6.Your network has a permanent connection to the Internet. Your local network includes multiple services. You are concerned about hackers gaining access from the Internet. You decide to set up filtering on ports 100 through 200. Which services might this affect? A. FTP B. NTP C. HTTPS D. SMTP E. POP3 7.Given: . Network B is IP network 172.17.0.0/16 . The IP address of the router for Network B is 172.17.0.1. What is the subnet mask for a computer attached to network B? A. 127.0.0.1 B. 172.17.0.0 C. 172.17.0.255 D. 255.255.0.0 E. 255.255.255.0 9.You are asked to implement a solution that provides for security authentication and encryption to a private network for a client machine. The client machine needs to connect to a NetWare server inside the private network. Which protocols are needed to implement this functionality? (Choose all that are applicable.) A. SMTP (Simple Mail Transfer Protocol) B. TFTP (Trivial File Transfer Protocol) C. PPTP (Point-to-point Tunneling Protocol) D. SNMP (Simple Network Management Protocol) E. TCP/IP (Transmission Control Protocol and Internet Protocol) F. Telnet 24.A new workstation cannot connect to the network. You verify that TCP/IP is installed correctly. The user uses a static IP address in the correct range for the segment and the subnet mask is correct. Why is the user not able to connect to the network? A. The DHCP server is down. B. A static IP address cannot be used on a network using DHCP. C. The static IP address is a duplicate to one already in use. D. The user does not have permissions to add a static IP address. 30.Which device checks the electrical signals being sent out of a port on a NIC? A. tone locator B. tone generator C. crossover cable D. hardware loopback E. smart phone 41.What are characteristics of a public network? (Choose all that are applicable.) A. Host IP addresses are visible only on the LAN. B. IP hosts are directly accessible from the Internet. C. Network IP addresses are exposed to the Internet. D. Network IP addresses are not exposed to the Internet E. Additional network IP addresses must be registered with IANA. 42.What is the transmission rate of a BRI ISDN circuit switched B channel? A. 16 Kbps B. 56 Kbps C. 64 Kbps D. 128 Kbps E. 1.5 Mbps 44.Which are true of IP subnets? (Choose all that are applicable.) A. An IP router connects two subnetworks. B. The subnets have the same network address. C. Each subnetwork behaves as if it were independent. D. Routing between nodes on different subnets is transparent to the users. E. Nodes on different subnetworks cannot communicate except through the Internet. 50.What does the last three octets in 00:B0:D0:5A:E1:B5 identify? A. The type of device B. The manufacturer of the device C. The network address of the device D. The device ID E. The Ethernet frame type of the device 53.Upon which protocol is HTTPS based? A. SSL B. IPSec C. SSH D. Kerberos E. DES 54.Which IPv4 address is a broadcast address for all nodes on the same network? A. 0.0.0.0 B. 192.168.0.255 C. 255.255.255.255 D. FF:FF:FF:FF:FF:FF Match number with letter: 1. DNS 2. DHCP 3. default gateway 4. ARP A. Assigns an IP address to a client workstation. B. Provides address translation of a host name to IP address. C. Provides address translation of an IP address to MAC address. D. Provides a route for packets with destinations outside the local subnet. E. Provides a pointer to the home server address for the client workstation. 67.Which network devices pass data based solely on the MAC address? (Choose all that are applicable.) A. hub B. router C. bridge D. Layer2 switch E. managed hub F. gateway 72.How many pairs of wires are used in 10Base-T? A. one B. two C. three D. four E. none, 10Base-T uses optical fiber 79.A user is unable to access data available to the account department but is able to view the data. Other users in the accounting department can access all data. What is the cause of the problem? A. Bad NIC B. Insufficient user permission C. Bad user name and password D. Accounting system data is corrupt