personal devices to ensure that personal data is not commingled with the company's sensitive information, and to keep the company's intellectual property safe. ANSWER: RATIONALE:

a, b, d

In a BYOD (bring your own device) environment, onboarding and offboarding policies are particularly crucial. IT staff is responsible for ensuring the network's safety while allowing access to a broad range of employee-owned devices using network resources. IT staff must also be authorized to monitor device activity and wipe data from the device, with or without prior notice, in order to protect the company's intellectual property.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.3 - Plan a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 6-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM Page 133


Name:

Class:

Date:

21. What is the purpose of encryption? a. prevent unauthorized users from accessing a network b. keep information private c. regulate and control access to data d. increase the speed of data transmission over networks ANSWER: RATIONALE:

b

The purpose of encryption is to keep information private. Encryption scrambles data transmitted over the airwaves into a format that cannot easily be interpreted if the signal is intercepted.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 22. What forms of authentication are provided by Wired Equivalent Privacy (WEP)? Choose all that apply. a. TKIP (Temporal Key Integrity Protocol) b. OSA (Open System Authentication) c. AES (Advanced Encryption Standard) d. SKA (Shared Key Authentication) ANSWER: RATIONALE:

b, d

There are two types of authentication offered by WEP, and they are no longer considered secure. The first is Open System Authentication (OSA), where no key is used at all. In this method, the wireless access client only needs to know the access point's SSID to request authentication. The second is Shared Key Authentication (SKA), where all wireless access clients use the same key (or one of a few keys), which can then be used to encrypt transmissions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. Page 134


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Section 6-4 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

23. Marcelo is aware of the WPA3 Wi-Fi protocol and would like to switch to it. He bought his router in 2020,

and the protocol was introduced in 2018, so his router should have it. However, when he tries to turn it on through the router's web interface, he can't find the setting. What could be the reason that WPA3 is not available on Marcelo's router? Choose all that apply. a. His router is defective. b. The router is WPA3 compatible, but the firmware has not been updated. c. The mandate to make all routers WPA3 compatible did not apply to the router that Marcelo

purchased. d. He is searching in the wrong location in the router settings. ANSWER: RATIONALE:

b, c

It is possible that Marcelo's router is compatible with WPA3, but it may require a firmware update to function correctly. Manufacturers often take time to release firmware and software updates after a product launch. Another reason why the product that Marcelo purchased may not be WPA3 compatible is that it may have been built and shelved before the mandate was in effect.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 24. Temporal Key Integrity Protocol (TKIP) was added to address the encryption issues of WEP. What were the

significant improvements of adding TKIP? Choose all that apply. a. key distribution Page 135


Name:

Class:

Date:

b. encryption c. message integrity d. accessibility ANSWER: RATIONALE:

a, b, c

TKIP achieved three notable enhancements. First, it assigns a unique key to every transmission for improved key distribution. Second, it uses encryption provided by RC4 (Rivest Cipher 4), a cipher that is now considered insecure but still widely used. Third, it uses a message integrity code named Michael, which ensures that incoming packets are indeed originating from their stated source. This process is also known as packet authentication.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 25. In WPA, TKIP aimed for backwards-compatibility, but WPA2's CCMP (Counter Mode with Cipher Block

Chaining Message Authentication Code Protocol) ensures future-focused data confidentiality. How does CCMP provide encryption and packet authentication? Choose all that apply. a. message integrity b. message encryption c. message accessibility d. message confidentiality ANSWER: RATIONALE:

a, b

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) provides encryption and packet authentication to ensure that incoming packets are indeed coming from their declared source. To achieve this, CCMP uses the block cipher algorithm AES (Advanced Encryption Standard) for encryption and message integrity. Compared to TKIP, AES offers faster and more secure encryption for wireless transmissions. It uses a sophisticated family of ciphers and multiple stages of data transformation to ensure data security.

Page 136


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 26. What is the essential difference between a block cipher and a stream cipher? Choose all that apply. a. A stream cipher encrypts one bit or byte of data at a time. b. A block cipher encrypts one bit or byte of data at a time. c. A stream cipher encrypts large chunks of data at a time. d. A block cipher encrypts large chunks or blocks of data at a time. ANSWER: RATIONALE:

a, d

The types of cipher algorithms are stream ciphers and block ciphers. The essential difference is that stream ciphers encrypt one byte (or possibly one bit) at a time, while block ciphers encrypt much larger chunks, or blocks, at a time in each calculation.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 27. Randy is setting up security for his home network. Which Wi-Fi security protocol will he use for his home

network environment? a. WPA2-PSK b. WPA c. WEP Page 137


Name:

Class:

Date:

d. WPA-Enterprise ANSWER: RATIONALE:

a

WPA2-PSK, where PSK stands for pre-shared key, is the most common configuration on home wireless networks. Randy will need to enter a passphrase for his device to authenticate to the network and for WPA2 and WPA3, the passphrase and the SSID characters are then used to calculate a unique encryption key for each device.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 28. Authentication and authorization are two distinct processes. What distinguishes these two processes?

Choose all that apply. a. Authorization is the sign-in process. b. Authentication determines what the entity can do once it gets into the resource. c. Authentication is the sign-in process. d. Authorization determines what the entity can do once it gets into the resource. ANSWER: RATIONALE:

c, d

Authentication is the sign-in process that allows an entity (such as a user, device, or application) to connect to a resource such as a network if they provide the correct credentials, such as username and password. Authorization determines what the entity can do once it gets into the resource. For example, any employee might be allowed to sign into the network (authentication), but only an administrator has permission to edit user accounts (authorization).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. Page 138


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Section 6-4 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

29. Shaunda is the owner of a café and wants to provide Internet access for her customers. However, she does

not want them to access the company network, go beyond the café's perimeter, or engage in any illegal activities on the network. What security configurations should she make to her Wi-Fi network to ensure that it is set up securely? Choose all that apply. a. geofencing b. guest network c. warning banner d. captive portal ANSWER: RATIONALE:

a, b, d

Shaunda should implement geofencing to restrict access to her guest network and company network to those only within the perimeter of her café. This is to prevent anyone from outside the perimeter attempting to hack her network. In addition, it's recommended that she create a guest network to keep her customers separate from her company network. Finally, by setting up a captive portal, Shaunda can inform her customers about acceptable behavior on her network and warn them of possible legal consequences if they engage in illegal activities. As a side note, although not listed, she should always run an up-to-date anti-virus, anti-malware program.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 30. What are some common security threats to Wi-Fi networks? Choose all that apply. a. war driving b. evil twin Page 139


Name:

Class:

Date:

c. WPS/brute force attack d. RFID attack ANSWER: RATIONALE:

a, b, c

Wi-Fi networks can be vulnerable to various security threats such as war driving, evil twin attacks, WPS attacks, and brute force attacks. WPS or Wi-Fi Protected Setup is a feature created to simplify the process of connecting devices to a secure Wi-Fi network. It does this by allowing the use of a push button on the router or a pin number provided by the manufacturer, instead of having to enter a long passphrase. However, this convenience comes at the cost of security. Using the push button mode or pin number method makes the device to network connection less secure and creates an entry point for hackers. Therefore, it's important to be aware of these security threats and take necessary measures to prevent them in order to protect your Wi-Fi networks.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 31. True story of another ATM scam. This has been reported happening in California and involves a wireless

technology called near-field communications (NFC). A customer goes to an ATM to withdraw cash. However, they find that the ATM card slot is jammed. At this point, a outwardly kind individual suggests that they use the tap function on their card to withdraw the money. The customer then uses the tap function to withdraw their money. They successfully complete their transaction and leave the ATM. However, when they receive their bank statement at the end of the month, they discover that an additional $3,000 has been taken from their account. How could that have happened? Choose all that apply. a. The ATM malfunctioned, and the money was not withdrawn. It was a glitch. b. The tap function requires that the transaction be closed manually. c. The customer did not close out the transaction. d. The outwardly kind person is really the bad actor. ANSWER: RATIONALE:

b, c, d

When using the tap function instead of the ATM card slot, customers are required to close out the transaction manually by pressing "no" at the end of the transaction. However, in this case, the customer did not do that. Unfortunately, the person who suggested using the tap function was the bad actor who took Page 140


Name:

Class:

Date:

advantage of the situation. They walked up to the ATM and withdrew money from the customer's account because the customer walked away without closing out the account information, mistakenly believing that the ATM would automatically close it after the transaction had been completed. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.4 - Secure a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.2.3 - Given a scenario, select and configure wireless devices and technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 6-4 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 32. What type of analyzer can evaluate Wi-Fi network availability as well as help optimize Wi-Fi signal settings

or help identify Wi-Fi security threats? a. Wi-Fi analyzer b. protocol analyzer c. packet analyzer d. spectrum analyzer ANSWER: RATIONALE:

a

A Wi-Fi analyzer is a tool that scans the frequencies used by Wi-Fi networks in a particular area. It listens for beacon frames and other management frames sent by Wi-Fi access points. Once it detects a Wi-Fi network, it measures the signal strength of the network. This measurement helps to determine the strength or weakness of the signal at a particular location. Wi-Fi analyzers are also useful in detecting which channels are being used by nearby networks. This information is crucial in selecting the least congested channel for optimal Wi-Fi performance.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM Page 141


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM

33. What are some common reasons why a Wi-Fi client cannot connect to the AP? Choose all that apply. a. wrong SSID b. encryption protocol mismatch c. incorrect passphrase d. short passphrase ANSWER: RATIONALE:

a, b, c

There are a few common reasons why a Wi-Fi client may not be able to connect to an Access Point (AP). This situation could be due to the wrong SSID being selected by the wireless client. In order to connect, the correct SSID must be selected. There could be an encryption protocol mismatch. This means that the wireless client must be configured to support the same encryption protocols offered by the access point. If this is not the case, the client will not be able to connect. An incorrect passphrase or security key could be the issue. If the passphrase or key does not match that of the access point, the client will not be authenticated and will be unable to connect.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 34. SSIDs are case sensitive. MYCAR does not equal MyCar. a. True b. False ANSWER: RATIONALE:

a

SSIDs are case sensitive. MYCAR does not equal MyCar.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Remember/Understand Page 142


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM 8/16/2024 12:22 PM

35. Debbie is trying to connect to her router. She has the SSID correct but still cannot log in. What could be the

problem? a. She is trying to log into an evil twin. b. The passphrase is case sensitive, and she accidentally left her caps lock on. c. Her hardware is not compatible. d. Her network interface card (NIC) failed. ANSWER: RATIONALE:

b

Debbie is inputting the correct passphrase but has her caps lock on and doesn't realize it.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 36. Marica purchased a new doorbell camera that broadcasts on the 2.4 GHz band. However, the new AP she

purchased only broadcasts on the 5 GHz band. What issue will arise from this scenario? a. The AP and doorbell camera will occasionally fail to communicate but will still work. b. The AP and doorbell camera will need a bridge to communicate. c. The AP and doorbell camera will be able to communicate slower than normal. d. The AP and doorbell camera will not be able to communicate. ANSWER: RATIONALE:

d

This scenario is called a mismatched RF band, and as a result, the AP and doorbell camera will be unable to communicate.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Apply Page 143


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM 8/16/2024 12:22 PM

37. Anna has an access point that is compatible with Wi-Fi 1 through Wi-Fi 5. She just bought a new computer

that is capable of using Wi-Fi 6, but when she tests the speed from her computer to her AP, she is only able to reach Wi-Fi 5 speeds. What is the reason? a. Anna needs to upgrade her firmware on both devices. b. Anna's device is not forward compatible. c. Anna needs to check with her Internet provider. d. Anna's AP is defective. ANSWER: RATIONALE:

b

It is impossible for a device to work with newer versions that weren't released when the original device was manufactured, although most devices can work with older versions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 38. What are some of the possible reasons for an AP association to get stuck? Choose all that apply. a. edge of the network's coverage range b. environmental factors c. MAC address filtering d. faulty Ethernet cable ANSWER: RATIONALE:

a, b, c

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network.

There are a few potential causes for an AP association to become stuck. One possibility is that the client device is situated near the edge of the network's coverage area. Additionally, physical obstacles could be obstructing the signal. Finally, it's possible that MAC address filtering has been enabled, preventing the device from connecting if its MAC address isn't on the approved list. A faulty Ethernet cable is not relevant in this situation since the issue pertains to wireless connectivity.

Page 144


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 39. Vasyl resides on the first floor of an apartment building just above the garage. Recently, he noticed that

whenever he enters the garage from the street or is parked outside his unit, he can easily log in to his home network. He is concerned about the security of his network and wants to know how he can prevent any unauthorized access from outside the apartment or from within the underground garage. How can Vasyl fix this issue? Choose all that apply. a. put carpets on the floor to absorb the signal b. lower the power levels on the router c. move APs away from exterior walls d. put tinfoil around the back of the router to keep the signal from propagating ANSWER: RATIONALE:

b, c

Most routers come with their power settings set to 100%. Therefore, Vasyl should adjust the power settings until the signal can no longer reach the outside. He might have to move the router to a higher position and decrease the power by 50% or more. If Vasyl has access points installed around his apartment, he should ensure that they are not located near windows or walls that face outside. Placing them closer to the center of the apartment will also help to reduce signal leakage to the outside.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 40. Nathan's wireless network is located in a busy company that employs about 50 people. Every day around

noon, when the lunch rush starts, he notices that the wireless signal becomes spotty. Sometimes it drops to barely any signal, and sometimes it drops altogether. However, after the lunch rush, the network works normally again. What might be causing this issue? a. interference from electromagnetic interference (EMI) b. channel overlap Page 145


Name:

Class:

Date:

c. signal degradation d. insufficient wireless coverage ANSWER: RATIONALE:

a

Nathan is having trouble with electromagnetic interference (EMI). During the lunch rush, devices like microwaves, refrigerators, and other equipment that emit EMI are working more than usual. As a result, EMI levels are higher during lunch hours, which cause Wi-Fi connectivity issues.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.6.5 - Troubleshoot a Wi-Fi network. ACCREDITING STANDARDS: WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 6-5 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM

Chapter 07 Network Architecture 1. The overall network design, the devices involved, how they're configured, the services implemented to

support the network, and the way that devices are connected to the network are called a network's architecture. a. True b. False ANSWER: RATIONALE:

a

The overall network design, the devices involved, how they're configured, the services implemented to support the network, and the way that devices are connected to the network are called a network's architecture.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical Page 146


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

2. Which device can be configured via a command-line interface or web-based management GUI (graphical

user interface), and can sometimes be configured in groups? a. unmanaged switch b. managed router c. managed switch d. unmanaged router ANSWER: RATIONALE:

c

A managed switch can be configured via a command-line interface or a webbased management GUI (graphical user interface), and sometimes can be configured in groups. In some situations, they are also assigned IP addresses for the purpose of continued management.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 3. Hazel wants a switch to enhance her firewall's capabilities. The switch should provide advanced filtering and

security functions. What type of switch matches those specifications? Page 147


Name:

Class:

Date:

a. managed switch b. unmanaged switch c. layer 3 switch d. layer 4 switch ANSWER: RATIONALE:

d

A layer 4 switch, also known as a content switch or an application switch, can interpret higher-layer data to enable advanced filtering, statistics tracking, and security functions, which will make it a good addition to her firewall.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 4. What is the first layer of defense to prevent a MAC flooding attack? Choose all that apply. a. disable physical ports b. disable virtual ports c. disable ephemeral ports d. disable WAN port ANSWER: RATIONALE:

a, b

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture.

As a first layer of defense, unused physical and virtual ports on switches and other network devices should be disabled until needed.

Page 148


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 5. What status listed below indicates that a switch port is down? Choose all that apply. a. administratively down b. error disabled c. auto disconnect d. suspended ANSWER: RATIONALE:

a, b, d

There are different ways to disable switch ports, and they are indicated by the following statuses: Administratively down, which means the port was disabled by an admin or in response to an admin's configuration; Error disabled, which is when the port was automatically shut down due to a problem of some kind; and Suspended, which is when the port configuration is experiencing a compatibility issue with other ports.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical Page 149


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

6. What is the command for disabling a port on a Cisco switch? a. shutdown b. disable c. switchport port-security d. shutoff ANSWER: RATIONALE:

a

You can disable a port on Cisco and Arista routers and switches with the shutdown command.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 7. Juan's company uses the hierarchical three-tiered network architecture approach developed by Cisco and

other manufacturers. Juan is currently in the process of purchasing switches to connect directly to hosts, including servers, printers, and workstations. What type of switches are these? Choose all that apply. a. distribution layer b. access layer Page 150


Name:

Class:

Date:

c. edge layer d. core layer ANSWER: RATIONALE:

b, c

Juan is purchasing access layer, or edge layer, switches. These consist of workgroup switches connected directly to hosts such as servers, printers, and workstations. Ideally, hosts only connect to access switches and never to switches at the other layers, although this is not always the case in the real world. Access switches typically organize traffic according to OSI layer 2 technologies.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 8. What is ToR (top of rack) switching, and what are some of its benefits? Choose all that apply. a. The ToR switches are the fastest switches and can handle the most data. b. The ToR switches connect all other devices in the rack to the rest of the network. c. Their location in the rack requires fewer switches, and, therefore, fewer hops. d. Their location in the rack often provides the best accessibility and cable management. ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

The ToR switch connects all other devices in the rack to the rest of the network. While ToR switches are not necessarily positioned physically at the top of the rack, the top location in the rack often provides the best accessibility and cable management.

Page 151


Name:

Class:

Date:

LEARNING OBJECTIVES:

WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 9. What is EoR (end of row) switching, and what are some of its benefits? Choose all that apply. a. EoR switching places several leaf switches in a rack at the end of each row of racks or in the middle

of each row. b. EoR switching places several leaf switches in a rack at the beginning of each row of racks or at the end of each row. c. This approach requires fewer switches (and, therefore, fewer hops for much of the network's traffic) and less rack space. d. The bottom location in the rack often provides the best accessibility and cable management. ANSWER: RATIONALE:

a, c

EoR is more horizontal in orientation. Instead of placing a switch at the top of each rack, EoR switching places several leaf switches in a rack at the end of each row of racks or in the middle of each row-called MoR (middle of row) switching. This approach requires fewer switches (and, therefore, fewer hops for much of the network's traffic) and less rack space, but more cabling and more work at cable management.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. Page 152


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

10. What is the benefit of keeping the bulk of a network's cabling within the rack for very short connections?

Choose all that apply. a. easier to troubleshoot when issues occur b. network requires less cable overall c. provides increased flexibility in the network design d. very high speed cable can make very short cable runs ANSWER: RATIONALE:

b, c, d

Keeping the bulk of a network's cabling within the rack for very short connections means that the network requires less cabling overall and provides increased flexibility in the network design. Very high speed cables can make very short cable runs.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand Page 153


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM 8/16/2024 12:22 PM

11. Each leaf switch is connected to every spine switch; therefore, messages must traverse fewer hops to reach

their destination. What does it mean when messages need fewer hops to reach their destination? a. a decrease in latency b. an improvement in redundancy c. an increase in performance d. an increase in security ANSWER: RATIONALE:

a

Messages take fewer hops to reach their destination because each leaf switch connects to every spine switch. Less time to destination means less latency.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 12. In the world of networking, what does the term "availability" mean? a. the amount of time a network administrator is available to respond to user complaints and

troubleshoot network issues b. how often network resources are accessible to authorized users, regardless of their location or device c. how consistently and reliably a resource can be accessed by authorized personnel d. the measure of how quickly a network can recover from a cyberattack or security breach, ensuring minimal downtime and data loss ANSWER:

c Page 154


Name:

RATIONALE:

Class:

Date:

In the world of networking, the term availability refers to how consistently and reliably a connection, system, or other network resource can be accessed by authorized personnel.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 13. What does the term HA (high availability) refer to? a. the maximum number of users allowed to access the network simultaneously without experiencing

congestion or slowdown b. the speed at which data packets travel through the network, ensuring minimal latency and faster response times c. the number of network hardware components, ensuring they can accommodate future expansions and upgrades d. a system that functions reliably nearly all the time ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture.

The term HA (high availability) refers to a system that functions reliably nearly all the time. For example, a server that allows staff to log on and use its applications and data 99.999% of the time is considered highly available, whereas one that is functional only 99.9% of the time is significantly less available.

Page 155


Name:

Class:

Date:

ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 14. One way to consider availability is by measuring a system's or network's uptime, which is the duration or

percentage of time that it functions normally between failures. What is the system downtime per year if the uptime is 99.99%? a. 52 minutes, 35 seconds b. 8 hours, 45 minutes, 56 seconds c. 5 minutes, 15 seconds d. 31 seconds ANSWER: RATIONALE:

a

If the uptime is 99.99% a year, the down time is 52 minutes, 35 seconds. With new technologies, a change has begun so that some companies can now offer six 9s of uptime which is 99.9999%. That amounts to 31 seconds of downtime a year!

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. Page 156


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

15. A key factor in maintaining the availability of network resources is fault tolerance. What is fault tolerance?

Choose all that apply. a. the process of intentionally introducing errors into the network to test its resilience and identify

potential vulnerabilities b. the ability of a network to automatically redirect traffic to alternative routes in case of congestion or slowdown, ensuring continuous operation c. the capacity of a system to continue performing despite an unexpected hardware or software malfunction d. the process of duplicating critical network components, such as servers or storage devices, to ensure redundancy and minimize the risk of data loss ANSWER: RATIONALE:

c, d

Maintaining the availability of network resources is crucial, and fault tolerance plays a vital role in achieving it. Fault tolerance refers to the system's capacity to continue functioning, even in the event of unexpected hardware or software malfunction. One of the key aspects of network design that contributes to fault tolerance is the provision of multiple paths for data to travel from one point to another. This may involve duplicating essential network components such as servers or storage devices to ensure redundancy and minimize the risk of data loss. Thus, if one connection or component fails, data can be rerouted via an alternate path.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Page 157


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

16. What is the term used to describe when something does not work as promised or as planned? a. error b. failover c. fault d. failure ANSWER: RATIONALE:

d

A deviation from a specified level of system performance for a given period. In other words, a failure occurs when something doesn't work as promised or as planned.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 17. Jessie was a system administrator at a large company's Network Operations Center (NOC). Occasionally,

employees company-wide would complain about the slow Internet service or that it was temporarily unavailable. As the complaints were widespread and the issue wasn't localized, Jessie investigated the problem at the NOC level. They determined that a router was causing the issue. From a fault tolerance perspective, what would this issue be considered? a. fault b. error Page 158


Name:

Class:

Date:

c. failover d. failure ANSWER: RATIONALE:

a

There was a fault with the router that was not functioning properly and could result in a system failure if not addressed immediately.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 18. Minor faults, such as a malfunctioning network interface card (NIC) on a router, can result in network

outages. a. True b. False ANSWER: RATIONALE:

a

Minor faults, such as a malfunctioning network interface card (NIC) on a router, can result in network outages.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. Page 159


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

19. To which standard does Link Aggregation Control Protocol (LACP) now belong? a. 802.3ad b. 802.11 c. 802.1ax d. 802.13 ANSWER: RATIONALE:

c

Many manufacturers now use Link Aggregation Control Protocol (LACP), which was initially defined by IEEE's 802.3ad standard and is currently defined by the 802.1ax standard (notice the change in working group from 802.3 to 802.1).

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM Page 160


Name:

Class:

Date:

20. In what type of situation is the round-robin rule algorithm used? a. load balancing b. packet inspection c. load shifting d. network monitoring ANSWER: RATIONALE:

a

A load balancer chooses a server according to one or more load-sharing algorithms. For example, the load balancer might use a round-robin rule, where each server in the cluster gets a turn in a particular order.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 21. Clustering is the process of grouping similar resources together. What resources can be clustered? Choose

all that apply. a. servers b. routers c. applications d. personal computers ANSWER: RATIONALE:

a, b, c

Clustering refers to the technique of grouping redundant resources such as servers so that they appear as a single device to the rest of the network. Clustering can be configured with groups of servers, routers, or applications. Although clustering usually accompanies load balancing, it is not a requirement. Page 161


Name:

Class:

Date:

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 22. Emie is the owner of an e-commerce company that is experiencing rapid growth. Her company has recently

launched a website that is managed by racks of servers. These servers are responsible for a variety of tasks, including taking orders, processing payments, issuing refunds, and updating the website's content on a daily basis. When a client types in the website URL, they are directed to the website. From the client's perspective, it appears that the website is powered by a single server. However, in reality, there are multiple servers working together to ensure that the website functions smoothly. How does this process happen? Choose all that apply. a. the client gets to choose which server they work with b. web client directs request to a single VIP (virtual IP address) c. racks of servers are clustered to look like one server d. load balancing directs traffic evenly between the servers ANSWER: RATIONALE:

b, c, d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

To access the website, web clients direct requests to a single VIP (virtual IP address) that represents the entire cluster. To the client, the cluster looks like a single web server. On the back end, though, a load balancer directs traffic evenly between the web servers, and the servers have access to all the data needed to respond to any webpage requests from clients (such as website files, databases, and authentication services). The clients, however, are not aware that two physical machines are at work. As far as a client is concerned, it's talking with a single server.

Page 162


Name:

Class:

Date:

LEARNING OBJECTIVES:

WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 7-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 23. A large e-commerce company had a server go down. It was an important server that processes orders. The

company has load balancing in place and clustered its servers together. What happened when that server when down? a. no major impact b. the company's website went down c. the company couldn't process orders d. the company had to scramble and replace the malfunctioning server ANSWER: RATIONALE:

a

There was no major impact on business operations when the server malfunctioned. The load balancer efficiently transferred the workload to another server, allowing the cluster to continue functioning normally. The IT team replaced the faulty server and added it back to the cluster.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.1 - Describe how to configure and manage switches in physical network architecture. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense Page 163


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

techniques, and solutions. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 7-1 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

24. Virtualization is an actual, or logical, version of something rather than the physical version. a. True b. False ANSWER: RATIONALE:

b

Virtualization is a virtual, or logical, version of something rather than the actual, or physical, version.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 25. What is the software that creates and manages a virtual machine (VM) and allocates the use of hardware

resources for the host and any of its guest VMs? a. operating system b. host c. guest d. hypervisor ANSWER: RATIONALE:

d

The key to this feat is a type of software known as a hypervisor. A hypervisor creates and manages a VM, and it allocates the use of hardware resources for the host and any of its guest VMs.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. Page 164


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. Section 7-2 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

26. Mackie plans to set up a test network that will incorporate all the operating systems used by his company.

He wants to ensure that any actions taken on this network will not affect the production network in any way. What should Mackie do? a. create a virtual network and set it to NAT b. create a virtual network and set it to host-only mode c. create a regular network with actual computers and use the Automatic Private IP Addressing

(APIPA) address scheme d. connect all computers with a virtual switch but no Internet connection ANSWER: RATIONALE:

b

When operating in host-only mode, virtual machines (VMs) on a single host can share data with each other and with their host, but they cannot communicate with any external nodes beyond the host. In other words, the virtual network interface cards (vNICs) never receive or transmit data via the physical network interface card (NIC) of the host machine. Another advantage of creating a virtual network in host-only mode is that all of the operating systems can be on a single computer, instead of multiple computers, and the single machine can be isolated in any location.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 27. What are some advantages of virtualization? Choose all that apply. a. efficient use of resources b. licensing costs c. cost and energy savings d. fault and threat isolation ANSWER: RATIONALE:

a, c, d

There are several benefits of virtualization. It allows for efficient use of resources Page 165


Name:

Class:

Date:

since physical clients or servers dedicated to a single function usually use only a small portion of their capacity (1). Virtualization enables organizations to save on costs and energy by purchasing fewer and less expensive physical machines (2). Virtual environments provide isolation for each guest system, which means that any issues with one guest will not affect the others, making it easier to contain faults and threats (3). POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 28. Angela has eight operating systems she wants to run, but she does not have the hardware to support each of

them. However, she has an older Windows computer with virtualization capabilities. The computer she has consists of 16 Gb of RAM, a 100 Gb hard drive, an on-board video card, and all other hardware is standard to a home PC. What issues might she face as she tries to install these operating systems? Choose all that apply. a. not enough host system resources b. the hypervisor may not support all guest operating systems c. she has to buy a hypervisor to run the guest operating systems d. she must use a type 1 hypervisor to run the guest operating systems ANSWER: RATIONALE:

a, b

It is possible for Angela to use a type 2 hypervisor. However, it is important that the host machine has enough resources available to use. Every virtual machine uses a portion of the host OS and hardware resources. As the number of guest machines increases, the resources available for the host decrease until, eventually, the host can no longer function properly. Additionally, not all hypervisors support every operating system. To avoid issues, it is recommended to refer to the help documentation for the hypervisor that you plan on using before downloading.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:22 PM Page 166


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:22 PM

29. Software-defined networking (SDN) is a centralized approach to networking that removes most of the

decision-making power from network devices. At what level is this responsibility handled? a. software level b. hardware level c. physical level d. network level ANSWER: RATIONALE:

a

Software-defined networking (SDN) is a centralized approach to networking that removes most of the decision-making power from network devices and instead handles this responsibility at a software level.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 30. Software-defined networking (SDN) enables automatic network configuration based on changing conditions

and application requirements. What is this capability called? a. transmission aware networking b. presentation aware networking c. application aware networking d. physical transmission aware networking ANSWER: RATIONALE:

c

SDN controllers can be used to reconfigure groups of network devices all at one time. It can even make configuration changes automatically in response to changing network conditions or application needs, which is called application aware networking. To be application aware, SDN takes advantage of insights from deep packet inspection (DPI), where the controller can analyze application information held in deeper layers of packets traversing the network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network Page 167


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

environments. Section 7-2 Bloom's: Remember/Understand 8/16/2024 12:22 PM 8/16/2024 12:22 PM

31. This plane is not a typical layer for network communication, but it is considered a part of the control plane.

Its purpose is to enable network administrators to remotely manage network devices, monitor them, and analyze data collected about the devices. What is this plane called in other contexts? a. applications plane b. management plane c. data plane d. infrastructure plane ANSWER: RATIONALE:

b

While not a typical layer for network communication, the management plane could be considered a part of the control plane. It allows network administrators to remotely manage network devices, monitor those devices, and analyze data collected about the devices. Protocols in this plane include SSH, Telnet, SNMP (Simple Network Management Protocol), and even HTTP for web-based user interfaces.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.7.2 - Explain forms of virtualization technologies on a network. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 32. In which service mode are hardware resources provided virtually, including network infrastructure devices

such as routing, switching, and DNS services? a. DRaaS (Disaster Recovery as a Service) b. SaaS (Software as a Service) c. IaaS (Infrastructure as a Service) d. PaaS (Platform as a Service) ANSWER: RATIONALE:

c

With IaaS (Infrastructure as a Service) cloud services, often pronounced i-az, hardware resources are provided virtually, including network infrastructure devices such as routing, switching, and DNS services. These services rely on the network infrastructure at the vendor's site, but customers are responsible for their Page 168


Name:

Class:

Date:

own application installations, server environment, data management and backup, and possibly operating systems. For example, customers might use the vendor's servers to store data, host websites, and provide email, DNS, or DHCP services, but provide their own OS licenses and productivity software, such as customer tracking, sales management, and an office suite. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.3 - Summarize cloud characteristics, models, and connectivity options. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 33. During software development, developers often need to access multiple platforms, which include the

operating system, the runtime libraries or modules provided by the OS to applications, as well as the hardware on which the OS runs. Which service model would be the better option? a. DRaaS (Disaster Recovery as a Service) b. SaaS (Software as a Service) c. XaaS (Anything as a Service) d. PaaS (Platform as a Service) ANSWER: RATIONALE:

d

Rather than purchasing and maintaining a separate device for each platform, a better option is to subscribe to PaaS (Platform as a Service) services (pronounced paz). Developers can build and test their applications within these virtual, online environments, which are tailored to the specific needs of the project.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.3 - Summarize cloud characteristics, models, and connectivity options. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 34. Cloud architecture provides different service model functions that can be customized to fit a client's needs, Page 169


Name:

Class:

Date:

such as monitoring, storage, applications, and virtual desktops. What is that as a Service function called? a. DRaaS (Disaster Recovery as a Service) b. SaaS (Software as a Service) c. XaaS (Anything as a Service) d. PaaS (Platform as a Service) ANSWER: RATIONALE:

c

In this broader model, the "X" as in (x as a Service) represents an unknown, just as it does in algebra. Here, the cloud can provide any combination of functions depending on a client's exact needs. This includes monitoring, storage, applications, and virtual desktops. For example, DaaS (Desktop as a Service) is a type of SaaS where you can access a virtual desktop through your browser.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.3 - Summarize cloud characteristics, models, and connectivity options. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 35. In what cloud deployment are services established on an organization's own servers in its own data center, or

services are established remotely for a single organization's private use and made available to authorized users over a WAN connection through some type of remote access? a. public cloud b. private cloud c. community cloud d. hybrid cloud ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.3 - Summarize cloud characteristics, models, and connectivity

In a private cloud, services are established on an organization's own servers in its own data center, or services are established remotely for a single organization's private use and made available to authorized users over a WAN connection through some type of remote access. If hosted internally, this arrangement allows an organization to use existing hardware and connectivity, potentially saving money. If hosted remotely, the organization benefits from advantages such as scalability, accessibility, and third-party management.

Page 170


Name:

Class:

Date:

options. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 36. What cloud services can be shared between multiple organizations, but are not available to the public? a. public cloud b. private cloud c. community cloud d. hybrid cloud ANSWER: RATIONALE:

c

Community cloud services are shared between multiple organizations, but not available publicly. Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in this way. For example, a medical database might be made accessible to all hospitals in a geographic area. In that case, the community cloud could be hosted internally by one or more of the organizations involved or hosted by a third-party provider. But it would not be made available to the public.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.3 - Summarize cloud characteristics, models, and connectivity options. ACCREDITING STANDARDS: WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 37. What type of pipeline specifically supports the continuous development of an application through the many

iterations of improvements? a. data pipeline b. software pipeline c. code pipeline d. resource pipeline ANSWER: RATIONALE:

b

A software pipeline specifically supports the continuous development of an Page 171


Name:

Class:

Date:

application through many iterations of improvements. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.4 - Explain the roles of automation and orchestration in network management. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 38. Orchestration is the automation of tasks to work together in a complex and lengthy workflow. a. True b. False ANSWER: RATIONALE:

a

Orchestration is the automation of tasks to work together in a complex and lengthy workflow. A robust and well-designed cloud deployment is almost fully orchestrated to minimize hands-on time required by admins and to reduce the chances of human error when changes need to be made.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.4 - Explain the roles of automation and orchestration in network management. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 39. What is the word used to describe the ability to quickly adapt to market demands according to increased or

decreased feature use within a system? a. timing b. mobility c. agility d. speed ANSWER: RATIONALE:

c

Agility refers to the ability to quickly adapt to market demands according to increased or decreased feature use within a system. As features are developed or retired, changes can be compiled, tested, and implemented automatically within a Page 172


Name:

Class:

Date:

well-defined pipeline. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.4 - Explain the roles of automation and orchestration in network management. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM 40. While a developer writes changes to the code, the changes can be uploaded into the branch that the

developer is working on. What is the process of uploading these changes called? a. commit b. commingle c. orchestration d. dynamic pipeline ANSWER: RATIONALE:

a

While a developer writes changes to the code, the changes can be uploaded into the branch that developer is working on. This process of uploading changes is called a commit. However, those changes typically are not merged directly into the production environment. They must be tested and evaluated by other people and by automated testing systems. Once fully approved, then the changes to the branch can be merged into the production environment's code.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.7.4 - Explain the roles of automation and orchestration in network management. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. TOPICS: Section 7-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:22 PM DATE MODIFIED: 8/16/2024 12:22 PM

Chapter 08 Network Segmentation 1. Which layers of the OSI model play a part in network segmentation? Choose from the list below.

7. Application Layer 6. Presentation Layer Page 173


Name:

Class:

Date:

5. Session Layer 4. Transport Layer 3. Network Layer 2. Data-Link Layer 1. Physical Layer a. 4, 3, 2 b. 7, 6, 5 c. 3, 2, 1 d. 3, 4, 1 ANSWER: RATIONALE:

c

Layer 3 allows for subnetting, which helps to manage and organize devices within the available IP address space. At layer 2, virtual LANs can be established, while at layer 1, physical gaps can be created in networks to separate LANs and prevent them from connecting to each other.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 2. George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic

to a minimum. What is the best way for George to accomplish this goal? a. use a new subnet mask for each server b. put servers into one network segment c. use multiple NICs on each server d. use a round-robin methodology so they act as one server ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

When a network is segmented into multiple smaller networks, the traffic on one network is separated from the traffic on another network, and each network becomes its own broadcast domain. In this case, George is segmenting the network based on device type, specifically servers.

Page 174


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 3. Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT)

specialists, as they involve varying levels of certain types of risks. How are OT risks defined? a. the takeover of a system or subsystem by an attacker b. the exposure of a physical systems' vulnerabilities c. physical systems' vulnerabilities in response to interruptions caused by a breach d. the exposure of data or availability of services ANSWER: RATIONALE:

c

OT security specialists often focus on different priorities that allow for varying amounts of certain types of risks. These risks are defined by the physical systems' vulnerabilities in response to interruptions caused by a breach, rather than the exposure of data or availability of services. For example, failure or compromise of a web server would be much more tolerable than failure or compromise of an irrigation system that, if it fails, could cause flooding or other physical damage.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 4. What is the term for a resource requiring detailed zoning and object-level security? a. trusted segmentation b. macro-segmentation c. network segmentation Page 175


Name:

Class:

Date:

d. micro-segmentation ANSWER: RATIONALE:

d

While sensitive systems must be somewhat exposed in order to be useful, microsegmentation can further increase security around individual resources. Instead of relying only on network-based, perimeter-dependent, security configurations, micro-segmentation requires granular zoning and, further, applies object-level security to individual resources. This is especially needed for IIoT (Industrial Internet of Things) systems, where devices must be exposed to the Internet.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 5. What type of data storage systems do small networks rely on? Choose all that apply. a. storage area network (SAN) b. network attached storage (NAS) c. redundant array of inexpensive disks (RAID) d. common network file system (CIFS) ANSWER: RATIONALE:

b, c

On smaller networks, this might be accomplished with a NAS (network-attached storage) system. NAS relies on network infrastructure to provide file access. The NAS device is attached to a network switch, which allows access from network servers and other networked devices. NAS often incorporates RAID (redundant array of inexpensive disks) to provide data redundancy, which would protect data in the event that one or more disks fail.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Page 176


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 8-1 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

6. If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from

elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called? a. redundancy b. RAID c. multipathing d. NAS ANSWER: RATIONALE:

c

If one storage device within a SAN suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic, which is called multipathing. Multipathing techniques can also provide load balancing to help ensure that the demand on storage is spread evenly across all storage devices in the SAN.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 7. In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in

a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply. a. FC (Fibre Channel) b. BNC Ethernet c. FCoE (Fibre Channel over Ethernet) d. iSCSI (Internet SCSI) ANSWER: RATIONALE:

a, c, d

The technologies used for storage area network (SAN) connections are: Fibre Page 177


Name:

Class:

Date:

Channel (FC), which is a storage networking architecture that runs separately from Ethernet networks to maximize the speed of data storage and access. Fibre Channel over Ethernet (FCoE) is a newer technology that allows FC to travel over Ethernet hardware and connections. To achieve this, the FC frame is encapsulated inside an FCoE frame, which is then encapsulated inside an Ethernet frame. Internet SCSI (iSCSI), pronounced "i-scuzzy," is a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. It can work on a twisted-pair Ethernet network with ordinary Ethernet NICs. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 8. SANs use the same IP technologies as standard IT networks. a. True b. False ANSWER: RATIONALE:

b

Although SANs do not use the same IP technologies as IT networks, they still must connect with these networks, which creates security vulnerabilities.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 178


Name:

Class:

Date:

9. The Internet is referred to by more than one zone name. What are those names? Choose all that apply. a. trusted zone b. untrusted zone c. demilitarized zone d. public zone ANSWER: RATIONALE:

b, d

The Internet is referred to as an untrusted zone, public zone, or WAN zone. Anything outside the organization's control is part of this zone.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.1 - Explain the purposes of network segmentation. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 8-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 10. Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In

order, what do the numbers 0 and 255 stand for? a. network address (Network ID) and broadcast address b. broadcast address and network address c. network address (Network ID) and host address d. broadcast address and host address ANSWER: RATIONALE:

a

The 0 in 192.198.120.0 is the network address (Network ID). The 255 in 192.198.120.255 is the broadcast address. Neither the network address nor the broadcast address can be used for hosts.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Remember/Understand Page 179


Name:

DATE CREATED: DATE MODIFIED:

Class:

Date:

8/16/2024 12:23 PM 8/16/2024 12:23 PM

11. How many subnets can the subnet mask 255.255.255.240 create? a. 2 b. 8 c. 4 d. 16 ANSWER: RATIONALE:

d

The subnet mask 255.255.255.240 can create 16 subnets. Here is how it works: In binary, the subnet mask looks like this: 11111111.11111111.11111111.11110000. By borrowing 4 bits from the last octet (in red), the last octet becomes 240. The n four red 1s are used to create the subnets. Using the formula 2 , where n equals 4 the number of bits taken from the last octet (which is 4), then 2 = 16. This means that 16 subnets can be created. In order to create subnets, all bits must be borrowed from left to right. So if two subnets are needed and the last octet is 1 .00000000, it would look like this 2 = 2 .10000000. For four subnets, 2 bits 2 would be borrowed or 2 = 4 .11000000, and so on.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 12. What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP

traffic across broadcast domains and enable centralization of key network services? a. DNS forwarding b. UDP forwarding c. TCP forwarding d. NTP forwarding ANSWER: RATIONALE:

b

POINTS:

1

Configuring UDP forwarding on your network allows routers, firewalls, or layer 3 switches to forward this UDP traffic across broadcast domains, which enables centralization of key network services. Page 180


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 13. When calculating subnets either manually or by using subnet tables, the following types of information will

be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply. a. network ID for each subnet b. number of routers per subnet c. broadcast address for each subnet d. range of host addresses ANSWER: RATIONALE:

a, c, d

When the number of subnets and the number of hosts per subnet are known, the following information will need to be determined: the network ID for each subnet, the broadcast address for each subnet, and the range of possible host addresses within each subnet.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 14. Which subnet mask is used for a class B network? a. 11111111 11111111 11111111 00000000 b. 11111111 11111111 11111111 11111111 c. 11111111 00000000 00000000 00000000 d. 11111111 11111111 00000000 00000000 Page 181


Name:

ANSWER: RATIONALE:

Class:

Date:

d

The subnet mask for a class B network in binary is 11111111 11111111 00000000 00000000. In decimal, the number is 255.255.0.0.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 15. Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network.

However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply. a. routers cannot function properly b. network addresses may overlap c. possible address pool exhaustion d. little room for future growth ANSWER: RATIONALE:

c, d

It is not a good idea to configure subnets so tightly that there is little room for future growth. The network could suffer from address pool exhaustion when all available addresses within a subnet are used up.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 16. How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that

apply. a. A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses. Page 182


Name:

Class:

Date:

b. IPv6 works at a different level of the OSI model. c. IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or

class C networks. d. IPv6 does not use subnet masks. ANSWER: RATIONALE:

a, c, d

IPv6 differs from IPv4 in that IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks. Additionally, IPv6 does not use subnet masks. Instead, a single IPv6 subnet can supply an astonishing 18,446,744,073,709,551,616 IPv6 addresses.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 17. What do the last four blocks (64 bits) identify in an IPv6 address? a. network prefix b. broadcast address c. host interface d. ISP address ANSWER: RATIONALE:

c

The last four blocks, which equate to the last 64 bits, identify the host's interface. On some IPv6 networks, those 64 bits are based on the interface's EUI-64 version of each device's MAC address.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.2 - Apply subnetting to network devices. ACCREDITING STANDARDS: WEST.N10-009.25.1.7 - Given a scenario, use appropriate IPv4 network addressing. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 8-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 183


Name:

Class:

Date:

18. When traffic moves between two VLANs, it must pass through a router. What is the term for this process? a. multi-switch VLAN b. VLAN tagging c. inter-VLAN routing d. multiport tagging ANSWER: RATIONALE:

c

When traffic moves between two VLANs, it must also go through the router. The term for this is inter-VLAN routing.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 19. On which OSI layer does VLAN traffic traverse? a. layer 4 b. layer 3 c. layer 2 d. layer 1 ANSWER: RATIONALE:

c

VLANs divide a single broadcast domain into multiple broadcast domains by organizing traffic based on layer 2 information.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network Page 184


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 8-3 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

20. Jason's company has purchased a new building and will be relocating part of the marketing and engineering

teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building? a. create independent networks for each department b. managed switches with VLANs c. add additional switches d. use the same subnet as the rest of the network ANSWER: RATIONALE:

b

Jason should set up the network with switches capable of supporting VLANs. This way, Jason can put the marketing team on a VLAN to the main marketing department and the Engineering team with the main engineering department at the original office.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 185


Name:

Class:

Date:

21. What is the most popular protocol for exchanging VLAN information over trunks? a. IEEE 802.1Q; also known as "dot1q" b. Cisco Inter-Switch Link (ISL) c. Multiple VLAN Registration Protocol (MVRP) d. Cisco's VTP (VLAN Trunk Protocol) ANSWER: RATIONALE:

d

The most popular protocol for exchanging VLAN information over trunks is Cisco's VTP (VLAN Trunk Protocol). VTP allows changes to a VLAN database on one switch, called the stack master, to be communicated to all other switches in the network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 22. When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single

router port. What is each of these logical interfaces on one physical interface called? a. logical ports b. subinterface c. logical interface d. logical VLAN ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. Each of these logical interfaces on one physical interface is called a subinterface.

Page 186


Name:

Class:

Date:

HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 23. How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses

portioned to each VLAN? a. Run a DHCP server for the entire network and have each subinterface configured with its own

subnetted range of IP addresses. b. Run a DHCP server for the entire network and use a DHCP relay agent to help sort DHCP requests by subnet. c. Have the router provide DHCP services with each subinterface and use a DHCP relay agent to help sort DHCP requests by subnet. d. Have the router provide DHCP services with each subinterface configured with its own subnetted range of IP addresses. ANSWER: RATIONALE:

b, d

VLAN clients can receive their IP addresses from the subnet's range of addresses in two ways. One way is to run a DHCP server for the entire network and use a DHCP relay agent to help organize DHCP requests by subnet. Alternatively, the router can provide DHCP services with each subinterface configured with its own subnetted range of IP addresses.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the Page 187


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 8-3 Bloom's: Apply 8/16/2024 12:23 PM 8/16/2024 12:23 PM

24. Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports? a. management b. native c. default d. data ANSWER: RATIONALE:

c

The default VLAN is typically preconfigured on a switch and initially includes all the switch's ports.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 25. Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates? a. voice b. native c. default d. data Page 188


Name:

ANSWER: RATIONALE:

Class:

Date:

d

The data VLAN carries user-generated traffic, such as email, web browsing, or database updates.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 26. Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic,

flexible routing, and minimized latency? a. voice b. native c. default d. data ANSWER: RATIONALE:

a

The voice VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network Page 189


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 8-3 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

27. Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was

about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply. a. Data VLAN b. Native VLAN c. Voice VLAN d. Management VLAN ANSWER: RATIONALE:

b, d

There are two VLANs that pose security risks: the Native VLAN, which receives all untagged frames from untagged ports. By default, this is the same as the default VLAN. However, this configuration poses a security risk when untagged traffic can travel in a VLAN-managed network. The Management VLAN can be used to provide administrative access to a switch. By default, this might be the same as the default VLAN; however, this arrangement poses a security risk and should be changed.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 28. A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch Page 190


Name:

Class:

Date:

port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this? a. incorrect port mode b. VLAN isolation c. incorrect VLAN assignment d. incorrect isolation mode ANSWER: RATIONALE:

c

The configuration error is an incorrect VLAN assignment. This can happen due to a variety of situations, including plugging a device into the wrong switch port or misconfigurations of the client authentication process in which a VLAN is assigned to a device before the authentication process is complete.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 29. In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the

network. What type of configuration error is this? a. incorrect port mode b. VLAN isolation c. incorrect VLAN assignment d. incorrect isolation mode ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

This configuration error is called VLAN isolation. By grouping certain nodes into a VLAN, others are excluded. This means that an entire group of nodes is cut off from the rest of the network.

Page 191


Name:

Class:

Date:

HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 30. A computer is connected to a switch port and then to a server on another switch port, but the computer is not

connecting properly to the server. What could the error be? a. incorrect port mode b. VLAN isolation c. incorrect VLAN assignment d. incorrect isolation mode ANSWER: RATIONALE:

a

The computer was accidentally assigned a port that was in trunk mode. Switch ports connected to endpoints, such as workstations and servers, should nearly always use access mode.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 Page 192


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Apply 8/16/2024 12:23 PM 8/16/2024 12:23 PM

31. Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker

generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called? a. VLAN scanning b. VLAN jumping c. VLAN hopping d. VLAN scripting ANSWER: RATIONALE:

c

Hackers sometimes take advantage of the way VLANs are tagged to implement an attack called VLAN hopping. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 32. What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply. a. Configure all ports as trunk ports on switches that carry traffic from multiple VLANs. b. Do not use the default VLAN. c. Disable auto-trunking. d. Change the native VLAN to an unused VLAN ID. ANSWER: RATIONALE:

b, c, d

To prevent VLAN hopping and strengthen network segmentation, follow these Page 193


Name:

Class:

Date:

guidelines: Avoid using the default VLAN. Set the native VLAN to an unused VLAN ID. Disable auto-trunking on switches that do not need to handle traffic from multiple VLANs. For switches that do need to carry traffic from multiple VLANs, set all ports as access ports unless they are used as trunk ports. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 33. What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4? a. UDP (User Datagram Protocol) b. TCP (Transmission Control Protocol) c. IP (Internet Protocol) d. FTP (File Transfer Protocol) ANSWER: RATIONALE:

a

VXLANs rely on UDP (User Datagram Protocol) to function at OSI layer 4, which works much better for managing extended infrastructure across networks and over the Internet.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. Page 194


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 8-3 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

34. Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network

than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages? a. networks supporting VXLANs must use hardware dedicated to VXLANs b. networks supporting VXLANs must be configured with a larger MTU c. networks supporting VXLANs must use fiber optic cable to manage larger MTUs d. networks supporting VXLANs must shrink the larger header to fit into the standard MTU ANSWER: RATIONALE:

b

The enlarged headers needed to support VXLANs require a much larger message on the network than the normal 1500-byte message, which is defined by the MTU (maximum transmission unit). To account for these larger headers, networks supporting VXLANs must be configured with a larger MTU, such as 1600 bytes.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.3 - Configure VLANs. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 8-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 35. Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration.

What are the different types of subnets? Choose all that apply. a. private subnet Page 195


Name:

Class:

Date:

b. public subnet c. IG subnet d. NAT subnet ANSWER: RATIONALE:

a, b

There are two types of subnets: private subnets, which host resources such as EC2 instances or database instances that should not be accessible from the Internet; and public subnets, which are similar to the screened subnet. They host resources such as web servers that should be accessible directly from the Internet.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: Section 8-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 36. This logical appliance provides filtered and protected access from resources in the private subnet to services

on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called? a. logical switch b. logical router c. Internet gateway d. NAT gateway ANSWER: RATIONALE:

d

The NAT gateway is a logical appliance that performs NAT functions, providing filtered, protected access from resources in the private subnet to services on the Internet. However, Internet-based resources would still not be able to initiate contact with the private subnet or access the protected resources directly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: Section 8-4 Page 196


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

37. Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a

host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place? a. Turn off the NAT gateway while working remotely. b. Create a bastion host/jump box, in the private subnet. c. Create a bastion host/jump box, in the public subnet. d. Daniel cannot work remotely. ANSWER: RATIONALE:

c

Daniel needs to create a bastion host, also called a jump box, in the public subnet. This EC2 instance can be logged into from any location across the Internet.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: Section 8-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 38. What is the purpose of a content delivery network (CDN)? Choose all that apply. a. delivers data closer to the user b. reduces latency c. reduces redundancy d. a temporary fix for a data center ANSWER: RATIONALE:

a, b

A CDN (content delivery network) can deliver data closer to users before entering the public Internet infrastructure, reducing latency and improving the user experience.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. Page 197


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. Section 8-4 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

39. Edge computing runs compute resources in physical locations closer to the user, and often, this data and

compute caching happen on edge devices rather than on traditional servers. a. True b. False ANSWER: RATIONALE:

a

Edge computing adds the ability to run compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices (an endpoint device or connection between networks) rather than on traditional servers. For example, a smart car computes distances itself to nearby objects even though the car is connected to the cloud for other computations. In this example, the smart car is the edge device.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: Section 8-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 40. A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in

regions that are closest to the point of use. a. True b. False ANSWER: RATIONALE:

a

Cloud also offers many benefits in terms of reducing latency when accessing resources throughout the world. One way of doing this is by locating cloud resources in regions that are closest to the point of use. For example, if the company's website receives a great deal of traffic from users located in India, the web server might be placed in an AWS data center that is physically located in India. Page 198


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.8.4 - Describe networking and segmentation options in the cloud. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.3.5 - Compare and contrast network access and management methods. TOPICS: Section 8-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM

Chapter 09 Wide Area Networking 1. Which of the following devices are used to connect WANs? Choose all that apply. a. server b. router c. workstation d. modem ANSWER: RATIONALE:

b, d

WANs utilize networking devices such as routers and modems to interconnect geographically dispersed networks.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 2. What is the term for the individual geographical locations connected by a WAN? Page 199


Name:

Class:

Date:

a. LAN endpoint b. demarc c. WAN dewpoint d. WAN site ANSWER: RATIONALE:

d

The individual geographic locations or endpoints connected by a WAN are known as WAN sites. A WAN link is a connection between one WAN site (or endpoint) and another site (or endpoint).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 3. True story: Alexis needed high-bandwidth Internet access because she teaches online and frequently uses the

Internet alongside Zoom. She purchased the high-speed package from her cable TV provider, which offered her 500 Mbps download speed and 20 Mbps upload speed. She made sure that her equipment was up-to-date to handle the speed increase. After the modem was installed, she downloaded a software program called Speedtest to confirm that she was getting the speed she was paying for. She tested her connection at different times during the day and discovered that the download speeds she was getting were not always what she paid for. Some days, she would get over 550 Mbps download, while on others she would only get 200 Mbps download. Occasionally, her speed would drop below 100 Mbps, although her upload speed remained between 18 and 20 Mbps. She contacted her carrier to ask about the issue and was told that she was getting the service she paid for. Why are Alexis' speeds fluctuating so much? a. The network interface card (NIC) in her computer couldn't handle that speed. b. There was a problem on Alexis' side of the demarc. c. It was the "best effort" by the ISP. d. There was a problem on the ISP's side of the demarc. ANSWER: RATIONALE:

c

The Internet service provider (ISP) makes a "best effort" attempt to provide the advertised bandwidth, but actual performance can vary significantly during peak usage times. Alexis was able to get the advertised bandwidth during the week Page 200


Name:

Class:

Date:

because she worked from home. However, on the weekend, when most people were at home, Internet speeds dropped significantly. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 4. Even with the fastest data plans, there is always one factor that slows down the data in a home office. What is

it? a. the demarc b. the last foot c. the last mile d. the termination point ANSWER: RATIONALE:

c

The majority of data travels on the Internet runs over fiber cables. However, it's the final stretch to its destination, known as the "last mile" (even if it's not really a mile in length), that significantly slows down the data reaching a home office.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 Page 201


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

5. Which type of dedicated WAN connection reserves bandwidth for the sole use of one customer, typically

symmetrical bandwidth with similar upload and download speeds, and an SLA (service level agreement)backed performance guarantee? a. MPLS (multiprotocol label switching) b. a leased line c. direct connection d. PoPs (point of presence) ANSWER: RATIONALE:

b

A leased line reserves bandwidth for the sole use of one customer, typically symmetrical bandwidth with similar upload and download speeds, and an SLAbacked performance guarantee.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 6. Which type of dedicated WAN connection enables multiple types of layer 3 protocols to travel over any one

of several connection-oriented layer 2 protocols, allowing any connectivity option for each site that is appropriate while centrally managing bandwidth between each site? a. MPLS (multiprotocol label switching) b. a leased line c. direct connection d. PoPs (point of presence) ANSWER: RATIONALE:

a

MPLS (multiprotocol label switching) enables multiple types of layer 3 protocols to travel over any one of several connection-oriented layer 2 protocols. Page 202


Name:

Class:

Date:

Essentially, MPLS can use any connectivity option for each site that is appropriate while centrally managing bandwidth between each site. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 7. Cloud providers often offer attractive SLAs (service-level agreements) based upon their platform's

availability. However, the reliability of the WAN connection that links their resources with a company's network is just as important. To this end, organizations generally offer an array of options. What are some of those options? Choose all that apply. a. ISP services b. VPN (virtual private network) c. direct connection d. on-prem storage ANSWER: RATIONALE:

b, c

A direct connection option maximizes predictability and minimizes latency and comes with a high price tag. A VPN connection to the cloud relies on the same VPN technologies used to connect on-premises networks with branch offices and remote workers. This method often relies on the Internet to provide the underlying network infrastructure, or it can be layered on top of a direct connection to increase security of those communications.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and Page 203


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 9-1 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

8. What are some of the benefits of an SD-WAN (software-defined wide area network)? Choose all that apply. a. zero-touch provisioning b. transport agnostic c. zero trust network management d. AAR (application-aware routing) ANSWER: RATIONALE:

a, b, d

Benefits of an SD-WAN include the following: Zero-touch provisioning: An SDWAN edge device can be shipped to a branch location where a non-technical employee can plug in the device without needing any on-site configuration; Transport agnostic: An SD-WAN controller can manage network configurations at multiple locations worldwide, regardless of the type of connection each segment uses to reach the SD-WAN; AAR (application-aware routing): Similar to SDNs, SD-WAN can support application-aware routing that directs traffic according to the information held in the higher OSI layers of the packets' headers.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 9. What is the purpose of a wireless WAN? a. high-throughput, long-distance, digital exchange Page 204


Name:

Class:

Date:

b. high-speed, short-distance, digital exchange c. works in the 2.5 GHz spectrum for long-distance connectivity d. works in urban environments ANSWER: RATIONALE:

a

Wireless WANs are designed for high-throughput, long-distance, digital exchange.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 10. All cellular networks share a similar infrastructure in which coverage areas are divided into cells. Each cell

is served by an array of antennas and its base station. Collectively, what is this setup called? a. signal splitter b. cellular emitter c. antenna array d. cell site ANSWER: RATIONALE:

d

The cell site is a combination of the antenna array and its base station. Cellular providers lease space on the towers-the tall structures visible from a distance-for their antenna arrays, as well as space on the ground for base station equipment.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. Page 205


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Section 9-1 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

11. What factors can determine the size of a cell in cellular service? Choose all that apply. a. topology b. number of cell towers c. population d. cellular traffic ANSWER: RATIONALE:

a, c, d

The size of a cell depends on the network's access method and the region's topology, population, and amount of cellular traffic.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 12. 4G (fourth generation) cellular service is characterized by an all-IP network for both data and voice

transmission. However, speed has been an issue. What generation of cellular service finally brought about true 4G speeds? a. LTE-A (LTE-Advanced) b. LTE (Long-Term Evolution) c. 4G-5 d. LTG (Long-Term Generation) ANSWER:

a Page 206


Name:

RATIONALE:

Class:

Date:

LTE-A (LTE-Advanced) can more realistically approach 4G standards. Sometimes, misleadingly called 5G E (5G Evolution), LTE-A is basically true 4G as defined back in 2008 but emerging later in real-world networks.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 13. What can be considered a disadvantage of satellite Internet access? a. Satellite Internet access must have a receiver box. b. Satellite Internet access must have a line-of-sight path. c. Satellite Internet access is easy to set up in rural areas. d. Satellite Internet access can be mobile such as in a car or boat. ANSWER: RATIONALE:

b

Clients can establish communication with satellites as long as they have a clear line-of-sight path to the sky, and the signal is not obstructed. It should be noted, however, adverse atmospheric conditions such as rain can disrupt or slow down satellite communications.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Page 207


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 9-1 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

14. Compared to other wireless WAN options, satellite services are faster and suffer less latency. a. True b. False ANSWER: RATIONALE:

b

Compared to other wireless WAN options, satellite services are slower and suffer more latency.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 15. Cells can be misshapen due to a variety of reasons. What are some of those reasons? Choose all that apply. a. cellular technology b. terrain c. EMI (electromagnetic interference) d. antenna radiation patterns ANSWER: RATIONALE:

b, c, d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

In theory, the division of a network into cells provides thorough coverage over any given area. In reality, cells are misshapen due to terrain, EMI, and antenna radiation patterns. Some edges overlap, and others do not meet up, resulting in gaps in coverage.

Page 208


Name:

Class:

Date:

LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 16. When a mobile device switches to a different antenna, its communication may change frequencies or even

carriers between cells. This transition usually occurs without the user's knowledge or awareness. What is this transition called? a. handoff b. tradeoff c. cell transfer d. signal splitting ANSWER: RATIONALE:

a

When a mobile device begins communicating with a different antenna, its communication might change frequencies or even carriers between cells. The transition, which normally happens without the user's knowledge or awareness, is known as a handoff.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 209


Name:

Class:

Date:

17. In order to reach a reasonable level of availability and effectiveness, how must 5G antennas be placed? a. close proximity b. spaced far apart c. line-of-sight d. same specifications as 4G antennas ANSWER: RATIONALE:

a

To reach a reasonable level of availability and effectiveness, many small 5G antennas must be installed in close proximity to each other so that 5G clients can receive a close and strong signal throughout the coverage area.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.1 - Compare WAN connectivity technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.1.5 - Compare and contrast transmission media and transceivers. WEST.N10-009.25.1.6 - Compare and contrast network topologies, architectures, and types. WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 18. Byron is the systems administrator for a midsize company. He has been working with an outside IT firm due

to issues with his edge routers. The technician from the IT firm told Byron that they have the same type of router and that Byron needs to update the firmware to get rid of the problem. The odd thing was that the IT technician referred to his router as an "exterior router" and not an "edge router." Why is that? a. Byron was using the wrong router. b. The technician misspoke. c. An edge router and exterior router can be the same. d. Edge routers and exterior routers look identical but are different. ANSWER: RATIONALE:

c

Sometimes, a technician might refer to their own edge router as an exterior router because it communicates with routers outside the AS (Autonomous System). An Autonomous System is a collection of IP networks and routers under the control of a single organization that presents a common routing policy to the Internet. But keep in mind, every router communicating over the Internet is a trusted edge router for some organization's AS, even if that organization is a large Page 210


Name:

Class:

Date:

telecommunications company managing a portion of the Internet backbone. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.2 - Explain how routers manage internetwork communications. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 19. What is the purpose of a routing table? a. identifies malfunctioning routers b. identifies where hosts are located c. identifies which networks are down d. identifies who owns other networks ANSWER: RATIONALE:

b

A routing table is a database that contains information about where hosts are located and the most efficient way to reach them. A router has two or more network ports, or interfaces, and each port connects to a different network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.2 - Explain how routers manage internetwork communications. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 20. What protocol is used by edge routers and exterior routers to distribute data outside of autonomous systems? a. IGPs b. EGPs Page 211


Name:

Class:

Date:

c. distance vector protocol d. link state protocol ANSWER: RATIONALE:

b

EGPs (exterior gateway protocols) are routing protocols used by edge routers and exterior routers to distribute data outside of autonomous systems.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.2 - Explain how routers manage internetwork communications. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 21. What term is used to describe the rating system used as a tiebreaker when a router determines which route to

send data through? a. netmask b. interface c. prefix d. metric ANSWER: RATIONALE:

d

The routing metric is a rating system used as a tie breaker when needed. Different ways of calculating this metric are available for each route, depending on the protocol used.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.2 - Explain how routers manage internetwork communications. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 212


Name:

Class:

Date:

22. What do the numbers 0.0.0.0 stand for in a routing table? Choose all that apply. a. gateway of last resort b. default route c. MAC address d. ARP address ANSWER: RATIONALE:

a, b

The numbers 0.0.0.0 stand for the default route and gateway of last resort in the routing table.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.2 - Explain how routers manage internetwork communications. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.2.1 - Explain characteristics of routing technologies. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 23. What is the purpose of an ACL (access control list)? a. It establishes routing paths between different networks. b. It acts as a filter to instruct the router to permit or deny traffic. c. It monitors and analyzes network traffic for performance issues. d. It stores configurations of network devices. ANSWER: RATIONALE:

b

An ACL acts as a filter to instruct the router to permit or deny traffic according to network layer protocol (for example, IP or ICMP), transport layer protocol (for example, TCP or UDP), source IP address, destination IP address (which can restrict or allow certain websites), and TCP or UDP port number.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Page 213


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 9-3 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

24. Eliana experienced intermittent traffic issues with one of her routers, allowing some traffic that shouldn't be

permitted while denying other traffic that should be allowed. What could be causing this issue? a. corrupted ACL b. missing ACL c. misconfigured ACL d. malfunctioning router ANSWER: RATIONALE:

c

When troubleshooting a problematic connection between two hosts, or between some applications or ports on two hosts, consider that the problem might be a misconfigured ACL blocking needed services, ports, or addresses.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 9-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 25. At what layer of the OSI model do proxy servers manage security? a. physical layer b. transport layer c. network layer d. application layer ANSWER: RATIONALE:

d

Proxy servers manage security at the application layer of the OSI model. Although proxy servers only provide low-grade security relative to other security devices, they can help prevent an attack on internal network resources such as web servers and web clients. Page 214


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 9-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 26. Which type of firewall is placed on the edge of the private network, to monitor the connection between a

private network and a public network, such as the Internet? a. host-based firewall b. network-based firewall c. next generation firewall d. packet-filtering firewall ANSWER: RATIONALE:

b

This is an example of a network-based firewall, so named because it protects an entire private network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 9-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 27. What type of firewall only protects the computer on which it is installed? a. packet-filtering firewall b. network-based firewall Page 215


Name:

Class:

Date:

c. next generation firewall d. host-based firewall ANSWER: RATIONALE:

d

A host-based firewall software only protects the computer on which it is installed. These firewalls can be configured more specifically for each server or workstation, whereas network firewalls must be configured for all traffic allowed on a network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. TOPICS: Section 9-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 28. Eduardo is responsible for overseeing his company's web server. He purchased a new hardware firewall and

now needs to establish some Access Control List (ACL) rules for it. These rules will involve filtering traffic from the web server that is destined for the Internet. Why does Eduardo need to block this outbound traffic from his web server? a. to stop bad actors from starting a DoS attack b. to stop employees from accessing shopping sites c. to stop employees from accessing FTP sites d. to stop worms from spreading ANSWER: RATIONALE:

d

One reason to block Internet-bound traffic is to prevent the spread of worms. For instance, when operating a web server, which usually only needs to respond to incoming requests and does not need to initiate outgoing requests, a packetfiltering firewall can be set up to block specific types of outgoing transmissions initiated by the web server. This can help prevent the spread of worms that are created to infect web servers and spread to other computers on the Internet.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.3 - Describe ways to secure WAN connections. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. Page 216


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.1.3 - Summarize cloud concepts and connectivity options. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. Section 9-3 Bloom's: Apply 8/16/2024 12:23 PM 8/16/2024 12:23 PM

29. What type of error causes routers to drop messages without any error feedback? a. DNS issues b. router misconfiguration c. interface error d. roaming misconfiguration ANSWER: RATIONALE:

b

This could be caused by a router misconfiguration. Routing tables with incorrect routes can result in dropped messages with no error feedback.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 30. What command is used to list the router's routing table information? a. ping b. traceroute c. show ip route d. ip route ANSWER: RATIONALE:

c

On a Cisco router, the "show ip route" command lists the router's routing table information. Misconfigured routing tables can cause significant problems for network connections. Page 217


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 31. Elliot was experiencing issues with one of his Cisco routers, and used the "show interface" command to

inspect the router's status. While examining the link state, he observed that FastEthernet0/2 was administratively down, confirming what he already knew. Now, he needed to identify the error and bring the port back up. What command should Elliot use to bring the port up? a. ip config b. config sys c. no shut d. no close ANSWER: RATIONALE:

c

If the interface is "administratively down," it has been shut down using the shutdown command or has encountered a configured limitation, such as a security breach. Elliot needs to bring it back up using the no shutdown (or no shut) command.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM Page 218


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:23 PM

32. In the routing table below what does the "D" in line 5 stand for?

S*

0.0.0.0/0 [1/0] via 192.168.1.1 10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks 1. C 10.1.1.0/24 is directly connected, GigabitEthernet0/1 2. L 10.1.1.1/32 is directly connected, GigabitEthernet0/1 3. C 10.1.2.0/24 is directly connected, GigabitEthernet0/2 4. L 10.1.2.1/32 is directly connected, GigabitEthernet0/2 5. D 10.2.0.0/16 [90/30720] via 10.1.1.2, 00:00:05, GigabitEthernet0/1 6. O 10.3.0.0/16 [110/20] via 10.1.2.2, 00:00:10, GigabitEthernet0/2 7. 192.168.0.0/16 is variably subnetted, 2 subnets, 2 masks 8. C 192.168.1.0/24 is directly connected, GigabitEthernet0/0 9. L 192.168.1.1/32 is directly connected, GigabitEthernet0/0 a. protocol (RIP) b. static c. protocol (EIGRP) d. connect ANSWER: RATIONALE:

c

The "D" in line 5 stands for protocol D (EIGRP).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 33. What happens when no matching route exists for a message? a. The message will not be able to leave the originating sender's device. b. The message will bounce around the network until its TTL (time-to-live) is up. c. The message will bounce back to the originating sender. d. The message will be dropped. ANSWER:

d Page 219


Name:

RATIONALE:

Class:

Date:

If no matching route exists for a message, the message will be dropped.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 34. What are the commands to add a gateway of last resort to a router? Choose all that apply. a. ip default-gateway b. ip default-network c. ip config-gateway d. ip route 0.0.0.0 0.0.0.0 ANSWER: RATIONALE:

a, b, d

A gateway of last resort can be added using one of the following commands: ip default-gateway (used when no routing is configured on the router); ip defaultnetwork (requires that routing is configured on the router and chooses a classful default route from existing routes); or ip route 0.0.0.0 0.0.0.0 (sets a default route for messages with no matching route in the routing table and requires that routing is configured on the router).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM Page 220


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:23 PM

35. What is a common routing problem whereby a message continuously follows the same path without

reaching its destination? a. asymmetrical loop b. missing route c. routing loop d. asymmetrical routing ANSWER: RATIONALE:

c

A routing loop occurs when a message continuously travels through the same path without ever reaching its destination, which can have a detrimental impact on network performance.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 36. What is the common routing issue called where NAT (network address translation) and firewalls cannot see

traffic in both directions of a conversation, and as a result, they cannot properly apply filtering rules and might incorrectly reject outgoing traffic that should have been approved? a. asymmetrical loop b. missing route c. routing loop d. asymmetrical routing ANSWER: RATIONALE:

d

In certain cases, asymmetrical routing can lead to problems for NAT and firewalls that need to monitor traffic in both directions of a conversation to apply filtering rules correctly. Firewalls typically depend on TCP sessions to allow outgoing traffic in response to approved incoming traffic. If incoming traffic reaches a different firewall than the one a server is supposed to use for its outgoing messages, the firewall might mistakenly reject outgoing traffic that should have been allowed. With NAT, if the connection path changes due to routing issues, the Page 221


Name:

Class:

Date:

state information might be lost, disrupting the session. This is one of many issues that can apply to NAT and asymmetrical routing. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 37. What command displays a router's routing table? a. show ip route b. show running-config c. show ip protocols d. show interface ANSWER: RATIONALE:

a

The command "show ip route" displays a router's routing table. Add parameters to specify types of routes.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 38. What command displays physical and data link layer information about a device's ports? Page 222


Name:

Class:

Date:

a. show ip route b. show running-config c. show ip protocols d. show interface ANSWER: RATIONALE:

d

The command "show interface" displays physical and data link layer information about a device's interfaces.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 39. Which command displays detailed VLAN configurations for each of a switch's interfaces? a. sh ip int br b. sh int tr c. sh int sw d. sh vlan br ANSWER: RATIONALE:

c

The commands "sh int sw" also known as "show interface switchport" will display detailed VLAN configurations for each of a switch's interfaces.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. Page 223


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 9-4 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

40. Which command displays a concise list of VLAN assignment information on a switch? a. sh ip int br b. sh int tr c. sh int sw d. sh vlan br ANSWER: RATIONALE:

d

The command "sh vlan br" also known as "show vlan brief" displays a concise list of VLAN assignment information on a switch.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.9.4 - Troubleshoot common WAN connection problems. ACCREDITING STANDARDS: WEST.N10-009.25.2.2 - Given a scenario, configure switching technologies and features. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.3 - Given a scenario, troubleshoot common issues with network services. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 9-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM

Chapter 10 Risk Management 1. Hackers are individuals who gain unauthorized access to systems or networks with or without malicious

intent. a. True b. False ANSWER: RATIONALE:

a

POINTS:

1

A hacker, in the original sense of the word, is someone who masters the inner workings of computer hardware and software to better understand them. Today, "hacker" is used more generally to describe individuals who gain unauthorized access to systems or networks with or without malicious intent.

Page 224


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 2. Which group of hackers follows their own code of ethics and is vulnerable to legal prosecution, often going to

great lengths to remain anonymous and to assist and educate? a. black hat hacker b. white hat hacker c. gray hat hackers d. red hat hackers ANSWER: RATIONALE:

c

Gray hat hackers abide by a code of ethics all their own and are vulnerable to legal prosecution, and, therefore, often go to great lengths to remain anonymous. They try to assist and educate.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 3. Which groups or individuals use their skills to bypass security systems with the intent to cause damage, steal

data, or compromise privacy? Some of these hackers and groups are also available for hire to serve someone else's agenda. a. black hat hacker b. white hat hacker c. gray hat hackers d. red hat hackers ANSWER:

a Page 225


Name:

RATIONALE:

Class:

Date:

Black hat hackers are groups or individuals who use their skills to bypass security systems with the intent to cause damage, steal data, or compromise privacy. They are not concerned with legal restrictions, and their goal is to achieve personal gain or execute a personal agenda against an individual or organization. Some black hat hackers and groups are also available for hire to serve someone else's agenda.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 4. What is the term for a vulnerability in a system, process, or architecture that could result in compromised

information or unauthorized access, or more broadly, the term for anything that can cause harm? Choose all that apply. a. exploit b. vulnerability c. risk d. threat ANSWER: RATIONALE:

b, d

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a vulnerability. In everyday language, that can be less specific than its technical definitions. A threat is anything that can cause harm in the context of cybersecurity.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 5. What is the term for the act of taking advantage of a known vulnerability in cybersecurity, and what is the Page 226


Name:

Class:

Date:

other, more broadly used term for the likelihood that a vulnerability will be exploited? Choose all that apply. a. exploit b. vulnerability c. risk d. threat ANSWER: RATIONALE:

a, c

Exploit is the term for the act of taking advantage of a known vulnerability in cybersecurity, and risk is the other, more broadly used term for the likelihood that a vulnerability will be exploited.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 6. What is the term used to describe the technique of deception that a person uses to follow an authorized

employee into a restricted area? a. tailgating b. piggybacking c. shoulder surfing d. quid pro quo ANSWER: RATIONALE:

b

Piggybacking is the term used to describe the technique where a person uses deception to follow an authorized employee into a restricted area. For example, someone who appears to be a delivery person and is carrying a large box might ask you to "hold the door," which gives the attacker access through an otherwise secure door.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 Page 227


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Apply 8/16/2024 12:23 PM 8/16/2024 12:23 PM

7. Adel uses the default preview screen when he is in his email, so when he single-clicks on a message, it shows

in the preview below the message pane. Recently, he received a notice from his bank about a large withdrawal from his account. He was supposed to open the email and click on the button to review the transaction. However, he didn't do any of those things, yet malware was still able to access his computer. Why was that able to happen? a. It was a new type of malware that attacks systems on delivery. b. Anti-malware software was not set up to check email. c. Viewing in preview is equivalent to opening email. d. Anti-virus software was out of date. ANSWER: RATIONALE:

c

Adel always used the preview pane when viewing email. However, using the preview pane in any email client is not recommended. It is the equivalent of opening the email, which means that any virus or malware attached to the email can be activated simply by viewing it in the preview pane.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 8. An employee is only given access and privileges to do their jobs and nothing else. What this principle called? a. principle of loss prevention b. principle of least access c. principle of least privilege d. principle of most restriction ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

The principle of least privilege means that employees and contractors are only given enough access and privileges to do their jobs, and these privileges are terminated as soon as the person no longer needs them.

Page 228


Name:

Class:

Date:

LEARNING OBJECTIVES:

WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 9. When there is sensitive data on the network that needs protection from unauthorized access, what solution can

be deployed to safeguard it? a. data loss prevention b. data retention solution c. data failure prevention d. data loss exclusion ANSWER: RATIONALE:

a

A DLP (data loss prevention) solution identifies sensitive data on the network and prevents it from being copied (such as downloading to a flash drive) or transmitted off the network (such as emailing or posting to cloud storage).

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 10. Which type of attack occurs when a few sources attack an external target or an internal target by flooding a

system with enough requests that services cannot respond? a. DDoS (distributed DoS) attack b. DoS (denial-of-service) attack c. DRDoS (distributed reflection DoS) attack d. amplified DRDoS attack ANSWER: RATIONALE:

b

A denial-of-service (DoS) attack can be initiated from within an organization's network as well as from outside. It is typically carried out by a small number of machines that target internal devices like workstations or servers, or by an external machine attempting to disrupt web or FTP servers. Single devices are Page 229


Name:

Class:

Date:

seldom used for external attacks because botnets have evolved into a readily available "as-a-service" network. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 11. Which attack is carried out through numerous sources, most of which are zombies, meaning that the owners

are unaware that their computers are being used in the coordinated attack? a. DDoS (distributed DoS) attack b. DoS (denial-of-service) attack c. DRDoS (distributed reflection DoS) attack d. amplified DRDoS attack ANSWER: RATIONALE:

a

DDoS attacks are orchestrated through many sources. Most of these machines are zombies, which means the owners are unaware that their computers are being used in the coordinated attack. A type of malware called a bot is installed on each machine and gives the bot herder, or central controller, remote control of the computer. Computers and even IoT devices can be requisitioned as part of a botnet, also called a zombie army, in coordinated DDoS attacks without the owners' knowledge or consent. These botnets are sometimes made available for hire on the black market.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 12. Which type of attack is bounced off uninfected computers, called reflectors, before being directed at the Page 230


Name:

Class:

Date:

target? a. DDoS (distributed DoS) attack b. DoS (denial-of-service) attack c. amplified DRDoS attack d. DRDoS (distributed reflection DoS) attack ANSWER: RATIONALE:

d

DRDoS (distributed reflection DoS) attack is a type of DDoS attack that is bounced off uninfected computers, called reflectors, before being directed at the target. This is achieved by spoofing the source IP address in the attack to make it look like all the requests for response are being sent by the target. As a result, all the reflectors send their responses to the target, thereby flooding the target with traffic.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 13. Which attack relies on intercepting and redirecting secure transmissions as they occur? a. deauth (deauthentication) attack b. DNS poisoning c. on-path attack d. back door ANSWER: RATIONALE:

c

In an on-path attack, also known as a Man-in-the-Middle (MitM) attack, a hacker intercepts and captures secure transmissions, such as in an evil twin attack where transmissions between clients and a rogue access point are intercepted. This allows the attacker to obtain users' passwords or deceive them with a fake website containing harmful options.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the Page 231


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

network. Section 10-1 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

14. What type of malware replicates itself with the intent to infect more computers, either through network

connections when it piggybacks on other files or through the exchange of external storage devices? a. trojan horse b. virus c. worm d. bot ANSWER: RATIONALE:

b

A virus is a malware program that replicates itself with the intent to infect more computers, either through network connections when it piggybacks on other files or through the exchange of external storage devices. A virus might damage files or systems, or it might simply annoy users by, for example, flashing messages or pictures on the screen.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 15. What type of malware runs independently of other software and travels between computers and across

networks? a. trojan horse b. virus c. worm d. bot ANSWER: RATIONALE:

c

POINTS:

1

A worm is a type of malware that runs independently of other software and travels between computers and across networks. Worms may be transmitted by any type of file transfer, including email attachments. They do not alter other programs in the same way that viruses do, but they can carry viruses. Page 232


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 16. Brenda used an ATM on Friday to withdraw $500 for the weekend. She usually checks her account balance

on Mondays to ensure that her checkbook is accurate. However, this past Monday, she found that $1,500 was missing from her account. The withdrawal occurred 3 minutes after she left the ATM, and it was the maximum daily limit of $2,000, which included the $500 she withdrew. There was no one near her when she made the transaction, so how could that money have been withdrawn? a. Brenda forgot about a $1,500 debit that had not cleared yet. b. This was an inside job. c. Someone used binoculars. d. Someone used a camera and card skimmer. ANSWER: RATIONALE:

d

A camera and card skimmer are sure signs of shoulder surfing, although it may be hard to tell if this is happening. If Brenda had noticed the flyer holder taped to the ATM, she would have seen where the Wi-Fi camera was hidden. The skimmer is hidden in plain sight in that it is attached to where Brenda slid her card into the slot. That is where her card was read, and the camera caught her PIN. There was someone in the parking lot that was watching from the Wi-Fi camera to write down or record the PIN information. The rule of thumb for ATMs is, if something does not look right, yank on it. If it comes off, it was fake.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.1 - Identify people, technology, and malware security risks to a network. ACCREDITING STANDARDS: WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. TOPICS: Section 10-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 17. A security risk assessment evaluates the impact of potential threats on business processes, and a business

risk assessment evaluates threats to and vulnerabilities of the network. Page 233


Name:

Class:

Date:

a. True b. False ANSWER: RATIONALE:

b

A security risk assessment evaluates threats to and vulnerabilities of the network, and a business risk assessment evaluates the impact of potential threats on business processes.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 18. What term defines a series of steps that accomplishes a defined goal? a. business assessment b. data resiliency c. business resiliency d. business process ANSWER: RATIONALE:

d

A business process is a series of steps that accomplishes a defined goal. For example, the series of steps involved in receiving an order from a customer, delivering a product or service, and billing the customer are operations business processes.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 Page 234


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

19. Armando wants to ensure that his company's network is protected against attackers. To do this, he needs to

test the network for vulnerabilities. What type of testing does Armando need to perform on his company's network? a. anomaly testing b. vulnerability testing c. penetration testing d. vector testing ANSWER: RATIONALE:

c

Armando needs to conduct a vulnerability assessment followed by penetration testing to determine which vulnerabilities can be patched or mitigated and which ones cannot.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 20. In a team exercise, two teams of different colors are tasked with attacking and defending a client's network.

One team is a hired outside firm, and the other is the company's own IT organization. The outside firm is responsible for attacking the network, while the company's IT organization is responsible for defending the network. Which team is responsible for attacking the network and which team is responsible for defending the network? Choose all that apply. a. The red team conducts the attack. b. The blue team conducts the attack. c. The red team defends the network. d. The blue team defends the network. ANSWER: RATIONALE:

a, d

During a red team-blue team exercise, the red team conducts the attack, and the blue team attempts to defend the network. Usually, the red team is a hired Page 235


Name:

Class:

Date:

attacker, such as a consultant or security organization, and the blue team is the company's own IT, security, and other staff. In some cases, the blue team has no warning of the impending attack to better evaluate day-to-day defenses. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 21. Which scanning tool can identify unencrypted, sensitive data (such as credit card numbers) saved on your

network hosts? a. Nessus b. Nmap c. Metasploit d. Wireshark ANSWER: RATIONALE:

a

Nessus can identify unencrypted, sensitive data (such as credit card numbers) saved on your network's hosts. The program can run on a local network or from off-site servers continuously maintained and updated by the developer.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 236


Name:

Class:

Date:

22. Which penetration testing tool combines known scanning and exploit techniques to explore potentially new

attack routes? a. Wireshark b. Nmap c. Nessus d. Metasploit ANSWER: RATIONALE:

d

Metasploit is a popular penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 23. An IDS (intrusion detection system) can prevent inbound attacks from reaching a host or network. a. True b. False ANSWER: RATIONALE:

b

An IDS can only detect and announce suspicious activity on a network or host.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM Page 237


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:23 PM

24. Which intrusion detection and prevention system increases security for the entire network? a. NIDS and HIDS (network intrusion detection system and host intrusion detection system) b. NIPS and HIPS (network intrusion protection system and host intrusion protection system) c. NIDS and HIPS (network intrusion detection system and host intrusion protection system) d. NIPS and HIDS (network intrusion protection system and host intrusion detection system) ANSWER: RATIONALE:

c

Using NIPS and HIPS together increases the network's security. For example, an HIPS running on a file server might accept a hacker's attempt to log on if the hacker is posing as a legitimate client. With the proper NIPS, however, such a hacker would likely never get to the server. Like an IDS, an IPS requires careful configuration to avoid an abundance of false alarms or a lack of needed alarms.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 25. What is the purpose of a honeypot? a. lure hackers into a decoy network to study their hacking techniques b. catch employees trying to steal secrets in the act c. a complex DMZ to keep hackers at bay d. act as a primary firewall for the network ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and

One way to learn about hackers is to lure them to a network on purpose. Those who want to learn more about hacking techniques or nab a hacker in the act might create a honeypot, which is a decoy system that is purposely vulnerable and filled with what appears to be sensitive (though false) content, such as financial data.

Page 238


Name:

Class:

Date:

management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 26. What is the primary difference between a honeypot and a honeynet? a. While a honeynet focuses on attracting and analyzing attacks on a single system, a honeypot provides

a broader and more detailed understanding of attack strategies and behaviors across a simulated network environment. b. While a honeypot focuses on attracting and analyzing attacks on a single system, a honeynet provides a broader and more detailed understanding of attack strategies and behaviors across a simulated network environment. c. A honeynet uses fewer resources than a honeypot. d. A honeypot uses more resources than a honeynet. ANSWER: RATIONALE:

b

A honeypot focuses on attracting and analyzing attacks on a single system, and a honeynet provides a broader and more detailed understanding of attack strategies and behaviors across a simulated network environment.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.10.2 - Increase network security through risk assessment and management. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 10-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 27. The practice of securing devices from network-or software-based attacks is called device locking. a. True b. False Page 239


Name:

ANSWER: RATIONALE:

Class:

Date:

b

The practice of securing devices from network- or software-based attacks is called device hardening.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 28. Why is it important to standardize OS and application versions across the network? a. to ensure all systems have identical performance levels b. to make sure all systems use the same amount of power c. to simplify the change process for future updates d. to ensure compatibility with all types of peripherals ANSWER: RATIONALE:

c

Updating OS and application versions consistently across the network will simplify the change process for future updates.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 29. What are some of the steps involved in implementing patches? Choose all that apply. a. validating b. prioritizing c. testing Page 240


Name:

Class:

Date:

d. identifying ANSWER: RATIONALE:

a, b, c

Implementing patches includes validating, prioritizing, testing, and applying them. Careful implementation is especially important with security patches, which play a critical role in protecting a business's interests.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 30. When a patch is necessary but cannot be implemented due to issues such as compatibility, other ways must

be found to modify the situation. What is this process called? a. risk adversity b. risk abatement c. risk management d. risk mitigation ANSWER: RATIONALE:

d

This process is called risk mitigation. When it is not possible to implement a necessary patch due to issues such as compatibility with legacy software, other layers of protection must be found to decrease the resulting risk and protect the affected devices and applications.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM Page 241


Name:

Class:

Date:

31. In today's increasingly connected world, the threat of firmware attacks is on the rise, emphasizing the critical

need to keep device firmware updated. However, even firmware updates can introduce issues that lead to computer malfunctions. Recently, an IT technician was prompted by the computer manufacturer to install a BIOS (Basic Input/Output System) firmware update. Sensibly, the technician created a backup of the old BIOS before proceeding with the update. Once installed, the computer functioned well but encountered an issue when shutting down-requiring the on/off button to be held for 10 seconds. Reverting to the old BIOS resolved the issue, until a new BIOS update was released two months later, resulting in the same problem. What course of action should the technician take now? a. block firmware updates b. call customer support c. continue trying when new updates are published d. do nothing ANSWER: RATIONALE:

a

Since this issue happened twice with two consecutive firmware updates, it might be best to shut off the firmware update feature on the device. If two separate firmware updates in a row fail, chances are there will not be any updates that will work.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 32. Enya was going through the updates available through Windows Update after the latest Patch Tuesday. One

of the updates caught her eye-it was a critical update for Microsoft Webserver. However, she does not have Microsoft Webserver installed on the server that she is working on. Is ignoring the patch a good idea, considering it is marked as critical? a. The patch may involve other issues it could fix. b. The patch will be there if the program is installed. c. Install the patch only if it is relevant to existing software. d. The patch could possibly damage existing software. ANSWER: RATIONALE:

c

If the product is not installed, there is no need to worry about installing updates for it. It is important to keep systems updated with patches relevant to the software that is actually being used in order to maintain security and performance. Page 242


Name:

Class:

Date:

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 33. Jeremy, a network administrator, has privileged access to manage his company's network but can only do so

from the office. What type of limiting precaution is this considered? a. limited use b. limited location c. limited duration d. limited privacy e. limited access ANSWER: RATIONALE:

b

This precaution is limited location. Many companies require that privileged accounts be accessed by employees only while working on location. This is to ensure that not even a legitimate network administrator can access the device remotely and make high-level changes from outside the protected network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 34. Dimitri, the IT Director of a mid-size company, has total network control, but his activities are monitored.

What type of precaution is this considered? a. limited use Page 243


Name:

Class:

Date:

b. limited location c. limited duration d. limited privacy e. limited access ANSWER: RATIONALE:

d

This precaution is considered limited privacy. A privileged account can be used for destructive activity, whether malicious or not. Therefore, all user actions within these accounts should be logged and monitored by someone other than the account owner. Although Dimitry has total network control, someone still needs to monitor his access for any signs of destructive or malicious activity.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 35. Which anti-malware solution is installed on every desktop, addresses the most likely point of entry, but

ignores the most important files that might be infected? a. host-based b. server-based c. network-based d. cloud-based ANSWER: RATIONALE:

a

The anti-malware installed on each desktop is considered host-based. While hostbased anti-malware addresses the most likely point of entry, it ignores the most important files that may be infected-those on the servers. This type of antimalware also does not provide sufficient coverage when a significant portion of the network is virtualized.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense Page 244


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

techniques, and solutions. Section 10-3 Bloom's: Remember/Understand 8/16/2024 12:23 PM 8/16/2024 12:23 PM

36. What anti-malware solution secures the point where the Internet connects with the internal network and

provides a strong defense against a primary source of intrusion? a. host-based b. server-based c. network-based d. cloud-based ANSWER: RATIONALE:

c

Securing the network's gateways, where the Internet connects with the interior network, is considered network-based. It provides a formidable layer of defense against the primary source of intrusion-the Internet. However, this does nothing to prevent users from putting the network at risk with infected files on flash drives, laptops, or smartphones, and it cannot respond to problems that manage to wiggle through the edge defenses. Network-based firewalls and defenses must be implemented throughout the network, not just on the perimeter.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 37. Why is it considered good cyber hygiene to remove all default user accounts including default administrator

accounts? a. Default accounts do not have total access. b. Default accounts have default passwords and usernames. c. Default accounts have software vulnerabilities. d. Default accounts have network connection issues. ANSWER: RATIONALE:

b

Default accounts have default usernames and passwords, and some may not have usernames or passwords at all. When setting up a network, it is important to Page 245


Name:

Class:

Date:

deactivate or remove all default accounts before proceeding with device setup. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 38. Besides ARP spoofing, ARP vulnerabilities contribute to the feasibility of several other exploits. What are

some of those exploits? Choose all that apply. a. cross-site scripting attacks b. DoS attacks c. on-path attacks d. MAC flooding attacks ANSWER: RATIONALE:

b, c, d

In addition to ARP spoofing, ARP vulnerabilities contribute to the feasibility of several other exploits, including DoS attacks, on-path attacks, and MAC flooding.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 39. What are the protocols on a switch that work together to protect against ARP spoofing? Choose all that

apply. a. MAC filtering b. DAI (dynamic ARP inspection) c. DHCP snooping Page 246


Name:

Class:

Date:

d. whitelisting/blacklisting ANSWER: RATIONALE:

b, c

DAI (dynamic ARP inspection) can be configured on a switch to protect against ARP spoofing attacks. When DAI is enabled, the switch compares incoming messages with its DHCP snooping binding table to determine whether the message's source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. DAI and DHCP snooping work together on network switches.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM DATE MODIFIED: 8/16/2024 12:23 PM 40. This anti-malware solution checks every file and transaction to protect important files but significantly slows

down network performance. What is it? a. host-based b. server-based c. network-based d. cloud-based ANSWER: RATIONALE:

b

This is a server-based solution. The anti-malware software resides on the servers and checks every file and transaction. It will protect important files but slow network performance considerably.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.10.3 - Implement device hardening techniques. ACCREDITING STANDARDS: WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.4.2 - Summarize various types of attacks and their impact to the network. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 10-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:23 PM Page 247


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:23 PM

Chapter 11 Access Control 1. What type of assessment should be done in order to address an organization's specific types of risks/threats

and their likelihood of occurring? a. risk assessment b. network security assessment c. posture assessment d. network compliance assessment ANSWER: RATIONALE:

c

A posture assessment needs to be done in order to identify vulnerabilities that rate both the severity of each threat and its likelihood of occurring.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 2. During freshman orientation, Ralph was advised to ensure that his devices have sufficient storage capacity

and that he can access his homework from anywhere. What variant of BYOD does this fall under? a. BYOA (bring your own application) b. BYOT (bring your own technology) c. CYOD (choose your own device) d. BYOC (bring your own cloud) ANSWER: RATIONALE:

d

Ralph should bring his own cloud (BYOC) to have enough space to save his homework and access it from any device. Cloud access would make this scenario feasible.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. Page 248


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 11-1 Bloom's: Apply 8/16/2024 12:24 PM 8/16/2024 12:24 PM

3. What are some of the benefits of using MDM (mobile device management) software for organizations?

Choose all that apply. a. increase device lifespan b. enforce password policy c. encrypt device data d. automate app development e. remote device wipe ANSWER: RATIONALE:

b, c, e

Some of the benefits of MDM (mobile device management) are that it can enforce password policy, encrypt device data, and remotely wipe a device if necessary.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 4. Which of the following statements may be found in an acceptable use policy (AUP)? Choose all that apply. a. Be aware that activities on this network can be and are monitored and may be formally audited. b. Employees can use company email accounts for personal communications as long as the activity does

not interfere with work duties. c. Do not do anything illegal using company devices or other resources. d. It is acceptable to access social media sites during work hours as long as productivity is maintained. e. Do not try to circumvent network security restrictions. ANSWER: RATIONALE:

a, c, e

POINTS: QUESTION TYPE:

1 Multiple Response

Here are some examples of statements that might be included in an acceptable use policy: Be aware that all activities on this network are subject to monitoring and may be formally audited. It is prohibited to engage in any illegal activities using company devices or other resources. Do not attempt to bypass network security restrictions.

Page 249


Name:

Class:

Date:

HAS VARIABLES: LEARNING OBJECTIVES:

False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 5. A security policy should define what "confidential" and "private" mean to the organization. This is often done

in a non-disclosure agreement (NDA). a. True b. False ANSWER: RATIONALE:

a

A security policy should define what "confidential" and "private" mean to the organization. This is often done in an NDA (non-disclosure agreement). In general, information is confidential if other parties could use it to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 6. Which access control method identifies the person by name and perhaps includes a photo, title, and other

information about the person? a. biometric lock b. access control vestibule c. biometric card d. access badge ANSWER: RATIONALE:

d

An access badge identifies the person by name and perhaps includes a photo, title, and other information. Additionally, many organizations provide electronic access badges or smart cards. When the smart card is swiped through a badge reader, the door unlocks, and the person's access to the secured area is time-stamped and Page 250


Name:

Class:

Date:

logged in a database. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 7. Which of the following physical detection methods senses change within its field of view? a. tamper detection b. CCTV c. motion detection d. pressure detection ANSWER: RATIONALE:

c

Motion detection triggers an alarm when it detects movement (senses change) within its field of view.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 8. Which of the following physical detection methods identify physical penetration, temperature extremes, input

voltage and frequency variations, or certain kinds of radiation? a. tamper detection b. CCTV c. motion detection d. pressure detection ANSWER: RATIONALE:

a

Tamper detection identifies physical penetration, temperature extremes, input voltage variations, input frequency variations, or certain kinds of radiation. Many Page 251


Name:

Class:

Date:

devices that need protection cannot be kept within a secure area so different types of tamper detection devices are needed for different types of scenarios. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 9. Any information covered by an NDA does not need to be protected from international export. a. True b. False ANSWER: RATIONALE:

b

Any information covered by an NDA might also be protected from international export.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 10. Why should encrypted data about patients, clients, students, or customers never be carried internationally?

Choose all that apply. a. Encrypted data can only be encrypted within the country of origin. b. In some countries, it may be required that data be decrypted before it can be brought into the country. c. Authorities in some countries may confiscate encrypted devices either temporarily or permanently. d. Encrypted data can only be stored in the country where it was collected. ANSWER: RATIONALE:

b, c

Encrypted data should not be taken into other countries because in some countries, the person carrying the encrypted data may be required to decrypt it before entering. In other countries, authorities might confiscate the devices either temporarily or permanently. Page 252


Name:

Class:

Date:

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 11. Garron was about to leave the office for the weekend, but he had to complete his office closing checklist

first. He made sure that all entrances and exits to the network room were locked, all outer perimeter doors were secured, and all windows were shut and locked. Just before leaving, he activated the alarm. However, when he returned on Monday, he discovered that several computers had been stolen from the network room, yet no alarm had gone off. How did this happen? a. An alarm sensor was moved to a non-entrance door. b. Garron stole them as he was leaving. c. It was an inside job, the cleaning crew had the unlock code. d. The burglars came in through the drop ceiling. ANSWER: RATIONALE:

d

The burglars entered the network room through the drop ceiling. Since the room was locked and not equipped with motion sensors, the burglars were able to come and go without using the doors or triggering the alarm.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 12. Ezra used to come and go from his company's network operations center (NOC) without any issues. After

his hip replacement, he has been denied access to the NOC multiple times a day. What could be the problem? a. Ezra's company's biometric system is malfunctioning. b. Ezra's company's biometric system is gait-based. c. Ezra's company's biometric system needs a software update. d. Ezra's company's biometric system was not properly installed. Page 253


Name:

ANSWER: RATIONALE:

Class:

Date:

b

Ezra's company uses a gait-based biometric marker. When Ezra first started, he walked a certain way. However, after having his hip replaced, his walking pattern changed. As a result, the biometric system was not always able to recognize him as Ezra. This became especially noticeable when he was tired, as his walking pattern worsened as the day went on.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.1 - Describe security policies and physical security that help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 13. What is the term used for controlling logical access to a network and its resources? a. machine access control b. media access control c. network access control d. network identity control ANSWER: RATIONALE:

c

Controlling logical access to a network and its resources is called NAC (network access control).

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 14. IAM (identity and access management) is utilized to control access to networks, databases, storage, and even

resource configuration permissions. What are the elements that IAM comprises? Choose all that apply. a. authorization Page 254


Name:

Class:

Date:

b. application c. authentication d. accounting ANSWER: RATIONALE:

a, c, d

IAM consists of three major elements: authentication, authorization, and accounting. Together, this framework is abbreviated as AAA (authentication, authorization, and accounting) and is pronounced triple-A.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 15. Only users can be authenticated. Applications, services, and devices cannot be authenticated. a. True b. False ANSWER: RATIONALE:

b

The role of authentication is to verify the identity of any entity, such as a user, application, service, or device, attempting to access a protected resource. It must be accurately verified before being granted access.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 16. Gracie, an attorney at the law firm Dewy, Cheathem, and Howe, logs her time worked for each client using

an assigned client number. What element of AAA is she using? Page 255


Name:

Class:

Date:

a. authentication b. authorization c. accounting d. application ANSWER: RATIONALE:

c

The accounting element of AAA can be used to track the resources used for clients. Each time a job is done for a client, the time will be logged and added to their bill.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 17. Hannah works for a large software company that allows employees to work from home. When she is at

home, she can log into her company's network with no issues. However, if she tries to log in from the library, which is 5 miles away, she receives an error message and cannot log in. What authentication strategy is this? a. time of day b. total time logged on c. source address d. geographic location ANSWER: RATIONALE:

d

This authentication strategy is known as geographic location or geofencing. Geofencing involves determining a client's geographic location to enforce a virtual security perimeter. In simpler terms, the client must be situated within a specific physical area to gain access to the network.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. Page 256


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 11-2 Bloom's: Apply 8/16/2024 12:24 PM 8/16/2024 12:24 PM

18. Which authentication restriction will lock a user, or bad actor, out of a network after too many attempts to

log in? a. time of day b. source address c. unsuccessful logon attempts d. geographic location ANSWER: RATIONALE:

c

This authentication strategy is called unsuccessful (failed) logon attempts. Hackers might repeatedly attempt to log on under a valid username for which they are trying to guess the password. As the network administrator, you can set a limit on how many consecutive, unsuccessful logon attempts from a single user ID the server will accept before blocking that ID from attempting to log on.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 19. Why is it important to change the default passwords on network devices as soon as you install them on your

network? Choose all that apply. a. Device usernames and passwords are weak. b. Device usernames and passwords are widely known. c. Device usernames and passwords are non-existent. d. Device usernames and passwords are too short. ANSWER: RATIONALE:

a, b

Passwords on network devices can sometimes be weak, such as using "admin" and "password." Passwords and usernames for devices can be easily found on the web with a simple search. All that needs to be done is to look for the specific make and model of the device. For devices like routers, the SSID is usually the make of the router. Additionally, some devices have two sets of passwords. For Page 257


Name:

Class:

Date:

example, routers and printers have passwords and usernames for the network, and they also have an administrative password and username for web-facing software. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 20. Why is it important to not use personal information about yourself when creating passwords? Choose all that

apply. a. that information is common knowledge b. that information can be found on social media c. that information can be collected through data brokers d. that information is the first data that a hacker will try during an attack ANSWER: RATIONALE:

b, c, d

Usually, your personal information is common knowledge only to your friends. However, thanks to social media, everybody shares just about everything about themselves, and it is very easy for a hacker to pick a target by scraping social media pages looking for targets. Data brokers like Spokeo sell information about people to anyone who wants to buy it, and hackers will use that information first when trying to break into your network or your device.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 21. When creating a password, is it important to avoid using words from the dictionary? Why is that the case? Page 258


Name:

Class:

Date:

Choose all that apply. a. Hackers use dictionaries, so they don't have to worry about spelling. b. Words from dictionaries are easy to remember, so they are easy for a hacker to use. c. Commonly used words in dictionaries are often used as passwords and should not be. d. Dictionary attacks are usually the first technique used when trying to hack a password. ANSWER: RATIONALE:

c, d

Dictionary attacks are often the first technique hackers use when trying to guess a password because most people will use common words from a dictionary as passwords.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 22. Which of the following symbols are common replacements for certain letters? Choose all that apply. a. @ is a b. 3 is E c. % is Z d. $ is S ANSWER: RATIONALE:

a, b, d

The @ symbol for "a," the number 3 for E, and the $ for S are most common replacements today.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM Page 259


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:24 PM

23. Hunter used to work in the sales department where he had access to various printers, server folders, and

resources to perform his job effectively. However, when he was moved to the marketing department, his access to the previous files on the server and printers was revoked. Instead, he was given access to a new set of folders on the server and some new color printers. What is the authorization method called? a. separation of duties b. least privilege c. security management d. RBAC (role-based access control) ANSWER: RATIONALE:

d

With RBAC, a network administrator receives from a user's supervisor a detailed description of the tasks or jobs that the user performs for the organization. The administrator is responsible for assigning the privileges and permissions necessary for the user to perform only this role. In addition, all users might require access to certain general resources on the network, for example, a portion of the company website available to all employees.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.2 - Explain how authentication, authorization, and accounting work together to help secure a network. ACCREDITING STANDARDS: WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-2 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 24. Which form of authentication allows clients to sign in once to access multiple systems or resources? a. 2FA b. SSO c. MFA d. security token ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

SSO (single sign-on) is a form of authentication in which a client signs in one time to access multiple systems or resources. The primary advantage of single sign-on is convenience. Users do not have to remember several passwords, and network administrators can limit the time they devote to password management.

Page 260


Name:

Class:

Date:

HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 25. What are some of the most common categories of authentication for MFA (multifactor authentication)?

Choose all that apply. a. something you know b. something you can do c. something you have d. something you are e. something you remember ANSWER: RATIONALE:

a, c, d

Some common categories of authentication for MFA include: something you know (password, PIN, or biographical data), something you have (ATM card, smart card, or key), and something you are (fingerprint, facial pattern, or iris pattern).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 26. What type of authentication generates a random code every 30 seconds that must be entered in addition to

the user's password to access the account? a. SMS-based OTP (One-Time Password) b. security token c. time-based authentication d. push notification approval ANSWER: RATIONALE:

c

This is called time-based authentication because the generated code is only valid Page 261


Name:

Class:

Date:

for a short period of time. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 27. Which of the following directory services are LDAP compliant? Choose all that apply. a. Active Directory b. OpenLDAP c. 398 Directory Server d. Microsoft IIS Server ANSWER: RATIONALE:

a, b, c

Active Directory, OpenLDAP, and 398 Directory Server are all LDAP compliant.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 28. One weakness of LDAP is that it transmits user credentials in plaintext. Therefore, today's on-prem

authentication processes should use the more secure LDAPS (LDAP over SSL/TLS). What port does LDAPS communicate on? a. 396 b. 486 c. 636 d. 286 ANSWER: RATIONALE:

c

POINTS:

1

Secure LDAPS (LDAP over SSL/TLS) communicates over port 636. Page 262


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 29. Why is RADIUS better than Kerberos for off-site clients? Choose all that apply. a. It is operating system agnostic (works with most OSs). b. Encryption is native to the software. c. It is a lightweight protocol that needs little bandwidth. d. It originated as a remote authentication service. ANSWER: RATIONALE:

a, d

RADIUS is compatible with almost all modern operating systems and can operate on a remote access server or a dedicated computer. Originally designed as a remote authentication service, RADIUS specializes in supporting clients that are not directly wired into the network, such as wireless access points or VPN-based clients.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 30. In what security model is everything both in and out of the network considered untrustworthy until proven

otherwise? a. role-based access b. mandatory access c. zero trust d. information flow ANSWER: RATIONALE:

c

In the zero trust security model, everything in or out of the network is considered untrustworthy until proven otherwise. It's based on the mantra, "Never trust, Page 263


Name:

Class:

Date:

always verify." To accomplish this, authentication and filtering processes must be applied repeatedly for each new access request. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 31. How are attack surfaces managed in a zero trust architecture model? a. Resources are isolated from other resources. b. Resources are protected through strong perimeter defense. c. Resources are individually protected. d. Resources are protected through static access control lists. ANSWER: RATIONALE:

c

Attack surfaces are managed by individually protecting each resource instead of defining a larger network space with protected resources inside. Each resource is configured with its own security.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 32. How is network segmentation managed in a zero trust architecture model? a. Resources are isolated from other resources. Page 264


Name:

Class:

Date:

b. Resources are protected through strong perimeter defense. c. Resources are individually protected. d. Resources are protected through static access control lists. ANSWER: RATIONALE:

a

In a zero trust network, segmentation is achieved by isolating resources from each other and by requiring authenticated communication between them. For instance, a database is located in a secure segment that demands authentication from a web server to access the database's information.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 33. How is authentication managed in a zero trust architecture model? a. Authentication processes are implemented based on a wide variety of context-aware factors. b. Authentication processes are implemented by access control and traffic analysis zones. c. Authentication processes are implemented based on traffic inspection and identification. d. Authentication processes are implemented between all resources. ANSWER: RATIONALE:

d

Authentication processes are implemented throughout the organization's network and between all resources. For example, an application that needs access to encryption keys might be required to authenticate to an IAM system before being granted access to keys held in a key management service.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 Page 265


Name:

KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Bloom's: Remember/Understand 8/16/2024 12:24 PM 8/16/2024 12:24 PM

34. How is access management applied in a zero trust architecture model? a. applied based on network configuration b. applied based on a variety of context-aware factors c. applied based on assigned policies d. applied based on zone defense ANSWER: RATIONALE:

b

Determinations of access authorization/management are made based on a wide variety of context-aware factors, such as time of day, traffic contents, request sources, device health, resource classification, and even behavior patterns. The principle of least privilege should be applied to ensure that any entity has only the permissions it needs and no more.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 35. With a zero trust architecture, a single VM with multiple network interfaces can have a different security

group for each one. a. True b. False ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of

Security groups protect individual network interfaces with rules customized to the needs of those interfaces, even to the point where a single VM with multiple network interfaces can have a different security group for each one, based on the needs of the traffic expected to reach that interface.

Page 266


Name:

Class:

Date:

modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 36. SASE (secure access service edge), pronounced sassy, merges hardware-defined networking services and

zero trust security principles and services into a single framework to better serve the needs of distributed network resources. a. True b. False ANSWER: RATIONALE:

b

SASE (secure access service edge), pronounced sassy, merges software-defined networking services and zero trust security principles and services into a single framework to better serve the needs of distributed network resources.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 37. Which of the following are some of the core components of an SASE (secure access service edge) based

approach to cybersecurity? Choose all that apply. a. CASB (cloud access security broker) b. FWaaS (Firewall as a Service) c. SWG (secure web gateway) d. IaaS (Infrastructure as a Service) ANSWER: RATIONALE:

a, b, c

The following are some of the core components of an SASE-based approach to cybersecurity: CASB (cloud access security broker), FWaaS (Firewall as a Page 267


Name:

Class:

Date:

Service), and SWG (secure web gateway). POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 38. What are some of the advantages of using a SWG (secure web gateway)? Choose all that apply. a. malware and threat detection b. latency from traffic inspection c. incorporation of multiple types of filters d. single point of failure ANSWER: RATIONALE:

a, c

Some of the advantages of using an SWG include malware and threat detection, as well as content filtering. Content filtering allows for the enforcement of policies to control access based on categories and URLs.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Response False WEST.NET+.25.11.4 - Explain how network security is evolving to meet the needs of modern, distributed networks. ACCREDITING STANDARDS: WEST.N10-009.25.1.8 - Summarize evolving use cases for modern network environments. WEST.N10-009.25.3.4 - Given a scenario, implement IPv4 and IPv6 network services. WEST.N10-009.25.4.3 - Given a scenario, apply network security features, defense techniques, and solutions. TOPICS: Section 11-4 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 39. What is the term used to describe a service that provides authentication services and stores user credentials? a. directory services b. IdP (identity provider) Page 268


Name:

Class:

Date:

c. IdsP (identity service provider) d. authorization server ANSWER: RATIONALE:

b

Cloud, web, and mobile applications often rely on IdPs for authentication services. Although Active Directory itself could be considered an IdP in that it provides authentication services and stores user credentials, the term "IdP" is generally used to refer to an authentication provider that is designed to support off-site authentication.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. TOPICS: Section 11-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 40. TACACS+ (Terminal Access Controller Access Control System Plus) is another AAA protocol, similar to

RADIUS, that provides network administrators with the ability to separate authentication, authorization, and auditing capabilities. However, TACACS+ differs from RADIUS in several ways. How does TACACS+ differ? Choose all that apply. a. Uses text-based packet structure. b. Relies on TCP, not UDP, at the transport layer. c. Is most often used for device administration access control for technicians, although it can be used

for network resource access control for users. d. Is typically used to authenticate to network devices such as routers and switches rather than to workstations or servers. e. Provides basic authentication and authorization capabilities. ANSWER: RATIONALE:

b, c, d

TACACS+ differs from RADIUS in that it relies on TCP, not UDP, at the transport layer. It is primarily used for device administration access control for technicians, although it can also be used for network resource access control for users. Typically, TACACS+ is used to authenticate to network devices such as routers and switches rather than to workstations or servers.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.11.3 - Compare authentication technologies. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.4.1 - Explain the importance of basic network security concepts. Page 269


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 11-3 Bloom's: Remember/Understand 8/16/2024 12:24 PM 8/16/2024 12:24 PM

Chapter 12 Performance and Recovery 1. What is the difference between an alert and a log? Choose all that apply. a. A log is a message generated when a predefined event occurs. b. An alert is a message generated when a predefined event occurs. c. An alert is a record of activities or state changes on a device or in a system. d. A log is a record of activities or state changes on a device or in a system. ANSWER: RATIONALE:

b, d

An alert is a message that is created when a predefined event occurs. These alerts can generate notifications to IT personnel or other automated responses, and they reflect real-time data. A log is a record of activities or state changes on a device or in a system. Logs contain historical data that can assist in retroactive analysis of past events.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 2. Network monitors and protocol analyzers are the same thing and gather the same information. a. True b. False ANSWER: RATIONALE:

b

The terms "network monitor" and "protocol analyzer" are often used interchangeably, but they have significant differences in the types and amount of data that they can gather. Consider the distinction between monitoring the traffic encountered by a single device on its network connection, which is the role of a protocol analyzer, and monitoring devices and traffic patterns across the entire Page 270


Name:

Class:

Date:

network, which is what a network monitor does. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 3. Ethen plans on monitoring traffic on his network. What would be the easiest and least expensive way for him

to do so? a. Configure all devices to report their traffic to a network monitor. b. Configure a switch to use port mirroring. c. Install a network TAP (test access point) or packet sniffer in line with the network. d. Use Wireshark on a wireless computer that supports promiscuous mode. ANSWER: RATIONALE:

d

The easiest and least expensive way for Ethen to monitor his network is to install Wireshark on a wireless computer, such as a laptop, set to promiscuous mode. This will allow Ethan to view all traffic passing through his network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 4. What is the difference between traffic analysis and packet analysis? Choose all that apply. Page 271


Name:

Class:

Date:

a. Traffic analysis examines traffic flow data for patterns and exceptions to those patterns. b. Packet analysis examines network data for patterns and exceptions to those patterns. c. Traffic analysis identifies protocols, errors, and misconfigurations. d. Packet analysis identifies protocols, errors, and misconfigurations. ANSWER: RATIONALE:

a, d

Traffic analysis examines network traffic flow data for patterns and exceptions to those patterns, and packet analysis identifies protocols, errors, and misconfigurations.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 5. There are various types of data errors and other transmission issues indicated by increasing interface counters.

What is the error called where the packet does not meet the minimum packet size? a. ghosts b. giants c. runts d. trivial ANSWER: RATIONALE:

c

Runts are packets that are smaller than the medium's minimum packet size. For instance, any Ethernet packet that is smaller than 64 bytes is considered a runt.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. Page 272


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 12-1 Bloom's: Remember/Understand 8/16/2024 12:24 PM 8/16/2024 12:24 PM

6. The syslog standard defines roles for devices participating in logging events. What are they? Choose all that

apply. a. The collector is a device that is monitored by a syslog-compatible application and issues event

information. b. The generator is a device that is monitored by a syslog-compatible application and issues event information. c. The collector is the server that gathers event messages from generators. d. The generator is the server that gathers event messages from collectors. ANSWER: RATIONALE:

b, c

The syslog standard defines two roles for devices participating in logging events: Generator-The device monitored by a syslog-compatible application that issues event information; and Collector-The server that gathers event messages from generators.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 7. Where do computers running Linux and UNIX record their syslog data? a. wevtutil el b. /var/log c. \system32\config\ d. /etc/syslog.conf ANSWER: RATIONALE:

b

POINTS:

1

Computers running Linux and UNIX record syslog data in a system log, found in the /var/log directory. Page 273


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 8. Irwin works for a local hospital where all employees are required to use multifactor authentication to access

the hospital's network, which stores all patient data. Why is it essential to track employees when they access patient data? Choose all that apply. a. The hospital practices least privilege protocols. b. The hospital wants to be sure that only certain employees have access to patient data. c. Tracking must be done for HIPAA (Health Insurance Portability and Accountability Act) compliance

purposes. d. It is a union rule that all employees must be tracked in accordance with their contract. ANSWER: RATIONALE:

b, c

All employees must authenticate to the hospital network to ensure that only specific employees, such as doctors and nurses, have access to patient data, while administrators and assistants do not need access to patient health data. Moreover, the hospital must comply with HIPAA regulations to avoid potential fines or loss of accreditation related to protection of patient data.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM Page 274


Name:

Class:

Date:

9. Which part of a network management system collects data from multiple managed devices at regular intervals

in a process called polling? a. managed device b. network management agent c. NMS (network management system) server d. MIB (management information base) ANSWER: RATIONALE:

c

The NMS (network management system) server, which may be a server or workstation, depending on the size of the network, collects data from multiple managed devices at regular intervals in a process called polling.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 10. Which part of a network management system contains several managed objects that can be any characteristic

of the device that is monitored? a. managed device b. network management agent c. network management system d. management information base ANSWER: RATIONALE:

a

A managed device can contain multiple managed objects, including components such as a processor, memory, hard disk, NIC, or intangibles such as performance or utilization.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. Page 275


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. Section 12-1 Bloom's: Remember/Understand 8/16/2024 12:24 PM 8/16/2024 12:24 PM

11. Each managed device may contain multiple managed objects. These objects are characteristics monitored on

the device. Each managed object is assigned an ID. What is this ID called? a. UUID (Universally Unique Identifier) b. DOI (Digital Object Identifier) c. OID (Object Identifier) d. PID (Persistent Identifier) ANSWER: RATIONALE:

c

Each managed object is assigned an OID (Object Identifier) that is standardized across all NMSs (network management systems). A managed device can contain multiple managed objects, representing any characteristic of the device that is being monitored. OIDs are used to identify managed objects in MIBs (Management Information Bases).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 12. Agents can communicate information about managed devices via any of several application layer protocols.

On modern networks, most agents use SNMP (Simple Network Management Protocol). Which UDP ports does SNMP use? Choose all that apply. a. 161 b. 164 c. 162 d. 163 Page 276


Name:

ANSWER: RATIONALE:

Class:

Date:

a, c

SNMP is part of the TCP/IP suite of protocols and typically runs over UDP ports 161 and 162. Port 161 is used to send information from the manager to the installed agents, while port 162 is used for agents to send messages to the manager.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 13. Jenny, a network administrator at a Fortune 500 company, is currently researching whether to transition

from SNMPv2 to SNMPv3 due to the latter's enhanced security features. However, the more complex configuration of SNMPv3 would necessitate additional overtime and personnel. As a result, Jenny and her team have decided to retain SNMPv2 for the time being. What security measures should Jenny and her team maintain to ensure the ongoing security of their network? Choose all that apply. a. Disable SNMP where it is not needed. b. Limit approved sources of SNMP messages. c. Continue to rely on edge devices such as firewalls. d. Require read-only mode. e. Configure strong community strings. ANSWER: RATIONALE:

a, b, d, e

To continue using SNMPv2, Jenny needs to take the following actions: Disable SNMP on devices where it's not needed (1). Limit approved sources of SNMP messages (2). Require read-only mode so devices can't be reconfigured using SNMP messages (3). Configure strong passwords, called community strings, on SNMP managed devices. Use different community strings on different types of devices so that devices with less secure protections will not compromise devices with higher security (4).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and Page 277


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. Section 12-1 Bloom's: Apply 8/16/2024 12:24 PM 8/16/2024 12:24 PM

14. What is the term used for information collected from network devices, such as routers and switches, to

describe the traffic crossing those devices' interfaces? a. internal flow data b. network flow data c. LAN flow data d. WAN flow data ANSWER: RATIONALE:

b

Network flow data is information collected from network devices, such as routers and switches, describing the traffic crossing those devices' interfaces. Portions of the traffic are captured and logged in flow logs and then analyzed to provide observability into network performance and activity. LAN flow data is incorrect because there can be multiple LANs in a network.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 15. Observability refers to the ability to capture internal system information in order to analyze and respond to

it. a. True b. False ANSWER:

a Page 278


Name:

RATIONALE:

Class:

Date:

Observability refers to the ability to capture internal system information in order to analyze and respond to it. Cloud observability must access data collected from a wide variety of monitoring services, many of which are cloud native in design.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 16. What types of information logs are retained in a cloud deployment? Choose all that apply. a. sign-in attempts b. security platform c. configuration changes d. traffic flows ANSWER: RATIONALE:

a, c, d

Logs capture information about activities in the cloud, such as sign-in attempts, configuration changes, or traffic flows. Different logging services have access to different types of activities.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 17. In AWS, what program captures information about every API (application programming interface) call Page 279


Name:

Class:

Date:

made in a customer's AWS account? a. CloudObserv b. CloudFlow c. CloudWatch d. CloudTrail ANSWER: RATIONALE:

d

CloudTrail captures information about every API (application programming interface) call made in a customer's AWS accounts. Most cloud platforms rely on API calls for nearly every interaction with a service or resource configuration.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-1 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 18. In AWS, what program offers real-time monitoring and has automated response capabilities? a. CloudObserv b. CloudFlow c. CloudWatch d. CloudTrail ANSWER: RATIONALE:

c

In AWS, much of the real-time monitoring and automated response is performed using CloudWatch.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.1 - Use appropriate tools to collect data about the network. ACCREDITING STANDARDS: WEST.N10-009.25.1.4 - Explain common networking ports, protocols, services, and traffic types. WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. Page 280


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

Section 12-1 Bloom's: Apply 8/16/2024 12:24 PM 8/16/2024 12:24 PM

19. What are the major factors used in network monitoring? Choose all that apply. a. discovery management b. performance management c. systems management d. fault management ANSWER: RATIONALE:

b, d

There are two main aspects to network monitoring: performance management involves monitoring the effectiveness of links and devices in meeting the demands placed on them; fault management involves detecting and signaling device, link, or component faults.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 20. James wants to monitor his company's network performance during peak and slow usage times over a six-

week period to identify potential problems in the future. What type of report will James generate? a. usage report b. operations report c. baseline report d. network demand report ANSWER: RATIONALE:

c

POINTS:

1

To know when there's a problem on the network, you must first know what is normal for that network. A baseline is a report of the network's normal state of operations and might include a range of acceptable measurements. Baseline measurements serve as a basis of comparison for future performance increases or decreases caused by network changes or events with past network performance. Page 281


Name:

Class:

Date:

QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 21. What are some of the most common KPIs (key performance indicators) found in products that measure

baseline performance? Choose all that apply. a. utilization b. error rate c. packet drops d. number of pull requests ANSWER: RATIONALE:

a, b, c

In products that measure baseline performance, some common KPIs include utilization, which refers to the actual throughput used as a percentage of available capacity. No network should be required to operate at maximum capacity. Error rate refers to the percentage of how often bits can be damaged in transit due to EMI or other interference. Packet drops occur when packets are damaged beyond use, arrive after their expiration, or are not allowed through an interface.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 22. What type of management refers to a collection of strategies to optimize the volume of traffic that a network

can support? Page 282


Name:

Class:

Date:

a. fault management b. bandwidth management c. traffic management d. flow management ANSWER: RATIONALE:

b

As a subset of performance management, bandwidth management refers to a collection of strategies to optimize the volume of traffic that a network can support.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 23. What are some of the technologies that may be used in bandwidth management? Choose all that apply. a. band management b. flow control c. congestion control d. QoS (quality of service) ANSWER: RATIONALE:

b, c, d

Bandwidth management involves various technologies such as flow control, congestion control, and quality of service (QoS). Flow control configures interfaces and protocols to balance permitted traffic volume with a device's capability of handling that traffic. Congestion control adjusts the way network devices respond to indications of network performance issues caused by traffic congestion, so they don't make the problem worse. QoS prioritizes some traffic over other traffic, so the most important traffic gets through even during times of congestion.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. Page 283


Name:

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Class:

Date:

WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. Section 12-2 Bloom's: Remember/Understand 8/16/2024 12:24 PM 8/16/2024 12:24 PM

24. Which bandwidth management technique uses the "stop-and-wait method" where a sender transmits a frame

and then waits for an acknowledgement before transmitting the next frame? a. band management b. flow control c. congestion control d. QoS (quality of service) ANSWER: RATIONALE:

b

Flow control uses the "stop-and-wait method" where a sender transmits a frame and then waits for an acknowledgement before transmitting the next frame.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 25. When a network needs to handle high volumes of network traffic, users benefit from a bandwidth

management and optimization technique known as traffic shaping. Traffic shaping can be categorized in which area of bandwidth management? a. congestion control b. flow control c. QoS (quality of service) d. band management ANSWER: RATIONALE:

c

When a network needs to handle high volumes of network traffic, network administrators must efficiently manage a network's QoS configurations, which are a group of techniques for adjusting the priority that a network assigns to various Page 284


Name:

Class:

Date:

types of transmissions. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: WEST.NET+.25.12.2 - Explain methods to optimize network performance. ACCREDITING STANDARDS: WEST.N10-009.25.1.2 - Compare and contrast networking appliances, applications, and functions. WEST.N10-009.25.3.2 - Given a scenario, use network monitoring technologies. WEST.N10-009.25.5.2 - Given a scenario, troubleshoot common cabling and physical interface issues. WEST.N10-009.25.5.4 - Given a scenario, troubleshoot common performance issues. TOPICS: Section 12-2 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 26. An incident response is a 5-stage process, which actually begins before the incident occurs. a. True b. False ANSWER: RATIONALE:

b

An incident response involves a 6-stage process that begins before the incident occurs. The stages are: preparation, detection and identification, containment, remediation, recovery, and review.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 27. What is data called that is collected in such a way that it can be presented in a court of law for the purpose of

prosecuting an instigator of illegal activity? a. real data b. audit data c. forensic data Page 285


Name:

Class:

Date:

d. digital data ANSWER: RATIONALE:

c

This type of data is known as forensic data. In certain situations, data must be collected in a manner that allows it to be presented in a court of law for the purpose of prosecuting someone involved in illegal activity. Forensic data can be compromised or destroyed if mishandled. Ideally, one or more first responders would take the lead in these cases.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 28. What is considered one of the highest priorities in the forensic process when documenting a scene? a. monitoring evidence b. chain of custody c. defensible audit trail d. securing the area ANSWER: RATIONALE:

c

Creating a defensible audit trail is one of the highest priorities in the forensics process. Additionally, a defensible audit trail is an audit trail that can be justified and defended in a court of law according to specific standards.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM Page 286


Name:

DATE MODIFIED:

Class:

Date:

8/16/2024 12:24 PM

29. All collected data must be carefully processed and tracked so that it does not leave official hands at any

point in the forensics process. What is this process? a. monitoring evidence b. chain of custody c. defensible audit trail d. securing the area ANSWER: RATIONALE:

b

This process is called the "chain of custody" and documents and describes exactly what the evidence is, when it was collected, who collected it, its condition, and how it was secured.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 30. Melina is a digital forensics technician at the 54th Street Division in Brooklyn. She has been called to the

scene of a crime because there are computers and phones that need to be documented due to the fact that they were in a criminal's possession. The criminal has been charged with the sale and distribution of drugs. When Melina arrives on site, she notices that the hard drive on one of the computers is active and discovers that a wipe program is running. She immediately unplugs the computer to stop the hard drive from being wiped clean. She then adds this incident to her documentation of the scene. What document is she adding to? a. monitoring evidence b. chain of custody c. defensible audit trail d. securing the area ANSWER: RATIONALE:

c

POINTS:

1

Since Melina unplugged the machine because of a wiper program wiping the hard drive, she needed to document the time and describe the symptoms she observed that led her to unplug the machine. Melina also needed to make a list of everyone found in the area and their access to the device in question.

Page 287


Name:

Class:

Date:

QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 31. Disaster recovery contingencies are commonly divided into categories. Which category costs the least but

needs the most work to restore functionality to a company? a. hot site b. warm site c. cold site d. black site ANSWER: RATIONALE:

c

In a cold site, the necessary computers, devices, and connectivity exist to rebuild a network. However, these resources are not appropriately configured, updated, or connected. Therefore, restoring functionality from a cold site could take a long time but is the cheapest option.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 32. What power flaw creates a momentary increase in voltage and can degrade a computer's power supply? a. brownout b. surge c. noise Page 288


Name:

Class:

Date:

d. blackout ANSWER: RATIONALE:

b

A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems, surges might last only a few thousandths of a second, but they can degrade a computer's power supply.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 33. What power flaw is a fluctuation in voltage levels caused by EMI or other devices on the network? a. brownout b. surge c. noise d. blackout ANSWER: RATIONALE:

c

Noise is a fluctuation in voltage levels caused by EMI or other devices on the network. Some noise is unavoidable on an electrical circuit, but excessive noise can cause a power supply to malfunction, immediately corrupting application or data files and gradually damaging motherboards and other computer circuits.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM Page 289


Name:

Class:

Date:

34. What power flaw is a momentary decrease in voltage, also known as a sag? a. brownout b. surge c. noise d. blackout ANSWER: RATIONALE:

a

A brownout is a momentary decrease in voltage, also known as a sag. An overtaxed electrical system can cause brownouts, which you might recognize in your home as a dimming of the lights. Such voltage decreases can cause computers or applications to fail and potentially corrupt data.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 35. Jasmine, the IT manager for a mid-sized company, recently oversaw the company's move to a new location

in a different town. Before the relocation, Jasmine researched the town's weather patterns, annual flooding forecasts, and the electricity provider for the area. Her findings indicated a higher likelihood of power outages during winter, frequent power spikes, and a few incidents of fires due to electrical issues. Jasmine now needs to decide on the best type of UPS to purchase for her network. What type of UPS would be most suitable for Jasmine to consider? a. online UPS b. line conditioning UPS c. standby UPS d. offline UPS ANSWER: RATIONALE:

a

Jasmine should choose the online UPS. It uses the AC power from the wall outlet to continuously charge its battery while providing power to a network device through its battery. In other words, a server connected to an online UPS always relies on the UPS battery for its electricity. Because the server never needs to switch from the wall outlet's power to the UPS's battery power, there is no risk of briefly losing service. Also, because the UPS always provides power, it can handle noise, surges, and sags before these fluctuations reach the attached device. Page 290


Name:

Class:

Date:

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 36. How long must you keep a backup of patient medical records in order to comply with HIPAA? a. 5 years b. 6 years c. 7 years d. 8 years ANSWER: RATIONALE:

c

In deciding what to back up, you might be required by certain compliance standards to back up certain types of data for a specified period. For example, HIPAA requires that medical records be saved for at least seven years from the date of the last service to the patient.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 37. Which backup strategy is the most comprehensive but takes the longest to complete? a. incremental backup b. differential backup Page 291


Name:

Class:

Date:

c. cloud backup d. full backup ANSWER: RATIONALE:

d

A full backup saves everything each time a backup is performed, and therefore, takes the longest to complete.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 38. According to the common backup standard, how often should data be backed up? a. Data should be backed up after about six hours of actual data entry. b. Data should be backed up after about four hours of actual data entry. c. Data should be backed up after about three hours of actual data entry. d. Data should be backed up after about seven hours of actual data entry. ANSWER: RATIONALE:

b

A common standard is to back up data after about four hours of actual data entry. Depending on user habits, this might mean you back up daily or weekly.

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 39. Data backups provide a way to recover data that is lost. To do this reliably under a wide variety of adverse Page 292


Name:

Class:

Date:

conditions, there is a rule that defines backup principles. What is that rule? a. 3-2-1-1 Rule b. 2-3-1-1 Rule c. 3-1-2-1 Rule d. 1-3-2-1 Rule ANSWER: RATIONALE:

a

The 3-2-1-1 rule consists of the following: Keep at least three complete backup copies of the data (3). Save backups on at least two different media types, such as hard drive and tape drive, or tape drive and cloud storage (2). Store at least one backup copy offsite (1). For greater protection against ransomware, ensure that at least one backup copy is stored offline (1).

POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:

1 Multiple Choice False WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Apply DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM 40. When creating contingency plans and selecting backup options, which DR (disaster recovery) metrics will

affect company decisions? Choose all that apply. a. MAO (Maximum Acceptable Outage) b. RTO (recovery time objective) c. MTPD (Maximum Tolerable Period of Disruption) d. RPO (recovery point objective) ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

The RTO (recovery time objective) defines the maximum tolerable length of time that a network can be down before operations are restored. It indicates when full functionality will be regained in the future, minus any lost data. Conversely, RPO (recovery point objective) defines the amount of historical data that needs to be restored from backups in the event of an outage. It represents the acceptable amount of data loss and shows the point in the past from which data will be recovered.

Page 293


Name:

Class:

Date:

LEARNING OBJECTIVES:

WEST.NET+.25.12.3 - Identify best practices for incident response and disaster recovery. ACCREDITING STANDARDS: WEST.N10-009.25.2.4 - Explain important factors of physical installations. WEST.N10-009.25.3.1 - Explain the purpose of organizational processes and procedures. WEST.N10-009.25.3.3 - Explain disaster recovery (DR) WEST.N10-009.25.5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues. TOPICS: Section 12-3 KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 8/16/2024 12:24 PM DATE MODIFIED: 8/16/2024 12:24 PM

Page 294


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.