51 Which of the following hub types are supported by the 100Base-TX physical layer specification? (Choose all that apply.)Class IClass IIClass IIIClass IV
52 Which of the following statements about routers is not true?Routers can connect two or more networks with dissimilar data link layer protocols and media.Routers can connect two or more networks with the same data link layer protocols and media.Routers store and maintain route information in a local text file.Servers with multiple network interfaces can be configured to function as software routers.Routers can learn and populate their routing tables through static and dynamic routing.
53 The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?Anywhere on the private internetwork, as long as the Internet is accessibleBetween the Internet access router and the Internet Service Provider's (ISP's) networkAt the ISP's network siteBetween the Internet access router and the rest of the private internetwork
54 What must you do to configure a firewall to admit File Transfer Protocol (FTP) traffic to the internal network using its default port settings? (Choose all that apply.)Open port 20Open port 21Open port 22Open port 23Open port 24
55 Proxy servers operate at which layer of the OSI reference model?Data linkNetworkTransportApplication
56 Which of the following is a feature that is not found in a traditional firewall product, but which might be found in a Next-Generation Firewall (NGFW)?Stateful packet inspectionDeep Packet Inspection (DPI)Network Address Translation (NAT)Virtual Private Network (VPN) support
57 Which of the following statements about content filtering in firewalls is true?Content filters examine the source IP addresses of packets to locate potential threats.Content filters enable switches to direct packets out through the correct port.Content filters examine the data carried within packets for potentially objectionable materials.Content filters use frequently updated signatures to locate packets containing malware.
58 Which of the following is not one of the criteria typically used by load balancers to direct incoming traffic to one of a group of servers?Which server has the lightest loadWhich server has the fastest response timeWhich server is next in an even rotationWhich server has the fastest processor
59 Which of the following devices enables you to use a standard analog telephone to place calls using the Internet instead of the Public Switched Telephone Network (PSTN)?Proxy serverVPN headendVoIP gatewayUTM appliance
60 Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses? (Choose all that apply.)NAT routerRADIUS serverProxy serverUTM appliance
61 HVAC systems can use the Internet of Things (IoT) to monitor which of the following? (Choose all that apply.)TemperaturePressureHumidityPrintersOccupancyCamerasDoor locks
62 A VPN headend is an advanced type of which of the following devices?SwitchRouterGatewayBridge
63 Which of the following technologies is typically associated with virtual PBX services?Quality of Service (QoS)Voice over IPCARPRound-robin DNS
64 Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph's proposed Internet access solution is true?The proposal fails to satisfy both the primary and secondary objectives.The proposal satisfies the primary objective but neither of the secondary objectives.The proposal satisfies the primary objective and one of the secondary objectives.The proposal satisfies the primary objective and both of the secondary objectives.
65 Which of the following protocols can be used by wireless controllers to communicate with the Access Points (APs) on a Wireless Local Area Network (WLAN)? Choose all that apply.CAPWAPLWAPPLDAPPPTP
66 Which of the following devices enables administrators of enterprise wireless networks to manage multiple Access Points (APs) from a central location?HypervisorWireless controllerWireless endpointDemarcation point
67 Which of the following devices can administrators use to create multiple Virtual Local Area Networks (VLANs) and forward traffic between them?Multilayer switchVirtual routerLoad balancerBroadband router
68 Which of the following is not a mechanism for distributing incoming network traffic among multiple servers?Load balancerRound-robin DNSNLB clusterVPN headend
69 A load balancer is a type of which of the following devices?SwitchRouterGatewayFirewall
70 Which of the following devices expands on the capabilities of the traditional firewall by adding features like Deep Packet Inspection (DPI) and an Intrusion Prevention System (IPS)?RADIUS serverCSU/DSUNGFWProxy server
71 Which of the following is a device that switches calls between endpoints on the local IP network and provides access to external Internet lines?VoIP PBXVoIP gatewayVoIP endpointMultilayer switch
72 Which of the following statements about Internet access through a proxy server accounts for the security against outside intrusion that a proxy provides?The proxy server uses a public IP address, and the client computers use private addresses.The proxy server uses a private IP address, and the client computers use public addresses.Both the proxy server and the client computers use private IP addresses.Both the proxy server and the client computers use public IP addresses.
73 Which of the following statements about proxy servers and NAT servers are true? (Choose all that apply.)NAT servers and proxy servers can both provide Internet access to clients running any application.NAT servers and proxy servers both use public IP addresses.NAT servers and proxy servers both access Internet servers and relay the responses to network clients.Both NAT servers and proxy servers cache web data for later use.
74 A multilayer switch can operate at which layers of the Open Systems Interconnection (OSI) model? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication
75 Which of the following devices can an administrator use to monitor a network for abnormal or malicious traffic?IDSUPSRADIUSDoSRAS
76 Which of the following is not a function that is typically provided by a unified threat management (UTM) appliance?Virtual private networkingNetwork firewallPacket forwardingAntivirus protection
77 Which of the following features enables an Intrusion Detection System (IDS) to monitor all of the traffic on a switched network?Stateful packet inspectionPort mirroringTrunkingService-dependent filtering
78 Which of the following network devices does not employ Access Control Lists (ACLs) to restrict access?RoutersHubsSwitchesWireless Access Points (WAPs)
79 Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?WINS Server AddressesDefault GatewayDNS Server AddressesSubnet Gateway
80 Which of the following routing protocols uses the packet format shown in the figure?RIPv1RIPv2OSPFEIGRPBGP
81 Which of the following statements about the Enhanced Interior Gateway Routing Protocol (EIGRP) is not true?EIGRP does not support classless IPv4 addresses.EIGRP is a hybrid routing protocol.EIGRP can only transmit incremental routing table updates.EIGRP shares routes within an autonomous system.
82 Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all that apply.)Bandwidth throttlingRate limitingBroadcast stormingNetwork Address Translation (NAT)
83 Which