0% found this document useful (0 votes)
48 views10 pages

Soal ITS Networking Sudah Di Bahas

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

Soal ITS Networking Sudah Di Bahas

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1. Move the approprite address type from the list on the left to its range on the right.

Not all
address types wil be used.
Note: You will receive partial credit for each correct answer.

Address Types Ranges

Lookback Address Type


127.0.0.0 - 127.255.255.255
addresses (Loopback)

Multicast Address Type


192.168.0.0 - 192.168.255.255
addresses (Private)

Private network Address Type


224.0.0.0 - 239.255.255.255
addresses (multicast)

Public network
addresses

2. Move each VPN term from the list on the left to its definition on right.
Note: You will receive partial credit for each correct answer.

Terms Definitions

Allows a remote user to connect Term


SSL VPN to a private network from
3
anywhere on the Internet

Layer 2 Tunneling Securely connects two portions Term


Protocol of a private network or two
1
private networks

Creates an unencrypted Term


Site-to-Site VPN connection between two
2
devices
3. On a Windows computer, which utility should you use to determine if your Domain Name
System (DNS) service is properly resolving fully quelified domain names (FQDNs) to IP
addresses?
a. ipconfig
b. nslookup
c. netstat
d. nbtstat

4. Move each IP address from the list on the left to its IPv4 address class on the right.
Note: You will receive partial credit for each correct answer

IP Addesses IPv4 Address Classes

133.234.23.2 Class A IP Address 4

224.100.20.3 Class B IP Address 1

201.111.22.3 Class C IP Address 3

64.123.12.1 Class D IP Address 2

5. Which media type is least susceptible to external interference, including EMI and RFI?
a. fiber optic
b. STP
c. UTP
d. Wirless

6. You are a network administrator at a small business. One morning at the start of business, you
realize that no employees at the company can access external websites. However, all employees
can access intranet sites. All computers are on the same intranet connected by a single router.
You need to trobleshoot the problem.

Which two actions should you complete? (Choose 2.)


a. Check the router for proper physical connectivity
b. Check that each computer has a valid IP address
c. Conect the Internet Service Provider
d. Check for bad network adapters on individual computers
7. A computer is connected to a switch via a network patch panel using copper cable. The
computer is getting lower than expected data speeds

Which two actions should you perform to identify the issue? (Choose 2.)
Note: You will receive partial credit for each correct selection.
a. Use an optical time domain reflrctometer (OTDR) to test the line.
b. Search for broken wires in your cable using a cable tester.
c. Tone the line from Unit A to Unit B
d. Test the data speed of the cable

8. You ping a server by using the fully qualified domain name (FQDN) and do not receive a
response. You then ping the same server by using its IP address and receive a response.
why do you receive a response on the second attempt but on the first attempt?
a. The DNS is not resolving
b. NSLOOKUP is stoped
c. The DHCP server is offline
d. PING is improperly configured

9. What are two characteristics of a mesh network topology? (Choose 2.)


a. It requires less cabling than either a star or ring topology
b. It is fault tolerant because of redundant connections
c. It works best for networks with a large number of nodes
d. Every node connects to every other node on the network

10. You are a network administrator at a small business. An employee is not able to access any
websites. No other employees are having this problem. All computers are on the same internet.
You need to trobleshoot the problem
Which three actions should you complete? (Choose 3.)
a. Check the DNS settings on the employee's computer
b. Determine whether the employee's computer has a valid IP address
c. Conect the internet Service Provider
d. Check to see if the router is working properly
e. Ensure thet the router has a connection to the internet

11. An organization needs to move its infrastructure completely off-premise.


Where should they locate their data center?
a. A public cloud
b. A private cloud
c. A virtual machine
d. A hybrid cloud
12. You work for a small office with 15 computers. Your local ISO provides you with a single public
IP address. You need to enable Internet access for all 15 computers.
Which routing function should you enable?
a. RIP
b. Static routing
c. Port forwarding (PAT)
d. NAT

13. What are two characteristics of VLANS (Choose 2.)


a. A VLAN can logically address packets by using IP
b. A single switch can service only a single VLAN
c. VLANs act as though they are on the same LAN regardless of physcal location
d. A VLAN compartmentalizes a network and isolates traffic

14. How is a router's static routing table updated?


a. through direct action by the network administrator
b. from the RIP protocol after resetting the router
c. with updates from the physically nearest routers
d. bt monitoring adjacent subnets

15. For each stetement about wide area networks (WAN), select True or Flase.
Note: You will receive partial credit for each correct selection.

Answer Area True False

The Internet is a wide area network


(WAN)
An internet is a wide area network
(WAN)
Companies with offices in multiple cities
use a wide area network (WAN) to share
data.

16. Complete the sentence by selecting the correct option from the drop-down list

Answer Area
The command-line tool used in Linux to list a host's active incoming connections is netstat
17. The network connection between Building A and Building B is 550 meters and there is insertion
loss on the line. Which tool should you use to test this attenuation?
a. Toner
b. Time domain reflectometer
c. Optical time domain reflectometer
d. Multimeter

18. Complete the sentence by selecting the correct option from the drop-down list_
Answer Area
On a wireless router, an SSID is the Brodcast ID

19. For each statement about hypervisors, select True or False.


Note: You will receive partial credit for each correct selection.

Answer Area True False

A Type 1 hypervisor runs directly on system


hardware.
A Type 2 hypervisor runs directly on system
hardware.
A Type 1 hypervisor is also known as a bare-metal
hypervisor.

20. What is a VPN?


a. A secure private connection over a public network
b. A virtual network within your local area network (LAN)
c. A personal network for your use only
d. A communication tunnel between VLANs

21. For each statement about client-server networks, select True or False.
Note: You will receive partial credit for each correct selection.

Answer Area True False

A client-server network has centralized


administration.
A client-server network requires each computer to
share its resources
A client-server network requires users to have a
user account on every computer they need to use.
22. You are trying to access a music sharing service on the Internet. The service is located at the IP
address 173.194.75.105. You are experiencing problems connecting. You run a trace route to
the server and receive the output shown in the image.
Evaluate the image and complete the statements by selecting the correct options from the drop-
down lists.

Note: You will receive partial credit for each correct selection.

command Prompt
c:\> tracert -d 173.194.75.105
racing route to 173.194.75.105 over a maximum of 30 hops
1 <1 ms <1 ms <1 ms 10.0.0.1
2 25 ms 29 ms 29 ms 174.57.168.1
3 9 ms 9 ms 9 ms 68.85.76.249
4 10 ms 9 ms 9 ms 68.86.210.25
5 14 ms 15 ms 18 ms 68.86.92.161
6 15 ms 16 ms 13 ms 68.86.86.142
7 14 ms 14 ms 14 ms 75.149.231.62
8 14 ms 15 ms 15 ms 209.85.252.80
9 17 ms 16 ms 17 ms 72.14.236.146
10 27 ms 28 ms 28 ms 209.85.241.222
11 26 ms 25 ms 26 ms 216.239.48.157
12 * * * Request timed out.
13 27 ms 26 ms 25 ms 173.194.75.105

Answer Area
Each hop in the trace route is a router.
The trace route completed successfully.

23. Which type of port is used to support VLAN traffic between two switches?
a. LAN port
b. WAN port
c. Trunk port
d. Virtual port

24. When a client's DHCP-issued address expires, the client will:


a. generate a new address valid to the subnet and request approval from the DHCP server.
b. disconnect from the network
c. attempt to renew its lease on the address_
d. continue to use the address until it is notified to stop.
25. Which represents the Internet Protocol version 6 (IPv6) Ioopback address?
a. FF00::127
b. ::1
c. ::
d. FE80::127

26. Complete the sentence by selecting the correct option from the drop-down list_

Answer Area
IPv4 multicast addresses range from 224.0.0.0 to 239.255.255.255

27. Your home computer is having problems accessing the Internet You suspect that your Internet
router's DHCP service is not functioning, so you check your computer's IP address.
Which address indicates that your router's DHCP service is NOT functioning?
a. 10.19.1.15
b. 169.254.1.15
c. 192.168.1.15
d. 172.16.1.15

28. Complete the sentences by selecting the correct option from each drop-down list.
Note: You will receive partial credit for each correct selection.

Answer Area
A vast computer network linking smaller computer networks worldwide is the Internet

A network that allows secure collaboration between a company and a supplier or partner is
an extranet

A private network that is accessible only to a company's employees is an intranet

29. Your school network has multiple routers. Students in one of the dorms report that they cannot
connect to the email server. You verify that the email server is operational. You suspect that the
router on the subnet is causing the problem.

Which two actions should you perfomi? (Choose 2.)


a. Enable dynamic routing.
b. Look in the router's NAT table.
c. Enable multicast.
d. Look in the router's routing table.
30. Security is a concern on wireless networks due to:
a. frequency modulation issues.
b. the potential for cross-talk
c. inability to encrypt transmissions.
d. the radio broadcast access method.

31. You are studying for finals in the student lounge. When your laptop is connected to the wireless
network, access to the Internet is slow When you plug your laptop into a wall jack, you can no
longer access the Internet You run the ipconfig /all command. The results are shown in the
image.
Evaluate the image and complete the statements by selecting the correct option from each
drop-down list.
Note: You will receive partial credit for each correct selection.

Answer Area
The wireless adapter has an IP address configured through DHCP.

The Ethernet adapter has an IP address configured through APIPA.

32. One reason to incorporate VLANs in a network is to


a. increase the number of available IP addresses.
b. reduce the number of broadcast domains.
c. increase the number of available Media Access Contro AC) addresses.
d. reduce the number of nodes in a broadcast domain
33. Which of the following uses a tunneling protocol to encapsulate data for transmission?
a. VLAN
b. Internet
c. NAT
d. VPN

34. Which service uses PTR and A records?


a. IDS
b. DNS
c. IPS
d. NAT

35. What is a justification for using STP instead of UTP cable to wire a network expansion?
a. You are routing cables through an area with high external interference.
b. You want to minimize the costs relating to the new installation.
c. You need to reduce attenuation.
d. You need the cable to be as light and flexible as possible.

36. Which physical network topology provides fault tolerant commumcation by providing redundant
communication paths?
a. Ring
b. Mesh
c. Bus
d. Star

37. For each statement about switches, select True or False.


Note: You will receive partial credit for each correct selection.

Answer Area True False

A switch sends unicast frames to one destination


port only.

A switch floods ports if it does not know where to


send a frame.
A switch sends broadcast frames to the uplink port
only.
38. Move the appropriate protocol from the list on the left to its description on the right. Not all
protocols will be used.
Note: You will receive partial credit for each correct answer.

Protocols Descriptions

TCP Connectionless, message-based


protocol with best-effort service UDP

ICMP

ARP Connection-oriented protocol with


guaranteed service TCP

UDP

IGMP Resolves a MAC address to an IP


ARP
address

39. Complete the sentence by selecting the correct option from the drop-down list.
Answer Area
Dynamic routing Is fault tolerant

40. What is the primary purpose of a perimeter network?


a. to act as a hidden location in which to deploy network clients
b. to provide a buffer area between a private intranet and the pubic internet
c. to act as a secure location for deploying highly sensitive network servers
d. to monitor traffic between routed subnets in a private LAN

You might also like