final paper fn311 internet services

20
CONFIDENTIAL FN311 INTERNET SERVICES Page 2 of 21 SECTION A OBJECTIVE QUESTIONS (50 MARKS) INSTRUCTION This section consists of FORTY (40) objective questions. Answer ALL questions in the answer booklet. 1. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need? CLO1 A. Application Hosting B. Equipment Co-Location C. Planning and provisioning D. Web Hosting 2. Which network utility helps determine the location of network problems and identifies routers that packets travel across? CLO1 A. nslookup B. netstat C. ping D. tracert

Upload: amira-dolce-farhana

Post on 20-Jan-2015

447 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 2 of 21

SECTION A

OBJECTIVE QUESTIONS (50 MARKS)

INSTRUCTION

This section consists of FORTY (40) objective questions. Answer ALL questions in the

answer booklet.

1. The IT manager of a medium-sized business wishes to house the company-owned

web servers in a facility that offers round-the-clock controlled access, redundant

power, and high-bandwidth Internet access. Which ISP service will fulfill this

need?

CLO1

A. Application Hosting

B. Equipment Co-Location

C. Planning and provisioning

D. Web Hosting

2. Which network utility helps determine the location of network problems and

identifies routers that packets travel across?

CLO1

A. nslookup

B. netstat

C. ping

D. tracert

Page 2: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 3 of 21

3. At which point do individuals and small businesses connect directly to the ISP

network to obtain Internet access?

CLO1

A. At a POP

B. At an IXP

C. At a Metro Ethernet link

D. On the ISP extranet

4. What is the basic procedure of incident management?

CLO1

A. Opening a trouble ticket

B. Using diagnostic tools to identify the problem

C. Surveying network conditions for further analysis

D. Configuring new equipment and software upgrades

5. Which ISP network support systems team will typically contact the customer once

a new circuit is ready and guide the customer in setting up passwords and other

account information?

CLO1

A. Network operations center

B. On-site installation team

C. Help desk

D. Customer service

Page 3: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 4 of 21

6. The IT manager of a medium-sized business wishes to house the company-owned

web servers in a facility that offers round-the-clock controlled access, redundant

power, and high-bandwidth Internet access. Which ISP service will fulfill this

need?

CLO1

A. Web hosting

B. Planning and provisioning

C. Application hosting

D. Equipment collocation

7. What are the things included in a logical topology document?

CLO1

A. The location of cables, computers, and other peripherals

B. The wireless signal coverage area

C. The device names and Layer 3 addressing information

D. The wiring closet and access point locations

8. A network technician is assigned to perform a site visit to a customer’s location to

determine the requirements for a network upgrade. In addition to the currently

installed equipment inventory, what other information about the hosts and

networking devices should the technician obtain from the customer?

CLO1

A. The cost of the currently installed equipment

B. All product keys for site license software

C. Any planned growth anticipated in the near future

D. The memory requirements for installed application software

Page 4: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 5 of 21

9. SHA Company requires a networking device that is capable of expansion to

accommodate growing network demands. What characteristic must this device

have to meet this requirement?

CLO3

A. Modular physical configuration

B. Ability to manage the device remotely

C. Ports that can be activated and deactivated

D. Ability to monitor operation and change the settings for a device

10. What does the use of redundant network components supply to a network? CLO1

A. Scalability

B. Manageability

C. Compatibility

D. Reliability

11. Which IPv4 class provides the lowest number of host addresses per network?

CLO2

A. Class A

B. Class B

C. Class C

D. Class D

Page 5: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 6 of 21

12. What is the network broadcast address for a Class C address of 192.168.32.0 with

the default subnet mask?

CLO2

A. 192.168.0.255

B. 192.168.32.254

C. 192.168.32.255

D. 192.168.32.0

13. How many usable hosts are available given a Class C IP address with the default

subnet mask?

CLO2

A. 254

B. 255

C. 256

D. 510

14. How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28

subnets?

CLO2

A. 16

B. 32

C. 256

D. 1024

Page 6: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 7 of 21

15. Which subnet mask would be appropriate for a Class C address used for 9 LANs,

each with 12 hosts?

CLO2

A. 255.255.255.0

B. 255.255.255.224

C. 255.255.255.240

D. 255.255.255.252

16. What is the reason that NAT was developed?

CLO3

A. To allow users on the public Internet to access local networks

B. To provide a method for privately addressed LANs to participate in the

Internet

C. To make routing protocols operate more efficiently

D. To allow private addresses to be routed on the public Internet

17. Which port numbers are used by PAT to create unique global addresses?

CLO3

A. 1024 and above

B. 64,000 and above

C. 255 and below

D. 1023 and above

Page 7: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 8 of 21

18. Static NAT works by mapping a specific inside local IP address to what other

specific address type?

CLO2

A. Inside global

B. Outside local

C. Outside global

D. Private IP address

19. What information is included in RIPv2 routing update that is not included in

RIPv1 updates?

CLO2

A. Subnet mask

B. Area identification

C. Hop count

D. Autonomous system number

20. What is the purpose of a routing protocol?

CLO1

A. It is used to build and maintain ARP tables

B. It provides a method for segmenting and reassembling data packets

C. It allows an administrator to devise an addressing scheme for the network

D. It provides a procedure for encoding and decoding data into bits for packet

forwarding

Page 8: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 9 of 21

21. Which protocol is an exterior routing protocol?

CLO1

A. OSPF

B. RIP

C. BGP

D. EIGRP

22. What statement is true regarding an AS number?

CLO1

A. All routers at an ISP must be assigned the same AS number

B. ISPs require all customers to have registered AS numbers

C. Interior routing protocols require registered AS numbers

D. AS numbers are controlled and registered for Internet use

23. A Catalyst switch is used as a temporary replacement for another switch that needs

to be repaired. About a minute after the switch has started, the SYST LED on the

front of the switch transitions from blinking green to amber. What is the meaning

of the amber SYST LED?

CLO2

A. The switch has no configuration file in NVRAM.

B. The switch is functioning properly.

C. The switch has failed POST and must be sent for service.

D. The switch is in half-duplex mode.

Page 9: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 10 of 21

24. What is the correct command sequence to configure a router host name to

"LAB_A"?

CLO2

A. Router> enable

Router# configure terminal

Router(config)# hostname LAB_A

B. Router> enable

Router# hostname LAB_A

C. Router> enable

Router# configure router

Router(config)# hostname LAB_A

D. Router> enable

Router(config)# host name LAB_A

25. Refer to Figure 1. Which series of commands will correctly configure the serial

interface on Router2?

CLO2

Figure 1

Page 10: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 11 of 21

A. Router2(config)# interface S0/0/0

Router2(config-if)# ip address 192.168.6.11 255.255.255.252

Router2(config-if)# clock rate 64000

Router2(config-if)# no shutdown

B. Router2(config)# interface S0/0/0

Router2(config-if)# ip address 192.168.6.11 255.255.255.252

Router2(config-if)# no shutdown

C. Router2(config)# interface S0/0/0

Router2(config-if)# ip address 192.168.6.9 255.255.255.252

Router2(config-if)# clock rate 64000

Router2(config-if)# no shutdown

D. Router2(config)# interface S0/0/0

Router2(config-if)# ip address 192.168.6.9 255.255.255.252

Router2(config-if)# no shutdown

26. In which does an SDM differ from the IOS CLI? CLO3

i. SDM is used for in-band management only. The IOS CLI can be used for

in-band and out-of-band management.

ii. SDM is accessed through a Telnet application. The IOS CLI is accessed

through a web browser.

iii. SDM is available for all router platforms. The IOS CLI is available for a

limited number of Cisco devices.

iv. SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of

text-based commands.

v. SDM is used for advanced configuration tasks. The IOS CLI is preferred

for initial basic device configuration.

Page 11: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 12 of 21

A. i and ii

B. ii and iii

C. iii and v

D. i and iv

27.

Figure 2

Refer to Figure 2. Router B receives a packet with a destination address of

10.16.1.97. What will router B does?

CLO3

A. Router will drop the packet

B. Router will use the default route

C. Router will forward the packet via the route to 10.16.1.0

D. Router will forward the packet via the route to 10.16.1.64

28. What Layer 1 problem can cause a user to lose Internet connectivity?

CLO3

A. Wrong default gateway

B. Wrong MAC address

C. Loose network cable

D. Wrong subnet mask

Page 12: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 13 of 21

29. A client is communicating with a server on a different segment of the network.

How does the server determine what service is being requested by the client?

CLO3

A. Applies the default service configured in directory services

B. Uses ARP to discover the appropriate service from the local router

C. Sends a request to the client asking for the appropriate service

D. Identifies the appropriate service from the destination port field

30. Choose a characteristic of network reliability?

CLO1

A. Redundant hardware provides enhanced reliability.

B. Reliability is measured based on the number of applications in use on the

network.

C. The longer the MTTR, the greater the reliability.

D. An ISP guarantees the same level of reliability to all of its customers.

31. A hacker has gained access to sensitive network files. In analyzing the attack, it is

found that the hacker gained access over a wireless segment of the network. It is

further discovered that the only security measure in place on the wireless network

is MAC Address Filtering. How is it likely that the hacker gained access to the

network?

CLO3

A. The hacker used a software tool to crack the shared hexadecimal wireless key.

B. The hacker obtained the MAC address of a permitted host, and cloned it on

his wireless laptop NIC.

C. The attacker mounted a denial of service attack to overwhelm the firewall

before penetrating the wireless LAN.

D. The hacker gained wireless access to the MAC address database and added

his own MAC address to the list of permitted addresses.

Page 13: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 14 of 21

32. A small company with two offices in the same building is requesting advice in

WAN connection. Which TWO questions would give technician information to

base a recommendation?

CLO3

i. What operating system is being used?

ii. How much money has the customer budgeted to spend on the WAN

connection?

iii. What type of e-mail client software is used by the employee?

iv. Are the computers laptops or workstations?

v. Are the company web servers located in the building or at the ISP?

A. i and ii

B. ii and iii

C. ii and v

D. i and iv

33. SnS Company wants to configure a firewall to monitor all channels of

communication and allow only traffic that is part of a known connection. Which

firewall configuration should be deployed?

CLO1

A. Packet filtering

B. Proxy

C. Stateful packet inspection

D. Stateless packet inspection

Page 14: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 15 of 21

34. Many backup scenarios require daily swapping of media to maintain a history of

backed up data. Data loss could occur if the tape or disk is not swapped daily.

Since swapping the tapes is a manual task, it is prone to failure. Users need to use

a notification method, such as calendar or task scheduling. What is the above

statement about?

CLO1

A. Review Backup Logs

B. Swap media

C. Perform Trial Restores

D. Perform Drive Maintenance

35. Which two characteristics of network traffic are being monitored if a network

technician configures the company firewall to operate as a packet filter?

CLO1

i. ports

ii. physical addresses

iii. packet size

iv. frame sequence number

v. protocols

A. i and ii

B. ii and iii

C. ii and v

D. i and iv

Page 15: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 16 of 21

36. What does the command copy flash tftp accomplish?

CLO1

A. It copies the IOS in flash to a TFTP server.

B. It copies the startup-configuration file in flash to a TFTP server.

C. It copies the running-configuration file in flash to a TFTP server.

D. It copies the configuration register settings in flash to a TFTP server.

37. Which is the potential problem with using tape media to back up server data?

CLO1

A. Data tapes are prone to failure and must be replaced often.

B. Tape is not a cost-effective means of backing up data.

C. Data tapes are difficult to store offsite.

D. Backup logs are not available with tape backup solutions.

38. Before a technician upgrades a server, it is necessary to back up all data. Which

type of backup is necessary to ensure that all data is backed up?

CLO3

A. Daily backups

B. Differential backups

C. Full backups

D. Incremental backups

39. While downloading an IOS image from a TFTP server, an administrator sees long

strings of exclamation marks (!) output to the console. What does this mean?

CLO1

A. The transfer is working.

B. The TFTP server is not responding.

C. The IOS file is corrupt and is failing the checksum verification.

D. There is not enough space in flash to hold the image.

Page 16: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 17 of 21

40. A PC is able to reach devices that are located both inside and outside the network.

However, when trying to reach an FTP server that is located on the same subnet,

the PC fails to make a connection. The administrator has several other PCs that are

located in the same subnet try a connection to the FTP server and they are

successful. Which troubleshooting tool can be used to determine the problem

between the PC and the FTP server?

CLO3

A. cable tester

B. digital multimeter

C. protocol analyzer

D. network analyzer

Page 17: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 18 of 21

SECTION B

STRUCTURED QUESTIONS (50 MARKS)

INSTRUCTION:

This section consists of TWO (2) structured questions. Answer ALL questions.

QUESTION 1

The following questions are based on Figure 1.1

Figure 1.1

(a) Find the value of the broadcast id on the side of R1 (Fa0/0) and on the

side of R3 (Fa0/0) using default subnet mask of class B.

CLO2

(4 marks)

(b) Explain the purpose of line 3 in the R2 routing table. CLO1

(4 marks)

(c) What is the best routing protocol used in this routing? Explain the

reason.

CLO1

(3 marks)

Page 18: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 19 of 21

(d) From the global configuration mode, configure the password for R1

device as below:

Console password Politeknik

vty line password Politeknik123

Enable password JTMK

Enable secret JTMK123

CLO2

(8 marks)

(e) From the configuration mode, configure the RIP version 2 on the R1

device

CLO2

(6 marks)

Page 19: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 20 of 21

QUESTION 2

(a) It is important that the ISP provide a reliable and scalable network to get

better services performance for their customers. Explain what is

scalability?

CLO1

(3 marks)

(b) Describe the definition of Routing Information Protocol and explain the

key characteristics of RIP.

CLO1

(8 marks)

(c) An Ethernet port on a router was assigned with an IP address of

172.16.112.1 / 20

i. Write the subnet mask in four dotted decimal form.

ii. What is the maximum number of hosts is allowed to support in

this subnet?

iii. Identify the network address and broadcast address for that

subnet.

iv. Identify the range of IP address available for the hosts?

CLO1

(1 mark)

CLO1

(1 mark)

CLO2

(2 marks)

CLO3

(1 mark)

Page 20: FINAL PAPER FN311 INTERNET SERVICES

CONFIDENTIAL FN311 INTERNET SERVICES

Page 21 of 21

(d) Based on the Figure 2.1, two (2) routers were used to enable host H1

and host H2 to communicate. Using information given in the figure and

in global configuration mode;

Figure 2.1

i. Write the command lines to give an IP address to FastEthernet 0/1

and serial interface 0/0/0 in router R1.

ii. Serial 0/0/0 is DCE, so set the clock rate of 6400 at the

appropriate port.

iii. Enable both ports so it can function properly with no shutdown

command and exit.

CLO1

(5 marks)

CLO1

(2 marks)

CLO2

(2 marks)