Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
462 Cards in this Set
- Front
- Back
Which of the following connector types would Sandy, a network technician, use to connect a serial
cable? A. RJ-11 B. BNC C. LC D. DB-9 |
DB-9
|
|
Which of the following would Joe, a technician, configure to modify the time a device will hold an
IP address provided through DHCP? A. DNS suffixes B. Leases C. Static IP addressing D. Reservations |
Leases
|
|
Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot
access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected |
An incorrect subnet mask has been entered into the WAP configuration
|
|
Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but
does not want to use an encryption method. Which of the following methods would be BEST to accomplish this? A. MAC filtering B. SSL VPN C. PPPoE D. WPA Enterprise |
MAC Filtering
|
|
Which of the following network topologies, when a single machine's cable breaks, would only
affect one network device and not the rest of the network? A. Bus B. Peer-to-peer C. Ring D. Star |
Star
|
|
Joe, a network technician, is tasked with installing a router and firewall to get an office working
with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address? A. QoS B. POP3 C. PAT D. SMTP |
PAT
|
|
Which of the following is a form of encrypting packets for safe, secure data transmission within a
network? A. RAS B. PPTP C. IPSec D. ICA |
IPSec
|
|
A company has only three laptops that connect to their wireless network. The company is currently
using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO). A. Change the encryption method to WPA B. Limit the DHCP scope to only have three addresses total C. Enable the SSID broadcast D. Enable and configure MAC filtering E. Change the broadcast channel to a less commonly used channel |
Enable WPA
Enable and configure MAC filtering |
|
Two duplicate pieces of equipment can be used in conjunction for which of the following
purposes? (Select TWO) A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP |
High availability
Fault tolerance |
|
The location that the local network connection ends and the ISP responsibility begins is known as
the: A. Access point. B. Default gateway. C. IDF connection. D. Demarcation point. |
Demarcation point
|
|
Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses.
Which of the following is the MOST likely problem? A. Incorrect subnet mask B. Incorrect DNS C. Missing default gateway D. Incorrect IPv6 address |
Incorrect DNS
|
|
Which of the following sizes is the fixed cell length in ATM?
A. 8 bytes B. 53 bytes C. 64 kilobytes D. 128 kilobytes |
53 bytes
|
|
Which of the following network scanners detects and sends out alerts for malicious network
activity? A. Packet sniffers B. IDS C. Port scanners D. IPS |
IDS
|
|
Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port
speed to 1000 Mbps. A user’s PC is no longer able to access the network. Which of the following is MOST likely the problem? |
A. The user’s NIC does not support 1Gbps
B. The switch is not compatible with 1000Mbps. C. The user's NIC does not support 100Mbps. D. Joe needs to restart the DNS server |
|
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received
successfully at its destination? A. The transport OSI model layer and the transport TCP/IP model layer B. The transport OSI model layer and the Internet TCP/IP model layer C. The network OSI model layer and the transport TCP/IP model layer D. The network OSI model layer and the Internet TCP/IP model layer |
The transport OSI model layer and the transport TCP/IP model layer
|
|
Which of the following network appliances would facilitate an even amount of traffic hitting each
web server? A. Load balancer B. VPN concentrator C. Proxy server D. Content filter |
Load balancer
|
|
For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?
A. The server contains several virtual machines and the MAC addresses are from the virtual machines. B. The server is hosting a web server and the MAC addresses are from connected browsers. C. The server is hosting a proxy server and the MAC addresses are from the connected clients. D. The server NIC is starting to fail and should be replaced. |
The server contains several virtual machines and the MAC addresses are from the virtual
|
|
Which of the following cable types would have the LEAST amount of EMI?
A. CAT3 B. CAT5 C. STPCAT6 D. Plenum CAT6 |
STPCAT6v
|
|
Which of the following wireless standards operates on the same frequency as 802.11a?
A. Compatible with 802.11b wireless networks B. Compatible with 802.11g wireless networks C. Compatible with 802.11i wireless networks D. Compatible with 802.11n wireless networks |
Compatible with 802.11n wireless networks
|
|
Which of the following can Joe, a network technician, change to help limit war driving?
A. Signal strength B. SSID C. Frequency D. Channel |
Signal strength
|
|
Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports
should be blocked on the firewall to achieve this? A. 21 B. 22 C. 23 D. 25 |
21
|
|
Which of the following uses eight groups of characters for addressing?
A. MAC B. IPv4 C. IPv6 D. DHCP |
IPv6
|
|
A packet sniffer is MOST likely used to do which of the following?
A. Prevent network based attacks B. Capture and analyze network traffic C. Route IP packets to remote destinations D. Record the switch ARP table |
Capture and analyze network traffic
|
|
Which of the following could Karen, a network technician, use to find the approximate location of a
break in a long network cable? A. Protocol analyzer B. Time domain reflectometer C. Toner probe D. Multimeter |
Time domain reflectometer (TDR
|
|
Which of the following network access methods is the MOST secure?
A. PPPoE B. SIP C. RSH D. IPSec |
IPSec
|
|
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur
to an outside DNS server? A. 20 B. 53 C. 80 D. 3389 |
53
|
|
Which of the following ports carries IMAP traffic, by default, on modern email systems?
A. 23 B. 25 C. 80 D. 143 |
143
|
|
Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem
with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information? A. DHCP B. ARP C. DNS D. PING |
ARP
|
|
Joe, a customer, shares a building with several other tenants. He reports that an unencrypted
wireless network has been getting slower while his internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem? |
WPA
|
|
Which of the following allows for multiple backend web servers to be accessed through a single
public IP address? A. Traffic shaping B. Caching engines C. Port address translation D. Quality of service prioritization |
PAT
|
|
Sandy, a technician, is asked to install a wireless router in a company’s public cafe area. The
company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A. Content filtering on the wireless access point B. Allow traffic from the wireless access point C. Block traffic from the wireless access point D. Packet filtering on the wireless access point |
Block traffic from the wireless access point
|
|
Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?
A. netstat B. route C. nslookup D. arp |
nslookup
|
|
Sandy, an administrator, has been tasked with running cables from one office to another
neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use? A. CAT5e B. CAT6 C. Coaxial D. Multimode fiber |
Multimode fiber
|
|
Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a
minimal amount of interference. Which of the following channel setups would be used to avoid overlap? A. 2, 6, 10 B. 1, 6, 11 C. 1, 7, 10 D. 1, 2, 3 |
1,6,11
|
|
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use? A. Intrusion detection software B. PoE C. Packet sniffer D. Intrusion prevention software |
Packet sniffer
|
|
Joe, a network administrator, would like to ensure that the footprint of the company’s wireless
coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company’s WAPs to make this change? A. SSID masking B. PPPOE C. Transmission power D. Encryption technology |
Transmission power
|
|
Which of the following exterior routing protocols uses an algorithm to determine the quickest route
to a destination? A. RIP B. OSPF C. BGP D. RIPv2 |
BGP
|
|
After installing new cabling, Karen, a technician, notices that several computers are connecting to
network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem? A. Multimeter B. Cable certifier C. Cable tester D. Toner probe |
Cable certifier
|
|
Which of the following would be an IP address received from APIPA?
A. 10.0.0.100 B. 172.168.0.100 C. 169.254.0.100 D. 192.168.0.100 |
169.254.0.100
|
|
Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the
following should be configured on the firewall to BEST achieve this? A. PAT B. Content filter C. Implicit deny D. NAT |
Content filter
|
|
The ISP needs to terminate the WAN connection. The connection should be located in the network
server room where the company LAN equipment resides. Which of the following identifies the location? A. Smart jack B. MDF C. VPN D. 66 block |
MDF
|
|
Sandy, the network technician, needs to run a cable through a power distribution room that
contains a high voltage transformer. Which of the following would be used to minimize EMI interference? A. FTP B. STP C. UTP D. RTP |
STP
|
|
Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of
the routing information. Which of the following protocols would be BEST for him to use? A. RIP B. VLSM C. OSPF D. STP |
OSPF
|
|
Which of the following is the MOST economical way for Sandy, a technician, to implement 10-
Gigabit Ethernet at a datacenter? A. 10GBaseLR B. 10GBaseSR C. 10GBaseX D. 10GBaseT |
10GBaseT
|
|
T568B wiring scheme is typically found on which of the following components?
A. Demarc extension B. 66 block C. Patch panel D. Vertical cross connect |
Patch panel
|
|
Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the
following software tools would she use to accomplish this? (Select TWO). A. arp B. dig C. route D. nslookup E. netstat |
dig
nslookup |
|
VoIP is being implemented throughout a company and Joe, the network technician, needs to
ensure that data and voice traffic do not interfere with each other. Which of the following features should be configured on a layer 3 switch to prioritize traffic for VoIP? A. VLAN B. VTP C. Port security D. QoS |
QoS
|
|
Sandy, a technician, is fixing a wireless network that was receiving interference from a user’s
cordless phone. Which of the following should Sandy configure? A. Channel B. Encryption C. SSID D. DHCP scope |
Channel
|
|
Joe, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both
ports are connected to the same switch in the IDF. Which of the following will MOST likely happen? A. VLAN malfunction B. Broadcast storm C. Quality of Service loss D. Duplicate IP addresses |
Broadcast storm
|
|
Which of the following security threats relies primarily on user deception and misinformation?
A. Rogue access points B. DoS attacks C. Man-in-the-middle attacks D. Phishing |
Phishing
|
|
Which of the following protocols would Kurt, a technician, use to synchronize local date and time
of a client workstation to that of a server? A. RTP B. NTP C. TFTP D. ARP |
NTP
|
|
A small office has asked to have six PCs networked together by Joe, a consultant. The office
users want file sharing capability with no access to the Internet. Which of the following items will Joe need? (Select TWO). A. Network bridge B. RG-59 patch cabling C. CAT5e patch cabling D. Firewall E. Switch |
CAT5e patch cabling
Switch |
|
Which of the following has a DB-9 connector?
A. SC B. RS-232 C. LC D. RJ-45 |
RS-232
|
|
Which of the following services would Karen, a technician, use to create or update a client's DNS
'A' and 'PTR' records automatically? A. Kerberos B. BIND C. WINS D. DHCP |
DHCP
|
|
Karen, an administrator, has created a patch cable. Which of the following tools should she use to
check the integrity of the cable? A. Protocol analyzer B. Toner probe C. Cable certifier D. Cable stripper |
Cable certifier
|
|
Which of the following tools would Kurt, an administrator, use to identify opens and shorts?
A. Ohmmeter B. Protocol analyzer C. Cable tester D. Multimeter |
Cable tester
|
|
Which of the following could Karen, a network technician, use to inspect connection setup,
request, and response headers for users connecting to a web server? A. nbtstat command B. dig command C. ipconfig command D. Protocol analyzer |
Protocol analyzer
|
|
A new business' web server has seen a huge spike of legitimate traffic in the last week. The
owners want to ensure the site has no problems as the business continues to grow. For Karen, a network administrator, which of the following is the MOST important concern for this company? A. Caching B. Asset management C. Traffic shaping D. High availability |
High Availability
|
|
Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless
security. Lately there have been many unauthorized devices on Kurt’s wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO). A. SSID should be changed daily and enabled. B. WEP should be replaced with WPA encryption. C. MAC filtering should be enabled and configured. D. A different WAP manufacturer should be used to prevent commonly used security cracking techniques E. Omni-directional antennas should be used to limit signal strength |
WEP should be replaced with WPA
MAC filtering should be enabled and configured |
|
Joe, a technician, is setting up an IDS security device. Which of the following should be configured
on the switch to utilize the IDS? A. PoE B. Port mirroring C. Convergence D. Port speed |
Port mirroring
|
|
Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured
wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO). A. PoE B. VLANs C. MTU black hole D. GBIC installation E. WPA F. Reduction of signal gain |
WPA
Reduction of signal gain |
|
Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the
following application services will be blocked due to this? A. Email sending and receiving B. Domain Name Service C. FTP access to external servers D. Remote desktop access |
EMail sending and receiving
|
|
Which of the following services do TCP connections provide to application layer protocols? (Select
TWO). A. Transport services without error recovery B. Large data size manageability using segmentation C. Secure Kerberos password encryption on data D. Delivery through error recovery E. Proxy server authentication |
Large data size manageability using segmentation
Delivery through error recovery |
|
CAT6 Ethernet cabling has a rated maximum transmission capability of:
A. 10Mbps B. 100Mbps C. 20,000Mbps D. 10,000Mbps |
10000 Mbps
|
|
DNS lookups for a given host are intermittently failing. Which of the following would Karen, a
technician, MOST likely use to verify this problem? A. arp B. nbtstat C. traceroute D. dig |
dig
|
|
Which of the following provides Kurt, a network technician, resource record information about
network nodes such as canonical names? A. Proxy server B. IPS C. DNS D. DHCP |
DNS
|
|
Sandy, an administrator, believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this? A. Intrusion prevention software B. Packet sniffer C. Intrusion detection software D. Port scanner |
Packet Sniffer
|
|
In which of the following wireless standards is MIMO used?
A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
N
|
|
Which of the following would Karen, a technician, do to monitor remote traffic through an access
point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2 |
Enable an SNMP agent
|
|
Kurt, a network administrator, wants to separate the network into broadcast domains. Which of the
following can he use? (Select TWO). A. WAPs B. Routers C. Patch panels D. Hubs E. Bridges F. VLANs |
Routers
VLANs |
|
Which of the following is an example of a DHCP failover mechanism?
A. APIPA B. Inactive lease C. Reservations D. Active lease |
APIPA
|
|
Kurt, an administrator, receives reports from users in an office that their 802.11g wireless
connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue? A. 2.4GHz B. 900MHz C. 1.1GHz D. 5GHz |
2.4GHz
|
|
Sandy, an administrator, needs to install a wireless network that will allow legacy devices to
connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
802.11n
|
|
Sandy, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following
wireless standards is being used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
802.11n
|
|
Which of the following network devices MOST likely functions as a network repeater or a bridge?
A. VPN concentrator B. IDS C. Access point D. Firewall |
Access point
|
|
Which of the following VPN methods is BEST used for connecting a remote office to the main
company office? A. WEP-to-WPA B. RDP-to-RAS C. Client-to-site D. Site-to-site |
Site-to-site
|
|
Kurt, an administrator, configures a device that functions at the network layer, and also has 24 collision domains. Which of the following terms BEST describes this device?
A. Hub B. VPN concentrator C. Wireless access point D. Multilayer switch |
Multilayer Switch
|
|
Karen, a network technician, needs to identify the MAC address of a device that is creating
broadcast storms on the network. Which of the following tools will provide the needed information? A. History logs B. Network sniffer C. Network maps D. Traffic shaping |
Network sniffer
|
|
Which of the following is the third layer of the OSI model?
A. Transport B. Application C. Data Link D. Network |
Network
|
|
A firewall that operates at Layer 7 of the OSI model is known as a(n):
A. Circuit gateway B. Packet filter C. Application level D. Redundant firewall |
Application level firewall
|
|
Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for
business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO). A. 23 B. 25 C. 53 D. 80 E. 443 |
80
443 |
|
Which of the following technologies would Sandy, a technician, use to connect networks at large
distances without the use of physical medium? A. Satellite B. ISDN C. OC3 D. OC12 |
Satellite
|
|
Once Kurt, a technician, has implemented the solution to a user's reported problem, which of the
following should Kurt do NEXT? A. Alert the user that everything is repaired. B. Verify full system functionality. C. Document findings, actions, and outcomes. D. Establish a plan of action to resolve the problem |
Verify full system functionality
|
|
Joe, a user, reports that his PC is the only one that does not have network connectivity. All the
wiring has been tested properly and the problem still exists. Joe is getting an APIPA address Which of the following is the MOST likely cause? A. Crossover cable is being used B. Switch was powered off C. PoE is disabled on the port D. Port on the switch is disabled |
Port on the switch is disabled
|
|
Which of the following issues is a common problem in wireless infrastructures?
A. Incorrect port number B. Mismatched SSIDs C. Invalid telnet sessions D. Too many collisions |
Mismatched SSIDs
|
|
A switch in IDF 3 has shut down at 3 p.m. every day this week. Which of the following network
tools should Karen, a technician, use to troubleshoot this problem? A. Environmental monitor B. Cable tester C. TDR D. Loopback plug |
Environmental monitor
|
|
Kurt, an administrator, wants to eliminate remote access to a network from all users, except those users in Kurt’s own country. Which of the following security measures could he use to set up this
functionality? A. MAC filtering B. Port filtering C. IP filtering D. TLS |
IP filtering
|
|
Which of the following technologies would adhere to the AAA model while facilitating ease of login
changes for multiple routers and switches? A. DOCSIS B. HDLC C. SNMP D. TACACS+ |
TACACS+
|
|
Joe, a customer, has reported that the wireless signal from a WAP can only be found in one
specific corner of a conference room. Which of the following is the MOST likely cause? A. Incorrect encryption method B. Incorrect antenna type C. Incorrect channel D. Incorrect SSID identifier |
Incorrect antenna type
|
|
Joe, a user, accidentally unplugs a cable from the patch panel and plugs it into the switch stack.
Now, all users are unable to access any network resources. Which of the following is the MOST likely cause? A. EMI B. Mismatched MTUs C. Looping D. Faulty module |
Looping
|
|
Kurt and Sandy, users, are reporting that they no longer have network access. A computer icon
shows that network connection is unplugged. Which of the following is the MOST likely reason for this? A. NIC power failure on the server B. Firewall is denying all traffic C. Patch panel power failure D. Switch power failure |
Switch power failure
|
|
Karen, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the
following user authentications would be the BEST to implement? A. MS-CHAP B. Kerberos C. TACACS+ D. PKI |
TACACS+
|
|
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz
frequency? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
A
|
|
Which of the following terms correctly defines the event in which multiple dynamic routers agree
on the state of the network? A. Convergence B. Spanning tree C. Port mirroring D. Link state |
Convergence
|
|
Which of the following would Sandy, a technician, find in a network map?
A. QoS standards B. MDF/IDFs C. System logs D. Firewall rules |
MDF/IDFs
|
|
Joe, a network technician, has configured a server with the following IP settings:
IP Address: 192.168.1.40/27 Default Gateway: 192.168.1.64 DNS: 192.168.1.33 The server cannot access the Internet. Which of the following settings needs to be changed? A. Default gateway B. IP address C. VLAN D. DNS |
Default gateway
|
|
Sandy, a technician, is troubleshooting a cable problem. She has checked both ends and suspects
an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis? A. TDR B. Protocol analyzer C. Multimeter D. Cable crimper |
TDR
|
|
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
A. 192.168.0.255 B. 192.168.0.1 C. 192.168.0.0 D. 192.168.0.253 |
192.168.0.255
|
|
After a switch upgrade, several users report no connection to the Internet, while other users report
no problems. Which of the following is the MOST likely problem? A. Wrong gateway B. Faulty or missing routes C. No DNS D. VLAN port assignments |
VLAN port assignments
|
|
When examining a suspected faulty copper network cable. Karen, the administrator, notices that
some of the pairs are untwisted too much. This is MOST likely causing which of the following? A. DB loss B. Dispersion C. Collisions D. Cross-talk |
Cross-talk
|
|
Joe, a network technician, is installing multiple 802.11 g WAPs with the same SSID. Which of the
following channel combinations would allow all three WAPs to operate without interfering with each other? A. 1, 6, 11 B. 2, 6, 10 C. 3, 5, 9 D. 7, 9, 11 |
1,6,11
|
|
Which of the following ports would Kurt, a technician, need to open on a firewall to allow SSH on
the default port? A. 20 B. 21 C. 22 D. 23 |
22
|
|
Which of the following technologies has different upload and download speeds?
A. OC12 B. SDSL C. OC3 D. ADSL |
ADSL
|
|
Kurt, the network technician, is troubleshooting a network issue by implementing a new security
device. After installing and configuring the device, which of the following steps should he take NEXT? A. Verify full system functionality B. Identify the main problem and question the user C. Document their findings, actions, and outcomes D. Escalate the issue to upper management. |
Verify full system functionality
|
|
Karen, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a
device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem? A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable. B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. C. Manually adjust the duplex mode on the server’s link. D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one |
Wires 1, 2, 3 and 6 need to be swapped on one end of the connecting cable
|
|
Which of the following is a Class A private IP address?
A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0 100 |
10.1.1.45
|
|
Which of the following defines the purpose of a DHCP scope?
A. To allocate a preset range of MAC addresses available for assignment. B. To tell a DHCP server to exclude IP addresses. C. To properly configure a DHCP server's allowed bandwidth level. D. To allocate a preset range of IP addresses available for assignment. |
To allocate a preset range of IP addresses available for assignment
|
|
Which of the following would the telecommunications carrier use to segregate customer traffic over
long fiber links? A. VLAN B. MPLS C. VPN D. PSTN |
MPLS
|
|
Sandy, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that
utilization issues do not occur on the company’s T1 Internet access network. Which of the following optimizations should Sandy implement? A. Load balancing B. Caching engine C. Traffic shaping D. Quality of service |
Traffic shaping
|
|
Which of the following tools would Sandy, a technician, BEST use to trace a wire through an area
where multiple wires of the same color are twisted together? A. Cable tester B. Toner probe C. Cable crimper D. Punch down tool |
Toner probe
|
|
Karen, a user, took a laptop on vacation and made changes to the configuration in order to use the
device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID |
Incorrect DNS
|
|
Karen, a technician, is connecting a new desktop computer to a switch. She was only able to
locate one cable in the office for the installation. The wires at each end are color coded as follows: End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown Which of the following should Karen do to complete the installation? A. Re-end the provided cable, keeping the wiring the same. B. Use the provided cable C. Purchase a crossover cable. D. Purchase a straight-through cable |
Purchase a straight-through cable
|
|
Which of the following identifies the WLAN Joe, a user, is connected to?
A. SSID B. Frequency C. WEP D. Channel |
SSID
|
|
Which of the following network appliances can BEST be described as allowing multiple servers to
share requests for a website through the same public IP address? A. VPN concentrator B. Content filter C. Load balancer D. Proxy server |
Load balancer
|
|
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless
access points seems compared to the limited number of wireless devices used. Joe believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). A. WPA encryption B. Changing wireless channels C. MAC filtering D. Changing wireless speed standards E. SSID disable |
WPA encryption
MAC filtering |
|
Which of the following security devices is used in providing packet and MAC address filtering
services for the network? A. Host-based proxy server B. Network-based firewall C. IDS D. IPS |
Network based firewall
|
|
An organization currently has CAT5e cabling throughout its office. Karen, the network technician,
is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause? A. Improper grounding B. TXRX reversed C. Incorrect termination D. Outdated NIC drivers |
Incorrect termination
|
|
Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network B. Segments broadcast traffic C. Increases port speed D. Allows another connection to the router |
Segments broadcast traffic
|
|
Which of the following is an authentication, authorization, and accounting method that provides
administrative access to network devices? A. PKI B. TACACS+ C. CHAP D. SSH |
TACACS+
|
|
Which of the following is used to verify configuration updates on a firewall?
A. Signature identification B. Access control lists C. Scanning services D. Content filtering |
Signature identification
|
|
Blocking a known malicious web address by using the ACL on the firewall is an example of which
of the following? |
IP filtering
|
|
Which of the following OSI layers is included in the TCP/IP model's Application layer?
A. Data Link B. Session C. Transport D. Network |
Session
|
|
Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT B. PTR C. MX D. CNAME |
CNAME
|
|
Kurt, a network technician, has configured a new firewall on the network. Users are reporting
errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website? A. Allow UDP port 53 B. Allow TCP port 80 C. Allow UDP port 340 D. Allow TCP port 443 |
Allow TCP port 443
|
|
Karen, a user, reports that the web browser is indicating the site certificate is not trusted. Which of
the following attacks may be in progress? A. Man-in-the-middle B. Denial of service C. Ping flooding D. Smurfing |
Man in the MIddle
|
|
Joe, a customer, has requested a solution to allow all internally and externally bound traffic to be
monitored. Which of the following would allow a packet sniffer to do this? A. A VPN client and VPN concentrator B. A smart jack installed for each network jack C. A managed switch with port mirroring D. A proxy server with content filter |
A managed switch with port mirroring
|
|
Joe, a technician, is asked to install a new wireless router, and make sure access to the new
wireless network is secured. Which of the following should be considered for security? A. The router has the correct antenna type B. The router has SSID disabled. C. The router is compatible with 802.11g. D. The router is broadcasting on the correct frequency. |
The router has SSID disabled.
|
|
Which of the following OSI layers performs error detection using a Frame Check Sequence?
A. Session B. Transport C. Physical D. Data link |
Data link
|
|
Which of the following commands can Sandy, a network technician, use to check whether the
DNS server for a given domain is reachable? A. nmap B. nbtstat C. dig D. arp |
dig
|
|
Kurt, a network technician, has been notified that several PCs are infected and are sending spam
emails. He wants to add a rule to the firewall to prevent the sending of emails from the internal network. Which of the following rules will prevent this? A. Deny TCP port 25 outbound B. Deny UDP port 53 outbound C. Deny TCP port 110 outbound D. Deny UDP port 213 outbound |
Deny TCP port 25 outbound
|
|
Which of the following solutions will detect and disable a rogue access point?
A. Port scan B. Packet sniffer C. IPS D. IDS |
IPS
|
|
Which of the following layers of the OSI model is above the Session layer?
A. Data link B. Presentation C. Physical D. Transport |
Presentation
|
|
A. ::1
B. ::255 C. 127.0.0.1 D. 127:0:0:1 |
::1
|
|
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed
though or dumped is a example of which of the following? A. Packet sniffing B. Packet filter C. Stateful inspection D. Content filter |
Stateful inspection
|
|
Joe, a network administrator, has been requested to install wireless access throughout the entire
building, while utilizing a single SSID. Which of the following options will meet this requirement? A. Set a separate VLAN on each WAP with the same encryption type B. Set the SSID on each WAP and set contiguous WAPs to different channels C. Set the SSID on each WAP and set contiguous WAPs to the same channel D. Set a separate VLAN on each WAP with the same frequency |
Set the SSID on each WAP and set contiguous WAPs to different channels
|
|
Which of the following connectors would Karen, a technician, use only for RG-6 cables?
A. F-connector B. MTRJ C. RJ-45 D. RS-232 |
F-connector
|
|
Sandy, a network technician, needs to push changes out to network devices and also monitor the
devices based on each device's MIB. Which of the following should she use? A. SNMP B. Traffic analysis C. Syslog D. Asset management |
SNMP
|
|
Which of the following would Joe, a technician, MOST likely use to remotely verify port
configuration of a switch? A. traceroute command B. SNMP monitor C. nbtstat command D. dig command |
traceroute command
|
|
Which of the following can be used to view the list of ports on which a server is listening?
A. dig B. net statistics C. netstat D. nslookup |
netstat
|
|
Sandy, a technician, needs to customize various cable lengths and verify that the cables are
working correctly. Which of the following tools would be needed to accomplish this? (Select TWO). A. Cable certifier B. Multimeter C. Crimper D. Punch down tool E. Loopback plug |
Cable certifier
Crimper |
|
Which of the following is an invalid MAC address?
A. AA:CE:58:FD:90:08 B. 44:98:3E:F8:33:23 C. 56:AD:BX89:55:54 D. 94:9E:FE:EE:8C:DF |
56:AD:BX89:55:54
|
|
On which of the following layers does a hub function?
A. Transport B. Data link C. Physical D. Network |
Physical
|
|
Sandy, an administrator, is experiencing availability issues on a Linux server. She decides to
check the server for an IP address conflict on the server. Which of the following commands should Sandy use? A. Traceroute B. Tracert C. Ifconfig D. Ipconfig |
ifconfig
|
|
Which of the following protocols does a router use to communicate packets to other routers?
A. RIP B. VLAN C. STP D. VTP |
RIP
|
|
Which TCP/IP model layer does the OSI model layer named 'session' respond to?
A. Application B. Presentation C. Internet D. Transport |
Presentation
|
|
Which of the following defines access for a network?
A. ACL B. RDP C. RAS D. ARP |
ACL
|
|
Which of the following protocols would Sandy, a technician, use to disable switch ports
automatically to prevent switching loops? A. RIP B. OSPF C. STP D. EGP |
STP
|
|
Karen, an administrator, finds a phone line but does not know where the line goes or if it is active.
Which of the following can be used to test if it is active? A. Butt set B. Punch down tool C. Cable tester D. Cable stripper |
Butt set
|
|
After a brownout, Kurt, a user, can connect to the internal network, but not the Internet. Which of
the following is the company's DSL router experiencing that is causing this issue? A. Switching loop B. Power failure C. Broadcast storm D. Duplicate IP address |
Power failure
|
|
The protocols that use a three way handshake to transfer information can be found within which
layer of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 |
Layer 4
|
|
Which of the following uses copper wiring?
A. 10GBaseER B. 10GBaseLW C. 100BaseFX D. 1000BaseT |
1000BaseT
|
|
Which of the following is a reason to use dynamic DNS?
A. The host IP address is not listed in the firewall. B. The host IP address is assigned by DHCP. C. Static routes cannot be used on the host network. D. A third-party certificate is being used. |
The host IP address is assigned by DHCP.
|
|
Sandy, a network consultant, is asked to set up a wireless network in a home. The home user
wants the wireless network to be available in every corner of the house. Which of the following additional information will Sandy need to determine the equipment for the installation? (Select TWO). A. The length of the house B. How many rooms are in the house? C. How many users will be using the wireless network? D. The building material of the house E. The cost of the house |
The length of the house
The building material of the house |
|
Which of the following should Joe, a technician, implement to provide high bandwidth to a VoIP
application? A. Caching engines B. Fault tolerance C. Load balancing D. High availability |
Load balancing
|
|
Joe, a network technician, is concerned about the environmental effects of power consumption
and heat from network resources. Limited space is also a concern. Which of the following technologies should be implemented? A. Circuit switching B. Network address translation C. Power over Ethernet D. Virtual servers |
Virtual servers
|
|
Which of the following is used by RADIUS to encrypt messages between the server and the
client? A. Public key B. CSU/DSU C. Private key D. Shared secret |
Shared secret
|
|
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
A. 1, 6, 11 B. 2, 7, 10 C. 2, 8, 13 D. 3, 6, 9 |
1,6,11
|
|
Which of the following is the port number used by HTTP?
A. 21 B. 80 C. 443 D. 3389 |
80
|
|
Which of the following is most effective against threats when used with an updated server? (Select
TWO) A. Kerberos server B. Stateful firewall C. Content filter D. IDS E. VPN concentrator |
Content filter
IDS |
|
A crossover cable is MOST commonly associated with which of the following layers of the OSI
model? A. Session B. Application C. Network D. Physical |
Physical
|
|
For security reasons Kurt, a network technician, wants to install a Linux based email server.
Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs? A. VPN concentrator B. Virtual servers C. Wireless D. Multimode fiber |
Virtual servers
|
|
A company is about to install a second network connection with a new ISP. Which of the following
routing protocols is the BEST choice? A. IS-IS B. BGP C. OSPF D. RIP |
BGP
|
|
A layer 3 switch can move packets between subnets based on which of the following criteria?
A. 802.1q tag B. Port C. Application D. IP address |
IP address
|
|
A bridge handles frames at which of the following layers of the OSI model?
A. Network B. Session C. Transport D. Data Link |
Data Link
|
|
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is
Joe MOST likely connecting? A. A 110 block B. A demarc C. A DB-9 D. A smart jack |
110 block
|
|
Joe, an administrator, has just finished installing a new switch and connected two servers with IPs
of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem? A. The subnet mask is incorrect. B. A routing loop has occurred. C. Joe used a crossover cable to connect the switch to the gateway D. The server is missing default-gateway information |
The server is missing default-gateway information
|
|
Which of the following devices should Joe, an administrator, connect to a protocol analyzer in
order to collect all of the traffic on a LAN segment? A. Hub B. VLAN C. Router D. Server |
Hub
|
|
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present? A. Reverse ARP B. Full duplex on the fiber link C. PoE D. 802.1q trunking |
802.1q trunking
|
|
Sandy, a user, is unable to access the company website on a laptop. A network technician verifies
that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT? A. Remotely connect to Sandy’s laptop and review the network configuration settings. B. Ping the web server from inside the network to ensure it is still up and running. C. Check to make sure the company’s website is accessible from the Internet. D. Ensure the Ethernet cable is securely plugged into Sandy’s laptop. |
Check to make sure the company’s website is accessible from the Internet.
|
|
Which of the following ports is the default telnet port?
A. 20 B. 21 C. 22 D. 23 |
23
|
|
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. This is a private address which cannot be seen by external users. B. The address does not have the appropriate subnet mask assigned. C. This is a public address which can only be seen by internal users. D. This is a private address which can only be seen by external users |
This is a private address which cannot be seen by external users.
|
|
Users have reported slow access times when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server? A. arp B. route C. ipconfig D. tracert |
tracert
|
|
Karen, a network administrator, needs to add an additional connection to a room. She adds a new
Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches? A. CAT3 cable B. Serial cable C. Crossover cable D. Rollover cable |
Crossover cable
|
|
Which of the following DNS record types provides the hostname to IP address mapping?
A. A record B. NS record C. CNAME record D. MX record |
A record
|
|
The selection of the correct punch down tool to use depends on which of the following?
A. Connector type B. Demarcation point location C. Block type D. Switch location |
Block type
|
|
Which of the following uses a ring topology?
A. DSL B. Ethernet C. DOCSIS D. SONET |
SONET
|
|
1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet) B. 100 meters (328 feet) C. 500 meters (1640 feet) D. 1000 meters (3280 feet) |
100 meters (328 feet)
|
|
Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404:
Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7 |
Layer 1
|
|
Which of the following protocols is Joe, a technician, using to encrypt data between web servers
and web browsers? A. SMTP B. SIP C. HTTP D. SSL |
SSL
|
|
Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to
the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose? A. CAT3 B. STP C. Coaxial D. Fiber |
Fiber
|
|
Karen, a customer, wants to install a wireless network into a shared office space. There are
several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO). A. SSID B. Channel C. Antenna type D. Wireless standard E. NAT |
SSID
Channel |
|
Which of the following connector types is MOST commonly found with coaxial cabling?
A. DB-9 B. BNC C. RJ-45 D. RJ-11 |
BNC
|
|
Which of the following connector types will MOST likely be located on a serial cable?
A. DB-9 B. LC C. ST D. BNC |
DB-9
|
|
Kurt, a user, on a network cannot access any network resources. The link light on his computer
shows that a connection is present. Which of the following is the MOST likely cause of the problem? A. The wrong cable type has been used B. IDS has shut down the computer's switch port C. The port on the switch is configured incorrectly D. Spanning tree protocol was implemented |
The port on the switch is configured incorrectly
|
|
A router that takes the workstations internal IP address and changes it to another IP address when
it sends the data outside of the network is and example of which of the following? A. NAT B. IDS C. NMAP D. DMZ |
NAT
|
|
Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away
from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable? A. Install two CAT6 cables with a repeater. B. Install a 500 foot (152 meter) CAT5 cable. C. Install a 500 foot (152 meter) CAT5e cable. D. Install three CAT6 cables with a repeater. |
Install two CAT6 cables with a repeater
|
|
Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives
reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet 0/10 Switchport trunk encapsulation dotlq Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections? A. The servers have not had VLAN tagging enabled on their NICs B. Speed and duplex have not been set C. VLAN tagging was not set on the trunk D. The servers have been connected with CAT5 cable |
Speed and duplex have not been set
|
|
Karen, an administrator, wants to list all the network connections to and from the server. Which of
the following commands would MOST likely be used? A. traceroute B. ping C. ipconfig D. netstat |
netstat
|
|
Before installing a wireless network, which of the following should Karen, a network technician,
take into consideration to reduce signal exposure for war drivers? A. Device placement B. MAC address filtering C. User authentication D. Encryption protocols |
Device placement
|
|
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to
pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080 |
161
162 |
|
Which of the following virtual components maintains a MAC-to-port forwarding table?
A. Virtual PBX B. Virtual desktop C. Virtual switch D. Virtual server |
Virtual switch
|
|
In which of the following layers of the OSI model does the TCP protocol operate?
A. Session B. Network C. Data link D. Transport |
Transport
|
|
A. CSMA/CA
B. CSMA/CD C. Wireless encryption D. Wireless bonding |
CSMA/CA
|
|
Creating a uniform user environment throughout the network can BEST be achieved by using
which of the following? A. Honeypots B. Virtual switches C. Virtual PBX D. Virtual desktops |
Virtual desktops
|
|
After a baseline check was completed it was noted that the network was working far below the
level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring? A. Upgrade the firmware on all routers and switches B. Reboot the entire network one device at a time C. Conduct a network traffic analysis D. Rerun the baseline to ensure the results were correct |
Conduct a network traffic analysis
|
|
Which of the following layers of the OSI model maps to the Network Interface layer of the TCP
stack? (Select TWO). A. Physical B. Session C. Data Link D. Network E. Transport |
Physical
Data Link |
|
Which of the following would help a new administrator quickly determine if a network had a VLAN
for its publicly accessible servers? A. Baselines B. Regulations C. Logical network diagrams D. Wiring schematics |
Logical network diagrams
|
|
Keyword and blacklist filtering would be handled at which level in a network?
A. Layer 2 managed switch B. DHCP server C. Hardware firewall D. Bridge |
Hardware firewall
|
|
A common technique used to prevent the unauthorized network devices from sending traffic
across a network is port. A. spanning B. address translation C. mirroring D. authentication |
authentication
|
|
When installing two 802.11g access points in the same building, which of the following channels
will MOST likely be used to minimize interference? A. 5 and 6 B. 1 and 6 C. 6 and 10 D. 2 and 6 |
1 and 6
|
|
Which of the following devices transmits timed broadcasts onto an active network?
A. Bridge B. Unmanaged switch C. DHCP client D. Firewall |
DHCP client
|
|
Which of the following describes the location where an administrator would terminate a bundle of
CAT5e cables? A. Switch B. Smart jack C. Router D. Patch panel |
Patch panel
|
|
Which of the following can be an STP cable?
A. RG-6 B. CAT5e C. Fiber D. RG-59 |
CAT5e
|
|
Which of the following is used to identify active hosts along with their network addresses?
A. Port scan B. Ping sweep C. IDS D. NIPS |
Ping sweep
|
|
A web server is running correctly but sending a RST packet to any client trying to connect using
HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server? A. Route B. Ifconfig C. Netstat D. Nslookup |
Netstat
|
|
Which of the following utilities can be used to list the routing table?
A. ipconficj B. nslookup C. netstat D. dig |
netstat
|
|
At which of the following layers does the TFTP protocol operate?
A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7 |
Layer 7
|
|
Which of the following is an EGP routing protocol?
A. IGP B. OSPF C. BGP D. RIP |
BGP
|
|
Which of the following is the name of the routing update process involved when a change occurs
in the routing environment? A. Supernetting B. Dynamic C. Subletting D. Convergence |
Convergence
|
|
Which of the following features should an administrator configure to allow an IDS to watch the
traffic on a switch? A. ARP spoofing B. VLAN C. Mirroring D. Spanning tree |
Mirroring
|
|
Which of the following utilities would be used to display a NIC's cache of MAC addresses?
A. arp B. nslookup C. dig D. netstat |
arp
|
|
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes
on either side of the data link? A. Gateway B. Hub C. Bridge D. Router |
Bridge
|
|
Which of the following security devices would MOST likely be used on a network to screen and
prevent malicious traffic? A. IDS B. VPN C. NIPS D. HIDS |
NIPS
|
|
At which of the following layers does the ICMP protocol operate?
A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 5 |
Layer 3
|
|
A user reports sporadic connectivity with their wireless connection. A technician determines the
wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue? A. The client does not support 802.11n. B. Incorrect frequency on the client is being used. C. Incorrect encryption on the AP. D. The client distance from the AP. |
The client distance from the AP.
|
|
Which of the following are common VPN transports? (Select TWO)
A. RDP B. VNC C. SSL D. PPTP E. RAS |
SSL
PPTP |
|
Which of the following are valid MAC addresses? (Select TWO)
A. 00-1C-1F-2C-13-43 B. FFFF.FFFF.FFFF C. 00-1B-26-3F-B1-16-34 D. 00-01-1E-2F-B3-16-01 E. 001C.1G2F.1234 |
00-1C-1F-2C-13-43
FFFF.FFFF.FFFF |
|
Which of the following tools would an administrator use to determine if a DNS server is answering
authoritatively for a domain? A. nbtstat B. dig C. netstat D. hostname |
dig
|
|
Which of the following is a correct IP ACL? (Select TWO)
A. PERMIT 192.268.20.1 B. DROP 00-12-34-56-78-9A C. DENYO:::0:::0:::3 D. DENY ANY ANY E. PERMIT 192.168 1.100 80 |
DENY ANY ANY
PERMIT 192.168.1.100 80 |
|
Which of the following is an example of a MAC address?
A. 10.0.10.1 B. 1A-23-F9-CD-06-9L C. 1A-23-F9-CD-06-9B D. 1A-23-F9-CD-06-9B-23-5C |
1A-23-F9-CD-06-9B
|
|
A Stateful firewall is MOST useful in protecting against which of the following network scans?
A. PING B. UDP C. Xmas D. ACK |
Xmas
|
|
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port
53? A. Network layer firewall B. Stateful inspection firewall C. Zone aware firewall D. Application layer firewall |
Application layer firewall
|
|
An administrator is setting up a network and would like to prevent users from having the ability to
plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use? A. NAT B. Dynamic C. Subnetting D. Static |
Static
|
|
Which of the following features does SNMPv3 have over previous versions when remotely
monitoring networking devices? (Select TWO). A. Trap receivers B. HTTPS C. Authentication D. Privacy E. Availability |
Authentication
Privacy |
|
An administrator only has one public IP address that must be shared among five employees.
Which of the following network schemes should be used? A. SNAT B. SNAP C. NAC D. MPLS |
SNAT
|
|
Which of the following authenticates a web server to the remote client in PKI?
A. FQDN B. DNS name C. Public key D. Private key |
Public key
|
|
An administrator needs to diagnose problems with a WINS server. Which of the following tools
should be used? A. nslookup B. nbtstat C. dig D. netstat |
nbtstat
|
|
In an enterprise setting, access switches providing network connectivity placed throughout a
building are typically connected to a backbone called the: A. MDF B. Proxy C. Demarcation point D. Smart jack |
MDF
|
|
Which of the following solutions will detect and disable a rogue access point?
A. Port scan B. Packet sniffer C. IPS D. IDS |
IPS
|
|
A zone transfer occurs over which of the following ports?
A. TCP 53 B. UDP67 C. UDP123 D. TCP 25 |
TCP 53
|
|
A technician claims to have crimped a patch cable according to the T568A standard on one end
and T568B on the other. Which of the following results is to be expected? A. Since only half the leads are used, the cable will only work at 100Mbps. B. The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables. C. There will be no proper data continuity; the standards utilize two different wiring diagrams. D. The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables |
There will be no proper data continuity; the standards utilize two different wiring diagrams.
|
|
An administrator is setting up a security camera that will send the same feed to twelve of the
twenty workstations on the network. Which of the following addressing schemes was designed for this scenario? A. Multicast B. Unicast C. Broadcast D. Peer-to-peer |
Multicast
|
|
Which of the following protocols requests membership to a multicast group?
A. IGMP B. SNMP C. SMTP D. ICMP |
IGMP
|
|
A standard installation for wireless will use which of the following antenna types?
A. Sector B. Patch C. Yagi D. Omni-Directional |
Omni-Directional
|
|
Which of the following regulates the amount of network traffic a single node receives in a server
cluster? A. Load balancer B. Proxy server C. Content filter D. Quality of service |
Load balancer
|
|
A technician would like to separate the HR department's workstations from the other workstations
at the company. Which of the following network topologies should be used? A. Peer to peer B. Subnetting C. VLAN D. VPN |
VLAN
|
|
A client wants to improve the wireless coverage on the third floor of their house. The wireless
router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables? A. Switch B. Router C. Repeater D. Bridge |
Repeater
|
|
Which of the following describes what the number two represents in l00Base2 cabling?
A. Fiber B. Coaxial cable C. UTP D. Twisted pair |
Coaxial cable
|
|
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
A. 1000BaseT B. 10GBaseSW C. 100BaseFX D. 100BaseTX |
10GBaseSW
|
|
Which of the following is a disadvantage of using the EIGRP protocol?
A. It does not scale well. B. It converges slower than OSPF. C. It is a proprietary protocol. D. It is a distance vector protocol. |
It is a proprietary protocol.
|
|
Which of the following routing protocols runs over UDP and determines path based upon distance
vectors? A. RIP B. DSI C. BGP D. ISIS |
RIP
|
|
Which of the following is equipment provided by the telephone company that provides remote
diagnostic and loopback services for subscriber lines? A. 66 block B. Demarc C. Smart jack D. 110 block |
Smart jack
|
|
An administrator is troubleshooting a communication issue between two computers on the same
Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue? A. Setup an ACL that allows and logs all IP traffic between the two computers B. Configure a spanning tree to check for a loop C. Setup a span port on the switch to watch for CRC errors D. Connect both computers using a crossover cable |
Connect both computers using a crossover cable
|
|
Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic? A. Switch B. Hub C. Modem D. Repeater |
Hub
|
|
Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select
TWO) A. NTP B. VNC C. RTP D. SIP E. TLS |
RTP
SIP |
|
Which of the following is a secure method of copying information over a public network?
A. SCP B. SMTP C. SNMP D. TFTP |
SCP
|
|
An administrator needs to authenticate users to the network, authorize network activities, and
account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO). A. TACACS+ B. RADIUS C. Kerberos D. 802.1X E. RRAS |
TACACS+
RADIUS |
|
An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the
following will help diagnose this issue? A. Multimeter B. Toner probe C. Protocol analyzer D. Butt set |
Toner probe
|
|
An administrator wants to test the network MTU. Which of the following commands allows different
size packets to be sent? A. netstat B. traceroute C. nbtstat D. ping |
ping
|
|
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband
connection on many routers? A. DSL B. POTS C. VDSL D. Smart jack |
POTS
|
|
Which of the following protocols uses UDP to transfer files?
A. FTP B. SFTP C. SMTP D. TFTP |
TFTP
|
|
Which of the following would be used to connect two IDFs in the same building with the LAN, while
minimizing crosstalk? A. RG-6 B. STP C. CAT3 D. UTP |
STP
|
|
Which of the following network devices would MOST likely be installed to allow the company's
single public IP to be shared and translated into local IPs for network devices? A. Router B. Hub C. WAP D. Switch |
Router
|
|
A technician who separated two departments using VLANs now discovers that the VLANs cannot
communicate with each other. Which of the following does the technician need to enable communication between the VLANs? A. Port spanning B. VLAN concentrator C. Firewall D. Router |
Router
|
|
Which of the following network topologies BEST describes a VPN? (Select TWO)
A. Point to Point B. Point to Multipoint C. VLAN D. Ring E. Bus |
Point to Point
Point to Multipoint |
|
Which of the following cable speeds would provide the GREATEST theoretical bandwidth?
A. 1000BaseT B. 100BaseT C. 10GBaseT D. 10BaseT |
10GBaseT
|
|
Which of the following is true about an IP address if the first bit is a zero?
A. The address is a Class A address. B. The address is a Class B address. C. The address is a Class C address. D. The address is a Class D address. |
The address is a Class A address
|
|
Which of the following is typically used In an LAN environment?
A. 10GBaseSW B. 10GBaseLW C. 10GBaseSR D. 10GBaseEW |
10GBaseSR
|
|
After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are
straight-thru wires. Which of the following MOST likely describes this cable type? A. Crossover cable with open pairs B. Crossover cable C. Rollover cable D. Straight-thru cable with open pairs |
Crossover cable
|
|
A server keeps rebooting at various times throughout the day. Which of the following tools would
BEST help to diagnose this issue? A. Multimeter B. Temperature monitor C. Cable tester D. Toner probe |
Temperature monitor
|
|
Which of the following devices would allow a technician using a packet sniffer to view all the data
on a network? A. GBIC B. Hub C. Bridge D. Modem |
Hub
|
|
Which of the following allows a technician to mask a private network of IP addresses behind one
public IP address? A. NAT B. Subnetting C. DHCP D. DNS |
NAT
|
|
An administrator is deploying three B/G wireless access points in a new office location. Which of
the following channels eliminates interference? A. 1, 6, and11 B. 3, 6, and 9 C. 11,16, and20 D. 36, 40, and 44 |
1, 6, and11
|
|
Which of the following is a reason to block FTP at the corporate firewall?
A. It does not transfer encrypted files. B. It cannot be tunneled in a VPN. C. It is a deprecated protocol. D. It transmits passwords in clear text. |
It transmits passwords in clear text.
|
|
A network IPS provides which of the following?
A. The layer 3 protocol on which other protocols like TCP and UDP communicate. B. Enables the IPSec protocol on internal workstations. C. Packet-based detection and prevention of network attacks. D. Single mode IP communication for a fiber line between remote sites. |
Packet-based detection and prevention of network attacks.
|
|
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful
address. Which of the following is the address that can be used in this scenario? A. 10.178.1.5/1 B. 10.178.1.5/8 C. 10.178.1.5/16 D. 10.178.15/30 |
10.178.1.5/8
|
|
Which of the following tools would a technician use to check functionality of a physical network
connection? A. Butt set B. Cable tester C. Protocol analyzer D. Voltage event recorder |
Cable tester
|
|
A technician needs to troubleshoot connectivity between two devices located on the same
network. Which of the following BEST describes the type of protocol being used? A. IGP B. EIGRP C. EGP D. BGP |
IGP
|
|
Which of the following ports are used by default for web servers? (Select TWO).
A. 80 B. 110 C. 123 D. 143 E. 443 |
80
443 |
|
Which of the following connectivity issues is likely to occur within a token ring network?
A. Crosstalk B. Broadcast storm C. Duplex mismatch D. Collision |
Collision
|
|
An administrator is having a hard time adding a new switch to the network. After verifying that all
the ports are configured correctly on each switch, which of the following should the administrator verify NEXT? A. Straight-through cable is used to connect both switches B. Loopback plug is connected C. Crossover cable is used to connect both switches D. Cable is a rollover cable |
Crossover cable is used to connect both switches
|
|
Which of the following devices would MOST likely integrate a DHCP server?
A. Router B. Hub C. Switch D. Bridge |
Router
|
|
The helpdesk is receiving calls about the corporate web server being down. Which of the following
should be taken NEXT after verifying that the server is unreachable? A. Escalate the call to a technician B. Document any changes in the web server configuration. C. Implement and test a solution. D. Continuously ping the server until a ping response is obtained |
Escalate the call to a technician
|
|
Which of the following tools would an administrator BEST use to trace a network cable?
A. Toner B. Cable tester C. Butt set D. Multimeter |
Toner
|
|
An administrator wants to prevent users from plugging in their personal laptops and accessing the
Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed? A. Multilayer switch B. CSU C. Proxy server D. IDS |
Proxy server
|
|
Which of the following technologies allows an administrator to submit traffic to an IDS for review?
A. Spanning tree B. VLAN C. PoE D. Port mirroring |
Port mirroring
|
|
Which of the following is true of an ACL when a packet matching an ACE is found?
A. The matching ACE is skipped to allow all other ACEs to be examined. B. The matching ACE is processed and then the last ACE is examined. C. The matching ACE is processed and then the next ACE is examined. D. The matching ACE is processed and the next packet is examined. |
The matching ACE is processed and the next packet is examined.
|
|
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL B. SDSL C. OC3 D. ATM |
ATM
|
|
A user connecting a laptop to a wall jack is prompted for user credentials before being granted
access to the network. Which of the following is MOST likely implemented on the switch? A. MAC filtering B. PoE C. IP filtering D. 802.1X |
802.1X
|
|
A network administrator needs to add an additional connection to a room. The administrator adds
a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches? A. CAT3 cable B. Serial cable C. Crossover cable D. Rollover cable |
Crossover cable
|
|
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
A. 10GBaseER B. 10GBaseSW C. 10GBaseLW D. 10GBaseEW |
10GBaseLW
|
|
A technician needs to add network capacity. However, when plugging a second switch into the first
switch, there is no link light. Which of the following is the cause of this situation? A. The switches are not stackable. B. The cable was not wired using 568A. C. The cable needs to be a crossover cable D. The switches have IGMP snooping enabled |
The cable needs to be a crossover cable
|
|
When testing a CAT5 cable, the technician notices that pin A is open. However, the cable still
works fine. Which of the following describes how this is possible? A. The cable was tested for 100BaseTX. B. The cable is a 1000BaseT cable. C. The switch uses link aggregation, D. The switch was setup to use MDIX |
The cable was tested for 100BaseTX.
|
|
Users are unable to access the Internet but the users are able to send/receive email from their
desktops. Which of the following ports is MOST likely being blocked? A. 25 B. 80 C. 110 D. 143 |
80
|
|
Which of the following would need to be implemented on a wireless router to allow network access
based on a passphrase that the administrator would supply? A. WPA-PSK encryption B. SSID broadcast C. Port forwarding D. MAC filtering |
WPA-PSK encryption
|
|
Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO)
A. OSPF B. RIP C. EIGRP D. IGRP E. RIPv2 |
RIP
IGRP |
|
When installing a wireless network in a large area, which of the following is the FIRST thing that
should be considered when trying to get the MOST coverage? A. SSID naming B. Device placement C. Encryption methods D. Channel selection |
Device placement
|
|
Which of the following utilities would be used to display a network's MX record?
A. dig B. nbtstat C. traceroute D. route |
dig
|
|
Which of the following is the term used to describe the aggregation of multiple components to form
one logical component? A. Bonding B. Circuit switching C. CSMA/CD D. Channelization |
Bonding
|
|
Which of the following performs posture assessments for unknown devices that connect to the
network? A. PKI B. EAP C. NAC D. AAA |
NAC
|
|
At which of the following OSI model layers is HTTPS encryption performed?
A. Layer 3 B. Layer 5 C. Layer 6 D. Layer 7 |
Layer 7
|
|
Which of the following network cable types requires grounding?
A. STP B. UTP C. Fiber D. Serial |
STP
|
|
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?
A. Secure VPN B. MAC filtering C. IP filtering D. Static IP addresses |
MAC filtering
|
|
On which of the following network devices would an administrator configure an ACL?
A. Router B. Hub C. Repeater D. NIC |
Router
|
|
Which of the following analyzes the entire subnet to identify all hosts that are active?
A. Ping sweep B. Packet sniffer C. Traceroute D. Port scanner |
Ping sweep
|
|
A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs
the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the: A. RJ-11 connector needs to be re-crimped B. User has plugged into the laptop's NIC port C. User has plugged the wrong end of the cable into the port D. RJ-11 connector needs to be replaced with an RJ-45 connector |
User has plugged into the laptop's NIC port
|
|
Which of the following is true of stateless inspection?
A. It is not able to determine which ports to block. B. It is able to detect packets from established connections only. C. It is able to determine the connection state of all packets going through the firewall D. It is not able to determine if a packet is related to an established connection. |
It is not able to determine if a packet is related to an established connection.
|
|
An administrator would like to know the name of the workstation that is being repaired. Which of
the following commands, without parameters, will provide this information? A. Hostname B. Ipconfig C. Netstat D. Ping |
Hostname
|
|
Which of the following routing protocols involves all routers knowing the connections status of
other routers within the network? A. RIPv2 B. OSPF C. IGRP D. BGP |
OSPF
|
|
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the
laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed? A. The laptop is too far away from the WAP. B. The WAP is using 802.11a frequencies. C. The laptop is only set to allow 802.11n connections. D. The technician is on an 802.11b network. |
The technician is on an 802.11b network.
|
|
Which of the following network devices would MOST likely be installed on a network to help
reduce broadcast traffic and to allow individual virtual networks? A. Switch B. Repeater C. Hub D. WAP |
Switch
|
|
A natural disaster has occurred and the administrator must return the network to a healthy status.
Which of the following should the administrator do in this case? A. Follow the emergency action plan. B. Wait for an issue to be reported. C. Establish a new baseline. D. Determine if escalation is necessary |
Follow the emergency action plan.
|
|
Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present? A. Reverse ARP B. Full duplex on the fiber link C. PoE D. 802.1q trunking |
802.1q trunking
|
|
Which of the following connector types is commonly identified by two rows of pins with four in one
row and five in the other? A. DB-9 B. RJ-45 C. SC D. BNC |
DB-9
|
|
At which of the following layers does the UDP protocol operate?
A. Layer 1 B. Layer4 C. Layer 6 D. Layer 7 |
Layer4
|
|
Interior gateway protocols are used for resolving routes:
A. Between networks B. Within routers C. Within networks D. Between WAPs |
Within networks
|
|
Which of the following commands would allow a computer to acquire an IP address?
A. ipconfig/release B. ipconfig/renew C. ipconfig/all D. ipconfig/help |
ipconfig/renew
|
|
Which of the following protocols can be used to retrieve system and network performance
information from a router? A. LDAP B. IMAP C. TFTP D. SNMP |
SNMP
|
|
Which of the following devices can be installed on individual computers throughout the network?
A. NIPS B. Network-based firewall C. VPN concentrator D. Host-based firewall |
Host-based firewall
|
|
Several users are sending emails to CompTIA.org. but they are not being received. Which of the
following commands could be used to verify that the company is able to connect to the mail service at CompTIA.org? A. Ping B. Arp C. Dig D. telnet |
telnet
|
|
Which of the following metrics indentifies the number of connections that is between two devices?
A. Hop count B. MTU C. Latency D. Bandwidth |
Hop count
|
|
Which of the following tools can be used to identify the location of a network outage?
A. traceroute B. netstat C. nslookup D. ping |
traceroute
|
|
Which of the following has a maximum data rate of 11Mbps?
A. 802.11n B. 802.11g C. 802.11b D. 802.11a |
802.11b
|
|
Which of the following networks are reserved for private IP addresses?
A. 168.129.00/24 B. 172.16.128.0/15 C. 192.168.0.0/16 D. 162.17.0.0/12 |
192.168.0.0/16
|
|
An administrator needs to terminate network cables that have just been installed in the main
communications closet. Which of the following tools is required? Q. 418 p. 143 A. Multimeter B. Snips C. Toner probe D. Punch down tool |
Punch down tool
|
|
A small business with eight employees has just opened their office in a renovated loft in a busy
downtown area. The owner of the building does not want to run any additional wiring beyond power, to preserve the historic nature of the building. Because of this stipulation, almost all tenants in the building have chosen to implement wireless. Which of the following should be the FIRST step in setting up this SOHO network? A. Run a wireless site survey B. Speak to tenants to determine their telephone standards. C. Install and configure a Gigabit switch. D. Determine the operating system versions. |
Run a wireless site survey
|
|
Two business partners have recently been connected via a dedicated extranet. It has been
discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues? A. Multicast B. PAT C. CIDR D. NAT |
NAT
|
|
Two autonomous networks who wish to exchange routing data should use which of the following protocols?
A. OSPF B. BGP C. EIGRP D. IS-IS |
BGP
|
|
A computer is able to ping other devices on the same network but is unable to ping devices on
another network. Which of the following needs to be configured? A. DNS primary server B. Host route C. Proxy ARP D. Default gateway |
Default Gateway
|
|
A technician at a company providing online, real-time media streaming to the Internet needs a
network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements? A. Subnetting B. Unicast C. Broadcast D. Multicast |
Multicast
|
|
Which of the following would be used to lock all of the primary communication equipment of a
building, including its demarcation point? A. MTR B. MDF C. Smartjack D. IDF |
MDF
|
|
Which of the following restricts network access to a router administrator's interface?
A. IDS B. SSL C. ACL D. SMNPv2 |
ACL
|
|
In which of the following topologies could the failure of one machine cause the entire network to
stop functioning? A. Mesh B. Token ring C. Star D. Spanning tree |
Token ring
|
|
A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a
169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type? A. Multicast B. DHCP C. APIPA D. Broadcast |
APIPA
|
|
Which of the following address formats uses 32-bit addressing?
A. IPv4 B. MAC address C. IPv6 D. Host address |
IPv4
|
|
Determining when to retransmit frames is an example of which of the following Ethernet
properties? A. Carrier sense B. Collision detection C. Multiple access points D. Collision avoidance |
Collision detection
|
|
The T568B wiring standard slates that CAT5 cables should be coded as follows:
A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown, B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown, C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown, D. White/Orange, Orange, White/Green, Blue, |
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
|
|
Using network monitoring tools would allow an administrator to do which of the following?
A. Configure offline devices B. Examine performance issues C. Install additional software and updates D. View syslog events |
Examine performance issues
|
|
Which of the following WAN protocols is a packet switching technology?
A. Frame Relay B. POTS C. PSTN D. ISDN |
Frame Relay
|
|
Which of the following layers of the OSI model is the presentation layer?
A. Layer 1 B. Layer 5 C. Layer 6 D. Layer 7 |
Layer 6
|
|
The "1000" in 1000BaseT cabling represents which of the following?
A. The theoretical maximum cable length B. The theoretical maximum bandwidth C. The theoretical port limit of the cable D. The quality level of the copper wiring used |
The theoretical maximum bandwidth
|
|
Which of the following protocols is commonly used by ping?
A. SIP B. ICMP C. TFTP D. ARP |
ICMP
|
|
Which of the following WAN protocols is a circuit switching technology?
A. ISDN B. SONET C. Frame Relay D. ATM |
ISDN
|
|
When verifying a new wireless installation the administrator is unable to see a wireless signal with
any wireless laptop. The MOST likely problem is: A. The SSID is not set to broadcast B. An incorrect channel is being used C. Incorrect client security settings are configured D. Incorrect client configuration on the laptops |
The SSID is not set to broadcast
|
|
Link aggregation is also known as port:
A. distribution B. mirroring C. spanning D. trunking |
Distribution
|
|
802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the
following? A. 460 feet (140 meters) B. 540 feet (165 meters) C. 560 feet (171 meters) D. 840 feet (256 meters) |
460 feet (140 meters)
|
|
Which of the following devices allows multiple internal IP addresses to access an external website
with minimal impact to the network bandwidth? A. Proxy B. Load balancer C. Router D. Bandwidth shaper |
Proxy
|
|
Which of the following is a TRUE statement about static routing vs. dynamic routing?
A. Dynamic routing is created adhoc and static routing cannot be changed once implemented. B. Static routing is hard-coded and requires significant administrative overhead for large networks. C. Static routing requires little administrative overhead and dynamic routing requires significant administrative overhead. D. Dynamic routing is the best solution for small networks and static routing is the best solution for large scale networks. |
Static routing is hard-coded and requires significant administrative overhead for large networks.
|
|
A VPN connection is not working correctly and the technician is unable to ping the VPN server.
Which of the following actions should the technician do FIRST? A. Call their local ISP B. Verify the IP information of the server C. Check their local Internet connection D. Verify the hostname of the server |
Check their local Internet connection
|
|
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator
receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem? A. The laptop is missing the software supplicant B. The access point SSID is hidden. C. The laptop only supports TKIP and AES encryption, D. The access point is on the wrong channel. |
The laptop is missing the software supplicant
|
|
Which of the following is used to reduce the number of public IP addresses required?
A. RADIUS B. SNAT C. PAT D. NAT |
NAT
|
|
Multiple users call from the same location saying that they have no network connectivity. The
administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue? A. Baseline configuration B. Security policy C. Performance and transaction logs D. Physical network diagram |
Physical network diagram
|
|
A technician wants to use an existing DHCP server for three additional VLANs. Which of the
following features needs to be configured to allow for this addition? A. DHCP server B. Proxy server C. Repeater D. DHCP relay |
DHCP relay
|
|
An administrator is troubleshooting wireless connectivity issues at a client’s office and discovers
that the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue? A. 802.1 1g B. 802.1X C. 802.11n D. 802.11b |
802.11n
|
|
For security reasons a network technician wants to install a Linux based email server, Microsoft
web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs? A. VPN concentrator B. Virtual servers C. Wireless D. Multimode fiber |
Virtual servers
|
|
Which of the following monitors a server to see which protocols might be in use?
A. Ping sweep B. Intrusion detection software C. Port scanner D. Wireless packet sniffer |
Intrusion detection software
|
|
Which of the following protocols defaults to port 161?
A. SFTP B. SNMP C. SMTP D. SNTP |
SNMP
|
|
Which of the following technologies was designed to provide the FASTEST data rates over analog
phone lines? A. RADSL B. SONET C. ADSL D. MPLS |
ADSL
|
|
Which of the following services can an administrator use to reduce latency and prioritize the flow
of data? A. Fault tolerance B. RADIUS C. QoS D. Load balancing |
QoS
|
|
A small office in which all workstations are using an ISP provided IP range has noticed a
consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement? A. Multicast addressing B. Load balancing C. Address translation D. DHCP |
Address translation
|
|
How many bits are in an IPv6 address?
A. 32 B. 64 C. 128 D. 256 |
128
|
|
A stateless firewall requires a technician to:
A. Write more packet filters. B. Write less packet filters. C. Purchase a license for states. D. Upgrade definitions manually. |
Write more packet filters.
|
|
Which of the following should be used to test an internal NIC without having to connect it to the
network? A. Loopback cable B. Crossover cable C. Rollover cable D. Straight cable |
Loopback cable
|
|
Which of the following has the HIGHEST data rate speed?
A. T1 B. ADSL C. SDSL D. OC-3 |
OC-3
|
|
Users are reporting that they are still experiencing network issues even though a fix was recently
applied. Which of the following troubleshooting methodology steps is the administrator using? A. Escalating the problem B. Testing the solution and identifying the effects C. Continuing to gather information about the same symptoms D. Documenting the solution and the entire process |
Testing the solution and identifying the effects
|
|
Kerberos is a form of user authentication that:
A. Provides users access to network resources. B. Performs router commands after user authentication. C. Provides users with remote access only capabilities. D. Does not require an authentication server |
Provides users access to network resources.
|
|
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following
symptoms? A. Signal loss B. Signal bleed C. Data collision D. Crosstalk |
Signal loss
|
|
Which of the following tools allows an administrator to determine the MAC address of another
computer? A. ping B. arp C. ifconfig D. ipconfig |
arp
|
|
Which of the following is used to create multiple networks from one large network?
A. PAT B. NAT C. Multicast D. Subnetting |
Subnetting
|
|
Which of the following wireless standards was the FIRST standard to be ratified and is used to
support legacy wireless devices? A. 802.11a B. 802.11g C. 802.11b D. 802.11n |
802.11b
|
|
Which of the following commands is used to display other computers running on the network?
A. hostname B. ipconfig C. net view D. nslookup |
net view
|
|
Users are reporting problems connecting to servers in the remote company.com domain. The
administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com? A. dig company.com ns B. ipconfig/all C. ifconfig-a D. dig company.com mx |
dig company.com ns
|
|
In an environment with STP disabled, which of the following is the MOST likely cause of the
exponential increase in repeated packets transferred through the network? A. Incorrect subnet mask B. Mismatched MTU C. Switching loop D. VLAN mismatch |
Switching loop
|
|
Which of the following is the MOST likely authentication scheme used in 802.1x?
A. CHAP B. RADIUS C. TACACS+ D. Kerberos |
RADIUS
|
|
Which of the following does not affect security on a wireless access point?
A. Encryption B. DHCP C. Password D. SSID |
DHCP
|
|
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the
application relies on a specific protocol. Which of the following should the technician use? A. DHCP B. PAT C. Proxy D. IPX |
PAT
|
|
Which of the following routing protocols is strictly a distance vector protocol?
A. IS-IS B. BGP C. EIGRP D. OSPF |
BGP
|
|
Computers on a small network are not able to receive new addresses from the DHCP server.
However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario? A. The DHCP server has an incorrect gateway configured. B. The DHCP server was incorrectly configured with a six hour lease time on addresses. C. The DHCP server was incorrectly configured with no-expiring lease time on addresses. D. The DNS server is no longer functional and internal name-address resolution is down. |
The DHCP server was incorrectly configured with no-expiring lease time on addresses.
|
|
Physical and logical network diagrams are used for which of the following configuration
management goals? A. Track DHCP distribution B. Compare MAC and IP addresses C. Document Internet access history D. Identity network devices |
Identify network devices
|
|
Which of the following is the MOST efficient way to troubleshoot network problems?
A. Create an action plan B. Implement and test a solution C. Determine if anything has changed D. Identity a probable cause |
Determine if anything has changed
|
|
Which of the following OSI model layers is used for logical addressing?
A. Physical B. Transport C. Network D. Data link |
Network
|
|
Which of the following layers is associated with the physical hardware address of a network node?
A. Layer 1 B. Layer 2 C. Layer 6 D. Layer 7 |
Layer 2
|
|
Which of the following cable types has a MAXIMUM transmission speed of 10Mbps?
A. CAT6 B. CAT5 C. Single-mode fiber D. CAT3 |
CAT3
|
|
When debugging a routing problem, the time-to-live (TTL) value can be used to determine:
A. Number of routes available. B. Number of router hops. C. Time that an advertised route is valid. D. Time to make a round trip. |
Time to make a round trip
|
|
Which of the following mitigation techniques would an administrator apply to a device in order to
restrict remote access? A. Disable TELNET B. Disable IGMP snooping C. Enable TELNET but not SSL D. Disable ICMP/ping on device |
Disable TELNET
|
|
Which of the following improves wireless performance by allowing only one wireless transmission
on the network at a time?Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding |
CSMA/CA
|
|
When ordering aT1 line, the network technician tells the telecommunications company that a
particular device is not needed since it is built-in to the router's T1 port. Which of the following devices is the technician referring to? A. CSU/DSU B. ATM C. TDR D. DWDM |
CSU/DSU
|
|
Which of the following is the full range of address block 192.16876.0/23?
A. 192.168.76.0-192.168.77.255 B. 192.168.76.0-192.168.76.255 C. 192.168.76.0-192.168.76.23 D. 192.168.76.0-192.168.78 0 |
192.168.76.0-192.168.77.255
|
|
Which of the following is the MOST secure method to enable remote users to access a company's
internal network resources? A. VPN concentrator B. Network-based firewall C. DMZ D. Stateful firewall |
VPN concentrator
|
|
A network at a small business utilizes a star topology and is experiencing frequent collisions among data packets. Which of the following devices is MOST likely being used?
A. Unmanaged switch B. Hardware firewall C. Hub D. Managed switch |
Hub
|
|
A technician temporarily needs an additional network connection in their office to test a new
workstation. Which of the following is the BEST solution to add a temporary network connection? A. Install a small network switch B. Use port mirroring on the switch C. Split the pairs of the existing jack D. Install a CSU/DSU |
Install a small network switch
|
|
A technician is troubleshooting a network connectivity issue with a user's desktop configured to
use a static IP address. The technician notes the following configuration: IP 172.16.2.0 NETMASK 255.255.254.0 DEFAULT GATEWAY 172.16.1.1 DNS 192.168.1.1 Which of the following changes will allow the desktop to communicate properly with remote networks? A. Changing the DNS to 172.16.1.100 B. Changing the WINS server to 172.174.136 C. Changing the netmask to 255.255.255.0 D. Changing the default gateway to 1 72.16.3.1 |
Changing the default gateway to 1 72.16.3.1
|
|
An administrator needs to know the workstation name of a user who called in for support in order
to remotely manage it. After calling the user and having the user open a command prompt, which of the following commands would the administrator ask the user to type? A. Netstat B. Ifconfig C. Hostname D. Ping |
Hostname
|
|
A user is trying to connect their new desktop to the network but is unable to get an IP address.
The technician tests the cable and finds that there are too many open pairs. Which of the following wiring standards needs to be used in the replacement cable? A. 568B B. Crossover C. 569-A D. 607-A |
568B
|
|
Which of the following protocols uses port 119, by default?
A. NNTP B. NTP C. TFTP D. FTP |
NNTP
|
|
Session affinity is a feature of which of the following devices?
A. DNS server B. DHCP server C. Load balancer D. IPS |
Load balancer
|
|
Which of the following describes 1Gigabit Ethernet?
A. 10GBaseER B. 10Base2 C. 1000BaseT D. 100Base5 |
1000BaseT
|
|
A user in the accounting department reports that their office is able to connect to the network, but
they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue? (Select TWO). A. Physical network diagram B. Job log C. Acceptable use policy D. Baseline documentation E. Wiring schematic |
Physical network diagram
Wiring schematic |
|
Which of the following remote access methods allows an administrator to take control of a user's
machine and block the user from seeing the active session? A. PPP B. PPPoE C. RDP D. RAS |
RDP
|
|
Which of the following is primarily used for VoIP?
A. TLS B. RDF C. NTP D. RTP |
RTP
|
|
Which of the following tools would allow an administrator to push out a software update to all
switches on the network? A. Network management B. Protocol analyzer C. Network monitoring D. System diagnostic |
Network management
|
|
Which of the following wiring distribution components uses a bridge clip to connect both sides of
the block? A. 110 Block B. Demarc C. Smart jack D. 66 block |
66 block
|
|
Administrators are performing a war drive around their company's complex. Which of the following
are they attempting to detect? A. Worms B. Rogue access points C. DDoS attacks D. Bluesnarfing attacks |
Rogue access points
|
|
Which of the following is an interior routing protocol that is used to provide routing within
autonomous systems? A. ARP B. IGP C. BGP D. EGP |
BGP
|
|
On a network switch, which of the following is the default native VLAN?
A. 0 B. 1 C. 1024 D. 4096 |
1
|
|
Which of the following LAN technologies is defined as fast Ethernet?
A. 10BaseT B. 100BaseT C. 100BaseFX D. 1000BaseT |
100BaseT
|
|
A user plugged a cable between two network jacks that attach to the same switch and caused a
broadcast storm. Which of the following would have prevented the broadcast storm? A. Spanning tree B. VLAN tagging C. 802.1x D. Port mirroring |
Spanning tree
|
|
Which of the following devices separates a LAN segment into two collision domains, without
affecting the broadcast domain? A. Firewall B. Bridge C. Repeater D. Router |
Bridge
|
|
When configured. MPLS can increase routing redundancy by providing which of the following
network topology types? A. Bus B. Mesh C. Multipath D. Ring |
Mesh
|
|
On which of the following cables would a technician find a BNC connector installed?
A. CAT6 B. RG-6 C. Fiber D. CAT3 |
RG-6
|
|
Which of the following ping parameters will set the size of the outgoing packet?
A. –c B. i C. R D. –s |
–s
|
|
Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?
A. ISDN B. PSTN C. OC-24 D. T1 |
T1
|
|
A user on a network cannot access any network resources. The link light on the computer shows
that a connection is present. Which of the following is the MOST likely cause of the problem? A. The wrong cable type has been used. B. IDS has shut down the computer's switch port. C. The port on the switch is configured incorrectly D. Spanning tree protocol was implemented. |
The port on the switch is configured incorrectly
|
|
At which of the following layers does the TCP protocol operate?
A. Layer 1 B. Layer4 C. Layer 6 D. Layer 7 |
Layer4
|
|
An administrator wants to limit the wireless guest network traffic to 100Kbps so that utilization
issues do not occur on the company's T1 Internet access network. Which of the following optimizations should the administrator implement? A. Load balancing B. Caching engine C. Traffic shaping D. Quality of service |
Traffic shaping
|
|
Which of the following commands would be used to display the IP address on a UNIX/Linux
computer? A. netstat B. ipconfig C. ifconfig D. dig |
ifconfig
|
|
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the
company web address. Which of the following command sequences will test DNS functionality? A. nslookup set type=mx www.company.com B. nslookup Set type=ns @ns.company.com www C. nslookup domain ns.company.com lookup www D. nslookup server ns.company.com www.company.com |
nslookup
server ns.company.com www.company.com |
|
Which of the following components is typically used for voice transmissions and has a 10Mbps
maximum transfer speed? A. 110 block B. Patch panel C. Vertical cross connect D. 66 block |
66 block
|
|
A company is about to install a second network connect on with a new ISP. Which of the following
routing protocols is the BEST choice? A. IS-IS B. BGP C. OSPF D. RIP |
BGP
|
|
A customer wants to network several computers within a large warehouse. The warehouse has
one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer? A. CAT3 B. CAT5 C. CAT6 D. Fiber |
Fiber
|
|
Which of the following represents the physical address of a network access card?
A. FF01:D2:C4:87::11 B. 00-30-48-83-9B-C8 C. 08-9D-35-22-L2-34-FF-21 D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A |
00-30-48-83-9B-C8
|
|
An administrator needs to update a router configuration for a router that does not support SSH.
Which of the following can be used to securely update the router configuration? A. FTP B. SNMPv2 C. TFTP D. HTTPS |
HTTPS
|
|
Which of the following is an invalid IPv4 address?
A. 225.0.0.1 B. 254.254.0.0 C. 256.0.0.4 D. 224.2.1.4 |
256.0.0.4
|
|
A layer 3 switch can move packets between subnets based on which of the following criteria?
A. 802.1q tag B. Port C. Application D. IP address |
IP address
|
|
Which of the following features is essential in a firewall if it is to support RTP sessions?
A. Remote console B. Statefulness C. Address translation D. Zones |
Statefulness
|
|
1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet) B. 100 meters (328 feet) C. 500 meters (1640 feet) D. 1000 meters (3280 feet) |
100 meters (328 feet)
|
|
An administrator is unable to ping a workstation. Which of the following tools would BEST help to
resolve the issue? A. Cable tester B. Multimeter C. Toner probe D. Protocol analyzer |
Cable tester
|
|
A technician is reporting wireless transmission speeds of 300Mbps. Which of the following
wireless standards is being used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
802.11n
|
|
A user took a laptop on vacation and made changes to the configuration in order to use the device
at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID |
Incorrect DNS
|
|
In which of the following layers of the OSI model does the TCP protocol operate?
A. Session B. Network C. Data link D. Transport |
Transport
|
|
Which of the following would MOST likely be used to punch down LAN cables before connecting
them to the main switch? A. IDF B. 66 block C. MDF D. 110 block |
110 block
|
|
A technician needs to manage a switch by using the management port on the back of the switch.
Which of the following cables would the technician use? A. Straight B. Console C. Crossover D. Loopback |
Console
|
|
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a
user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information? A. DHCP B. ARP C. DNS D. PING |
ARP
|
|
Which of the following network appliances can BEST be described as allowing multiple servers to
share requests for a website through the same public IP address? A. VPN concentrator B. Content filter C. Load balancer D. Proxy server |
Load balancer
|
|
A workstation is having connectivity issues when being added to the domain. Which of the
following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation? A. Ipconfig B. Nslookup C. Netstat D. Nbtstat |
Ipconfig
|
|
A SONET network typically uses which of the following transmission media?
A. Single-mode fiber B. Multimode fiber C. Copper D. Wireless |
Single-mode fiber
|
|
A link light on a switch is an example of which of the following Ethernet properties?
A. Collision detection B. Multiple access points C. Carrier sense D. Collision avoidance |
Carrier sense
|
|
Which of the following is required if ports from VLANs on two separate switches need to broadcast
to each other? A. Port mirroring B. VPN C. Trunking D. Port authentication |
Trunking
|
|
Which of the following networks would MOST likely require EGP routing?
A. Networks that use OSPF in addition to static routes B. Networks with classless Internet domain routing C. Networks with multiple ISPs D. Networks that use encryption |
Networks with multiple ISPs
|
|
A user reports being occasionally disconnected from the server. Which of the following tools could
the technician use to determine if it is the client or the server that is dropping the connection? A. Packet sniffer B. Multimeter C. Load balancer D. Throughput tester |
Packet sniffer
|
|
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,
one pair for sending and the other pair for receiving? A. 100BaseT4 B. 100BaseTX C. 100BaseX D. 100BaseFX |
100BaseTX
|
|
A technician needs to install additional access points for a new high speed connection being
added in the new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable connections? A. Smart Jack B. Demarc C. 110 Block D. 66 Block |
110 Block
|
|
An administrator is implementing a second server due to the increased usage. Which of the
following optimization techniques is the administrator using? A. Caching engines B. QoS C. Traffic shaping D. Load balancing |
Load balancing
|
|
A network technician is installing a new managed 10/100 Mbps switch on the network. The
network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer? A. MAC filtering B. IP address C. PoE D. Port speed |
Port speed
|
|
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the
only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? A. Hub B. Bridge C. Switch D. Router |
Switch
|
|
Which of the following uses copper wiring?
A. 10GBaseER B. 10GBaseLW C. 100BaseFX D. 1000BaseT |
1000BaseT
|
|
Which of the following protocols is used to disable switch ports automatically to prevent switching
loops? A. RIP B. 0S: F C. STP D. EGP |
STP
|
|
Which of the following commands provides similar information about the current configuration of
active local Ethernet adapters? (Select TWO). A. traceroute B. ipconfig C. ifconfig D. route E. hostname |
ipconfig
ifconfig |
|
When ordering switches for a new building, which of the following is the BEST way for the
technician to determine the number of switches to put in each network closet? A. Review the architectural plans to see how many drops go to each closet. B. Count the number of rooms near each closet and standardize eight drops per room. C. Wireless is the new standard and no network switches will be needed in the building, D. Count the number of phone ports and configure two network ports for each phone port |
Review the architectural plans to see how many drops go to each closet.
|
|
Which of the following wiring standards would MOST likely be used to interconnect two devices
without the use of a hub or switch? A. 568A B. 568B C. Crossover D. Loopback |
Crossover
|
|
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to
pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080 |
161
162 |
|
The administrator's ISP indicates that they will need an autonomous system number to begin
routing external network traffic. Which of the following protocols should the ISP plan to use? A. is-is B. RIPv2 C. OSPF D. BGP |
BGP
|
|
A company has recently received a new ADSL backup Internet connection. Which of the following
will MOST likely be used between the modem and the ISP? A. PPPoE B. RAS C. IPSec D. MSCHAP |
PPPoE
|
|
Which of the following would MOST likely be used with multimode fiber?
A. 10GBaseLR B. 10GBaseT C. 10GBaseER D. 10GBaseSR |
10GBaseSR
|
|
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant B. converged C. autonomous D. vectored |
Converged
|
|
Which of the following should be used to ensure that all packets are received by every connected
device? A. Hub B. Router C. Switch D. Firewall |
Hub
|
|
Which of the following devices should an administrator connect to a protocol analyzer in order to
collect all of the traffic on a LAN segment? A. Hub B. VLAN C. Router D. Server |
Hub
|
|
The network administrator has just finished installing a new 10/100/1000 switch, but receives
reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet0/10 Switchport trunk encapsulation dot1q Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections? A. The servers have not had VLAN tagging enabled on their NICs. B. Speed and duplex have not been set. C. VLAN tagging was not set on the trunk. D. The servers have been connected with CAT5 cable. |
Speed and duplex have not been set.
|
|
Which of the following protocols can be found at the application layer?
A. Telnet B. TCP C. SNMP D. UDP |
Telnet
|
|
An administrator replaced a router with a switch. End users are able to access network shares but
are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet? A. Router routes traffic between different networks and a switch does not B. The new switch is faulty and needs to be replaced and configured correctly C. The firewall needs to be setup to allow traffic to reach the Internet D. The switch needs to be setup to forward data traffic to the Internet |
Router routes traffic between different networks and a switch does not
|
|
Which of the following protocols requests membership to a multicast group?
A. IGMP B. SNMP C. SMTP D. ICMP |
IGMP
|
|
Which of the following cable types is intended to be used on short distances and is immune to any
A. Singlemode fiber B. Multimode fiber C. Shielded twisted pair D. Unshielded twisted pair |
Multimode fiber
|
|
An administrator attempts to open a web page and sees the following error: 'Error 404: Page not
found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7 |
Layer 1
|
|
Which of the following protocols is Karen, a user, utilizing if no handshake or data reliability are
required? A. TCP B. FTP C. TFTP D. UDP |
UDP
|
|
Sandy, a network administrator, needs to facilitate traffic from several VLANs over a single port.
Which of the following configuration changes would facilitate access? A. Traffic filtering B. Trunking C. MAC filtering D. Port mirroring |
Trunking
|
|
Which of the following colors represents the outer leads on a connector head of a 568B patch
cable? (Select TWO). A. Blue, brown/white B. Green/white, blue C. Orange/white, orange D. Blue, blue/white E. Brown/white, brown |
Orange/white, orange
Brown/white, brown |
|
Karen and Kurt, attackers, use which of the following network scanners to see the protocols that
are being used? (Select TWO). A. IDS B. Packet sniffer C. Port scanners D. Malware scanner E. Ping sweep |
Packet sniffer
Port scanners |
|
Kurt, a network administrator, is checking work on some new CAT5 LAN network cabling installed
at an organization. Multiple lines are receiving poor signals, and Kurt finds the lengths of the runs to be sometimes over 350 feet (107 meters). Which of the following is the cause of the issue? A. CAT5 cable runs over 330 feet (100 meters) need to utilize STP instead of UTP. B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters). C. CAT5 cabling is limited to single-run lines of 250 feet (76 meters). D. CAT5 cabling needs to have terminators installed at each end for runs over 330 feet (100 meters). |
CAT5 cabling is limited to single-run lines of 330 feet (100 meters).
|
|
Which of the following authentication solutions also provides AAA and uses TCP?
A. TACACS+ B. Kerberos C. RADIUS D. RAS |
TACACS+
|
|
A managed switch offers which of the following benefits over an unmanaged switch? (Select
TWO). A. 802.1q B. SNMP C. Gigabit D. Layer 2 forwarding E. Fewer collision domains |
802.1q
SNMP |
|
Which of the following can be configured to restrict specific ports and IP addresses from accessing
the internal network? (Select TWO). A. Layer 2 switch B. MAC address filtering C. ACLs D. IIS server E. Port scanner F. Firewall |
ACL
FIrewall |
|
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the
same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248 |
255.255.255.0
|