Your SlideShare is downloading. ×

FINAL PAPER FN311 INTERNET SERVICES

645

Published on

Published in: Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
645
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
51
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CONFIDENTIAL FN311 INTERNET SERVICES Page 2 of 21 SECTION A OBJECTIVE QUESTIONS (50 MARKS) INSTRUCTION This section consists of FORTY (40) objective questions. Answer ALL questions in the answer booklet. 1. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need? CLO1 A. Application Hosting B. Equipment Co-Location C. Planning and provisioning D. Web Hosting 2. Which network utility helps determine the location of network problems and identifies routers that packets travel across? CLO1 A. nslookup B. netstat C. ping D. tracert
  • 2. CONFIDENTIAL FN311 INTERNET SERVICES Page 3 of 21 3. At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access? CLO1 A. At a POP B. At an IXP C. At a Metro Ethernet link D. On the ISP extranet 4. What is the basic procedure of incident management? CLO1 A. Opening a trouble ticket B. Using diagnostic tools to identify the problem C. Surveying network conditions for further analysis D. Configuring new equipment and software upgrades 5. Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information? CLO1 A. Network operations center B. On-site installation team C. Help desk D. Customer service
  • 3. CONFIDENTIAL FN311 INTERNET SERVICES Page 4 of 21 6. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need? CLO1 A. Web hosting B. Planning and provisioning C. Application hosting D. Equipment collocation 7. What are the things included in a logical topology document? CLO1 A. The location of cables, computers, and other peripherals B. The wireless signal coverage area C. The device names and Layer 3 addressing information D. The wiring closet and access point locations 8. A network technician is assigned to perform a site visit to a customer’s location to determine the requirements for a network upgrade. In addition to the currently installed equipment inventory, what other information about the hosts and networking devices should the technician obtain from the customer? CLO1 A. The cost of the currently installed equipment B. All product keys for site license software C. Any planned growth anticipated in the near future D. The memory requirements for installed application software
  • 4. CONFIDENTIAL FN311 INTERNET SERVICES Page 5 of 21 9. SHA Company requires a networking device that is capable of expansion to accommodate growing network demands. What characteristic must this device have to meet this requirement? CLO3 A. Modular physical configuration B. Ability to manage the device remotely C. Ports that can be activated and deactivated D. Ability to monitor operation and change the settings for a device 10. What does the use of redundant network components supply to a network? CLO1 A. Scalability B. Manageability C. Compatibility D. Reliability 11. Which IPv4 class provides the lowest number of host addresses per network? CLO2 A. Class A B. Class B C. Class C D. Class D
  • 5. CONFIDENTIAL FN311 INTERNET SERVICES Page 6 of 21 12. What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask? CLO2 A. 192.168.0.255 B. 192.168.32.254 C. 192.168.32.255 D. 192.168.32.0 13. How many usable hosts are available given a Class C IP address with the default subnet mask? CLO2 A. 254 B. 255 C. 256 D. 510 14. How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets? CLO2 A. 16 B. 32 C. 256 D. 1024
  • 6. CONFIDENTIAL FN311 INTERNET SERVICES Page 7 of 21 15. Which subnet mask would be appropriate for a Class C address used for 9 LANs, each with 12 hosts? CLO2 A. 255.255.255.0 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.252 16. What is the reason that NAT was developed? CLO3 A. To allow users on the public Internet to access local networks B. To provide a method for privately addressed LANs to participate in the Internet C. To make routing protocols operate more efficiently D. To allow private addresses to be routed on the public Internet 17. Which port numbers are used by PAT to create unique global addresses? CLO3 A. 1024 and above B. 64,000 and above C. 255 and below D. 1023 and above
  • 7. CONFIDENTIAL FN311 INTERNET SERVICES Page 8 of 21 18. Static NAT works by mapping a specific inside local IP address to what other specific address type? CLO2 A. Inside global B. Outside local C. Outside global D. Private IP address 19. What information is included in RIPv2 routing update that is not included in RIPv1 updates? CLO2 A. Subnet mask B. Area identification C. Hop count D. Autonomous system number 20. What is the purpose of a routing protocol? CLO1 A. It is used to build and maintain ARP tables B. It provides a method for segmenting and reassembling data packets C. It allows an administrator to devise an addressing scheme for the network D. It provides a procedure for encoding and decoding data into bits for packet forwarding
  • 8. CONFIDENTIAL FN311 INTERNET SERVICES Page 9 of 21 21. Which protocol is an exterior routing protocol? CLO1 A. OSPF B. RIP C. BGP D. EIGRP 22. What statement is true regarding an AS number? CLO1 A. All routers at an ISP must be assigned the same AS number B. ISPs require all customers to have registered AS numbers C. Interior routing protocols require registered AS numbers D. AS numbers are controlled and registered for Internet use 23. A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED? CLO2 A. The switch has no configuration file in NVRAM. B. The switch is functioning properly. C. The switch has failed POST and must be sent for service. D. The switch is in half-duplex mode.
  • 9. CONFIDENTIAL FN311 INTERNET SERVICES Page 10 of 21 24. What is the correct command sequence to configure a router host name to "LAB_A"? CLO2 A. Router> enable Router# configure terminal Router(config)# hostname LAB_A B. Router> enable Router# hostname LAB_A C. Router> enable Router# configure router Router(config)# hostname LAB_A D. Router> enable Router(config)# host name LAB_A 25. Refer to Figure 1. Which series of commands will correctly configure the serial interface on Router2? CLO2 Figure 1
  • 10. CONFIDENTIAL FN311 INTERNET SERVICES Page 11 of 21 A. Router2(config)# interface S0/0/0 Router2(config-if)# ip address 192.168.6.11 255.255.255.252 Router2(config-if)# clock rate 64000 Router2(config-if)# no shutdown B. Router2(config)# interface S0/0/0 Router2(config-if)# ip address 192.168.6.11 255.255.255.252 Router2(config-if)# no shutdown C. Router2(config)# interface S0/0/0 Router2(config-if)# ip address 192.168.6.9 255.255.255.252 Router2(config-if)# clock rate 64000 Router2(config-if)# no shutdown D. Router2(config)# interface S0/0/0 Router2(config-if)# ip address 192.168.6.9 255.255.255.252 Router2(config-if)# no shutdown 26. In which does an SDM differ from the IOS CLI? CLO3 i. SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management. ii. SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser. iii. SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices. iv. SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands. v. SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration.
  • 11. CONFIDENTIAL FN311 INTERNET SERVICES Page 12 of 21 A. i and ii B. ii and iii C. iii and v D. i and iv 27. Figure 2 Refer to Figure 2. Router B receives a packet with a destination address of 10.16.1.97. What will router B does? CLO3 A. Router will drop the packet B. Router will use the default route C. Router will forward the packet via the route to 10.16.1.0 D. Router will forward the packet via the route to 10.16.1.64 28. What Layer 1 problem can cause a user to lose Internet connectivity? CLO3 A. Wrong default gateway B. Wrong MAC address C. Loose network cable D. Wrong subnet mask
  • 12. CONFIDENTIAL FN311 INTERNET SERVICES Page 13 of 21 29. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client? CLO3 A. Applies the default service configured in directory services B. Uses ARP to discover the appropriate service from the local router C. Sends a request to the client asking for the appropriate service D. Identifies the appropriate service from the destination port field 30. Choose a characteristic of network reliability? CLO1 A. Redundant hardware provides enhanced reliability. B. Reliability is measured based on the number of applications in use on the network. C. The longer the MTTR, the greater the reliability. D. An ISP guarantees the same level of reliability to all of its customers. 31. A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network? CLO3 A. The hacker used a software tool to crack the shared hexadecimal wireless key. B. The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC. C. The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN. D. The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.
  • 13. CONFIDENTIAL FN311 INTERNET SERVICES Page 14 of 21 32. A small company with two offices in the same building is requesting advice in WAN connection. Which TWO questions would give technician information to base a recommendation? CLO3 i. What operating system is being used? ii. How much money has the customer budgeted to spend on the WAN connection? iii. What type of e-mail client software is used by the employee? iv. Are the computers laptops or workstations? v. Are the company web servers located in the building or at the ISP? A. i and ii B. ii and iii C. ii and v D. i and iv 33. SnS Company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed? CLO1 A. Packet filtering B. Proxy C. Stateful packet inspection D. Stateless packet inspection
  • 14. CONFIDENTIAL FN311 INTERNET SERVICES Page 15 of 21 34. Many backup scenarios require daily swapping of media to maintain a history of backed up data. Data loss could occur if the tape or disk is not swapped daily. Since swapping the tapes is a manual task, it is prone to failure. Users need to use a notification method, such as calendar or task scheduling. What is the above statement about? CLO1 A. Review Backup Logs B. Swap media C. Perform Trial Restores D. Perform Drive Maintenance 35. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? CLO1 i. ports ii. physical addresses iii. packet size iv. frame sequence number v. protocols A. i and ii B. ii and iii C. ii and v D. i and iv
  • 15. CONFIDENTIAL FN311 INTERNET SERVICES Page 16 of 21 36. What does the command copy flash tftp accomplish? CLO1 A. It copies the IOS in flash to a TFTP server. B. It copies the startup-configuration file in flash to a TFTP server. C. It copies the running-configuration file in flash to a TFTP server. D. It copies the configuration register settings in flash to a TFTP server. 37. Which is the potential problem with using tape media to back up server data? CLO1 A. Data tapes are prone to failure and must be replaced often. B. Tape is not a cost-effective means of backing up data. C. Data tapes are difficult to store offsite. D. Backup logs are not available with tape backup solutions. 38. Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up? CLO3 A. Daily backups B. Differential backups C. Full backups D. Incremental backups 39. While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean? CLO1 A. The transfer is working. B. The TFTP server is not responding. C. The IOS file is corrupt and is failing the checksum verification. D. There is not enough space in flash to hold the image.
  • 16. CONFIDENTIAL FN311 INTERNET SERVICES Page 17 of 21 40. A PC is able to reach devices that are located both inside and outside the network. However, when trying to reach an FTP server that is located on the same subnet, the PC fails to make a connection. The administrator has several other PCs that are located in the same subnet try a connection to the FTP server and they are successful. Which troubleshooting tool can be used to determine the problem between the PC and the FTP server? CLO3 A. cable tester B. digital multimeter C. protocol analyzer D. network analyzer
  • 17. CONFIDENTIAL FN311 INTERNET SERVICES Page 18 of 21 SECTION B STRUCTURED QUESTIONS (50 MARKS) INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. QUESTION 1 The following questions are based on Figure 1.1 Figure 1.1 (a) Find the value of the broadcast id on the side of R1 (Fa0/0) and on the side of R3 (Fa0/0) using default subnet mask of class B. CLO2 (4 marks) (b) Explain the purpose of line 3 in the R2 routing table. CLO1 (4 marks) (c) What is the best routing protocol used in this routing? Explain the reason. CLO1 (3 marks)
  • 18. CONFIDENTIAL FN311 INTERNET SERVICES Page 19 of 21 (d) From the global configuration mode, configure the password for R1 device as below: Console password Politeknik vty line password Politeknik123 Enable password JTMK Enable secret JTMK123 CLO2 (8 marks) (e) From the configuration mode, configure the RIP version 2 on the R1 device CLO2 (6 marks)
  • 19. CONFIDENTIAL FN311 INTERNET SERVICES Page 20 of 21 QUESTION 2 (a) It is important that the ISP provide a reliable and scalable network to get better services performance for their customers. Explain what is scalability? CLO1 (3 marks) (b) Describe the definition of Routing Information Protocol and explain the key characteristics of RIP. CLO1 (8 marks) (c) An Ethernet port on a router was assigned with an IP address of 172.16.112.1 / 20 i. Write the subnet mask in four dotted decimal form. ii. What is the maximum number of hosts is allowed to support in this subnet? iii. Identify the network address and broadcast address for that subnet. iv. Identify the range of IP address available for the hosts? CLO1 (1 mark) CLO1 (1 mark) CLO2 (2 marks) CLO3 (1 mark)
  • 20. CONFIDENTIAL FN311 INTERNET SERVICES Page 21 of 21 (d) Based on the Figure 2.1, two (2) routers were used to enable host H1 and host H2 to communicate. Using information given in the figure and in global configuration mode; Figure 2.1 i. Write the command lines to give an IP address to FastEthernet 0/1 and serial interface 0/0/0 in router R1. ii. Serial 0/0/0 is DCE, so set the clock rate of 6400 at the appropriate port. iii. Enable both ports so it can function properly with no shutdown command and exit. CLO1 (5 marks) CLO1 (2 marks) CLO2 (2 marks)

×