Appendix A
Answers to Written Labs

Chapter 1: Introduction to Networks

  1. Bus, ring, and star
  2. Multiprotocol Label Switching (MPLS)
  3. Server
  4. Client-server
  5. Point-to-point
  6. Hub or switch
  7. Multiprotocol Label Switching
  8. Wide area network
  9. A segment
  10. Bus

Chapter 2: The Open Systems Interconnection Specifications

  1. The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses).
  2. The Physical layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium.
  3. The Network layer provides routing through an internetwork and logical addressing.
  4. The Presentation layer makes sure that data is in a readable format for the Application layer.
  5. The Session layer sets up, maintains, and terminates sessions between applications.
  6. Protocol Data Units (PDUs) at the Data Link layer are called frames. As soon as you see the word frame in a question, you know the answer.
  7. The Transport layer uses virtual circuits to create a reliable connection between two hosts.
  8. The Network layer provides logical addressing, typically IP addressing, and routing.
  9. The Physical layer is responsible for the electrical and mechanical connections between devices.
  10. The Data Link layer is responsible for the framing of data packets.

Chapter 3: Networking Topologies, Connectors, and Wiring Standards

  1. Category 6
  2. Demarcation point, or demarc
  3. Crossover
  4. RG-6
  5. Category 5e
  6. Straight-through
  7. To connect two CSU/DSUs
  8. 1, 2, 3, and 6
  9. 1 to 3 and 2 to 6
  10. It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles).

Chapter 4: The Current Ethernet Specifications

1.

Decimal 128 64 32 16 8 4 2 1 Binary
192 1 1 0 0 0 0 0 0 11000000
168 1 0 1 0 1 0 0 0 10101000
10 0 0 0 0 1 0 1 0 00001010
15 0 0 0 0 1 1 1 1 00001111

2.

Decimal 128 64 32 16 8 4 2 1 Binary
172 1 0 1 0 1 1 0 0 10101100
16 0 0 0 1 0 0 0 0 00010000
20 0 0 0 1 0 1 0 0 00010100
55 0 0 1 1 0 1 1 1 00110111

3.

Decimal 128 64 32 16 8 4 2 1 Binary
10 0 0 0 0 1 0 1 0 00001010
11 0 0 0 0 1 0 1 1 00001011
12 0 0 0 0 1 1 0 0 00001100
99 0 1 1 0 0 0 1 1 01100011

4.

Binary 128 64 32 16 8 4 2 1 Decimal
11001100 1 1 0 0 1 1 0 0 204
00110011 0 0 1 1 0 0 1 1 51
10101010 1 0 1 0 1 0 1 0 170
01010101 0 1 0 1 0 1 0 1 85

5.

Binary 128 64 32 16 8 4 2 1 Decimal
11000110 1 1 0 0 0 1 1 0 198
11010011 1 1 0 1 0 0 1 1 211
00111001 0 0 1 1 1 0 0 1 57
11010001 1 1 0 1 0 0 0 1 209

6.

Binary 128 64 32 16 8 4 2 1 Decimal
10000100 1 0 0 0 0 1 0 0 132
11010010 1 1 0 1 0 0 1 0 210
10111000 1 0 1 1 1 0 0 0 184
10100110 1 0 1 0 0 1 1 0 166

7.

Binary 128 64 32 16 8 4 2 1 Hexadecimal
11011000 1 1 0 1 1 0 0 0 D8
00011011 0 0 0 1 1 0 1 1 1B
00111101 0 0 1 1 1 1 0 1 3D
01110110 0 1 1 1 0 1 1 0 76

8.

Binary 128 64 32 16 8 4 2 1 Hexadecimal
11001010 1 1 0 0 1 0 1 0 CA
11110101 1 1 1 1 0 1 0 1 F5
10000011 1 0 0 0 0 0 1 1 83
11101011 1 1 1 0 1 0 1 1 EB

9.

Binary 128 64 32 16 8 4 2 1 Hexadecimal
10000100 1 0 0 0 0 1 0 0 84
11010010 1 1 0 1 0 0 1 0 D2
01000011 0 1 0 0 0 0 1 1 43
10110011 1 0 1 1 0 0 1 1 B3

Chapter 5: Networking Devices

Description Device or OSI layer
This device sends and receives information about the Network layer. Router
This layer creates a virtual circuit before transmitting between two end stations. Transport
A Layer 3 switch or multilayer switch. Router
This device uses hardware addresses to filter a network. Bridge or switch
Ethernet is defined at these layers. Data Link and Physical
This layer supports flow control and sequencing. Transport
This device can measure the distance to a remote network. Router
Logical addressing is used at this layer. Network
Hardware addresses are defined at this layer. Data Link (MAC sublayer)
This device creates one big collision domain and one large broadcast domain. Hub
This device creates many smaller collision domains, but the network is still one large broadcast domain. Switch or bridge
This device can never run full duplex. Hub
This device breaks up collision domains and broadcast domains. Router

Chapter 6: Introduction to the Internet Protocol

  1. This would be a Layer 2 broadcast, or FF:FF:FF:FF:FF:FF.
  2. FTP uses both TCP ports 20 and 21 for the data channel and the control channel, respectively.
  3. Both TCP and UDP! A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions. Notice that DNS uses both TCP and UDP. Whether it opts for one or the other depends on what it’s trying to do.
  4. ICMP uses IP directly to build error-reporting packets that are transmitted back to the originating source host when issues arise during the delivery of data packets. ICMP is also used during Ping and some Traceroute operations.
  5. Quite simply, the service might not be running currently on that server. Another possibility might be that a firewall between the client and the server has blocked the protocol in question from passing.
  6. RDP uses port 3389.
  7. MGCP uses ports 2427 and 2727.
  8. ICMP is the protocol that the ping and tracert commands rely on. If you’re having trouble getting pings and traceroutes through a router, you might need to check if ICMP is being allowed through.
  9. TFTP servers respond to UDP messages sent to port 69.
  10. SMTP uses TCP port 25, POP3 uses TCP port 110, RDP uses TCP port 3389, and IMAP4 uses TCP port 143.

Chapter 7: IP Addressing

Written Lab 7.1

  1. The class C private range is 192.168.0.0 through 192.168.255.255.
  2. IPv6 has the following characteristics, among others, that make it preferable to IPv4: more available addresses, simpler header, options for authentication, and other security.
  3. Automatic Private IP Addressing (APIPA) is the technology that results in hosts automatically configuring themselves with addresses that begin with 169.254.
  4. An IP address assigned to an interface
  5. One-to-many address
  6. A MAC address, sometimes called a hardware address or even a burned-in address
  7. The fact that it has 128-bit (16-octet) addresses, compared to IPv4’s 32-bit (4-octet) addresses
  8. 172.16.0.0 through 172.31.255.255
  9. 192–223, 110xxxxx
  10. Loopback or diagnostics

Written Lab 7.2

  1. Unicast
  2. Global unicast
  3. Link-local
  4. Unique local (used to be called site-local)
  5. Multicast
  6. Anycast
  7. Anycast
  8. ::1
  9. FE80::/10
  10. FC00:: /7

Written Lab 7.3

  1. 2001:db8:1:1:090c:abff:fecd:1234
  2. 2001:db8:1:1: 040c:32ff:fef1:a4d2
  3. 2001:db8:1:1:12bc:abff:fecd:1234
  4. 2001:db8:1:1:0f01:3aff:fe2f:1234
  5. 2001:db8:1:1:080c:abff:feac:caba

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT

  1. 192.168.100.25/30. A /30 is 255.255.255.252. The valid subnet is 192.168.100.24, broadcast is 192.168.100.27, and valid hosts are 192.168.100.25 and 26.
  2. 192.168.100.37/28. A /28 is 255.255.255.240. The fourth octet is a block size of 16. Just count by 16s until you pass 37. 0, 16, 32, 48. The host is in the 32 subnet, with a broadcast address of 47. Valid hosts are 33–46.
  3. 192.168.100.66/27. A /27 is 255.255.255.224. The fourth octet is a block size of 32. Count by 32s until you pass the host address of 66. 0, 32, 64. The host is in the 64 subnet, broadcast address of 95. The valid host range is 65–94.
  4. 192.168.100.17/29. A /29 is 255.255.255.248. The fourth octet is a block size of 8. 0, 8, 16, 24. The host is in the 16 subnet, broadcast of 23. Valid hosts are 17–22.
  5. 192.168.100.99/26. A /26 is 255.255.255.192. The fourth octet has a block size of 64. 0, 64, 128. The host is in the 64 subnet, broadcast of 127. Valid hosts are 65–126.
  6. 192.168.100.99/25. A /25 is 255.255.255.128. The fourth octet is a block size of 128. 0, 128. The host is in the 0 subnet, broadcast of 127. Valid hosts are 1–126.
  7. A default Class B is 255.255.0.0. A Class B 255.255.255.0 mask is 256 subnets, each with 254 hosts. We need fewer subnets. If we use 255.255.240.0, this provides 16 subnets. Let’s add one more subnet bit. 255.255.248.0. This is 5 bits of subnetting, which provides 32 subnets. This is our best answer, a /21.
  8. A /29 is 255.255.255.248. This is a block size of 8 in the fourth octet. 0, 8, 16. The host is in the 8 subnet, and broadcast is 15.
  9. A /29 is 255.255.255.248, which is 5 subnet bits and 3 host bits. This is only 6 hosts per subnet.
  10. A /23 is 255.255.254.0. The third octet is a block size of 2. 0, 2, 4. The host is in the 16.2.0 subnet; the broadcast address is 16.3.255.

Chapter 9: Introduction to IP Routing

  1. False. RIP and RIPv2 are both distance vector protocols.
  2. False. RIP and RIPv2 are both distance vector protocols.
  3. False. EIGRP is a Cisco-proprietary routing protocol.
  4. Autonomous system
  5. RIP does not work well in large networks, so OSPF would be the best answer, and both RIP and OSPF are nonproprietary.
  6. Static routing
  7. The MAC address of your default gateway (router)
  8. The IP address of the server
  9. The MAC address of the router sending the frame to the server
  10. The IP address of the server

Chapter 10: Routing Protocols

  1. 120
  2. 90
  3. 120
  4. 1
  5. RIPng (Next Generation). I wonder how many of you answered RIPv3.
  6. OSPFv3
  7. EIGRPv6
  8. When you need to connect two autonomous systems (ASs) together
  9. When all your routers are Cisco routers
  10. Distance vector

Chapter 11: Switching and Virtual LANs

  1. Broadcast
  2. Collision
  3. Trunking allows you to send information about many or all VLANs through the same link. Access ports allow information about only one VLAN transmitted.
  4. Power over Ethernet (PoE)
  5. The VLAN port membership is set wrong.
  6. Flood the frame out all ports except the port on which it was received.
  7. Address learning, filtering, and loop avoidance
  8. It will add the source MAC address to the forward/filter table.
  9. Spanning Tree Protocol (STP)
  10. Create a VLAN for contractors and another VLAN for guests.

Chapter 12: Wireless Networking

  1. 11 Mbps
  2. 54 Mbps
  3. 54 Mbps
  4. 2.4 GHz
  5. 2.4 GHz
  6. 5GHz
  7. 1 Gbps
  8. The values of WPA keys can change dynamically while the system is being used.
  9. The IEEE 802.11i standard has been sanctioned by WPA and is called WPA version 2.
  10. Three

Chapter 13: Authentication and Access Control

  1. Anti-malware updates, operating system updates, or Windows Registry settings
  2. Persistent
  3. SSL VPN
  4. PKI
  5. Only the owner of the key
  6. Kerberos
  7. Authentication, authorization, and accounting
  8. 802.1X
  9. MS-CHAP
  10. TACACS+

Chapter 14: Network Threats and Mitigation

  1. Botnet
  2. Once per week
  3. Buffer overflow
  4. Amplified or reflective
  5. Packet sniffer
  6. A macro virus
  7. Man-in-the-middle attack
  8. A rogue access point
  9. Windows Update
  10. On-demand and on-access virus scans

Chapter 15: Physical Security and Risk

  1. Virtual wire firewall interfaces
  2. Stateful
  3. Content filtering
  4. Single point of failure
  5. A VPN concentrator
  6. Security zones
  7. Mantrap
  8. Deny
  9. Honeynet
  10. Passive reactions from an IDS

Chapter 16: Wide Area Networks

  1. It is readily available.
  2. Cable. In a modern network, hybrid fiber coaxial (HFC) is a telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.
  3. Frame Relay. Although Frame Relay is not available in many markets today, it is a possible solution for the problem presented.
  4. 1.544 Mbps
  5. Digital Subscriber Line
  6. Frame Relay and X.25
  7. LTE and WiMAX
  8. ATM
  9. HDSL, SDSL, VDSL, ADSL
  10. Fiber to the premises

Chapter 17: Troubleshooting Tools

  1. traceroute or tracert
  2. Throughput tester
  3. ipconfig /all
  4. Telnet
  5. route
  6. FTP
  7. nslookup
  8. netstat-n
  9. ifconfig
  10. route print

Chapter 18: Software and Hardware Tools

  1. False
  2. False
  3. True
  4. True
  5. False. A typical network analyzer can see only one segment at a time.
  6. Cable certifier
  7. False. Unless you don’t mind prison.
  8. A temperature monitor
  9. A voltage event recorder
  10. A cable stripper/crimper

Chapter 19: Network Troubleshooting

  1. Test the theory to determine cause.
  2. Document findings, actions, and outcomes.
  3. Network designers minimize crosstalk inside network cables by twisting the wire pairs together, putting them at a 90-degree angle to each other.
  4. The port has the wrong VLAN assignment.
  5. Split pairs
  6. Attenuation
  7. Establish a plan of action to resolve the problem and identify potential effects.
  8. Implement the solution or escalate as necessary.
  9. Switching loops, routing loops, routing problems, Proxy ARP, broadcast storms
  10. Crosstalk, attenuation, collisions, shorts, open impedance mismatch, interference

Chapter 20: Management, Monitoring, and Optimization

  1. Honeypots
  2. Traffic shaping
  3. Best effort
  4. An inverter
  5. Load balancing
  6. A baseline
  7. Crossover
  8. Cloud computing
  9. Virtual servers, virtual switches, virtual desktops, software as a service (SaaS), and network as a service (NaaS)
  10. Procedures
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset