Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
688 Cards in this Set
- Front
- Back
An administrator has determined that auto-negotiation has failed on a connection. Which of the following are the MOST important settings that should be matched on each side of the connection?
A. Port speed, port duplex, flow control B. VLAN assignment, port authentication, flow control C. IP address, OSPF area, route propagation D. Port enable, port mirroring, link aggregation |
A. Port speed, port duplex, flow control
|
|
Which of the following command line tools can be used to display listening sockets and established connections on the local computer?
A. ipconfig B. nbtstat C. nslookup D. netstat |
D. netstat
|
|
Which of the following network cable types is LEAST susceptible to EMI?
A. UTP CAT5 B. UTP CAT3 C. Plenum STP CAT5 D. Coaxial |
D. Coaxial
|
|
Which of the following network devices would MOST likely be installed to extend the wireless coverage range in an office space and help strengthen the signal of the network?
A. Switch B. Firewall C. Repeater D. Hub |
C. Repeater
|
|
Windows users are reporting that they cannot connect to legacy file servers. Ping attempts to the file server and WINS server were successful. Which of the following tools should be used NEXT?
A. TRACERT B. IPCONFIG C. NSLOOKUP D. NBTSTAT |
D. NBTSTAT
|
|
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use?
A. Security policy B. Baseline configurations C. CAT5 wiring schematices D. Physical network diagram |
D. Physical network diagram
|
|
Which of the following configuration management documentation types would an administrator use to know how and when to properly install new network devices on the LAN?
A. Network policy B. Baseline configuration C. Logical network diagram D. Wiring schematic |
A. Network policy
|
|
OSPF is an example of which of the following routing protocol types?
A. Link-state IGP B. Distance-vector EGP C. Link-state EGP D. Distance-vector IGP |
A. Link-state IGP
|
|
Which of the following tools is designed to send a signal through one end of a cable, so that it can be found at the other end of the cable?
A. Toner probe B. Multimeter C. Voltage event recorder D. Cable tester |
C. Voltage event recorder
|
|
An administrator believes a workstation is not able to access resources because the wrong DNS server is configured on the workstation. Which of the following commands would MOST likely be used to determing the current configured DNS server?
A. ipconfig B. arp C. ping D. traceroute |
A. ipconfig
|
|
Which of the following is typically used in an LAN environment?
A. 10GBaseLW B. 10GBaseEW C. 10GBaseSW D. 10GBaseSR |
D. 10GBaseSR
|
|
The 1000 in 1000BaseT cabling represent which of the following?
A. The theoretical port limit of the cable. B. The quality level of the copper wiring used. C. The theoretical maximum bandwidth. D. The theoretical maximum cable length. |
C. The theoretical maximum bandwidth
|
|
Which of the following connector types is used to connect to a dial-up modem?
A. RJ-11 B. RJ-45 C. ST D. BNC |
A. RJ-11
|
|
An administrator wants to monitor live traffic on a switch to determine if a malicious source is broadcasting ARP traffic. Which of the following utilities would BEST accomplish this?
A. Switchport mapper B. Network mapper C. Packet sniffer D. Packet injector |
C. Packet sniffer
|
|
Which of the following connector types is used to make a CAT5e patch cable?
A. RJ-45 B. SC C. ST D. DB-9 |
A. RJ-45
|
|
Users report an intermittent degradation of sound on their IP phones. Which of the following would a network administrator do to alleviate the problem?
A. Configure QoS B. Configure VLAN trunking on the switch C. Use plenum cables D. Provide fault tolerance for the switch. |
A. Configure QoS
|
|
Which of the following tools would an administrator use to terminate cabling to a 110 block?
A. Certifier B. Cable crimper C. Punch down D. Toner probe |
C. Punch down
|
|
According to best practices, which of the following would be used to get a dial-tone off a 66 block?
A. Vampire tap B. Two pair tri-star connector C. Butt set D. Four pair tri-star connector |
C. Butt set
|
|
Which of the following would BEST describe security devices used to provide
content filtering? A. Proxy server B. VPN concentrator C. Port scanners D. DHCP server |
A. Proxy server
|
|
Which of the following tools is used to create a patch cable?
A. Toner probe B. Cable tester C. RJ-45 crimper D. Punch down tool |
C. RJ-45 crimper
|
|
Which of the following is the maximum distance that CAT5 cable can run
before experience db loss? A. 100 feet (30.5 meters) B. 328 feet (100 meters) C. 358 feet (109.12 meters) D. 207 feet (63.1 meters) |
B. 328 feet (100 meters)
|
|
The administrator's ISP indicates that they will need an autonomous system
number to begin routing external network traffic. Which of the following protocols should the ISP plan to use? A. BGP B. OSPF C. RIPv2 D. IS-IS |
A. BGP
|
|
An administrator is unsure of how to turn off spanning tree protocol on a
switch. Which of the following documents should the administrator consult to determine the proper settings? A. Wiring schematic B. Event logs C. Logical network diagram D. Product manual |
C. Logical network diagram
|
|
Which of the following can be used to help verify that a remote web server
is not blocked by a firewall? A. Toner probe B. Protocol analyzer C. Port scanner D. Packet injector |
C. Port scanner
|
|
An administrator wants to connect a laptop directly to a printer's network
port. Which of the following cable types should the administrator use to guarantee communication with the printer? A. Serial cable B. Cross-over cable C. Rollover cable D. Straight-through cable |
B. Cross-over cable
|
|
Plenum cable should be used to:
A. protect against ESD. B. decrease cost. C. comply with fire codes. D. increase reliability. |
C. comply with fire codes.
|
|
Which of the following is the DOS command to find out the IP address of a
host device? A. netstat B. ipconfig C. ifconfig D. tracrt |
B. ipconfig
|
|
Which of the following is an acceptable method for deciding placement of
wireless access points? A. A site survey B. Where there are electrical service and network connections available C. Every 300 feet (91 meters) D. In the middle of each room |
A. A site survey
|
|
Which of the following MOST likely needs to be implemented to provide
central authentication for network equipment? A. SSH B. PKI C. RADIUS D. SSL VPN |
C. RADIUS
|
|
Which of the following logical network topologies would a technician MOST
likely find in a person's home? A. WAN B. Domain C. P2P D. Client/server |
C. P2P
|
|
Which of the following is required if ports from VLANs on two separate
switches need to broadcast to each other? A. VPN B. Trunking C. Port authentication D. Port mirroring |
B. Trunking
|
|
An administrator wishes to determine if there is a service listening on
port 1433 on a server. Which of the following tools would the administrator use to determine this? A. route B. net start C. netstat D. ipconfig |
C. netstat
|
|
Which of the following will allow data and power over the same connection?
A. Trunking B. Mirroring C. Spanning tree D. PoE |
D. PoE
|
|
Which of the following WAN protocols uses fiber-optic media?
A. SONET B. Frame Relay C. ISDN D. POTS |
A. SONET
|
|
Which of the following tools is used to connect analog telephony wire pairs
to a block, such as a 110 or 66 block? A. Butt set B. Toner probe C. Punch down tool D. Protocol analyzer |
D. Punch down tool
|
|
A user reports an inability to access a certain website, but is able to
access all other sites. Which of the following tools would the administrator MOST likely use to see where the problem is occurring? A. netstat B. traceroute C. hostname D. ipconfig |
B. traceroute
|
|
When installing an access point, which of the following encryption schemes
should be implemented to BEST secure the network? A. WEP B. WPA C. WPA with PSK D. WPA2 with PSK |
D. WPA2 with PSK
|
|
When installing a new secure wireless network the administrator should turn
on: A. WPA and turn off SSID broadcast B. WPA and turn on SSID broadcast C. WEP and turn off SSID broadcast D. WEP and turn on SSID broadcast |
A. WPA and turn off SSID broadcast
|
|
An administrator needs to identify the DNS servers that a computer is
using. Which of the following commands would MOST likely be used? A. ping B. nslookup C. ipconfig D. traceroute |
B. nslookup
|
|
Which of the following ports would be commonly used for email traffic?
A. 20 B. 443 C. 80 D. 110 |
D. 110
|
|
Which of the following can allow or deny network access based on a physical
hardware address? A. IP filtering B. IDS C. MAC filtering D. IPS |
C. MAC filtering
|
|
An end user is able to connect to a wireless network and is able to browse
the internet, yet is unable to access network servers. Which of the following is the MOST likely cause of the problem? A. There is a problem with the DNS server. B. The network card is malfunctioning. C. The end user is connected to the incorrect wireless network. D. The device is configured with an incorrect subnet mask. |
C. The end user is connected to the incorrect wireless network.
|
|
Which of the following protocols uses port 20, by default?
A. FTP B. SSH C. HTTPS D. DNS |
A. FTP
|
|
Which of the following is true about an IP address if the first three bits
are all one and the fourth bit is a zero? A. The address is a Class D address. B. The address is a Class A address. C. The address is a Class B address. D. The address is a Class C address. |
A. The address is a Class D address.
|
|
An administrator needs to check the number of active connections on their
computer. Which of the following should the administrator use? A. dig B. ping C. netstat D. ipconfig |
C. netstat
|
|
Which of the following protocols are commonly used for VoIP? (Select TWO)
A. NNTP B. SIP C. HSRP D. NPP E. RTP |
B. SIP
E. RTP |
|
Which of the following is a common type of copper-based Ethernet?
A. 1000BaseFX B. 100BaseFX C. 1000BaseSX D. 1000BaseT |
D. 1000BaseT
|
|
Refer to the attached Exhibit. In the diagram, which of the following
would be a single point of failure with the highest impact to systems? A. Switch A failing B. Connection between switch A and switch B failing C. Router failing D. Connection between the router and switch A failing |
A. Switch A failing
|
|
Which of the following would be sent to an SNMP network management system
in the event that a failure or predefined threshold was crossed? A. SNMP trap B. History log C. System log D. SNMP agent |
A. SNMP trap
|
|
Which of the following ports would be commonly used for HTTP?
A. 23 B. 80 C. 443 D. 20 |
B. 80
|
|
An administrator suspects that packets to an IP address are being dropped
over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets? A. netstat B. traceroute C. nslookup D. ping |
B. traceroute
|
|
Which of the following monitors a server to see which protocols might be in
use? A. Ping sweep B. Wireless packet sniffer C. Port scanner D. Intrusion detection software |
C. Port scanner
|
|
11g wireless signals operating at 2.4GHz has a maximum line of sight range
of which of the following? A. 460 feet (140 meters) B. 560 feet (171 meters) C. 840 feet (256 meters) D. 540 feet (165 meters) |
A. 460 feet (140 meters)
|
|
Which of the following would be MOST important in achieving fault tolerance
on a network that hosts a distributed application? A. Redundant servers with failover B. High-capacity disk caching C. Hypervisor and virtual hosts D. Unattended reboot of servers |
A. Redundant servers with failover
|
|
A technician needs to manage a switch by using the management port on the
back of the switch. Which of the following cables would the technician use? A. Loopback B. Straight C. Console D. Crossover |
C. Console
|
|
While installing a WAP a technician sees an option labeled 'SSID
broadcast'. Which of the following would be the result of disabling that feature? A. The WAP will not broadcast a wireless signal. B. The wireless network will not be auto detected by wireless clients. C. The SSID name will be encrypted. D. The clients will not function until that setting has been changed on them. |
B. The wireless network will not be auto detected by wireless clients.
|
|
Which of the following network access security methods involves the
analysis of a physical hardware addresses? A. MAC filtering B. L2TP C. RAS D. IP filtering |
A. MAC filtering
|
|
Which of the following wiring standards would MOST likely be used to
connect a single network node to a switch? A. Loopback B. Straight C. Crossover D. Rollover |
B. Straight
|
|
Which of the following protocols ensures message integrity when
transferring data from the server to the client? A. RSH B. SNMPv3 C. FTP D. SNMPv2 |
B. SNMPv3
|
|
Information gathering and diagnostics indicate that a worm has infected the
local database server and its clients, and is saturating local network traffic. Which of the following is the NEXT step for a technician? A. Run a virus scan on all local workstations B. Shutdown the database server C. Contact the DBA to consider escalation D. Scan the database server log for remote connections |
B. Shutdown the database server
|
|
Which of the following processes translates a private IP address for a
public IP address? A. DNS B. PAT C. NAT D. DHCP |
C. NAT
|
|
An administrator suspects an IP conflict on the local LAN. Which of the
following is BEST used to troubleshoot this problem? A. hostname B. ifconfig C. traceroute D. nslookup |
B. ifconfig
|
|
Which of the following is a purpose of using a port scanner?
A. To determine VLAN port configuration on the network. B. To determine services running on a server C. To detect DoS attacks on the network D. To analyze network traffic at the packet level |
B. To determine services running on a server
|
|
Refer to the attached Exhibit. IN the environment represented by the
diagram, a technician is asked to temporarily connect three printers to the network. they are to be placed physically next to the existing network printer. The technician needs to install a new switch to connect these printers because all ports are taken on the network. Which of the following locations on the network would be the BEST place for the additional switch to be placed? A. Between the existing printer and switch A. B. Between switch A and switch B C. Between the DHCP and switch A D. Between switch A and switch C |
A. Between the existing printer and switch A
|
|
A company's internal email system is an example of which of the following
logical network topologies? A. WAN B. VLAN C. Peer to Peer D. Client/server |
D. Client/server
|
|
A user submits and online transaction to purchase 10 items. The following
day, the same user notices that the transaction receipt shows 100 items being purchased instead of 10. Which of the following MOST likely occurred? A. Man-in-the-middle attack B. DoS attack C. Botnet attack D. DDoS attack |
A. Man-in-the-middle attack
|
|
An administrator would like to segment traffic into two logical networks on
a single switch. Which of the following technologies should be implemented? A. VPN B. LAN C. VLAN D. VDSL |
C. VLAN
|
|
Which of the following will MOST likely occur when a technician uses a CAT5
UTP cable longer than the maximum length per segment? A. Duplex mismatch B. Speed mismatch C. Attenuation D. Load balancing |
C. Attenuation
|
|
An administrator indicates that the T1 line at a remote site can plug
directly into the new router, eliminating the need for a secondary device. Which of the following external devices is no longer needed? A. CSU/DSU B. VLAN C. MDF D. ATM |
A. CSU/DSU
|
|
Which of the following terms BEST describes the time required for routers
to exchange new routes and update their routing tables with information from other network routers? A. Propagation B. Convergence C. Crosstalk D. Attenuation |
B. Convergence
|
|
Which of the following would an administrator use to standardize all cross
connects on a RJ-45 jack? A. Smart jack B. 110 block C. 66 block D. Patch panel |
D. Patch panel
|
|
Which of the following networking protocols is used to give the remote
computer secure command line access to the server? A. ICMP B. RTP C. SSH D. Telnet |
C. SSH
|
|
A small company needs to be temporarily extend its call center by ten
employees. The company decides to rent office space on the opposite side of the building; the two spaces are 400 feet (122 meters) apart. Which of the following is the MOST cost effective solution? A. Install gigabit switches and run Ethernet. B. Install a new T1 line for that office. C. Use a wireless repeater and a WAP. D. Connect the two offices with fiber. |
C. Use a wireless repeater and a WAP.
|
|
A client wants to improve the wireless coverage on the third floor of their
house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables? A. Switch B. Bridge C. Router D. Repeater |
D. Repeater
|
|
Which of the following devices can be installed on individual computers
throughout the network? A. VPN concentrator B. Host-based firewall C. NIPS D. Network-based firewall |
B. Host-based firewall
|
|
A company network is experience a man-in-the-middle attack, where a
malicious user is impersonating the default gateway IP address of 192.168.1.1. Give that the default gateway MAC address is 00-11-22-33-44- 55, which of the following commands can the administrator run on the affected hosts to resolve the issue? A. arp -a 192.168.1.1 B. arp -a 00-11-22-33-44-55 C. arp -s 192.168.1.1 00-11-22-33-44-55 D. arp -s 00-11-22-33-44-55 192.168.1.1 |
C. arp -s 192.168.1.1 00-11-22-33-44-55
|
|
Which of the following methods is used in creating an ACL?
A. IP filtering B. VPNs C. Content filtering D. PPPs |
A. IP filtering
|
|
Which of the following protocols is used during boot-up of diskless hosts?
A. TFTP B. IGMP C. SNMP D. TLS |
A. TFTP
|
|
Which of the following is the maximum number of available segments on a
10Base-T network? A. 1,024 B. 2 C. 512 D. 1,256 |
B. 2
|
|
Which of the following is the MOST likely reason that two computers in
different VLANs, on the same Layer 2 switch, are unable to communicate with each other? A. IGMP snooping should be enabled on the switch B. A router is needed to route traffic between the VLANs C. The computers do not support ARP proxy. D. Spanning trees between the VLANs need to be converged. |
B. A router is needed to route traffic between the VLANs.
|
|
A crossover cable is not needed when the switch supports which of the
following? A. MDIX B. LACP C. XDSL D. IGRP |
A. MDIX
|
|
Which of the following WAN technologies provides the highest maximum
bandwidth? A. ADSL B. SONET C. T1 D. E3 |
B. SONET
|
|
Which of the following technologies is the MOST cost-effective when
protecting a large number of networked workstations from external attacks? A. External scanning service B. Host-based IDS C. Network-based IPS D. Network-based firewall |
D. Network-based firewall
|
|
Which of the following is true about an IP address if the first four bits
are all a one? A. The address is a Class C address. B. The address is a Class E address. C. The address is a Class D address. D. The address is a Class A address. |
B. The address is a Class E address.
|
|
Which of the following provides the GREATEST level of protection against
someone attempting to capture a router password traversing the network? A. SCP B. AH C. ACL D. SSH |
D. SSH
|
|
A loopback plug is useful for which of the following?
A. NIC diagnostics B. Toning C. Throughput testing D. Punchdown blocks |
A. NIC diagnostics
|
|
Which of the following network types is suitable for a 10 gigabyte core
network using 10 meter (33 feet) fiber runs? A. 10GBase-ER B. 10GBase-SR C. 10GBase-SW D. 100Base-FX |
B. 10GBase-SR
|
|
Which of the following is the BEST tool to use when terminating a network
jack? A. Snips B. Toner probe C. Punch down D. Cable stripper |
C. Punch down
|
|
Which of the following WAN technologies uses 53 byte fixed-length cells?
A. Frame relay B. FDDI C. ATM D. SONET |
C. ATM
|
|
A company finished upgrading the wireless encryption to WPA2 Enterprise.
The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem? A. The laptop is missing the software supplicant. B. The access point SSID is hidden. C. The laptop only supports TKIP and AES encryption. D. The access point is on the wrong channel. |
A. The laptop is missing the software supplicant.
|
|
A wireless access point supports up to 20 clients. Which of the following
describes this wireless network? A. Point to point B. Ring C. Mesh D. Point to multipoint |
D. Point to multipoint
|
|
An administrator needs to update a router configuration for a router that
does not support SSH. Which of the following can be used to securely update the router configuration A. HTTPS B. FTP C. TFTP D. SNMPv2 |
A. HTTPS
|
|
Routers operate predominantly at which of the following layers of the OSI
model? A. 1 B. 3 C. 4 D. 2 |
B. 3
|
|
Which of the following routing protocols are unable to advertise CIDR
networks? (Select TWO) A. OSPF B. RIPv2 C. RIP D. IGRP E. EIGRP |
C. RIP
D. IGRP |
|
Which of the following connectors can be used for serial connections?
A. SC B. RS-232 C. BNC D. ST |
B. RS-232
|
|
Which of the following components is used to terminate a T1 connection?
A. Smart jack B. Patch panel C. 66 block D. 110 block |
A. Smart jack
|
|
An administrator would like to evaluate network traffic. Which of the
following tools should the administrator use? A. OTDR B. Certifier C. Toner probe D. Protocol analyzer |
D. Protocol analyzer
|
|
Which of the following networks are reserved for private IP addresses?
A. 172.16.128.0/15 B. 162.129.0.0/24 C. 168.129.0.0/24 D. 192.168.0.0/16 |
D. 192.168.0.0/16
|
|
Which of the following technologies allows an administrator to submit
traffic to and IDS for review? A. Port mirroring B. VLAN C. Spanning tree D. PoE |
A. Port mirroring
|
|
Which of the following protocols is commonly associated with VoIP?
A. POP3 B. NTP C. SIP D. IGMP |
C. SIP
|
|
An administrator's is at a client's site to figure out an intermittent
network problem. The technician has already asked if anything has changed on the network. Which of the following is the NEXT step in the troubleshooting methodology? A. Identify the results and effects of the solution. B. Identify the affected areas of the network. C. Establish the most probably cause D. Implement and test the solution |
B. Identify the affected areas of the network.
|
|
Which of the following mitigation techniques is MOST effective against a
man-in-the-middle attack? A. Encryption B. Popup blocker C. Authentication D. ACL |
C. Authentication
|
|
An administrator has just completed creating a new subnet. Users on the
new subnet are unable to access the network. Which documentation will BEST provide information to help identify the issue? A. Logical network diagram B. Physical network diagram C. Policies D. Procedures |
A. Logical network diagram
|
|
Which of the following switch features allows power and data from a single
connection? A. VLAN B. Spanning tree C. PoE D. Trunking |
C. PoE
|
|
Which of the following protocols allows dynamic addresses to be assigned to
devices? A. SNMP B. ARP C. SMTP D. DHCP |
D. DHCP
|
|
Which of the following describes an area where communications equipment is
stored? A. HVAC B. Demarc C. MDF D. 110 block |
C. MDF
|
|
Which of the following controls are MOST effective when a route only
supports remote configuration via Telnet? (Select TWO) A. Vulnerability scanner B. Strong passwords C. Port scanner D. Two factor authentication E. IP ACLs |
D. Two factor authentication
E. IP ACLs |
|
An administrator wants to prevent users from plugging in their personal
laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed? A. IDS B. CSU C. Proxy server D. Multilayer switch |
C. Proxy server
|
|
increasing which of the following?
A. Domain kiting B. Broadcast domains C. Collision domains D. Frequency domains |
C. Collision domains
|
|
Which of the following devices will measure the amount of EMI that a
network cable emits? A. Protocol analyzer B. OTDR C. Cable tester D. TDR |
D. TDR
|
|
An administrator is adding a new router in order to connect to a new remote
location. After verifying that all the wiring and IP information is accurate, the administrator is still unable to connect to the remote router. Which of the following is the MOST probably cause? A. Console access is denied B. Password is not set correctly C. Clock speed is not configured D. Duplex mismatch |
C. Clock speed is not configured
|
|
The plans for a new office require 300 network connections. Which of the
following network sizes should be allocated to the new office? A. /23 B. /25 C. /24 D. /30 |
A. /23
|
|
Which of the following software security devices can be implemented on
individual servers in order to solely identify abnormal behavior? A. DNS B. HIDS C. HIPS D. Network-based firewall |
B. HIDS
|
|
A technician is at a client's site to figure out an intermittent network
problem. The technician has implemented the solution. Which of the following is the NEXT step in the troubleshooting methodology? A. Determine if escalation is necessary. B. Create an action plan and identify potential effects. C. Document the solution and the entire process. D. Determine if anything has changed. |
C. Document the solution and the entire process.
|
|
Which of the following ports would be commonly used for FTP traffic?
A. 23 B. 25 C. 22 D. 20 |
D. 20
|
|
As an added level of security a network administrator can configure which
of the following on a firewall? A. Port blocking B. Port forwarding C. Port mirroring D. VPN pass-through |
A. Port blocking
|
|
A computer is unable to access the corporate web server, which has an IP
address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem? Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic A. Static ARP entries B. Revers ARP failure C. IP address conflict D. MAC spoofing |
D. MAC spoofing
|
|
run on the computer. Based on the output below, which of the following is
the MOST likely cause of this problem? Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic A. Static ARP entries B. Revers ARP failure C. IP address conflict D. MAC spoofing D. MAC spoofing A user is having problems accessing the wireless network with a gaming device. Which of the following is the MOST likely cause of the problem? A. The device does not support 802.1 p. B. WPA2 is not supported by the device. C. Broadcast prevention is enabled on the switch. D. PoE is not enabled over wireless. |
B. WPA2 is not supported by the device.
|
|
Which of the following connection methods is considered secure and is
normally used to connect to web resources such as online banking and ecommerce sites? A. SSH B. HTTPS C. SFTP D. HTTP |
B. HTTPS
|
|
Which of the following is a secure method of remote access via command
line? A. Telnet B. RSH C. SSH D. RCP |
C. SSH
|
|
Which of the following cables would be used with a RJ-45 connector?
A. UTP B. Serial C. Coaxial D. Fiber |
A. UTP
|
|
Which of the following LAN technologies is considered fast Ethernet and
uses two pairs of cabling, one pair for sending and the other pair for receiving? A. 100BaseX B. 100BaseT4 C. 100BaseTX D. 100BaseFX |
C. 100BaseTX
|
|
A solution provided less than ideal results, and the technician is forced
to go back and devise a new solution. Which of the following would be done NEXT, assuming probable cause is established and escalation is not necessary? A. Create an action plan and accompanying solution. B. Document the solution and steps taken during the process. C. Gather information about the problem. D. Determine if anything has changed. |
A. Create an action plan and accompanying solution.
|
|
Which of the following is MOST likely used to transfer files to a web
server? A. FTP B. DNS C. POP3 D. IMAP4 |
A. FTP
|
|
SONET is normally associated with which of the following?
A. Point to multipoint B. Bus C. Point to point D. Ring |
D. Ring
|
|
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
A. 100BaseFX B. 10GBaseSW C. 1000BaseT D. 100BaseTX |
B. 10GBaseSW
|
|
An IDS device needs to be plugged into a port that can see all traffic on a
network switch. Which of the following features of the switch should be used? A. Port security B. Port trunking C. Port mirroring D. Port spanning |
C. Port mirroring
|
|
Link aggregation is also known as port:
A. mirroring. B. spanning. C. distribution. D. trunking. |
D. trunking.
|
|
An administrator is looking to install new WAPs into remote locations for
increased network capacity. Which of the following technologies would the equipment need to support if accessible power outlets were at a minimum? A. MAC filtering B. PoE C. WPA D. VLAN |
B. PoE
|
|
Which of the following is a reason why satellite Internet should be
avoided, if VoIP is being used? A. One-way communication B. Latency C. Low bandwidth D. Availability |
B. Latency
|
|
Which of the following ports allows telnet traffic to be secure?
A. 25 B. 22 C. 23 D. 21 |
B. 22
|
|
After crimping a new RJ-45 plug in an unmarked cable, the network tester
tool gives the message "Warning! Voltage on line!". Which of the following is the MOST likely cause of this message? A. The cable is a T1 connection. B. The cable is being used on the phone network. C. Fluorescent lights are causing interference on the cable. D. There is a short in the cable. |
B. The cable is being used on the phone network.
|
|
Which of the following network monitoring tools would be used to identify
the maximum available bandwidth on a network? A. Protocol analyzers B. Port scanners C. Throughput testers D. History logs |
C. Throughput testers
|
|
Which of the following authenticates a web server to the remote client in
PKI? A. DNS name B. Public key C. Private key D. FQDN |
B. Public key
|
|
Which of the following commands provides similar information about the
current configuration of active local Ethernet adapters? (Select TWO) A. route B. hostname C. ifconfig D. traceroute E. ipconfig |
C. ifconfig
E. ipconfig |
|
After accepting a request packet on port 80, the firewall automatically
allows the reply packet to pass Which of the following terms BEST describes this firewall behavior? A. Stateful inspection B. Intrusion detection C. Passive fingerprinting D. Content filtering |
A. Stateful inspection
|
|
Which of the following is MOST likely to affect IP based surveillance
systems? A. Social engineering B. Mantrap C. Man-in-the-middle D. Vishing |
C. Man-in-the-middle
|
|
Which of the following devices should be used to segment two networks?
A. Media converter B. Hub C. Bridge D. Repeater |
A. Media converter
|
|
Which of the following should be modified after a new network device is
added to the network? A. Intrusion detection software B. Router configuration setting C. Physical and logical diagrams D. System logs |
C. Physical and logical diagrams
|
|
When implementing a basic wireless home network, which of the following
should be taken into consideration when configuring the wireless router so it does not conflict with other home electronics? A. Beacon B. Appropriate encryption C. Frequency D. ESSID |
C. Frequency
|
|
Which of the following is a secure method of copying information over a
public network? A. TFTP B. SCP C. SNMP D. SMTP |
B. SCP
|
|
A user in the accounting department reports that their office is able to
connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue? A. Physical network diagram B. Acceptable use policy C. Job log D. Baseline documentation E. Wiring schematic |
A. Physical network diagram
E. Wiring schematic |
|
Which of the following protocols would an administrator use to backup files
from a router to a local server? A. DHCP B. SMTP C. NTP D. TFTP |
D. TFTP
|
|
Which of the following technologies verifies that keys have not been
tampered with and integrity is maintained? A. IPSec AH B. TKIP C. Pre-shared key D. WEP |
A. IPSec AH
|
|
Which of the following can be used to set options such as TFTP server
addresses, DNS search lists, and broadcast addresses on network clients and workstations? A. DHCP server B. Smart jack C. Network bridge D. Layer 2 switch |
A. DHCP server
|
|
Which of the following commands would be used to display the IP address on
a UNIX/Linux computer? A. ifconfig B. netstat C. dig D. ipconfig |
A. ifconfig
|
|
The technician notices that one of the wires in a CAT5 cable is cut in
half. Which of the following connectivity issues did the technician discover? A. Attenuation B. Open pairs C. Interference D. Crosstalk |
B. Open pairs
|
|
A company recently installed a new VoIP phone system that runs over their
existing T3 Internet connection. Which of the following network technologies would BEST handle voice traffic prioritization above all other data? A. IPSec B. Load balancing C. QoS D. PoE |
C. QoS
|
|
Which of the following is an invalid subnet mask?
A. 255.255.255.255 B. 255.255.0.0 C. 255.256.255.0 D. 255.0.0.0 |
C. 255.256.255.0
|
|
Which of the following tools logs electrical surges?
A. Cable tester B. Toner probe C. Voltage event recorder D. Protocol analyzer |
C. Voltage event recorder
|
|
Which of the following network devices would MOST likely be installed to
allow a fiber optic cable to be plugged into a network device with only RJ- 45 connections? A. Hub B. Media Converter C. Basic switch D. WAP |
B. Media Converter
|
|
Users are reporting that they are still experiencing network issues even
though a fix was recently applied. Which of the following troubleshooting methodology steps is the administrator using? A. Continuing to gather information about the same symptoms B. Documenting the solution and the entire process C. Testing the solution and identifying the effects D. Escalating the problem |
C. Testing the solution and identifying the effects
|
|
For the BEST performance, wireless signals should use
A. overlapping channels. B. non-overlapping channels. C. redundant channels. D. different encryption types. |
B. non-overlapping channels.
|
|
Which of the following devices enables a router to communicate with a T1
line? A. IPS B. Layer 3 switch C. CSU/DSU D. Firewall |
C. CSU/DSU
|
|
Which of the following devices separates a LAN segment into two collision
domains, without affecting the broadcast domain? A. Firewall B. Bridge C. Repeater D. Router |
B. Bridge
|
|
CAT5, CAT5e, and CAT6 cabling all consist of:
A. 8 separate strands, all split into individual leads with no intertwining. B. 8 separate strands split into 4 pairs of 2 intertwined leads. C. 8 separate strands split into 2 pairs of 4 intertwined leads. D. 4 separate strands split into 2 pairs of 2 intertwined leads. |
B. 8 separate strands split into 4 pairs of 2 intertwined leads.
|
|
A laptop cannot connect to a wireless network. The laptop is configured to
use WPA2 with PSK and TKIP. An administrator determines the laptop should be set to use AES. This is an example of which of the following? A. Incorrect frequency band usage B. Faulty wireless antenna C. Environmental interference D. Incorrect encryption settings |
D. Incorrect encryption settings
|
|
Which of the following network topologies is used within a token based
network? A. Point to multipoint B. Mesh C. Ring D. Point to point |
C. Ring
|
|
Which of the following LAN technologies has the SHORTEST maximum length for
each cable run without the use of a repeater? A. 10GBaseT B. 10GBaseLW C. 10GBaseX D. 10BaseT |
D. 10BaseT
|
|
An administrator needs to test connectivity to a particular website without
launching a browser session. Which of the following commands would MOST likely be used to test this connection? A. ipconfig B. ping C. traceroute D. nslookup |
B. ping
|
|
Which of the following protocols is used to transmit emails?
A. SNMP B. POP3 C. SMTP D. IMAP4 |
C. SMTP
|
|
Which of the following would be used to locate a cable that is in a bundle
located in a distant telecommunications closet? A. Toner probe B. Butt set C. Voltage meter D. Voltage event recorder |
A. Toner probe
|
|
A technician wishes to implement network authentication at the switch port
level. Which of the following standards is designed to accomplish this? A. TKIP B. WPA2 C. 802.1ad D. 802.1x |
D. 802.1x
|
|
Which of the following features will allow for redundancy of a data port?
A. Aggregation B. PoE C. VLAN D. Spanning tree |
A. Aggregation
|
|
How many potential MAC address schemes are possible?
A. 2^48 B. 2^64 C. 2^46 D. 2^32 |
A. 2^48
|
|
Two autonomous networks who wish to exchange routing data should use which
of the following protocols? A. EIGRP B. OSPF C. IS-IS D. BGP |
D. BGP
|
|
Which of the following is the MOST appropriate policy for updating physical
network diagrams? A. Update before regularly scheduled network audits. B. Update whenever a connection is changed. C. Update after weekly network support team review. D. Update after new personnel are hired. |
B. Update whenever a connection is changed.
|
|
Which of the following are usually needed during manual configuration of a
client on an 802.11g network segment using DHCP and WEP? (Select TWO) A. Name servers B. Subnet mask C. SSID D. Shared key E. IP address |
C. SSID
D. Shared key |
|
Which of the following standards uses 5GHz frequency for network
communications? A. 802.11g B. 802.11b C. 802.3 D. 802.11a |
D. 802.11a
|
|
Which of the following has the STRONGEST encryption?
A. WPA2 B. L2TP C. WPA D. WEP |
A. WPA2
|
|
The MAIN difference between a MAC and an IP ACL is
A. IP ACLs work at Layer 3 while MAC ACLs do not B. IP ACLs are supported by Layer 2 switches while MAC ACLs are not C. MAC ACLs are more secure than IP ACLs D. MAC addresses cannot be spoofed while IP addresses can |
A. IP ACLs work at Layer 3 while MAC ACLs do not
|
|
A user contacts a technician and states, "The network is down." After
further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem? A. Unplug and then plug the network cable back in. B. Reboot the core router. C. Have the user run netstat. D. Have the user ping the default gateway. |
C. Have the user run netstat.
|
|
Given a typical 802.11 a/g/n wireless router, which of the following
frequencies would the unit operate at, by default? (Select TWO) A. 2.4GHz B. 900MHz C. 2.1GHz D. 5GHz E. 1.8GHz |
A. 2.4GHz
D. 5GHz |
|
New service from the telephone company is delivered over fiber, but the
technician does not have a fiber module for the router. Which of the following would remedy this issue? A. CSU/DSU B. Media converter C. Fiber repeater D. OTDR |
B. Media converter
|
|
Allowing two ports to function as one is considered to be which of the
following features? A. Etherchanneling on same switch B. Port authentication C. Port trunking on different switches D. Port mirroring |
A. Etherchanneling on same switch
|
|
A technician needs to install additional access points for a new high speed
connection being added in the new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable connections? A. Smart Jack B. 110 Block C. Demarc D. 66 Block |
B. 110 Block
|
|
A company has recently deployed 100 servers to provide online financial
transactions. Which of the following technologies is a technician MOST likely to deploy to ensure that each server is processing no more than 1000 Internet requests every second and that each request has an average processing time of five seconds? A. Load balancer B. Bandwidth shaper C. Proxy server D. Multilayer switch |
A. Load balancer
|
|
Which of the following protocols operate at layer 4 or the OSI model?
(Select TWO) A. HTTP B. FTP C. UDP D. TCP E. ICMP |
C. UDP
D. TCP |
|
Which of the following is the difference between FTP and SFTP?
A. SFTP is tunneled over IPSec. B. SFTP runs in passive mode. C. SFTP protocol is tunneled over SSL. D. SFTP is run over SHH. |
D. SFTP is run over SSH.
|
|
A port scanner is used by network administrator for which of the following?
A. To determine open ports on network hosts B. To secure switches and routers C. To make a physical network diagram D. To find routers with weak passwords |
A. To determine open ports on network hosts
|
|
An administrator notices that collisions are repeatedly occurring on a hub.
Which of the following would be the BEST way to help reduce these collisions? A. Replace the hub with a switch. B. Install a bridge on the network. C. Setup VLANs on the hub.. D. Use a static IP address on the network. |
A. Replace the hub with a switch.
|
|
A host on subnet 10.1.1.0/24 is sending packets with a source address of
169.254.0.100. Which of the following is the MOST likely explanation? A. The border router is unreachable. B. The default gateway is unreachable. C. The DHCP server is unreachable. D. The primary DNS server is unreachable. |
C. The DHCP server is unreachable.
|
|
An administrator has added four switches to a campus network. The switch
in wiring closet is connected to the switch in wiring closet and the switch in wiring closet. The switch in wiring closet is connected to the switch in wiring closet and the switch in wiring closet. Which of the following topologies is represented in this design? A. Ring B. Bus C. Mesh D. Star |
A. Ring
|
|
Delaying low-priority packets is a common technique for achieving which of
the following? A. QoS B. Fault tolerance C. Load balancing D. Dynamic routing |
A. QoS
|
|
A workstation is having connectivity issues when being added to the domain.
Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation? A. nslookup B. netstat C. nbtstat D. ipconfig |
D. ipconfig
|
|
A network administrator needs to add an out-of-band IDS to monitor all
traffic traversing the switch. Which of the following features would need to be specifically configured in order to achieve this? A. Spanning tree protocol B. Port authentication C. Port mirroring D. VLAN trunking |
C. Port mirroring
|
|
Which of the following connection methods or protocols is considered
unsecure and by default uses port 80? A. HTTP B. HTTPS C. TELNET D. RCP |
A. HTTP
|
|
An administrator is implementing a wireless network. Which of the
following encryption technologies is the MOST secure method and will authenticate devices to the network? A. WEP B. VPN C. SSH D. WPA |
D. WPA
|
|
Which of the following topologies is the MOST fault tolerant?
A. Mesh B. Bus C. Star D. Ring |
A. Mesh
|
|
Which of the following is the maximum distance for CAT5 cable?
A. 1058 feet (323 meters) B. 328 feet (100 meters) C. 100 feet (30.5 meters) D. 50 feet (15.2 meters) |
B. 328 feet (100 meters)
|
|
Two clients are directly connected via RJ-45 and CAT5e cables and
communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response? A. 2 and 3 B. 1 and 2 C. 5 and 6 D. 3 and 6 |
D. 3 and 6
|
|
Which of the following should be configured to provide a priority to voice
traffic? A. Port mirroring B. QoS C. DMZ D. Trunking |
B. QoS
|
|
Which of the following is a method of connecting devices wirelessly?
A. PPP B. Bluetooth C. RDP D. VNC |
B. Bluetooth
|
|
Which of the following terms describes the process of routers accepting the
same routing topology in their route tables? A. Resemblance B. Convergence C. Consolidation D. Aggregation |
B. Convergence
|
|
Which of the following is the correct format for an IPv4 IP address?
A. XXXX.XXXX.XXXX B. XX:XX:XX:XX:XX:XX C. XX-XX-XX-XX-XX-XX D. XXX.XXX.XXX.XXX |
D. XXX.XXX.XXX.XXX
|
|
A company needs to perform stateful packet filtering on the core network.
Which of the following devices would BEST be suited to match this equipment? A. DHCP server B. Router ACLs C. Proxy D. Firewall |
D. Firewall
|
|
At which of the following OSI model layers is HTTPS encryption performed?
A. Layer 3 B. Layer 7 C. Layer 5 D. Layer 6 |
D. Layer 6
|
|
A network administrator suspects that two computers on the same subnet have
the same IP address. Which of the following utilities could be used to determine which physical device the workstation is sending traffic? A. ARP B. NSLOOKUP C. DIG D. NETSTAT |
A. ARP
|
|
The 802.11n protocol operates at which of the following layers of the OSI
model? (Select TWO). A. Layer 2 B. Layer 1 C. Layer 4 D. Layer 5 E. Layer 3 |
A. Layer 2
|
|
A technician at a company providing online, real-time media streaming to
the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements? A. Multicast B. Subnetting C. Broadcast D. Unicast |
A. Multicast
|
|
Which of the following network protocols is used for sending outbound email
from a host? A. POP B. RTP C. IMAP D. SMTP |
D. SMTP
|
|
An administrator discovers that a compromised system on the network is
injecting incorrect routes in an attempt to intercept network traffic. Which of the following protocols is MOST likely being used? A. BGP B. RIP C. EIGRP D. OSPF |
A. BGP
|
|
A Linux user is reporting intermittent issues connecting to several
websites. Which of the following commands would the administrator MOST likely use to see where the traffic is dropping off at and the connections statistics to each device along the way? A. mtr B. ifconfig C. ping D. traceroute |
A. mtr
|
|
Which of the following tools can be used to test if a new DNS server is
resolving addresses correctly? A. nbtstat B. netstat C. traceroute D. nslookup |
D. nslookup
|
|
The primary goal of implementing network QoS features is
A. Provide fault tolerance to the network design. B. Increase network throughput. C. Prevent undesirable network traffic from entering the network. D. Provide predictable network performance. |
D. Provide predictable network performance.
|
|
A user reports that the entire corporate network is down. Which of the
following should the technician do FIRST? A. Identify if there are any other symptoms. B. Create an action plan and identify its effects. C. Escalate to a senior engineer. D. Implement a solution and test the results. |
A. Identify if there are any other symptoms.
|
|
An administrator would like to troubleshoot email issues and verify that
the mail service on server1.comptiA.org is available and accepting mail. Which of the following commands would BEST accomplish this? A. dig @server1.comptiA.org -t MX B. telnet server1.comptiA.org 25 C. ping -l 110 server1.comptiA.org -t D. nmap server1.comptiA.org -p0 |
B. telnet server1.comptiA.org 25
|
|
Which of the following represents a private IP address?
A. 140.90.90.90 B. 172.16.24.9 C. 139.93.23.22 D. 23.34.98.222 |
B. 172.16.24.9
|
|
Which of the following wireless standards has a MAXIMUM throughput, by
default, of 54Mbps and operates at the 5Ghz range? A. 802.11b B. 802.11n C. 802.11g D. 802.11a |
D. 802.11a
|
|
Which of the following pairs should be crossed to create a crossover cable?
A. 5,6 and 7,8 B. 1,2 and 3,6 C. 4,5 and 6,7 D. 1,2 and 3,4 |
B. 1,2 and 3,6
|
|
Which of the following features of a network switch eliminates the need for
cross-over cables? A. 802.1x B. Auto-MDIX C. IGMP snooping D. VLANs |
B. Auto-MDIX
|
|
A user calls network support and reports that email is not working. Which
of the following should the technician do FIRST? A. Determine which mail hub the user was connected to and perform a graceful restart. B. Ask the user what operation was performed, what the expected result was, and what the actual result was. C. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network administrator if needed. D. Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent. |
B. Ask the user what operation was performed, what the expected result was,
and what the actual result was. |
|
Which of the following features is essential in a firewall if it is to
support RTP sessions? A. Remote console B. Zones C. Statefulness D. Address translation |
C. Statefulness
|
|
Which of the following is the MAXIMUM segment distance for 100BaseTX?
A. 100 meters (328 feet) B. 30 meters (100 feet) C. 1000 meters (3281 feet) D. 305 meters (1000 feet) |
A. 100 meters (328 feet)
|
|
Which of the following Internet connections is traditionally carried over
an existing coax backbone? A. ADSL B. Fiber C. Cable D. SDSL |
C. Cable
|
|
Which of the following is the MOST accurate description of spanning tree
protocol? A. Protocol that detects routing loops and then adjusts priorities accordingly B. Algorithm to span the switch ports in order to create a tree-based hierarchical layout C. Algorithm that detects cabling loops and then disables an affected port to remove loops D. Port spanning technique used to provide network fault tolerance |
C. Algorithm that detects cabling loops and then disables an affected port
to remove loops |
|
After reports of network performance problems, the technician determines
that the switch firmware should be updated. Which of the following should the technician do NEXT? A. Identify the results and effects of the solution B. Create an action plan and identify potential effects C. Identify the affected areas of the network D. Document the solution and the entire process |
B. Create an action plan and identify potential effects
|
|
Which of the following encryption technologies would be the WEAKEST method
to use when securing a new SOHO wireless network? A. WEP64 B. WPA C. WEP128 D. WPA2 |
A. WEP64
|
|
Which of the following components would a technician check to see if a
phone outage is an internal or external problem? A. 110 block B. Demarc C. 66 block D. Patch panel |
B. Demarc
|
|
A network administrator would MOST likely use a port scanner to do which of
the following? A. Trace a physical network port through a building. B. Capture incoming network packets to port 80 on a workstation. C. Report the link speed and duplex of all ports on a switch. D. Remotely test a firewall configuration on a server. |
D. Remotely test a firewall configuration on a server.
|
|
Which of the following uses 802.1q?
A. 802.1x B. Port mirroring C. VLAN D. QoS |
C. VLAN
|
|
Which of the following technologies transfers data over an analog signal?
A. ADSL B. ISDN C. POTS D. DOCSIS |
C. POTS
|
|
Which of the following allows a WAP to be installed in a location where
there are no power outlets available? A. PoE B. Port authentication C. PPTP D. Trunking |
A. PoE
|
|
Which of the following devices transmits timed broadcasts onto an active
network? A. Bridge B. Unmanaged switch C. DHCP client D. Firewall |
C. DHCP client
|
|
A firewall is set to block inbound connections on port 25. Which of the
following protocols would enable the administrator to retrieve email without reconfiguring the firewall? A. FTP B. SNMP C. POP3 D. SMTP |
C. POP3
|
|
When ordering switches for a new building, which of the following is the
BEST way for the technician to determine the number of switches to put in each network closet? A. Count the number of phone ports and configure two network ports for each phone port. B. Review the architectural plans to see how many drops go to each closet C. Count the number of rooms near each closet and standardize eight drops per room. D. Wireless is the new standard and no network switches will be needed in the building. |
B. Review the architectural plans to see how many drops go to each closet.
|
|
Which of the following LAN technologies has a length segmentation of limit
of 2 kilometers (1.2 miles)? A. 1000BaseT B. 100BaseFX C. 10BaseF D. 100BaseTX |
C. 10BaseF
|
|
Which of the following should be used to ensure that all packets are
received by every connected device? A. Switch B. Firewall C. Hub D. Router |
C. Hub
|
|
Which of the following tools allows an administrator to verify the network
configuration of a system? A. route B. ifconfig C. traceroute D. ping |
B. ifconfig
|
|
Which of the following WAN types requires the use of a telephone line?
A. POTS B. Wireless C. Satellite D. ATM |
A. POTS
|
|
A technician is troubleshooting a network connectivity issue with a user's
desktop configured to use a static IP address. The technician notes the following configuration: IP 172.16.2.0 NETMASK 255.255.254.0 DEFAULT GATEWAY 172.16.1.1 DNS 192.168.1.1 Which of the following changes will allow the desktop to communicate properly with remote networks? A. Changing the DNS to 172.16.1.100 B. Changing the WINS server to 172.17.4.136 C. Changing the netmask to 255.255.255.0 D. Changing the default gateway to 172.16.3.1 |
D. Changing the default gateway to 172.16.3.1
|
|
Which of the following tools can be used to identify the location of a
network outage? A. ping B. traceroute C. netstat D. nslookup |
B. traceroute
|
|
A reserved set of IP addresses in a DHCP scope is commonly assigned to
which of the following network devices? (Select TWO) A. Workstation B. Server C. Laptop D. Hub E. Printer |
B. Server
E. Printer |
|
Which of the following protocols is the MOST secure for transferring
network device configurations? A. TFTP B. SCP C. RCP D. FTP |
B. SCP
|
|
When PKI is used for mutual authentication:
A. the public key is installed on the client and the private key on the server. B. both the private and the public key are installed on the server. C. the private key is installed on the client and the public key on the server. D. both the private and the public key are installed on the client. |
C. the private key is installed on the client and the public key on the
server. |
|
Which of the following devices contains an earpiece dialing interface and
speaker, and is used to test local loop telephony lines and connections? A. Butt set B. Protocol analyzer C. Punch down tool D. Toner probe |
D. Toner probe
|
|
Administrators are performing a war drive around their company's complex.
Which of the following are they attempting to detect? A. Bluesnarfing attacks B. DDoS attacks C. Worms D. Rogue access points |
D. Rogue access points
|
|
An administrator is provisioning a 10GBaseSR Ethernet connection between
two core switches. Which of the following cable types should the administrator plan to use? A. CAT6 copper B. RG-6 copper C. Multimode fiber D. Single-mode fiber |
C. Multimode fiber
|
|
An administrator is troubleshooting a device that will not power on. Which
of the following tools should the administrator use to check the wall outlet? A. Multimeter B. Toner probe C. Cable tester D. OTDR |
A. Multimeter
|
|
Which of the following is strictly used to convert analog to digital
signals? A. Modem B. Hub C. NIC D. Repeater |
A. Modem
|
|
A device that can detect and disrupt network-based attacks is a(n):
A. IPS B. DNS C. DSU D. IDS |
A. IPS
|
|
Which of the following network cable types requires grounding?
A. Fiber B. STP C. Serial D. UTP |
B. STP
|
|
Which of the following commands is MOST appropriate to determine whether a
network interface is up or down? A. ISAKMPD B. IFCONFIG C. ARP D. SNORT |
B. IFCONFIG
|
|
VoIP and data traffic are carried on different subnets in an enterprise.
Which of the following techniques can be used to provide both services to hosts on the same UTP cable? A. Use SSH tunneling for data connections. B. Put voice and data on separate VLANs. C. Upgrade terminations from TIA-568A to TIA-568B. D. Enable time-division multiplexing on local switches. |
B. Put voice and data on separate VLANs.
|
|
A technician wants to use an existing DHCP server for three additional
VLANs. Which of the following features needs to be configured to allow for this addition? A. DHCP relay B. Proxy server C. DHCP server D. Repeater |
A. DHCP relay
|
|
Which of the following tools will an administrator need to terminate the
network cabling to the patch panel? A. Multimeter B. Toner probe C. Punch down D. Certifiers |
C. Punch down
|
|
When installing two 802.11g access points in the same building, which of
the following channels will MOST likely be used to minimize interference? A. 5 and 6 B. 1 and 6 C. 6 and 10 D. 2 and 6 |
B. 1 and 6
|
|
Which of the following terminations would be used on a UTP cable connecting
a workstation to a switch? A. TIA-568A on one end, TIA-568B on the other end B. TIA-568A on one end, TIA-568A with pairs reversed on the other end C. TIA-568B on one end, TIA-568B on the other end D. TIA-568B on one end, TIA-568B with pairs reversed on the other end |
C. TIA-568B on one end, TIA-568B on the other end.
|
|
A user is reporting issues connecting to the corporate web server. When
analyzing the output from a packet sniffer an administrator sees: Client->Server SYN Server->Client ACK Client->Server RST Which of the following is the user experiencing? A. The server is failing to properly respond. B. The 3-way handshake is complete but the browser is unresponsive. C. The client is prematurely closing the connection. D. The server is prematurely closing the connection. |
C. The client is prematurely closing the connection.
|
|
Which of the following should be used to transfer data between two
computers via their NICs? A. RG-6 cable B. Crossover cable C. Loopback cable D. Rollover cable |
B. Crossover cable
|
|
An E1 connection contains how many lines?
A. 22 B. 24 C. 16 D. 32 |
D. 32
|
|
A mobile user reports that after receiving a new patch cable for their
laptop, the laptop is unable to connect to the network. An administrator verifies that the port is configured correctly and the LAN drop is active. Which of the following is the MOST likely cause? A. Crosstalk on the cable B. Speed mismatch C. Duplex mismatch D. Open pairs are present |
C. Duplex mismatch
|
|
Using network monitoring tools would allow and administrator to do which of
the following? A. Configure offline devices B. Examine performance issues C. View syslog events D. Install additional software and updates |
B. Examine performance issues
|
|
Which of the following routing algorithms would provide the fastest
convergence time? A. A distance-vector algorithm B. A path-vector algorithm C. A link-state algorithm D. A static algorithm |
C. A link-state algorithm
|
|
Internet-working devices operate at OSI layer:
A. 5 B. 2 C. 4 D. 3 |
D. 3
|
|
A server has an IP address of 192.168.50.12 and a subnet mask of
255.255.255.0. A client on the same network has an IP address of 192.168.50.112 and a subnet mask of 255.255.255.128. Which of the following BEST describes the result when the client sends a ping to the server? A. The packet is received by the server and it replies successfully. B. The packet is received by the server, but the reply is sent to its default gateway. C. The packet is sent directly to the client's default gateway. D. The packet is dropped by the server because it did not come from its default gateway. |
A. The packet is received by the server and it replies successfully.
|
|
Which of the following wireless connections has the SHORTEST maximum
operating distance? A. 802.11g B. Bluetooth C. 802.11b D. 802.11a |
B. Bluetooth
|
|
Which of the following describes an email that is sent to users with web
links that direct them to malicious websites? A. Rogue access points B. Man-in-the-middle C. Phishing D. Viruses |
C. Phishing
|
|
Which of the following is used to serve as an emergency backup line to
troubleshoot a broadband connection on many routers? A. VDSL B. DSL C. POTS D. Smart jack |
C. POTS
|
|
Which of the following network services replies to requests to port 67?
A. DNS B. DHCP C. SNMP D. IMAP |
B. DHCP
|
|
A technician is working on a SOHO wireless network and notices that the
wireless adapter in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adapter. Which of the following would BEST describe this connection speed? A. The laptop is too far away from the WAP. B. The WAP is using 802.11a frequencies. C. The laptop is only set to allow 802.11n connections. D. The technician is on an 802.11b network. |
D. The technician is on an 802.11b network.
|
|
An administrator is attempting to verify if a newly installed workstation
is connected to the network. Which of the following commands can be used to verify basic connectivity? A. ping B. hostname C. route D. dig |
A. ping
|
|
Two business partners have recently been connected via a dedicated
extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues? A. CIDR B. NAT C. Multicast D. PAT |
B. NAT
|
|
Which of the following devices limits the possibility of third-party
sniffing of traffic between hosts on a local network? A. Bridge B. Packet filter C. Layer 2 switch D. Protocol analyzer |
C. Layer 2 switch
|
|
A network technician has discovered from a bandwidth monitoring tool that
nearly 100% of a serial WAN link is being utilized. Which of the following would the technician MOST likely use in determining the type of traffic that is causing the excess traffic on the WAN link? A. Throughput tester B. Load tester C. TFTP D. Packet sniffer |
D. Packet sniffer
|
|
Which of the following protocols uses port 143 by default?
A. IMAP4 B. NTP C. SSH D. SNMP |
A. IMAP4
|
|
Which of the following protocols is used by a WAP to authenticate its
identity with a server on the domain? A. TKIP B. RADIUS C. CHAP D. MS-CHAP |
B. RADIUS
|
|
All of the following features require the need for a nearby power outlet
EXCEPT: A. port mirroring B. PPPoE C. PoE D. port trunking |
C. PoE
|
|
Which of the following features would BEST be used to optimize real-time
voice and video chat? (Select TWO). A. QoS B. Fault tolerance systems C. Caching engines D. Traffic shaping E. Load balancing |
A. QoS
D. Traffic shaping |
|
Which of the following troubleshooting steps should be performed NEXT after
a core router has been reported down? A. Test a solution B. Implement a solution. C. Identify all affected areas. D. Establish the outage cause. |
C. Identify all affected areas.
|
|
Which of the following connectors is MOST commonly associated with a
physical bus topology? A. RJ-45 B. SC C. RJ-11 D. BNC |
D. BNC
|
|
Which of the following devices is used to extend network coverage by
helping to maintain the signal quality of the original transmission? A. Switch B. Hub C. Repeater D. Modem |
C. Repeater
|
|
A technician needs to extend the telephone company's original point of
entry into the companies Telco closet. Which of the following will need to be extended? A. Smart jack B. 66 Block C. 110 Block D. Demarc |
D. Demarc
|
|
Which of the following statements is TRUE regarding static routing tables?
A. They are harder to maintain. B. They are used in large and complex networks. C. The update certain aspects automatically. D. They are easy to configure and maintain. |
A. They are harder to maintain.
|
|
A media converter is also known as a:
A. transceiver B. hub. C. modem. D. repeater. |
A. transceiver
|
|
Which of the following authenticates a person by a particular key pair?
A. EAP B. PKI C. RADIUS D. CHAP |
B. PKI
|
|
Which of the following OSI layers does a Layer 3 switch operate at? (Select
TWO). A. Presentation B. Network C. Transport D. Data link E. Session |
B. Network
D. Data link? |
|
Which of the following functions at Layer one of the OSI model?
A. Repeater B. Switch C. DHCP D. Load balancer |
A. Repeater
|
|
An administrator needs to view the routing table on a UNIX system. Which
of the following tools should be used? A. ifconfig B. traceroute C. netstat D. nslookup |
C. netstat
|
|
If cable is rated for 10GBaseT, how much theoretical bandwidth can this
cable provide in megabits per second (Mbps)? A. 100Mbps B. 10Mbps C. 10000Mbps D. 1000Mbps |
C. 10000Mbps
|
|
Which of the following is a device that sits inline on the network and
stops network attacks in real-time? A. PKI B. IDS C. VPN D. IPS |
D. IPS
|
|
FTP is commonly used to do which of the following?
A. Transfer files to a network drive B. Redirect URLs of a network device C. Send and receive emails D. Remotely manage servers |
A. Transfer files to a network drive
|
|
A software vendor wants to distribute free updates for clients via the web.
Which of the following protocols would be the MOST efficient to distribute the updates? A. SSH B. FTP C. DNS D. TLS |
B. FTP
|
|
A technician would use a logical network diagram to determine the number
of: A. Cables in the network. B. Users on the network. C. Broadcast domains on the network. D. Switches on the network. |
B. Broadcast domains on the network.
|
|
Which of the following commands would test the loopback adapter of an
internal NIC? A. ping 127.127.0.0 B. ping 127.0.0.1 C. ping 127.1.1.1 D. ping 127.127.1.0 |
B. ping 127.0.0.1
|
|
A technician moves a VOIP phone to a new location, but discovers the phone
does not start up when plugged into the network. Which of the following explains this situation? A. The switch does not support PoE. B. The phone needs a fiber port. C. QoS is not enabled on the switch. D. The jack needs to be rewired using the 568B standard. |
A. The switch does not support PoE.
|
|
An administrator wants to connect users at three branch offices to the main
office through the internet. Which of the following devices should the administrator install at the main office to BEST accomplish this goal? A. IPS sensor B. Proxy server C. VPN concentrator D. Layer 2 switch |
C. VPN concentrator
|
|
Which of the following mitigation techniques is the MOST effective to
defend against social engineering? A. Antivirus scanner B. User training C. Patch management solution D. Security and network policy revision |
B. User training
|
|
Which of the following is the default DNS port?
A. 143 B. 53 C. 23 D. 443 |
B. 53
|
|
Which of the following commands would MOST likely be used to list the
status of all established TCP connections on port 80? A. netstat -r B. netstat -v C. netstat -aupn D. netstat -at E. netstat -p tcp |
E. netstat -p tcp
|
|
An administrator replaced a router with a switch. End users are able to
access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet? A. Router routes traffic between different networks and a switch does not. B. The switch needs to be setup to forward data traffic to the Internet. C. The firewall needs to be setup to allow traffic to reach the Internet. D. The new switch is faulty and needs to be replaced and configured correctly. |
A. Router routes traffic between different networks and a switch does not.
|
|
filtering?
A. Presentation B. Application C. Session D. Network |
B. Application
|
|
Which of the following is the term used to describe the aggregation of
multiple components to form one logical component? A. Bonding B. CSMA/CD C. Circuit switching D. Channelization |
A. Bonding
|
|
Which of the following uses a certificate for a tunneling connection?
A. PPTP B. SSL VPN C. VNC D. RDP |
B. SSL VPN
|
|
Frames are found within which of the following layers of the OSI model?
A. Layer 1 B. Layer 3 C. Layer 2 D. Layer 5 |
C. Layer 2
|
|
Which of the following ports is associated with FTP?
A. 20 B. 53 C. 3389 D. 23 |
A. 20
|
|
Which of the following tools would an administrator use to record and
display data passing through the network? A. Event recorder B. Toner probe C. TDR D. Protocol analyzer |
D. Protocol analyzer
|
|
A network engineer is creating a way to access several servers through the
Internet. Which of the following will accomplish this? A. Configure dynamic private IP addressing for each server. B. Assign a static private IP address to each server. C. Assign a static public IP address to each server. D. Configure dynamic public IP addressing for each server. |
C. Assign a static public IP address to each server.
|
|
Which of the following replaces the destination IP address of a packet?
A. SNAT B. NAT C. DNS D. DHCP |
A. SNAT
|
|
Which of the following describes a routing table that needs to be
maintained manually? A. Static B. Link-state C. Dynamic D. Hop count based |
A. Static
|
|
A user receives an email that asks for a username and password and appears
to be from a bank. Which of the following attacks may be occurring? A. Man in the middle B. Phishing C. Worm D. ARP spoofing |
B. Phishing
|
|
A technician is troubleshooting a network connectivity issue. Given the
following abbreviated traceroute output: 1 192.168.1.1 2 172.16.40.1 3 10.4.0.1 4 172.16.40.1 Which of the following is MOST likely occuring? A. IP conflict B. Broadcast storm C. Switching loop D. Routing loop |
D. Routing loop
|
|
Which of the following logical network topologies is MOST likely to use the
IPSec protocol? A. VLAN B. VPN C. Peer-to-peer network D. VTP domain |
B. VPN
|
|
Which of the following allows and administrator to view malicious activity
after it has taken place? A. IDS B. IPS C. Packet sniffer D. Port scanner |
A. IDS
|
|
A user reports being occasionally disconnected from the server. Which of
the following tools could the technician use to determine if it is the client or the server that is dropping the connection? A. Packet sniffer B. Throughput tester C. Load balancer D. Multimeter |
A. Packet sniffer
|
|
An administrator is planning a new wireless network by using only channels
1, 6, and 11. This is to minimize which of the following? A. Attenuation B. Interference C. Reflection D. Broadcast storms |
B. Interference
|
|
Which of the following protocols is used to establish multicast groups?
A. OSPF B. DHCP C. RIP D. IGMP |
D. IGMP
|
|
Which of the following is intended to be used over existing SONET
equipment? A. 10GBaseLR B. 10GBaseEW C. 10GBaseER D. 1000BaseT |
B. 10GBaseEW
|
|
Which of the following is the MOST common collision detection technique
used by an Ethernet switch? A. CSMA/CA B. 802.11a RTS C. Bonding D. CSMA/CD |
D. CSMA/CD
|
|
Which of the following networks would MOST likely require EGP routing?
A. Networks with classless Internet domain routing B. Networks that use OSPF in addition to static rotues C. Networks that use encryption D. Networks with multiple ISPs |
D. Networks with multiple ISPs
|
|
Which of the following cables would a technician use to connect two
switches together? A. Crossover B. 568B C. Loopback D. 568A |
A. Crossover
|
|
Which of the following protocols can be found at the application layer?
A. Telnet B. UDP C. TCP D. SNMP |
A. Telnet
|
|
Which of the following describes 1Gigabit Ethernet?
A. 10Base2 B. 10GBaseER C. 100Base5 D. 1000BaseT |
D. 1000BaseT
|
|
Which of the following is a dynamic routing protocol?
A. CIDR B. SNAT C. OSPF D. SCTP |
C. OSPF
|
|
Which of the following could be used to check network connectivity on a
workstation? A. Toner probe B. Temperature monitor C. Cable tester D. Voltage meter |
C. Cable tester
|
|
Which of the following would be used to capture data moving across the
network? A. Throughput tester B. Spanning tree C. Packet sniffer D. Load balancer |
C. Packet sniffer
|
|
An administrator needs to diagnose problems with a WINS server. Which of
the following tools should be used? A. nslookup B. netstat C. nbtstat D. dig |
C. nbtstat
|
|
Which of the following would an administrator MOST likely require in order
to connect a client to a WPA encrypted network? A. Pre-shared key B. SSID C. DSA public key D. Gateway address E. PIN |
A. Pre-shared key
|
|
A network engineer is logged onto a router and attempts to ping a host from
the router. The first set of ping packets has a 25% success rate. Several subsequent ping attempts all have a 100% success rate. Which of the following describes the MOST likely reason? A. Intermittent issues are present caused by faulty network cabling B. Network denial of service attack is present C. Router was still attempting to learn ARP address D. Firewall was initially blocking the ping attempts. |
C. Router was still attempting to learn ARP address
|
|
Which of the following protocols uses a three-way handshake process before
establishing a connection? A. DNS B. TFTP C. UDP D. TCP |
D. TCP
|
|
A network has four switches; each switch has a physical link to all other
switches. Which of the following topologies is being used? A. Star B. Mesh C. Point-to-multipoint D. Ring |
B. Mesh
|
|
Which of the following is a VLAN trunking protocol standard?
A. 802.1x B. 802.3 C. 802.1q D. 802.11 |
C. 802.1q
|
|
Which of the following would be used to identify the hot zone in a server
room? A. Cable stripper B. Temperature monitor C. OTDR D. Voltage event monitor |
B. Temperature monitor
|
|
Which of the following will separate broadcast domains by default?
A. Layer 2 switch B. Repeater C. Router D. Hub |
C. Router
|
|
A link light on a switch is an example of which of the following Ethernet
properties? A. Collision detection B. Collision avoidance C. Multiple access points D. Carrier sense |
D. Carrier sense
|
|
A technician arrives at a site and is troubleshooting an unfamiliar
network. Which of the following steps should be done FIRST to diagnose the problem? A. Compare wiring schematics to industry standards. B. Escalate the problem to administrative technician. C. Identify symptoms and draw a network diagram. D. Use a port analyzer to determine network topology. |
C. Identify symptoms and draw a network diagram.
|
|
In order for computers with private IP addresses to access the public
Internet, which of the following must the router perform? A. DHCP B. APIPA C. BGP D. NAT |
D. NAT
|
|
An administrator would like to monitor the network to evaluate which
employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used? A. Throughput testing B. Stateful packet inspection C. Load balancing D. Packet sniffing |
D. Packet sniffing
|
|
A company has recently received a new ADSL backup Internet connection.
Which of the following will MOST likely be used between the modem and the ISP? A. RAS B. MSCHAP C. PPPoE D. IPSec |
C. PPPoE
|
|
Which of the following technologies was designed to provide the FASTEST
data rates over analog phone lines? A. MPLS B. RADSL C. SONET D. ADSL |
D. ADSL
|
|
An administrator is configuring IP 10.178.1.5 on a legacy device that will
only accept a classful address. Which of the following is the address that can be used in this scenario? A. 10.178.1.5/30 B. 10.178.1.5/16 C. 10.178.1.5/1 D. 10.178.1.5/8 |
D. 10.178.1.5/8
|
|
Which of the following is true of an ACL when a packet matching an ACE is
found? A. The matching ACE is processed and then the last ACE is examined. B. The matching ACE is processed and then the next ACE is examined. C. The matching ACE is processed and the next packet is examined. D. the matching ACE is skipped to allow all other ACEs to be examined. |
C. The matching ACE is processed and the next packet is examined.
|
|
Which of the following is the MOST accurate description of a L2/L3 switch?
A. A switch that directly connects to a router B. A router that directly connects to a switch C. A multi-purpose switch fabric used in full mesh environments D. Performs switching and routing duties |
D. Performs switching and routing duties
|
|
Which of the following features enables a firewall to inspect a packet
based on connection status? A. Signature identification B. Stateless inspection C. Port forwarding D. Stateful inspection |
D. Stateful inspection
|
|
Which of the following would contain information regarding network device
alerts using SNMP? A. Audit log B. Syslog C. Ping sweep reports D. History log |
B. Syslog
|
|
Which of the following describes how original network diagrams contained
in the documentation should be maintained? A. Used as a point-in-time reference but never relied upon B. Used only to satisfy a network upgrade checklist requirement C. Regular audits to ensure that diagrams remain accurate D. Considered to be the only source-of-truth of the network state |
C. Regular audits to ensure that diagrams remain accurate
|
|
A technician has been monitoring network performance of the distribution
hubs. It appears that many collisions are occurring during working hours. Which of the following is the BEST approach to resolve these collisions? A. Replace hubs with switches B. Replace hubs with repeaters C. Upgrade the hubs to 10GB D. Implement time of day restrictions |
A. Replace hubs with switches
|
|
Which of the following describes the location where an administrator would
terminate a bundle of CAT5e cables? A. Smart jack B. Patch panel C. Switch D. Router |
B. Patch panel
|
|
Which of the following technologies has the LARGEST bandwidth capacity?
A. SDSL B. ADSL C. OC3 D. OC12 |
D. OC12
|
|
Which of the following ports are associated with email protocols by
default? (Select TWO) A. 123 B. 22 C. 25 D. 110 E. 161 |
C. 25
D. 110 |
|
Which of the following devices only monitors traffic being sent to a host?
A. IPS B. Firewall C. IDS D. Proxy server |
C. IDS
|
|
When pinging the default gateway there is a 40% packet loss. Which of the
following MOST likely explains this situation? A. Pins 1 and 3 are open B. Incorrect subnet mask C. Duplex mismatch D. Incorrect VLAN |
C. Duplex mismatch
|
|
Which of the following wiring distribution components uses a bridge clip to
connect both sides of the block? A. Smart jack B. Demarc C. 66 block D. 110 block |
C. 66 block
|
|
After receiving network problem reports from users, the technician notices
that the router is rebooting itself several times a day. Which of the following would the technician do NEXT to further diagnose this problem? A. Replace the router's memory and CPU. B. Test the router's connection with a throughput tester. C. Review the router's event logs D. Install redundant network connections to the router |
C. Review the router's event logs
|
|
An administrator can ping a server, but is unable to SSH to it. Which of
the following is the MOST likely cause of this? A. The default gateway on the server is incorrect. B. An IDS device prevents SSH connections. C. The subnet mask on the client is incorrect. D. A host-based firewall prevents SSH connections. |
D. A host-based firewall prevents SSH connections.
|
|
Which of the following is a secure replacement for telnet console
connections? A. TLS B. SSH C. HTTPS D. SIP |
B. SSH
|
|
Which of the following cable types is MOST likely to have LC connectors?
A. Category 6 cable B. Shielded twisted pair C. RG-6 D. Multimode fiber |
D. Multimode fiber
|
|
Which of the following allows a technician to mask a private network of IP
addresses behind one public IP address? A. DHCP B. DNS C. Subnetting D. NAT |
D. NAT
|
|
Which of the following is used to terminate CAT5e cable on the 110 block?
A. Punch down tool B. Cable stripper C. Cable tester D. Snips |
A. Punch down tool
|
|
An administrator has replaced a faulty 1000BaseT NIC on the server switch
with a new 1000BaseFX. Which of the following should the administrator do NEXT? A. Update the wiring schematics B. Update the switch configuration logs C. Reboot the switch to enable the new connection D. Update the logical network diagram |
A. Update the wiring schematics
|
|
In which of the following would a technician need to use a punch down tool
in order to end a cable? A. to terminate a fiber connection in an IDF B. To connect a patch cable to a wall jack C. To terminate a rollover cable to a network device D. To terminate cable into a patch panel |
B. To connect a patch cable to a wall jack
|
|
Which of the following BEST describes a beacon in a wireless network?
A. A type of web cookie that manages session. B. A token ring frame indicating a serious network problem. C. A device that amplifies a signal to broadcast SSIDs. D. A frame that contains AP parameters, such as SSID and rates. |
D. A frame that contains AP parameters, such as SSID and rates.
|
|
A new LAN switch is installed with on fiber ports. Which of the following
would a technician need on the new switch to allow compatibility to the existing fiber network? A. Repeater B. Router C. Hub D. Media converter |
D. Media converter
|
|
VLANs occur at which of the following layers of the OSI model?
A. 2 B. 3 C. 4 D. 1 |
A. 2
|
|
Which of the following commands is used to track the path a packet takes to get to its destination?
A. nbtstat B. traceroute C. ifconfig D. nslookup |
B. traceroute
|
|
Which of the following is the MAIN disadvantage of using the spanning tree protocol?
A. It only runs at Layer 3 B. Convergence takes too long. C. The root port must have gigabit speeds. D. It is a vendor specific protocol. |
B. Convergence takes too long.
|
|
Which of the following features of a switch allows all VLANs to pass through the same port?
A. Port mirroring B. Trunking C. PoE D. Spanning tree |
B. Trunking
|
|
Which of the following protocols could be used in a peer-to-peer topology?
A. RADIUS B. NetBIOS C. IGMP D. TACACS+ |
C. IGMP
|
|
The primary purpose of an IPS is which of the following?
A. Stop or log intrusions B. Relay wireless traffic C. Detect or route packets D. Route internal network traffic |
A. Stop or log intrusions
|
|
Which of the following Internet connection types uses a POTS line?
A. Cable B. Dial-up C. Fiber D. Satellite |
B. Dial-up
|
|
Interior gateway protocols are used for resolving routes:
A. within networks. B. between WAPs. C. between networks. D. within routers. |
A. within networks.
|
|
Which of the following can be used to record and save VoIP conversations?
A. Port scanner B. Packet sniffer C. IDS D. Banner grabber |
B. Packet sniffer
|
|
Which of the following cables can be a UTP cable?
A. Fiber B. RG-6 C. CAT6 D. RG-59 |
C. CAT6
|
|
Where does the responsibility for maintenance and support shift from the telecommunication company
to the customer? A. Demarc B. Where the telecommunication lines enter the building C. Central office D. Smart jack |
A. Demarc
|
|
Which of the following would a technician set up for a building within a campus?
A. MDF B. EMI C. IDF D. ESD |
C. IDF
|
|
After adding a new cable segment to the network, the technician should:
A. Update the wiring schematics. B. Create a new baseline document. C. Document the changes in the business continuity plan. D. Update the disaster recovery plan. |
A. Update the wiring schematics.
|
|
Where would a technician MOST likely place the company MX and A records?
A. Firewall B. Proxy server C. DNS server D. Load balancer |
C. DNS server
|
|
Which of the following would MOST likely contain information about unlabeled datacenter
connections? A. Emergency call list B. Procedures manual C. Logical network diagram D. Wiring schematic |
D. Wiring schematic
|
|
When no specific route to a destination exists, a router will fallback to its
A. BGP peer. B. default gateway. C. source host. D. shortest path. |
B. default gateway.
|
|
Web users are reporting issues downloading various types of media. Which of the following should the
administrator do FIRST? A. Continue to gather information and see what other problems may exist. B. Create an action plan and solution identifying potential effects. C. Determine the most probable cause. D. Find out what has recently changed on the network. |
A. Continue to gather information and see what other problems may exist.
|
|
Which of the following protocols functions at the transport layer of the OSI model?
A. RTP B. SIP C. UDP D. TCP |
C. UDP
D. TCP |
|
Which of the following ports will allow a technician to transfer configuration data to a network switch?
A. 3359 B. 110 C. 389 D. 69 |
D. 69
|
|
Which of the following is encrypted when IPSec operates in tunnel mode? (Select TWO)
A. Source MAC address B. IP address of the tunnel termination points C. Destination MAC address D. Payload information E. Header information |
D. Payload information
E. Header information |
|
A new company has been given one public IP address. The company employs 200 users requiring
Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees? A. Proxy server B. NAT C. Multicasting D. Subnetting |
B. NAT
|
|
Which of the following protocols has similar functionality to Telnet but operates more securely than
Telnet? A. RSH B. SNAT C. SSH D. TFTP |
C. SSH
|
|
Which of the following requires the pin-outs to be the same on both ends of a cable?
A. Straight B. Rollover C. Loopback D. Crossover |
A. Straight
|
|
When a device wants to send a packet over the network, the process of listening to the network media
to see whether any other packets are sent is called: A. multiple access points. B. carrier sense. C. media access control. D. collision avoidance. |
B. carrier sense.
|
|
Which of the following network devices commonly uses OSPF?
A. Layer 2 switch B. Firewall C. Repeater D. Router |
D. Router
|
|
Which of the following commands is used to display other computers running on the network?
A. net view B. ipconfig C. nslookup D. hostname |
A. net view
|
|
Which of the following would MOST likely be used with multimode fiber?
A. 10GBaseT B. 10GBaseSR C. 10GBaseER D. 10GBaseLR |
B. 10GBaseSR
|
|
A company finished deploying an 802.11g wireless mesh. The administrator receives a call from a user
who is unable to connect to the company wireless, though all network configurations are centrally managed. Which of the following is MOST likely causing the connection problem? A. The end user is using an 802.11b/g wireless card. B. The end user is using an 802.11a wireless card. C. The access point has omni-directional antennas. D. The access point is not broadcasting the SSID. |
B. The end user is using an 802.11a wireless card.
|
|
Which of the following is the purpose of QoS?
A. Load balance traffic across multiple LAN and WAN links. B. Classify, mark and prioritize traffic on WAN and LAN links. C. Guarantee traffic delivery. D. Increase speed of network traffic. |
B. Classify, mark and prioritize traffic on WAN and LAN links.
|
|
A technician replaces a hub with a network switch. Multiple users notice that traffic congestion has
lessened substantially. Which of the following was MOST likely causing the network congestion? A. Crosstalk B. Attenuation C. Signal bleed D. Collisions |
D. Collisions
|
|
Which of the following describes the ICMP protocol?
A. Layer 4 protocol B. TCP protocol C. Layer 3 protocol D. UDP protocol |
C. Layer 3 protocol
|
|
If the goal is to minimize the amount of time it takes for other routers in the network to learn about a
routing change, the network administrator should choose a routing protocol that has the shortest: A. convergence. B. link state. C. path. D. multipath. |
A. convergence.
|
|
Which of the following DNS record types is used for IPv6 host address mappings?
A. CNAME B. AAAA C. SRV D. PRT |
B. AAAA
|
|
Users from different locations are reporting issues with various intranet sites. After identifying all the
affected areas, which of the following should a technician do NEXT? A. Determine what has recently changed. B. Establish the most probably cause. C. Create an action plan and solution identifying potential effects. D. Continue to identify new symptoms and problems elsewhere. |
A. Determine what has recently changed.
|
|
Which of the following OSI model layers is the session layer?
A. Layer 5 B. Layer 1 C. Layer 6 D. Layer 7 |
A. Layer 5
|
|
All of the following are valid subnet masks EXCEPT:
A. 255.255.0.0 B. 255.255.255.0 C. 255.255.240.0 D. 255.255.253.0 |
D. 255.255.253.0
|
|
In which of the following components will POTS lines MOST likely be terminated?
A. Hub B. Switch C. Patch panel D. 110 block |
D. 110 block
|
|
Which of the following can be configured on a WAP to authenticate users and place them onto the right
VLAN? A. Trunking B. 802.1q C. 802.1x D. AAA |
C. 802.1x
|
|
Which of the following cable types have a maximum recommended cable length of 100 meters (328
feet)? A. Fiber B. Coaxial C. Ethernet D. Serial |
C. Ethernet
|
|
A user has reported slow network response in a large training room; the class requires many students to
access the same website each day. Which of the following would BEST remedy this problem? A. Firewall B. Caching engine C. Jitter correction D. Fault tolerance |
B. Caching engine
|
|
Which of the following Internet technologies would provide the GREATEST bandwidth?
A. T3 B. OC3 C. Cable D. T1 |
B. OC3
|
|
Which of the following would MOST likely be used to punch down LAN cables before connecting
them to the main switch? A. 110 block B. MDF C. 66 block D. IDF |
A. 110 block
|
|
Which of the following helps network traffic optimization by remembering where each computer is
connected? A. Firewall B. VLAN C. Switch D. Network analyzer |
C. Switch
|
|
An application layer firewall is MOST beneficial when used with which of the following protocols?
A. GRE B. VoIP C. HTTP D. SNMP |
D. SNMP
|
|
Which of the following would an administrator MOST likely use to forward inbound packets on port
80 to port 8080 on a local server? A. Repeater B. Firewall C. Packet shaper D. Bridge |
B. Firewall
|
|
Multiple uses call from the same location saying that they have no network connectivity. The
administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the adminsitrator MOST likely consult to troubleshoot the issue? A. Physical network diagram B. Baseline configuration C. Performance and transaction logs D. Security policy |
A. Physical network diagram
|
|
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a
technician do NEXT? A. Determine if anything else has changed. B. Identify the affected areas. C. Escalate part of the solution to the appropriate section. D. Create an action plan. |
B. Identify the affected areas.
|
|
Which of the following LAN technologies has the GREATEST length segmentation limit?
A. 100BaseFX B. 1000BaseT C. 10BaseF D. 100BaseTX |
C. 10BaseF
|
|
Users are reporting problems connecting to servers in the remote company.com domain. The
administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com? A. dig company.com mx B. ifconfig -a C. dig company.com ns D. ipconfig /all |
C. dig company.com ns
|
|
A NIC capable of utilizing 'auto-sense' for a given connection is actually configuring which settings
dynamically on its own? (Select TWO) A. Link latency B. Cable type C. MAC address D. Link speed E. Link duplex |
D. Link speed
E. Link duplex |
|
Which of the following devices can be configured to block ports?
A. DHCP server B. Basic firewall C. Content filter D. Hub |
B. Basic firewall
|
|
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty
NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem? A. Physical and logical network B. Physical network C. DHCP tables and DNS records D. Logical network |
A. Physical and logical network
|
|
Using 802.1x on a switch accomplishes which of the following?
A. Port trunking B. Port mirroring C. Port spanning D. Port authentication |
D. Port authentication
|
|
Which of the following does not affect security on a wireless access point?
A. SSID B. DHCP C. Encryption D. Password |
B. DHCP
|
|
A technician is installing new LAN lines into a company's new office space. Which of the following is
the termination point for each new run? A. Patch panel B. Demarc C. 66 Block D. Smart Jack |
A. Patch panel
|
|
A private AS number is useful in which of the following situations?
A. Enterprise network without redundant links B. Isolated network at a single site C. Internet multihoming with all ISPs in same BGP area D. Internet multihoming with multiple carriers |
C. Internet multihoming with all ISPs in same BGP area
|
|
Which of the following is an example of an IPv4 address?
A. 1A-23-F9-CD-06-9B B. 10:0:10:1 C. 10.0.10.1 D. 100.101.100 |
C. 10.0.10.1
|
|
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected
computer is on the network and checks if a node is saturating the network. Which of the following tools should be utilized in this situation? A. Multimeter B. IGMP C. Port scanner D. Protocol analyzer |
D. Protocol analyzer
|
|
Which of the following can be used by web developers to remotely and securely update content on a
website? A. SNMP B. SFTP C. FTP D. RCP |
B. SFTP
|
|
To ensure that VoIP phones are provided with power without using independent power supplies,
switches on the network must have which of the following features? A. Spanning tree B. VLAN tagging C. PoE D. PPPoE |
C. PoE
|
|
Which of the following is the BEST device to use in order to implement a VLAN on the network?
A. Proxy server B. VPN C. VNC D. Switch |
D. Switch
|
|
Which of the following specialized network devices is used to authenticate users to the web and blocks
certain websites from being accessed? A. DNS server B. Proxy server C. CSU/DSU D. IDS |
B. Proxy server
|
|
In which of the following topologies could the failure of one machine cause the entire network to stop
functioning? A. Token ring B. Star C. Mesh D. Spanning tree |
A. Token ring
|
|
Which of the following technologies can prevent a department's network broadcast from propagating to
another department's network if they are located on the same switch? A. A VLAN B. A hub C. A trunk D. A firewall |
A. A VLAN
|
|
An administrator wants to provide redundant paths to network resources in case a link fails. Which of
the following switch features would the administrator need to use to accomplish this task? A. Trunking B. Spanning tree C. VLAN D. PoE |
B. Spanning tree
|
|
Which of the following is the BEST reason for implementing QoS?
A. To implement a network security policy B. To minimize network delays for real-time traffic C. To prevent peer to peer network traffic from being delivered D. To provide fault tolerance by using load balancing |
B. To minimize network delays for real-time traffic
|
|
Which of the following describes an attack where all TCP flags are enabled on a packet?
A. DDos B. Xmas attack C. Smurf attack D. DoS |
B. Xmas attack
|
|
A technician is using a packet sniffer to identify a server. The technician observes the following
network traffic: HOST-A TCP 80 -> HOST-B TCP 1328 PUSH HOST-B TCP 1328 -> HOST-A TCP 80 PUSH ACK HOST-A UDP 69 -> HOST C UDP 1235 HOST-C ICMP -> HOST-D ICMP Which of the following is MOST likely to be the server? A. HOST-C B. HOST-A C. HOST-B D. HOST-D |
B. HOST-A
|
|
Which of the following would be used to determine if near end crosstalk occurs?
A. Cable tester B. Toner probe C. Protocol analyzer D. Multimeter |
A. Cable tester
|
|
Which of the following network protocols can be used to keep the network device clocks
synchronized? A. RTP B. SMTP C. NTP D. SNMP |
C. NTP
|
|
A technician would like to separate the HR department's workstations from the other workstations at
the company. Which of the following network topologies should be used? A. VPN B. VLAN C. Subnetting D. Peer to peer |
B. VLAN
|
|
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a
cable to plug their laptop into the router in order to be able to console into it. Which of the following would the administrator need to make this connection? A. Loopback B. 568B C. Crossover D. Rollover |
D. Rollover
|
|
Which of the following is a best practice when implementing a basic wireless network?
A. Configuring encryption with a WEP key and labeling the key on the WAP B. Not configuring the ESSID point C. Disabling ESSID broadcast D. Adding two access points per area of service |
C. Disabling ESSID broadcast
|
|
Which of the following commands can be used to add a default gateway to a host?
A. traceroute - d 192.168.1.1 B. ping -s 192.168.1.1 C. ifconfig eth0 192.168.1.1 255.255.255.0 D. route add 0.0.0.0 gw 192.168.1.1 |
D. route add 0.0.0.0 gw 192.168.1.1
|
|
Which of the following protocols is responsible for the delivery of email from server to server?
A. IMAP B. SNMP C. POP3 D. SMTP |
D. SMTP
|
|
Which of the following protocols is typically used for VoIP solutions?
A. SSH B. RTP C. TLS D. IGMP |
B. RTP
|
|
Which of the following provides encrypted KVM console access to remote computers?
A. RAS B. PPP C. RDP D. VPN |
C. RDP
|
|
After troubleshooting a network problem, a technician determines that the problem is not on the local
network but exists on the ISP network. Which of the following should the technician do NEXT? A. Escalate the problem to the ISP for resolution B. Report the ISP to the IANA. C. Visit the ISP data center and reboot the router. D. Switch the Internet connection to a new ISP. |
A. Escalate the problem to the ISP for resolution.
|
|
Which of the following activities will not be possible if the gateway IP address is set incorrectly on a
client's machines? A. Pinging a remote computer B. Printing over a local network C. Sharing local network files D Sniffing the network traffic |
A. Pinging a remote computer
|
|
Which of the following is a direct advantage of having wireless standards?
A. Increased number of protocols can be used B. Greater device security C. Increased use of wireless spectrum D. Interoperability between devices |
D. Interoperability between devices
|
|
CAT5e cable running to a network closet should always be
A. punched down on a 66 block B. placed in a separate VLAN. C. spliced into a 100-pair cable. D. terminated in a patch panel. |
D. terminated in a patch panel.
|
|
Which of the following would be used when designing a climate controlled room?
A. Voltage event recorder B. Temperature monitor C. Multimeter D. HVAC |
B. Temperature monitor
|
|
Which of the following can be configured to logically group ports into different subnets on a switch?
A. VTP B. VLAN C. VTY D. VPN |
B. VLAN
|
|
Which of the following is inversely proportional to a wireless client connection speed?
A. Frequency of the access point B. ESSID length on the access point C. Encryption of the connection D. Distance from the access point |
D. Distance from the access point
|
|
A technician needs ton ensure that the IP of the DHCP enabled workstation will never change. Which
of the following can be implemented on the DHCP server to accomplish this requirement? A. Reservation B. Request C. Option D. Offer |
A. Reservation
|
|
An administrator needs to extend the wireless coverage inside of the company's office space. Which of
the following devices would MOST likely be installed to allow this extension? A. Repeater B. Firewall C. Switch D. Router |
A. Repeater
|
|
Which of the following documents should always be kept up-to-date after any major changes are made
to a network backbone? A. Network diagram B. Network security procedure C. Company policy D. Performance baseline |
A. Network diagram
|
|
Which of the following are commonly used FTP ports? (Select TWO)
A. 22 B. 23 C. 20 D. 21 E. 25 |
C. 20
D. 21 |
|
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant. B. autonomous. C. converged. D. vectored. |
C. converged.
|
|
Which of the following is the MOST widely used VoIP protocol?
A. SIP B. IAX C. SCTP D. H.264 |
A. SIP
|
|
Which of the following connector types is commonly identified by two rows of pins with four in one
row and five in the other? A. SC B. DB-9 C. RJ-45 D. BNC |
B. DB-9
|
|
Which of the following address formats uses 32-bit addressing?
A. IPv6 B. IPv4 C. Host address D. MAC address |
B. IPv4
|
|
Which of the following is the MOST important factor to ensure wireless connectivity?
A. Centralized device management B. Installing WPA C. AP placement D. Wireless encryption |
C. AP placement
|
|
An administrator monitors the performance of a network and router and wants to determine if the
traffic load is greater than normal. Which of the following should the administrator do to discover this? A. Clear the interface buffers and reset packet counts. B. Compare current information with the router baseline. C. Review the logical network diagram for default connection speeds. D. Perform interface stress tests to see if performance is degraded. |
B. Compare current information with the router baseline.
|
|
Which of the following is the MOST appropriate tool for detecting the enabled network services in the
default install of an operating system? A. Intrusion detection software B. Honeypot C. Port scanner D. Packet sniffer |
C. Port scanner
|
|
A network sniffer has been set up on a switch port in an attempt to monitor traffic from another switch
port. Which of the following technologies would allow this to work in a switched network? A. VLANs B. Port mirroring C. Port trunking D. Spanning tree |
B. Port mirroring
|
|
A user's web browser begins displaying SSL certificates mismatch warnings. Which of the following
attacks may be occurring? A. Man in the middle B. Smurf C. Denial of service D. Password hijacking |
A. Man in the middle
|
|
Which of the following routing protocols runs over UDP and determines path based upon distance
vectors? A. RIP B. BGP C. OSPF D. IS-IS |
A. RIP
|
|
An administrator wants to be alerted when a network-based attack is underway, but the company policy
prohibits blocking or dropping network connections. Which of the following MUST be deployed? A. Firewall B. IPS C. Managed PKI D. IDS |
D. IDS
|
|
Which of the following is a secure method for administering a network device?
A. FTP B. TFTP C. SIP D. SNMPv3 |
D. SNMPv3
|
|
A long fiber optic segment has failed. A network technician suspects a broken cable. Which of the
following tools can be utilized to help determine where the cable break has occurred? A. TDR B. Toner probe C. Multimeter D. OTDR |
D. OTDR
|
|
An administrator is at a client's site to figure out an intermittent network problem. Which of the
following is the FIRST step in the troubleshooting methodology that should be performed? A. Create and action plan and solution identifying potential effects. B. Identify the affected areas of the network. C. Gather information. D. Implement and test the solution. |
C. Gather information.
|
|
Which of the following cables would be used to transfer data from one computer to another if both
computers are directly connected to each other? A. Crossover B. Patch C. Loopback D. Rollover |
A. Crossover
|
|
An administrator has added four switches to a campus network. Each switch is connected to all other
switches. Which of the following topologies is represented in this design? A. Star B. Mesh C. Ring D. Bus |
B. Mesh
|
|
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
A. 802.11n B. 802.11a C. 802.11b D. 802.11g |
A. 802.11n
|
|
Which of the following BEST describes a late collision?
A. It does not have as much affect on the network as does a regular collision. B. It occurs when the speeds are mismatched. C. It occurs after the first 64 bytes of the frame are transmitted. D. It can only occur after a regular collision has occurred. |
C. It occurs after the first 64 bytes of the frame are transmitted.
|
|
An administrator reports to work in the morning to find that all of the company's computers have not
received the nightly updates. Which of the following should the administrator check FIRST to determine the issue? A. Wiring schematic B. Acceptable use policy C. Error logs D. Session logs |
C. Error logs
|
|
Which of the following is a secure way to transfer files from one device to another?
A. TFTP B. SFTP C. SNMPv3 D. FTP |
B. SFTP
|
|
Which of the following cabling types should be used with 100BaseTX?
A. Coaxial B. Fiber C. Token ring D. UTP |
D. UTP
|
|
A Linux user is reporting trouble accessing the Internet. After verifying that the workstation is
authenticated to the domain, which of the following should the administrator perform FIRST on the Linux workstation? A. nslookup B. ifconfig C. ipconfig D. dig |
D. dig
|
|
An administrator has configured two hosts as follows:
HOST A IP 192.168.3.100 NETMASK 255.255.254.0 GATEWAY 192.168.2.1 HOST B IP 192.168.1.200 NETMASK 255.255.254.0 GATEWAY 192.168.2.1 Which of the following MUST be changed in order to allow HOST A to talk to HOST B? A. HOST A netmask to 255.255.255.0 B. HOST B netmask to 255.255.252.0 C. HOST B IP address to 192.168.2.200 D. HOST A IP address to 192.168.2.100 |
C. HOST B IP address to 192.168.2.200
|
|
Which of the following allows TCP/IP packets to be analyzed for possible threats?
A. IDS B. DNS server C. Proxy server D. CSU |
A. IDS
|
|
Which of the following exchanges routing information between two autonomous systems?
A. OSPF B. IGP C. EIGRP D. EGP |
D. EGP
|
|
Which of the following would hep a new administrator quickly determine if a network had a DMZ for
its publicly accessible servers? A. Wiring schematics B. Baselines C. Regulations D. Logical network diagrams |
D. Logical network diagrams
|
|
An administrator is troubleshooting a communication issue between two computers on the same Layer
2 switch. Which of the following is the BEST way to determine if the switch is causing the issue? A. Setup an ACL that allows and logs all IP traffic between the two computers B. Setup a span port on the switch to watch for CRC errors C. Configure a spanning tree to check for a loop D. Connect both computers using a crossover cable |
D. Connect both computers using a crossover cable
|
|
Which of the following WAN types uses a ring topology? (Select TWO)
A. Efl`1 B. Frame relay C. FDDI D. ATM E. SONET |
C. FDDI
E. SONET |
|
Which of the following IP addresses is a private IP address?
A. 11.100.101.1 B. 192.166.100.1 C. 192.186.200.221 D. 172.22.254.254 |
D. 172.22.254.254
|
|
An administrator receives a contract for a server install at a new building. Which of the following
should be completed after installing the server? A. Review the evacuation procedures B. Test the air temperature C. Log the administrator password used D. Update the network diagram |
D. Update the network diagram
|
|
Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic? A. Hub B. Repeater C. Switch D. Modem |
A. Hub
|
|
The technician needs to add a third device to an existing /30 network. Which of the following explains
how this can be achieved? A. The network should be subnetted to a /29. B. The third device can use the broadcast address. C. Configure ARP spoofing on the third device. D. A repeater should be installed for the third device. |
A. The network should be subnetted to a /29.
|
|
When working on a router problem, the technician learns that this problem has been reoccurring.
Which of the following should the technician consult to identify the past technicians that worked on the problem? A. Network policy B. ACL C. Baseline configuration D. Job logs |
D. Job logs
|
|
An Ethernet hub and an Ethernet switch both operate at which of the following layers of the OSI
model? A. Layer 1 B. Layer 3 C. Layer 2 D. Layer 7 |
C. Layer 2
|
|
A newly created patch cable is not working. The technical notices that the cable has two wires that are
crossed, which of the following connectivity issues is occuring? A. Collision B. Attenuation C. Open pairs D. A short |
D. A short
|
|
Which of the following is a correct IP ACL? (Select TWO)
A. DROP 00-12-34-56-78-9A B. PERMIT 192.168.1.100 80 C. PERMIT 192.268.20.1 D. DENY ANY ANY E. DENY 0:::0:::0:::3 |
B. PERMIT 192.168.1.100 80
D. DENY ANY ANY |
|
A LAN support team is installing new cables when all networked applications slow and then stop
working. Switches in the server room show all connected ports at 100% activity. Which of the following has MOST likely occured? A. Cable run has a break B. Switching loop C. New switch port is in wrong VLAN. D. Cable run has a short |
B. Switching loop
|
|
The IP address 10.4.5.12 is on the same subnet as 10.4.7.192. Which of the following is MOST likely
the network address and subnet mask? A. 10.4.5.0/25 B. 10.4.7.0/32 C. 10.4.4.0/22 D. 10.4.5.0/23 |
C. 10.4.4.0/22
|
|
Which of the following configuration management documents would an administrator use to configure
a new router's ACL for a new network? A. Logical network diagram B. Router history and log information C. Wiring schematics D. Network procedures and configurations |
D. Network procedures and configurations
|
|
An administrator has just completed installing a virtual proxy server. Which of the following
documentation needs to be updated? A. Wiring schematic B. Physical network diagram C. Job log D. Logical network diagram |
D. Logical network diagram
|
|
Which of the following would be used to optimize network performance and increase bandwidth
availability? A. Packet analysis B. Fault tolerance C. QoS D. Traffic shaping |
D. Traffic shaping
|
|
A workstation has an IP address of 169.254.128.1. Which of the following IP address types is this?
A. RFC1918 private IP address B. Public Internet address C. DHCP lease D. APIPA |
D. APIPA
|
|
Which of the following protects individual computers from malicious software?
A. NIPS B. Network based firewalls C. Host based firewalls D. HIDS |
C. Host based firewalls
|
|
Which of the following is used to convert a FQDN to an IP address?
A. Layer two switch B. Proxy server C. DNS server D. DHCP server |
C. DNS server
|
|
The IP address block 172.31.146.128/25 represents which of the following?
A. Classful address B. Public address C. Private address D. APIPA address |
C. Private address
|
|
An individual wearing an A/C technician uniform asks to enter the data center to service the air
conditioning unit. When asked for identification, the individual quickly leaves. Which of the following was avoided? A. Identity fraud B. Social engineering C. Social media D. Phishing |
B. Social engineering
|
|
An administrator has found interference on a network. Which of the following is the cable MOST
likely composed of? A. STP B. UTP C. Fiber D. RG-6 |
B. UTP
|
|
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
A. Butt set B. Stripper C. Punch down tool D. Snips |
B. Stripper
|
|
Which of the following technologies has the same uplink and downlink speed standards?
A. SDSL B. ADSL C. OC12 D. OC3 |
A. SDSL
C. OC12 D. OC3 |
|
Which of the following has a maximum data rate of 11Mbps?
A. 802.11a B. 802.11g C. 802.11n D. 802.11b |
D. 802.11b
|
|
Which of the following network devices is used to segment multiple networks?
A. Modem B. Hub C. Router D. Layer 2 switch |
C. Router
|
|
Which of the following OSI model layers is the transport layer?
A. Layer 6 B. Layer 4 C. Layer 7 D. Layer 1 |
B. Layer 4
|
|
Which of the following is an IPv6 address for localhost?
A. FFFF:127.0.0.1 B. 127:: C. FF::0 D. ::1 |
D. ::1
|
|
A technician would like to connect two computer directly via their respective network cards, and no
intermediary devices. Which of the following cable types would allow this? A. Crossover B. Serial C. RG-6 D. Loopback |
A. Crossover
|
|
Which of the following network protocols assigns a device's IP address?
A. SMTP B. TFTP C. HTTPS D. DHCP |
D. DHCP
|
|
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL B. ATM C. SDSL D. OC3 |
B. ATM
|
|
The address 0:0:0:0:0:0:0:1 is also know as the
A. IPv4 localhost address. B. IPv4 loopback address. C. IPv6 loopback address. D. IPv6 default DNS address. |
C. IPv6 loopback address.
|
|
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL B. ATM C. SDSL D. OC3 B. ATM The address 0:0:0:0:0:0:0:1 is also know as the A. IPv4 localhost address. B. IPv4 loopback address. C. IPv6 loopback address. D. IPv6 default DNS address. C. IPv6 loopback address. Which of the following is the MOST secure method to enable remote users to access a company's internal network resources? A. DMZ B. Network-based firewall C. Stateful firewall D. VPN concentrator |
D. VPN concentrator
|
|
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the
following device types is being installed? A. Intrusion detection B. Proxy server C. Bandwidth shaper D. Load balancer |
C. Bandwidth shaper
|
|
Which of the following authentication mechanisms on a wireless network uses a separate network
authentication server? A. TKIP B. Kerberos C. WEP D. RADIUS |
D. RADIUS
|
|
Which of the following methods is used to provide access to a VPN?
A. RAS B. IGP C. PPTP D. PPP |
C. PPTP
|
|
Which of the following devices can be affected by a microwave?
A. 110 block B. Router C. Wireless repeater D. Firewall |
C. Wireless repeater
|
|
An administrator would like to test the firewall rules on a corporate network. Which of the following
tools would MOST likely by used? A. Port scanner B. Packet sniffer C. Traffic shaper D. Ping sweep |
A. Port scanner
|
|
A network with twenty clients needs to view a video file. Which of the following should be configured
on the client's computers to reduce network traffic? A. Class C addresses B. Class A addresses C. Multicast D. Broadcast |
C. Multicast
|
|
Which of the following can be used to find the location of a cable short?
A. Multimeter B. TDR C. Protocol analyzer D. CSU/DSU |
B. TDR
|
|
Which of the following is an example of a private IP address?
A. 11.0.0.8 B. 172.17.22.201 C. 192.165.107.29 D. 64.64.105.22 |
B. 172.17.22.201
|
|
Which of the following provides internal network access to the Internet via one public IP address?
A. DNAT B. Broadcast C. PAT D. Multicast |
C. PAT
|
|
An administrator adds a second network connection between two devices to increase network
bandwidth. Which of the following features should be used to accomplish the increase? A. VLANs B. CSMA/CD C. Bonding D. Port mirroring |
C. Bonding
|
|
A digital phone line will MOST likely have which of the following connectors?
A. BNC B. RJ-11 C. DB-25 D. DB-9 |
B. RJ-11
|
|
Which of the following LAN technologies has the GREATEST throughput speed?
A. 10BaseF B. 10BaseTX C. 10BaseFX D. 10BaseT |
A. 10BaseF
|
|
Which of the following technologies allows a company to install IP cameras and IP phones without
having to connect them to a separate power source? A. STP B. VTP C. QoS D. PoE |
D. PoE
|
|
Users in a conference room report issues controlling the multimedia equipment in the conference room
via the wireless panel. The projector and audio in the room also are sporadically turning on and off. Which of the following is the MOST likely cause of this issue? A. Frequency B. Encryption C. Interference D. Channel |
C. Interference
|
|
An administrator needs to remove sleeves on a CAT6 cable. Which of the following tools will work
BEST? A. Punch down B. Cable tester C. Cable stripper D. Cable certifier |
C. Cable stripper
|
|
At which of the following layers of the OSI model does a router reside?
A. Layer 1 B. Layer 5 C. Layer 7 D. Layer 3 |
D. Layer 3
|
|
IGP differs from EGP because IGP is designed for use in which of the following?
A. Communication between networks B. Communication between WANs C. Single non-autonomous network D. Single autonomous network |
D. Single autonomous network
|
|
An administrator is unable to ping a workstation. Which of the following tools would BEST help to
resolve the issue? A. Cable tester B. Multimeter C. Protocol analyzer D. Toner probe |
A. Cable tester
|
|
Session affinity is a feature of which of the following devices?
A. IPS B. Load balancer C. DNS server D. DHCP server |
B. Load balancer
|
|
An administrator would like to turn off web-based administration access to critical network routers and
switches. Which of the following ports should be blocked? (Select TWO) A. 21 B. 80 C. 23 D. 110 E. 443 |
B. 80
E. 443 |
|
Which of the following network devices is used by a laptop to connect via WPA2?
A. Secure firewall B. Network repeater C. Hub D. Wireless router |
D. Wireless router
|
|
Which of the following is true of IPSec when operating in transport mode?
A. Both the header and the payload are encrypted B. Only the header is encrypted C. Neither the header nor the payload are encrypted D. Only the payload is encrypted |
D. Only the payload is encrypted
|
|
A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which
of the following actions should the technician do FIRST? A. Check their local Internet connection B. Verify the IP information of the server C. Call their local ISP D. Verify the hostname of the server |
A. Check their local Internet connection
|
|
Which of the following capabilities is essential in a firewall when securing VoIP traffic between remote
hosts? A. Multipath for media streams B. Application layer filtering C. Filtering by zones D. Source routing rules |
B. Application layer filtering
|
|
Which of the following can be used to block a guest's laptop access to DHCP services?
A. Configure DNS servers statically on workstations. B. Use IPSec on all remote connections. C. Reserve leases to known MAC addresses. D. Disable TFTP on local servers. |
C. Reserve leases to known MAC addresses.
|
|
Which of the following BEST explains the function of OSI layer 4?
A. Connecting hosts on the same segment B. Routing packets across segments C. Reliable delivery of packets D. Specifying signal timing and amplitude |
C. Reliable delivery of packets
|
|
Which of the following would an administrator use to locate where to extend a new wireless network at
a new location? A. Baseline configuration B. Security policy C. Logical network map D. Wiring schematic |
C. Logical network map
|
|
Which of the following will MOST likely use an ISDN PRI circuit?
A. Analog phone system B. Fax machine C. Cable modem D. Digital phone system |
D. Digital phone system
|
|
A user receives an email asking them to update their password for a remote service using a URL
provided in the email. Which of the following is MOST likely occurring? A. Smurf B. Denial of service C. Phishing D. Man in the middle |
C. Phishing
|
|
An administrator needs to authenticate users to the network, authorize network activities, and account
for activities done. Which of the following are service that will BEST meet these goals? (Select TWO). A. Kerberos B. TACACS+ C. 802.1x D. RADIUS E. RRAS |
B. TACACS+
D. RADIUS |
|
On which of the following cables would a technician find a BNC connector installed?
A. CAT3 B. RG-6 C. CAT6 D. Fiber |
B. RG-6
|
|
If an IPSec session is not working correctly, which of the following would a technician do FIRST?
A. Check that IGMP is enabled on the network switch B. Verify that IPSec service is running on the DNS server C. Verify that the correct SNMP strings are setup on each system D. Check whether their system is set to the correct IPSec setting |
D. Check whether their system is set to the correct IPSec setting
|
|
Which of the following commands is useful to find out the nodes that are active on an Ethernet
segment? A. ARP B. NSLOOKUP C. VMSTAT D. TRACEROUTE |
A. ARP
|
|
Which of the following is the MOST likely authentication scheme used in 802.1x?
A. RADIUS B. CHAP C. Kerberos D. TACACS+ |
A. RADIUS
|
|
Two network switches need to be cabled together via copper cabling. These switches do not support
MDI-X. Which of the following cabling will need to be used? A. Crossover B. Loopback C. Straight D. Rollover |
A. Crossover
|
|
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a
cubicle corresponds to a given RJ-45 jack in a patch panel? A. Spectrum analyzer B. Multimeter C. Punch-down tool D. Toner probe |
B. Multimeter
|
|
Which of the following protocols can lead to user credential disclosure when a network analyzer is
used? (Select TWO) A. TFTP B. SNMPv3 C. Telnet D. RSH E. FTP |
C. Telnet
E. FTP |
|
Which of the following is the name of the routing update process involved when a change occurs in the
routing environment? A. Supernetting B. Subnetting C. Convergence D. Dynamic |
C. Convergence
|
|
A technician has deployed multiple temperature monitoring devices with IP addresses in the
10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which of the following destination IP addresses must the technician configure on the server to send keep-alive packets to all the devices? A. 10.137.24.0 B. 10.137.24.127 C. 10.137.24.128 D. 10.127.24.1 |
B. 10.137.24.127
|
|
Which of the following network services can be used to provide wireless network authentication?
A. DHCP B. RADIUS C. TACACS D. DNS |
B. RADIUS
|
|
A port that can use 10/100/1000 speeds MOST commonly uses which the following physical media?
A. Coax B. Copper C. Fiber D. Wireless |
B. Copper
|
|
A client attempts to connect to a network resource and is given an error message about their access
being restricted. Which of the following BEST describes the reason for denial? A. The user's account is disabled. B. The network resource is unavailable. C. The user is not connected to the network. D. The user's account failed to authenticate with correct permissions. |
D. The user's account failed to authenticate with correct permissions.
|
|
Which of the following BEST describes a device that helps resolve IP addresses into FQDNs?
A. DHCP server B. DNS server C. Firewall D. Content switch |
B. DNS server
|
|
Which of the following classes is the address 208.177.23.1?
A. Class A B. Class B C. Class D D. Class C |
D. Class C
|
|
Which of the following protocols resolves MAC addresses from IP addresses?
A. RTP B. ARP C. DHCP D. DNS |
B. ARP
|
|
Which of the following would need to be implemented on a wireless router to allow network access
based on a passphrase that the administrator would supply? A. MAC filtering B. SSID broadcast C. WPA-PSK encryption D. Port forwarding |
C. WPA-PSK encryption
|
|
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same
subnet? A. 255.255.255.240 B. 255.255.255.128 C. 255.255.255.0 D. 255.255.240.0 |
D. 255.255.240.0
|
|
As the number of networks and routers has grown, the technician finds that entering the routing
information for all customers in each router has become a time consuming and error prone process. Which of the following should the technician do? A. Keep routing assignments in an exportable spreadsheet. B. Stop routing and bridge all connections. C. Switch to a dynamic routing protocol. D. Hire another technician to maintain routing assignments. |
C. Switch to a dynamic routing protocol.
|
|
A user transferring files via FTP discovers that the username and password has been compromised.
Which of the following may have been used to intercept the login credentials? A. SNMPv2 B. A network sniffer C. A telnet session D. Secure FTP |
B. A network sniffer
|
|
An administrator is troubleshooting network connectivity and would like to view the path that packets
are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use? A. traceroute B. ping C. nslookup D. route |
A. traceroute
|
|
In order for two machines on different VLANs to communicate with one another, which of the
following must be properly set? A. Load balancing B. Subnet mask C. DNS D. Default gateway |
D. Default gateway
|
|
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the
following could be used to accomplish this connection? A. Token ring B. Optical media C. Smart jack D. Media converter |
D. Media converter
|
|
An administrator is troubleshooting crosstalk issues. Which of the following should the administrator
check FIRST? A. Proxy settings B. WLAN channels C. Patch cables D. Port duplex |
C. Patch cables
|
|
Which of the following connection methods is considered unsecure and allows a connection to a
machine in terminal emulation mode? A. TELNET B. HTTPS C. RCP D. HTTP |
A. TELNET
|
|
Which of the following BEST describes ISDN?
A. Coaxial cable, token passing, local area network B. Carrier sense, multiple access points, collision detection on multiple workstations C. Circuit switching, digital signaling, interfaces carry multiple channels D. Cell switching, 53-byte cells, uniform handling of voice and data |
C. Circuit switching, digital signaling, interfaces carry multiple channels
|
|
Which of the following cable coverings is MOST likely to reduce toxic gases during a fire?
A. Polyvinyl chloride B. Multimode C. Plenum D. Polystyrene |
C. Plenum
|
|
An administrator suspects there is an issue on the network with DHCP, and wants to monitor the entire
request and response process for giving out leases. Which of the following tools should the administrator use to BEST monitor these transactions? A. Protocol bus analyzer B. Intrusion detection system C. Protocol analyzer D. Port scanner |
C. Protocol analyzer
|
|
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the
internet. Other hosts on the same network can connect to the internet. Which of the following should the technician check? A. The hosts file B. The default gateway C. The DNS server entries D. The network card |
B. The default gateway
|
|
Which of the following WAN technology types does not use an Ethernet cable as a medium for
communication and is used for long distances? A. DSL B. E3/T3 C. ATM D. WiMAX |
D. WiMAX
|
|
A user reports that their laptop does not have network connectivity, but was working fine last week.
The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type? A. Multicast B. APIPA C. Broadcast D. DHCP |
B. APIPA
|
|
Firewalls can be used for which of the following?
A. Protocol analysis B. Port scanning C. Packet sniffing D. Content filtering |
D. Content filtering
|
|
A technician needs to install phones that will only require one cable for both data and power to be
supplied. Which of the following features MUST the switch support? A. Port mirroring B. PoE C. Spanning tree D. VLAN |
B. PoE
|
|
Which of the following devices is MOST likely to have a bridge built-in?
A. NIC B. Media converter C. Hub D. WAP |
D. WAP
|
|
Which of the following protocols controls the set up, tear down, and accounting of voice over IP based
communication? A. TLS B. RTP C. SIP D. IGMP |
C. SIP
|
|
Which of the following provides VPN services at the HIGHEST OSI level?
A. IPSec B. PPPoE C. L2TP D. SSL |
D. SSL
|
|
Which of the following threats is MOST likely to result in a service disruption for all customers
accessing www.company.com? A. DoS B. Port scan C. War driving D. Blue snarfing |
A. DoS
|
|
Which of the following port combinations need to be opened over a firewall for Internet browsing?
A. 80 and 443 B. 443 and 143 C. 80 and 110 D. 80 and 25 |
A. 80 and 443
|
|
Which of the following devices can be used to breakup a broadcast domain?
A. Router B. Bridge C. DHCP server D. Unmanaged switch |
A. Router
|
|
A technician needs to install a VoIP system in the building but some locations do not have electrical
outlets available. Which of the following features of a switch would need to be available? A. Port authentication B. VLAN C. Trunking D. PoE |
D. PoE
|
|
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer successfully get their network configuration via DHPC, but the user reports that their laptop has no web access, but can print. Which of the following MOST likelyl occurred? A. The laptop and the switch duplex setting do not match. B. The printer has the wrong DNS configuration. C. The laptop is in the wrong VLAN. D. the laptop and the switch port speed do not match. |
C. The laptop is in the wrong VLAN.
|
|
Which of the following is the 802.1x standard an example of?
A. NAT B. PAT C. NAC D. SNAT |
C. NAC
|
|
An administrator has a networking closet on the first floor of a building with all of the network and
communication equipment. However, the telephony provider installed the communications line in the basement. Which of the following needs to be extended to connect the line to the networking closet? A. Demarcation point B. Router C. Smart jack D. Patch panel |
D. Patch panel
|
|
An administrator is setting up a security camera that will send the same feed to twelve of the twenty
workstations on the network. Which of the following addressing schemes was designed for this scenario? A. Multicast B. Unicast C. Broadcast D. Peer-to-peer |
A. Multicast
|
|
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the
patch panel? A. Multimeter B. Cable crimper C. Toner probe D. Punch down tool |
B. Cable crimper
|
|
Which of the following tools is used to find the MAC address of a workstation?
A. ipconfig B. route C. traceroute D. netstat |
A. ipconfig
|
|
Which of the following is the MOST cost effective solution to extend the distance of one Ethernet cable
run? A. Repeater B. Hub C. Switch D. Router |
A. Repeater
|
|
Mobile users are connecting from sites that have strong security policies and filter most traffic except
HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network? A. RDP access B. Dial-in access C. IPSec VPN D. SSL VPN |
D. SSL VPN
|
|
An administrator is setting up a network and would like to prevent users from having the ability to plug
their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use? A. Dynamic B. NAT C. Static D. Subnetting |
C. Static
|
|
Computers on a small network recently started receiving APIPA addresses for their NICs. Which of the
following is MOST likely the cause of such a scenario? A. The hardware firewall is down. B. The DHCP server is down. C. The DNS server is down. D. The email server is down. |
B. The DHCP server is down.
|
|
A user is reporting that their Internet connection is intermittent. Upon further investigation, an
administrator verifies that the cause is not a physical connection issue with the cable. Which of the following issues is MOST likely the cause? A. Port duplex mismatch B. Port is error disabled C. DNS settings are incorrect on the machine D. Port is shutdown on the switch |
A. Port duplex mismatch
|
|
Which of the following should be installed in a server room?
A. Protocol analyzer B. Certifiers C. Temperature monitor D. OTDR |
C. Temperature monitor
|
|
Packet sniffing at an Internet interface on a border host reveals outbound packets with a source address
of 10.254.0.5. Which of the following is a likely explanation? A. A user is accessing an Internet search engine. B. Enterprise database server has been compromised by Internet worm. C. There is a missing or incorrect rule in the routing policy. D. Time-to-live setting is not high enough for multicast service. |
C. There is a missing or incorrect rule in the routing policy.
|
|
Which of the following connection types are typically found in SOHO networks? (Select TWO)
A. ATM B. ADSL C. Frame relay D. T3 E. Cable modem |
B. ADSL
E. Cable modem |
|
Which of the following is the rate in bits per second of a bearer channel in a PRI circuit?
A. 16 Kbps B. 1.5 Mbps C. 1 Mbps D. 64 Kbps |
D. 64 Kbps
|
|
Which of the following cable types has a MAXIMUM transmission rate of 1Gbps?
A. Fiber B. Serial C. CAT7 D. CAT5e |
D. CAT5e
|
|
Which of the following cable types has the reception and transmission leads flipped on opposing ends
of the media? A. Rollover B. Serial C. Crossover D. Patch |
C. Crossover
|
|
Which of the following is an example of a MAC address?
A. 1A-23-F9-CD-06-9B-23-5C B. 10.0.10.1 C. 1A-23-F9-CD-06-9L D. 1A-23-F9-CD-06-9B |
D. 1A-23-F9-CD-06-9B
|
|
Which of the following encryption protocols is MOST secure when installing a wireless access point?
A. AES B. MD5 C. WEP D. WPA2 |
D. WPA2
|
|
Which of the following is a commonly used protocol for VoIP network communication?
A. SNMP B. DNS C. SSH D. RTP |
D. RTP
|
|
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company
web address. Which of the following command sequences will test DNS functionality? A. nslookup server ns.company.com www.company.com B. nslookup settype=mx www.company.com C. nslookup Set type=ns @ns.company.com www D. nslookup domain ns.company.com lookup www A. nslookup server ns.company.com www.company.com Which of the following is an example of CIDR notation? A. ::1 B. 10.10.10.0/30 C. 10.192.30.5:22 D. 255.255.255.0 |
B. 10.10.10.0/30
|
|
Which of the following transport protocols should be used to avoid retransmitting lost packets?
A. TCP B. IGMP C. ARP D. UDP |
D. UDP
|
|
An administrator needs to test connectivity between two devices located on the same internal network.
Which of the following commands would MOST likely be used? A. nslookup B. traceroute C. ping D. ipconfig |
C. ping
|
|
A wireless access point needs to be installed in a conference room for presentations. The access point
comes with an omni-directional antenna. Where is the BEST location for this access point so that it provides full room wireless coverage? A. Centered in the room B. Adjacent to the table top projector C. In the equipment room D. On the back wall |
A. Centered in the room
|
|
An L2 switch has two VLANs. The first computer connects to the switch on VLAN 5, and the second
computer connects to the switch on VLAN 10. Which of the following devices is needed to allow the first and second computer to communicate? A. Media converter that connects to the switch. B. Router that connects to the switch. C. Proxy server that connects to the switch. D. Bridge that connects to the switch. |
B. Router that connects to the switch.
|
|
A technician needs to configure a machine to automatically request an IP address upon boot. Which of
the following BEST describes this type of addressing? A. Static B. Routed C. Dynamic D. Convergence |
C. Dynamic
|
|
Which of the following analyzes the entire subnet to identify all hosts that are active?
A. Packet sniffer B. Ping sweep C. Traceroute D. Port scanner |
B. Ping sweep
|
|
Which of the following technologies attempts to avoid loops at Layer 2 of the OSI model?
A. Port mirroring B. PoE C. Spanning tree D. VLAN |
C. Spanning tree
|
|
Which of the following commands will display the routing table one a UNIX/Linux computer?
A. mtr B. netstat C. route D. ipconfig |
C. route
|
|
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
A. Duplex B. Collisions C. Latency D. Cable length |
C. Latency
|
|
Which of the following cable types is intended to be used on short distances and is immune to any type
of interference? A. Singlemode fiber B. Multimode fiber C. Unshielded twisted pair D. Shielded twisted pair |
B. Multimode fiber
|
|
Which of the following SNMP versions allows for authorization and encryption when connecting?
A. 2c B. 3 C. 3c D. 2 |
B. 3
|
|
The presence of a trusted third party is essential to which of the following authentication methods?
A. Public key infrastructure B. Advanced encryption standard C. 3DES password hashing D. Symmetric key encryption |
A. Public key infrastructure
|
|
Which of the following defines the required distance between each LAN drop that will be installed
within a building? A. Acceptance use policy B. Wiring schematics C. Company regulations D. Logical network diagrams |
B. Wiring schematics
|
|
A network CAT6 cable of 600 feet (183 meters) needs to be installed. Which of the following devices
can be installed at the halfway point to help ensure cabling speeds are not reduced? A. Modem B. Repeater C. Media converter D. Router |
B. Repeater
|
|
Malicious traffic has been detected terminating at HOST a on TCP port 4444. Which of the following
commands can be run on HOST A to determine the process attached to TCP port 4444? A. netstat -nap B. netstat -nav C. ifconfig -a D. ipconfig /all |
B. netstat -nav
|
|
Which of the following would allow an administrator to share Internet connectivity while only
publishing one public IP address? A. VLAN B. CIDR C. NAT D. DHCP |
C. NAT
|
|
Which of the following components is typically used for voice transmissions and has a 10Mbps
maximum transfer speed? A. Patch panel B. 66 block C. 110 block D. Vertical cross connect |
B. 66 block
|
|
Which of the following WAN technologies allows for the fastest connection?
A. T1 B. SONET C. OC-12 D. ADSL |
B. SONET
|
|
Which of the following statements is the MOST accurate description of PoE?
A. Provider edge technology used in MPLS core networks B. 802.3af or 802.3at standard to deliver DC power over CAT5 cables C. Standard that allows hubs and switches to work together without separate power cables D. 802.3az energy-efficient Ethernet standard endorsed by IEEE |
B. 802.3af or 802.3at standard to deliver DC power over CAT5 cables
|
|
Which of the following is the default NTP port?
A. 161 B. 143 C. 110 D. 123 |
D. 123
|
|
An administrator just installed a new DS3 WAN circuit providing 45Mbps. However, multiple users at
the site report slowness when accessing remote resources. Which of the following tools should the administrator use to diagnose the issue? A. Content filter B. Throughput tester C. Crossover cable D. Loopback plug |
B. Throughput tester
|
|
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this? A. Port mirroring B. Spanning tree C. PoE D. VLAN |
D. VLAN
|
|
Which of the following connectors is used to terminate fiber?
A. ST B. RJ-45 C. RJ-11 D. BNC |
A. ST
|
|
The helpdesk is receiving calls about the corporate web server being down. Which of the following
should be taken NEXT after verifying that the server is unreachable? A. Continuously ping the server until a ping response is obtained. B. Implement and test a solution. C. Escalate the call to a technician. D. Document any changes in the web server configuration. |
C. Escalate the call to a technician.
|
|
Which of the following does the AP use to broadcast the SSID of the wireless network to allow clients
to find and connect to the network? A. Association B. Beacon C. Probe D. WPA |
B. Beacon
|
|
Which of the following physical connections allows for the BEST performance when connecting to a
VPN server for a remote user? A. Baseband B. POTS C. Broadband D. Satellite |
C. Broadband
|
|
Which of the following is true about an IP address if the first two bits are both one and the third bit is a
zero? A. The address is a Class B address. B. The address is a Class C address. C. The address is a Class A address. D. The address is a Class D address. |
B. The address is a Class C address.
|
|
Which of the following protocols provides secure communication over the Internet?
A. RSH B. SNMP C. VNC D. SSH |
D. SSH
|
|
Which of the following describes what happens when a technician pings the broadcast address?
A. An ICMP loop floods the network B. All clients on the subnet respond C. All clients in the multicast group respond D. The broadcast server responds |
B. All clients on the subnet respond
|
|
An administrator installs a new web server and wishes to restrict traffic to it. However, the
administrator would like to keep the web server less restricted than the internal network. In which of the following firewall zones would the administrator place the web server? A. Demilitarized B. Internal C. Trusted D. Internet |
A. Demilitarized
|
|
Which of the following standards provides port authentication?
A. 802.1x B. 802.1q C. 802.11 D. 802.2 |
A. 802.1x
|
|
Which of the following is a distance vector routing protocol?
A. OSPF B. EIGRP C. IS-IS D. RIP |
D. RIP
|
|
Which of the following can be used to mitigate network congestion from users streaming media?
A. Protocol analyzer B. Caching gateway C. Broadcast traffic optimization D. Traffic shaping |
D. Traffic shaping
|
|
A particular route's destination address is referred to as the:
A. link state. B. next hop. C. shot vector. D. RIP peer. |
B. next hop.
|
|
A network administrator is documenting all devices on the network. This type of documentation is
known as which of the following? A. Network guidelines B. Network procedures C. Network baseline D. Network diagram |
D. Network diagram
|
|
A user has logged into a company laptop while at a conference. The user is unable to log directly into
the conference facility’s wireless network, but is able to connect to another user's laptop and thereby access the conference materials. This is an example of: A. client/server. B. shoulder surfing. C. peer to peer. D. VPN tunneling. |
C. peer to peer.
|
|
An administrator is deploying three B/G wireless access points in a new office location. Which of the
following channels eliminates interference? A. 1, 6, and 11 B. 11, 16, and 20 C. 3, 6, and 9 D. 36, 40, and 44 |
A. 1, 6, and 11
|
|
Which of the following is true of stateless inspection?
A. It is able to detect packets from established connections only. B. it is not able to determine which ports to block. C. It is able to determine the connection state of all packets going through the firewall. D. It is not able to determine if a packet is related to an established connection. |
D. It is not able to determine if a packet is related to an established connection.
|
|
A. CAT5e
B. CAT3 C. CAT5 D. CAT6 |
B. CAT3
|
|
Which of the following describes what the number two represents in 100Base2 cabling?
A. Coaxial cable B. Fiber C. UTP D. Twisted pair |
A. Coaxial cable
|
|
Multiple users on the same floor cannot access the network. Upon investigation, an administrator sees
that the switch has power and all of the active ports are blinking almost non-stop. Which of the following is MOST likely causing this to occur? A. DHCP snooping B. Routing loop C. Broadcast storm D. Speed/duplex mismatch |
C. Broadcast storm
|
|
Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33
feet)? A. X-10 B. 802.11a C. Bluetooth D. 802.11b |
C. Bluetooth
|
|
A link light on a network card refers to which of the following?
A. Auto duplex B. Collision detection C. Carrier sense D. Multiple access points |
C. Carrier sense
|
|
Which of the following devices will allow a technician to measure the amount of data that is capable of
traversing the network? A. Throughput tester B. Event logs C. Packet sniffers D. OTDR |
A. Throughput tester
|
|
Which of the following tools can be used to determine the MAC address of a machine on the local
subnet? A. dig B. ping C. arp D. host |
C. arp
|
|
Which of the following technologies facilitates the conversion of internal private IP addressing to
external public IP addressing? A. NAT B. SNMP C. DHCP D. TCP/IP |
A. NAT
|
|
Which of the following protocols would MOST likely be used to provide for the simple movement of
files across two machines over the Internet? A. NTP B. SMTP C. FTP D. POP3 |
C. FTP
|
|
Which of the following can be an STP cable?
A. CAT5e B. RG-59 C. Fiber D. RG-6 |
A. CAT5e
|
|
Which of the following commands can be used to find the MAC address of a connecting router?
A. traceroute B. arp C. ping D. ping sweep |
B. arp
|
|
Which of the following connection methods is considered secure?
A. HTTPS B. TELNET C. RCP D. HTTP |
A. HTTPS
|
|
In a new wireless network installation, the administrator has successfully installed and tested the
equipment. The NEXT step after turning wireless access on would be to: A. Perform a war drive to test for vulnerabilities. B. Configure the DHCP server. C. Document the physical layout. D. Configure wireless adapters. |
C. Document the physical layout.
|
|
Refer to the attached Exhibit. According to the diagram, which of the following is the correct path for
PC7 to print a document? Exhibit: image001.jpg A. Switch C to switch A to the router B. Switch C to switch A C. Switch C to switch A to switch B D. Switch B to the router |
B. Switch C to switch A
|
|
In which of the following networking types can a computer be a client to other computers and act as a
server as well? A. Peer to peer B. Bus C. Ring D. VPN |
A. Peer to peer
|
|
BGP is an example of which of the following routing protocol types?
A. Link-state IGP B. Link-state EGP C. Distance-vector EGP D. Distance-vector IGP |
C. Distance-vector EGP
|
|
Which of the following is the MOST common WAN technology type used in residential homes?
A. Frame relay B. MPLS C. Cable modem D. ATM |
C. Cable modem
|
|
How much theoretical bandwidth is available to three wireless access points that share the same 80
meter radius, if channel six is used on all three access points? A. 162Mbps B. 54Mbps C. 100Mbps D. 22Mbps |
B. 54Mbps
|
|
Which of the following is used by a company's ISP to troubleshoot network issues?
A. 110 Block B. 66 Block C. Smart Jack D. Demarc |
C. Smart Jack
|
|
Which of the following WAN technologies requires fiber optics?
A. PSTN B. POTS C. SONET D. ADSL |
C. SONET
|
|
Which of the following is a secure method of transferring a file?
A. FTP B. RCP C. SCP D. SSH |
C. SCP
|
|
Which of the following documentation would be the BEST to use when determining the location of the
wiring closets? A. Event logs B. Logical network diagram C. Physical network diagram D. Job logs |
C. Physical network diagram
|
|
Which of the following utilities would MOST likely be used to query the locally cached list of IP
addresses and their corresponding names as resolved through NetBIOS over TCP/IP? A. DIG B. NBSTAT C. NSLOOKUP D. NSCD |
B. NBSTAT
|
|
An administrator would like to determine which wire pair on a 100 block connects a jack in the next
room. Which of the following utilities would MOST likely be used to determine this? A. Port scanner B. Multimeter C. Protocol analyzer D. Toner probe |
B. Multimeter
|
|
The helpdesk has been informed that the company's ISP is experiencing network outages. Which of the
following commands can an administrator run to quickly locate and determine the TTL of the further reachable node? A. route B. ping C. arp D. traceroute |
D. traceroute
|
|
Which of the following cable types has immunity from EMI?
A. STP B. Plenum C. Fiber D. UTP |
C. Fiber
|
|
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
A. 10GBaseSW B. 10GBaseEW C. 10GBaseER D. 10GBaseLW |
D. 10GBaseLW
|
|
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO)
A. SNTP B. HTTP C. SFTP D. RCP E. SCP |
C. SFTP
D. SCP |
|
An administrator is reviewing helpdesk tickets and discovers multiple tickets for 'unable to print' and
'no Internet connectivity'. Which of the following documents would BEST provide information to help diagnose the issue? A. Policies B. Baseline C. Wiring schematic D. Logical network diagram |
D. Logical network diagram
|
|
Multiple users are reporting network issues. Before taking any course of action, which of the following
is the FIRST step a technician should take? A. Create a plan of action and a final solution for the issues. B. Document the solution and update all logical/physical network diagrams. C. Gather information about the problems/symptoms. D. Establish the probable cause behind the network issues. |
C. Gather information about the problems/symptoms.
|
|
Which of the following tools would be used to determine the quality of the network infrastructure?
A. OTDR B. Certifier C. Voltage event recorder D. Multimeter |
B. Certifier
|
|
Which of the following is MOST likely to be used for telephone wires connected to the plain old
telephone service (POTS)? A. CAT6 patch panels B. 66 block C. Smart jacks D. 110 block |
B. 66 block
|
|
Which of the following commands is MOST likely to allow an administrator to update a router
configuration without being prompted for user credentials? (Select TWO). A. RCP B. SSH C. SCP D. HTTPS E. TFTP |
A. RCP
E. TFTP |
|
Which of the following connectivity issues is the MOST likely to result from bundling network cables
tightly together? A. Open circuit B. Attenuation C. Collision D. Crosstalk |
D. Crosstalk
|
|
The MAIN difference between an IDS and an IPS is the:
A. IDS blocks malicious activity while the IPS only alerts about malicious activity. B. IDS is an inline system while the IPS is placed on a span port and has no IP address. C. IPS blocks malicious activity while the IDS only alerts about malicious activity. D. IDS uses a deterministic engine while the IPS uses probabilistic engine. |
C. IPS blocks malicious activity while the IDS only alerts about malicious activity.
|
|
When configured, MPLS can increase routing redundancy by providing which of the following
network topology types? A. Bus B. Mesh C. Ring D. Multipath |
B. Mesh
|
|
Which of the following is updated dynamically on all routers in an OSPF configured network, after a
change has occurred on the network? A. Hop count B. Access control list C. Bandwidth availability D. Routing table |
D. Routing table
|
|
Which of the following device can connect multiple workstations, support VLANs, and function as a
router? A. Hub B. Multilayer switch C. Switch D. Repeater |
B. Multilayer switch
|
|
Which of the following protocols is used by the ping command to troubleshoot problems between two
devices? A. ARP B. SIP C. IMAP4 D. ICMP |
D. ICMP
|
|
Which of the following ports does IPSec use, by default?
A. 500 B. 8080 C. 3389 D. 53 |
A. 500
|
|
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After
consolidating the office's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution? A. Switch to static IP addressing. B. Add a router to connect both networks. C. Change the subnet mask to 255.255.254.0. D. Request another class C IP score from the ISP. |
C. Change the subnet mask to 255.255.254.0.
|
|
Which of the following is MOST likely used to identify broadcast storms?
A. Cable tester B. Voltage event recorder C. Port scanner D. Protocol analyzer |
D. Protocol analyzer
|
|
Which of the following devices allows users to connect to company resources by providing them with a
valid internal IP address? A. Firewall B. DHCP server C. Switch D. Hub |
B. DHCP server
|
|
Which of the following devices is used to connect to a network by converting analog signals to digital
signals? A. Hub B. Modem C. Switch D. Repeater |
B. Modem
|
|
At which of the following OSI layers does the ARP protocol operate?
A. Layer 7 B. Layer 3 C. Layer 2 D. Layer 1 |
C. Layer 2
|
|
Which of the following is the metric used for OSPF?
A. Next hop B. Bandwidth C. Latency D. Cost |
B. Bandwidth
|
|
Which of the following would be used to lock all of the primary communications equipment of a
building, including its demarcation point? A. MTF B. MDF C. IDF D. Smart jack |
B. MDF
|
|
TCP occurs at which layer of the OSI model?
A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 3 |
C. Layer 4
|
|
Which of the following connectors would be on a fiber cable?
A. DB-25 B. LC C. BNC D. DB-9 |
B. LC
|
|
Which of the following is the correct number of pins in a RJ-111 connector?
A. 4 B. 3 C. 6 D. 8 |
A. 4
|
|
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?
A. Crosstalk B. Data collision C. Signal bleed D. Signal loss |
D. Signal loss
|
|
The SSL protocol is MOST commonly associated with which of the following ports?
A. 443 B. 143 C. 22 D. 80 |
A. 443
|
|
A technician is setting up a new wireless network in an office where there are existing APs
broadcasting on channels 6 and 11. Which of the following would be the BEST channel to use for the new network to keep interference to a minimum? A. 22 B. 3 C. 10 D. 1 |
D. 1
|
|
A company has both a private network for employees and an Internet access only network for guests on
the same switch. Which of the following advanced features is being used? A. PoE B. VLAN C. Port authentication D. Port mirroring |
B. VLAN
|
|
Which of the following is installed to reduce broadcast packets and collisions?
A. Firewall B. Switch C. Repeater D. Hub |
B. Switch
|
|
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity issues.
Which of the following is MOST likely causing the new issues? A. Signal bounce B. Antenna distance C. Environment factors D. Antenna placement |
C. Environment factors
|
|
Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO)
A. 802.11g B. 802.11a C. 802.11b D. 802.1x E. 802.11n |
B. 802.11a
E. 802.11n |
|
Which of the following is a correct Ethernet MAC address?
A. 16-15-4D-31-59-5J B. 11:34:7A:88:0C:DB C. 12:7H:45:89:9F:65 D. 12-88-FF-9X-58-9E |
B. 11:34:7A:88:0C:DB
|
|
Which of the following is the process of the amount of time that passes for routing updates in the
environment to reach a steady state? A. Dynamic B. Supernetting C. Convergence D. Subnetting |
C. Convergence
|
|
Which of the following devices does not limit network broadcast traffic and does not increase
performance? A. Switch B. Brouter C. Hub D. Router |
C. Hub
|
|
Which of the following devices is MOST commonly used to create a DMZ?
A. Bastion host B. Firewall C. Honeypot D. Repeater |
B. Firewall
|