Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
100 Cards in this Set
- Front
- Back
1. You are wanting to make a short straight-through cable to connect a router to a switch in your MDF. Your company uses the 568B wire pattern. Which color pairs will be crimped down on the outer pins of the RJ-45 connector (Select Two)
A. White/orange, orange B. White/brown, brown C. White / green, green D. White / blue, blue E. White / green, blue F. White / orange, blue Chapter 4 |
1.
B. White/brown, brown C. White / green, green Chapter 4 |
|
2. Jim is about to install a wireless network. A fellow network administrator warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers?
A. WAP placement B. MAC address filtering C. authentication method D. Encryption type Chapter 16 |
2.
A. WAP placement Chapter 16 |
|
3. Your company has purchased 800 new PCs for a roll out you about to make. Of the fellowing choice , which should you update according?
A. Asset management B. Change management C. Baseline D. Wire schemes Chapter 18 |
3.
A. Asset management Chapter 18 |
|
4. A user is concerned that a password is being sent in clear text when he connect to the RADIUS server using PAP. which of the following is true about security using RADIUS?
A. It uses a public key to encrypt messages between the client and server. B. It uses a private key to encrypt messages between the client and server C. It uses a shared secret to encrypt messages between the client and server D. It uses a CSU/DSU to encrypt the data between the client and server. Chapter 11 |
4.
C. It uses a shared secret to encrypt messages between the client and server Chapter 11 |
|
5. You have just installed an auto- sensing NIC on your computer. When a NIC has auto sensing capabilities, what does that mean? ( select two)
A. It will determine the link duplex B. It will receive a new Mac address C. It will choose its cable type for transmission D. It will determine its link speed to bandwidth E. It will determine its link latency with the switch Chapter 5 |
5.
A. It will determine the link duplex D. It will determine its link speed to bandwidth Chapter 5 |
|
6. When a system needs to send a packet to another system, what TCP/IP protocol does it use to find the destination systems Macs address when did Only Knows IP address?
A. Telnet B. Netstat C. Tracert D. Ping E. ARP Chapter 7 |
6.
A. DHCP broadcasts B. NetBIOS broadcast Chapter 7 |
|
7. Which of the following types of requests are always stop by the router? (Select Two)
A. DHCP broadcasts B. NetBIOS broadcast C. WINS requests D. DHCP lease renewals Chapter 8 |
A. DHCP broadcasts
B. NetBIOS broadcast |
|
8. Emma is setting up a wireless network for her company. She wants to use in authenauthentication message with a user must connect to a separate authentication server to gain access to the network. Which method would work best
A. WEP2 B. RADIUS C. Kerberou D. AES Chapter 15 |
8.
B. RADIUS Chapter 15 |
|
9. John is talking to his cable installer about running new UTP CAT 5e cable to two new office space being set up in his building. These are the last available space in his building in no more 10. office lots will ever be made here. The cable installers says that the cable runs for those location will b 92 meters, the wall outlets will just make it into the office what is the most cost efficient suggestion the installer can make?
A. Go ahead, just keep the combined length of patch panel under 8 meters B. Run backbone cable into a closer location and setup a new equipment room C. Keep the horizantal cabling at 90 meters, just make longer patch cables to the PC D. Use CAT3 cabling for the run instead of CAT5 Chapter 6 |
9.
Chapter 6 |
|
10. office lots will ever be made here. The cable installers says that the cable runs for those location will b 92 meters, the wall outlets will just make it into the office what is the most cost efficient suggestion the installer can make?
A. Go ahead, just keep the combined length of patch panel under 8 meters B. Run backbone cable into a closer location and setup a new equipment room C. Keep the horizantal cabling at 90 meters, just make longer patch cables to the PC D. Use CAT3 cabling for the run instead of CAT5 Chapter 6 |
10.
A. Go ahead, just keep the combined length of patch panel under 8 meters Chapter 6 |
|
11. Which of the following networking topology requires less Hardware in cable and then the others?
A. Bus B. Ring C. Star D. Mesh Chapter 3 |
11.
A. Bus Chapter 3 |
|
12. Just arrived at work and found that the user are having issues connecting to the web server. Last night, another network technician made an upgrade to the web server, which document might help you in resolving the problem?
A. Change management B. Cable management C. Network Maps D. Wire schemes Chapter 18 |
12.
A. Change management Chapter 18 |
|
13. Hey small bookstore in a handcrafted jewelry company share the same building. To save cause on the infrastructure, they want to use a single advance switch , but still retain two separate network. What features would a accomplish that gold?
A. bandwidth shaping B. Load balancing C. Trunking D. VLAN Chapter 12 |
13.
D. VLAN Chapter 12 |
|
14. Which networking technology is best defined as fast Ethernet?
A. 10BaseFL B. 100BaseT C. 1000BaseSX D. 1000BaseT Chapter 5 |
14
B. 100BaseT Chapter 5 |
|
15. which routing metric will tell you the number of connections between your PC and www.google.com?
A. Hop count B. latency C. Bandwidth D. Cost Chapter 8 |
15.
A. Hop count Chapter 8 |
|
16. You have a network with 25 user. All the uses of complaining about the network moving too slowly, even when only one person is accesing the server. which of the following tools could you use to troubleshoot the bottleneck?
A. Network analyzer B. Loopback device C. Packet sniffer D. protocol analyzer E. TDR Chapter 20 |
16
A. Network analyzer C. Packet sniffer D. protocol analyzer Chapter 20 |
|
17. A _____________________ enable the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently. because the information can be downloaded once for use by multiple hosts?
A. STMP server B. Proxy server C. NAT server D. DNS server Chapter 12 |
17.
B. Proxy server Chapter 12 |
|
18. Look at the following graphic. It shows that the command netstat-n has been run. What is the port number for the Foreign IP Address 207.46. 144.86?
A. Port 80 B. Port 110 C. Port 1707 D. Port 1741 Chapter 9 |
18.
A. Port 80 Chapter 9 |
|
19. Sam is troubleshooting a network issue abd has established hos plan of action to fix it. which of the following will be Next step to resolve the problem?
A. implement the plan of action and contact management if necessary B. Ensure that the network is functioning correctly. C. Document the outcomes of the plan D. Determine if anything has changed on the network Chapter 20 |
19.
A. implement the plan of action and contact management if necessary Chapter 20 |
|
20. You are wanting to use FTP to transfer files in the internet at your office, but your network administrator says that it not a good idea and that they have blocked FTP access using the firewall. What could the network admin's reason be for blocking FTP?
A. FTP is unable to transfer encrypted files B. FTP can't be tunneled using VPN connection C. FTP is a legacy protocol and can't be used on modem networks D. FTP transmits all passwords in plan text Chapter 11 |
20.
D. FTP transmits all passwords in plan text Chapter 11 |
|
21. What are available options for transporting data through a VPN?
A. SSL B. PPTP C. IPSec D. RDP E. RAS F. VLAN Chapter 12 |
21.
A. SSL B. PPTP C. IPSec Chapter 12 |
|
22. How should you configure multiple 802.11g wireless access points to create a single network that enables user to roam freely?
A. Configure all the WAPs to use the same SSID B. Configure all the WAPs to use the same frequency. C. Configure all the WAPs to use the same channel D. Configure each WAP to use an unique security setting Chapter 15 |
22.
A. Configure all the WAPs to use the same SSID Chapter 15 |
|
23. Firewall can be used for which of the following?
A. Protocol analysis, packets filtering, and content filtering B. Packet sniffing, protocol analysis, and content filtering C. Content filtering, packet filtering, and port filtering D. Port scanning, packet sniffing, and packet filtering Chapter 16 |
23.
C. Content filtering, packet filtering, and port filtering Chapter 16 |
|
24. A user calls from accounting department complaining that he only sees the server used by distribution, not the accounting server. A check of his IP address shows that he indeed got the IP address from the DHCP server what could be the problem?
A. Wrong gateway B. Port duplex mismatch C. Incorrect VLAN D. Wrong subnet mask |
24.
C. Incorrect VLAN |
|
25. I can't see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following command might I try to test my connection with your machine?
A. Ping Woobie B. Netstat Woobie C. NBstat Woobie D. STMP Woobie |
25.
A. Ping Woobie |
|
26. You are using HTTPS to make some online purchases. At which ISI layer does the encryption and decryption take place?
A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7 Chapter 6 |
26,
C. Layer 6 Chapter 6 |
|
27. Which type of cable do you need to connect a client a 100Base TX network?
A. STP B. RG-58 C. Category 3 UTP D. Category 5 UTP Chapter 5 |
27.
D. Category 5 UTP Chapter 5 |
|
28. Your Windows 7 system suddenly can't reach the internet. You know that your DHCP server has been intermittently malfunctioning. What command can you type to see if it give you an IP address, default gateway, and other necessary IP configuration before it crashed?
A. Ifconfig B. Ipconfig C. Nslookup D. Route print Chapter 20 |
28.
B. Ipconfig Chapter 20 |
|
29. Using Gigabit Ethernet for the backbone of your LAN. Which of the following access method goes Gigabit Ethernet use?
A. CSMA/CD B. Bonding C. Broadcast D. CSMA/CA Chapter 5 |
29.
A. CSMA/CD Chapter 5 |
|
30. What is the loopback address for your IPv6?
A. 127.0.0.1 B. 0:0:0:0:0:0:0:0 C. 1 D. 0:0:0:0:0:0:0:1 Chapter 13 |
30.
A. 02:45:A2:96:DF: 45 B. FFFF.FFFF.FFFF Chapter 13 |
|
31. Of the following choices. Which a legitimate MAC address? (Select Two)
A. 02:45:A2:96:DF: 45 B. FFFF.FFFF.FFFF C. 00-2C-37-4A-C3-29-17 D. 00-49-3B-5B-D5-84-11 E. 0211 3H5B 64D5 Chapter 2 |
31.
A. 02:45:A2:96:DF: 45 B. FFFF.FFFF.FFFF Chapter 2 |
|
32. Of the following network access security missed it, Which involves checking the physical address?
A. IP filtering B. MAC filtering C. RTP D. RADUS Chapter 16 |
32.
B. MAC filtering Chapter 16 |
|
33. Marsha wants to play certain restriction on communication between client computer is in the main file server. Which of the following will enable her to accomplish her goal
A. ACL B. DHCP C. DNS D. NAT Chapter 11 |
33.
A. ACL Chapter 11 |
|
34. A protocol that uses three-way handshake operates at which layer of the OSI model?
A. Data link B. Network C. Transport D. Session Chapter 9 |
34.
C. Transport Chapter 9 |
|
35. You noticed at your service in the MDF uh we starting at random times during the work day. What would help you diagnose the issue?
A. Multimeter B. Environmental monitor C. TDR D. Cable centifier Chapter |
35
Chapter |
|
36. A NIC creates________________ in the data link layer.
A. Segment B. Packets C. Frames D. Layers Chapter 2 |
36.
C. Frames Chapter 2 |
|
37. You about to install 802.11n APs in relatively close proximity of one another. Which channels would you configure them to work the best?
A. 6&11 B. 3&6 C. 1&5 D. 6&10 Chapter 15 |
37.
A. 6&11 Chapter 15 |
|
38. Which network topology uses a central hub?
A. Star B. Bus C. Ring D. Mesh Chapter 3 |
38.
A. Star Chapter 3 |
|
39. Employees have been bringing a WAPs in connecting them to your network to enable wireless access with their laptops. Which authentication message should be used to prevent this from happening?
A. 802.3ad B. TKIP C. WPA2 D. 802.1x Chapter 11 |
39.
D. 802.1x Chapter 11 |
|
40. Which type of internet connection would not be recommended if you want to talk to your friends using VOIP?
A. ISDN B. DSL C. T1 D. Satelite Chapter 14 |
40.
D. Satelite Chapter 14 |
|
41. Which of the following describes a proxy server function?
A. It protects the internet from internal network traffic B. It converts external IP address to private IP address for client on the internal network so that applications running on does client do not have to be configured for proxy server C. It act as an intermediary that includes all incoming and outgoing data packets D. It had to turn on network IP address from computers on the Internet Chapter 12 |
41.
D. It had to turn on network IP address from computers on the Internet Chapter 12 |
|
42. Which cable type has a maximum length of 300 meters
A. 10GBaseSW B. 100BaseFX C. 100BaseT D. 10BaseT Chapter 5 |
42.
A. 10GBaseSW Chapter 5 |
|
43. Of the following OS I layer which one converts the ones in zeros to electrical signal in place the signal on the cable?
A. Physical layer B. Data link layer C. Network layer D. Transport layer E. Session layer F. Presentation layer Chapter 2 |
43.
A. Physical layer Chapter 2 |
|
44. You are about to install a switch in the communication closet when a fellow technician notice you using a crossover cable to hook the switch to the existing switch in the closet. He says you don't need the crossover cable why is that?
A. The Switch has an MDIX port B. The switch is has STP enabled C. The switch uses CSMA/CD D. The switch needs a plenum-grade cable Chapter 4 |
44.
A. The Switch has an MDIX port Chapter 4 |
|
45. Hey fellow network technician is all doing the vantage of using EIGRP on his network. You want to show off your skills as competent technician by listing the disadvantage. What might you says?
A. It doesn't skills very well with larger network B. It is the slowest to courage all of the routing protocols C. It is a proprietary protocol D. It is a link state protocol Chapter 8 |
45.
C. It is a proprietary protocol Chapter 8 |
|
46. You have just installed a new device that performs stay full package filtering on your company's network. Which of the following describes this device?
A. Proxy server B. Firewall C. DNS server D. IDS Chapter 16 |
46.
B. Firewall Chapter 16 |
|
47. What layer of the OSL a model make sure that the data is in a readable format for the application layer?
A. Application layer B. Presentation layer C. Session layer D. Transport layer E. Network layer F. Data link layer Chapter 2 |
B. Presentation layer
Chapter 2 |
|
48. Which of the following methods of authentication will also provide AAA and uses TCP?
A. TACACS+ B. RADIUS C. IPSec D. NTP Chapter 11 |
48.
B. RADIUS Chapter 11 |
|
49. You are a network administrator attempting to troubleshoot a WINS server. Which tool would you most likely used to diagnose just?
A. Nbstat B. Netstat C. Nslookup D. Dig Chapter 10 |
49.
A. Nbstat Chapter 10 |
|
50. Call is complaining that his internet connection is moving at a snails pace. Which command line utility could you use to find out why?
A. Tracert B. Ping C. Netstat D. Nbstat Chapter 20 |
50.
A. Tracert Chapter 20 |
|
51. You are setting up a static IP on a workstation on your network. Which of the following are valid numbers you can use for the subnet mask?
A. 0 B. 1 C. 254 D. 255 E. 256 F. 253 Chapter 7 |
51.
A. 0 C. 254 D. 255 Chapter 7 |
|
52. John, the network administrator for the ACME building, needs to set up network for two different groups. what features would he need to use on his switch to enable both groups to use the same switch yet remain separate?
A. Enable trucking B. Enable VLANs C. Enable port mirroring D. It can't be done. He needs two switches Chapter 12 |
52.
B. Enable VLANs Chapter 12 |
|
53. Which network topology connects nodes with a central ring of cable?
A. Star B. Bus C. Ring D. Mesh Chapter 3 |
53.
C. Ring Chapter 3 |
|
54. You are tasked with setting up a WiFi network for a client. They already ready have to access point setup in broadcasting on channel 1 and 6. Which of the following would be the best to use in order to keep down interference?
A. 11 B. 3. C. 9 D. 10 Chapter 15 |
54.
A. 11 Chapter 15 |
|
55. Which of the following type of protocol might lead to a user's credential's being disclosed to possible attacker if a protocol analyzer is used?
A. TFTP B. Telnet C. FTP D. SCP E. SNMPv3 Chapter 20 |
55.
B. Telnet C. FTP Chapter 20 |
|
56. A BRI ISDN circuit transmit data at what rate?
A. 28.8 Kbps B. 33.6 Kbps C. 56 Kbps D. 126 Kbps Chapter 14 |
56.
D. 126 Kbps Chapter 14 |
|
57. You are attempting to troubleshoot in issue between 2 computers that are both connected to a layer 2 unmanaged switch. Of the following, which is the best way to find out if the switch is the problem?
A. Access the switch configuration screen and setup a log files B. Check to make sure that 802.1 D is enable on the switch C. Attach a loopback plug to the switch in monitor the traffic D. Connect both of the PCs together with a crossover cable Chapter 4 |
57.
D. Connect both of the PCs together with a crossover cable Chapter 4 |
|
58. How many pairs of wire are used in a 1000BasedT CAT 5 e cable
A. 1 B. 2 C. 4 D. Not enough information Chapter 5 |
58.
C. 4 Chapter 5 |
|
59. Kim's network has to network server. Each server is running the DHCP service. They each have a DHCP scope passing out 192.168 .4 .100 to 192.168.4.199 IP addresses. They are, on average, about 75-80 DHCP clients. How can Kim re configure the network so that these 2 DHCP service will not passed out conflicting IP addresses while still providing tolerance for DHCP?
A. Remove one of the DHCP servers B. Change half of the client to use static IP addresses C. Split the rain is so 1 DHCP server passes out 192.168 .4 .100 to 192.168 .4 .150 in the other passes out 192.168 .4 .151 to 192.168 .4 .199 D. Make one of the DHCP server is a DHCP relay Chapter 7 |
59.
C. Split the rain is so 1 DHCP server passes out 192.168 .4 .100 to 192.168 .4 .150 in the other passes out 192.168 .4 .151 to 192.168 .4 .199 Chapter 7 |
|
60. Which networking technology used in LANs is described as fast internet and uses two pair of cabling for transmitting in receiving?
A. 100BaseT4 B. 100BaseTX C. 100BaseFX D. 1000BaseT Chapter 5 |
60.
B. 100BaseTX Chapter 5 |
|
61. You are concerned about malicious attack on your network. Which of the following would you get in order to screen in prevent these attacks?
A. IDS B. VLAN C. NIPS D. HIDS Chapter 12 |
61.
C. NIPS Chapter 12 |
|
62. Which layer of the OS I model includes HTTP?
A. Application layer B. Presentation layer C. Session layer D. Transport layer E. Network layer F. Data link layer Chapter 2 |
62.
A. Application layer Chapter 2 |
|
63. Your company wants to test out the security of your network by allowing a text to hit a fake network that you created. Which technology would you need to use?
A. Honeynet B. Honeypot C. NDS D. NMAP Chapter 16 |
63.
A. Honeynet Chapter 16 |
|
64. This server access as a go- between on Rocky's network, enabling the client on his network to connect through it to access web pages instead of connecting to website directly
A. SMTP server B. WINS server C. Proxy server D. DNS server Chapter 12 |
64.
C. Proxy server Chapter 12 |
|
65. Which file transfer protocol uses UDP?
A. HTTP B. FTP C. SNMP D. TFTP Chapter 9 |
65.
D. TFTP Chapter 9 |
|
66. Fred has just purchase a new home router for his SOHO internet connection. He cannot get on the internet. He opens the web browser interface for the router and determine that his WAN address is 0.0 .0. 0. Which of the following is the best way to resolve this?
A. Run IPconfig/renew on his PC B. Do a DHCP via the is the router's. Web browser interface C. Restart his PC D. Verify the router us configure for static WAN IP address Chapter 19 |
66.
B. Do a DHCP via the is the router's. Web browser interface Chapter 19 |
|
67. Fox and Hound is a brand name for what device?
A. Multimeter B. Crimper C. Toner D. Hub Chapter 6 |
67.
C. Toner Chapter 6 |
|
68. Which networking topology connects computer is using a central hub?
A. Bus B. Ring C. Star D. Mesh Chapter 3 |
68.
C. Star Chapter 3 |
|
69. What technology enabled VLANs span multiple switches?
A. Spanning tree protocol B. Trucking C. 802.1x D. Bonding Chapter 12 |
69.
B. Trucking Chapter 12 |
|
70. Sally has a wireless network and has noticed significant slow downs at random times during the day. She believes her neighbors may be connecting to her wireless network. Of the following choices, which could be used to limit access to her network?
A. WPA2 encryption B. Switching the channels C. MAC filtering D. Changing from 802.11g to 802.11n E. Disabling the SSID Chapter 15 |
70.
C. MAC filtering Chapter 15 |
|
71. What might help to increase the signal strength of a wifi router in a large , open room? Testing reveals that signal strength is weaker in some spots and strong and others.
A. Change the SSID B. Change the encryption method C. Change the antenna placement D. Enable traffic shaping Chapter 15 |
71.
C. Change the antenna placement Chapter 15 |
|
72. Bullwinkle is trying to cut down on the town of Webb traffic going between his network and Internet, while still allowing all uses to obtain the information they need. What might he use to accomplish this?
A. Gateway B. Bridge C. Router D. Proxy server Chapter 12 |
72.
D. Proxy server Chapter 12 |
|
73. Because of security, you want to install a Microsoft Exchange server, Apache web server, in Microsoft Active Directory on three different servers. Which of the following technology would help you do this while reducing your hardware costs?
A. Virtual servers B. WPA encryption C. A VPN connection D. 802.1x Chapter 17 |
73.
A. Virtual servers Chapter 17 |
|
74. Which of the following has the greatest bandwidth?
A. T3 B. ADSL C. SDSL D. OC-3 Chapter 14 |
74.
D. OC-3 Chapter 14 |
|
75. Which 2 of the following upcoming types of fiber connectors? (Select two)
A. ST B. BNC C. LC D. DB-9 E. F- connector Chapter 3 |
75.
A. ST C. LC Chapter 3 |
|
76. This graphic display the result of an Ipconfig /all. What is the DHCP server's address?
A. 192.168.4.15 B. 00-80-AD-7B-48-39 C. 192.168.4.152 D. 192.168.4.150 E. 255.255.255.0 Chapter 20 |
76.
D. 192.168.4.150 Chapter 20 |
|
77. Everyday at the office, we play counter strike source over the Internet (only during lunch hour of course). Today, however, there is a lot of lag in the action---our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring?
A. Tracert B. Traceroute C. Ping D. Arp Chapter 20 |
77.
A. Tracert Chapter 20 |
|
78. You up planning to implant a network with 400 hosts. Which subnet mask would accommodate for that many devices?
A. /23 B. /24 C. /25 D. /26 Chapter 7 |
78
A. /23 Chapter 7 |
|
79. Which of the following is not an aspect of straight through cable? (Select two)
A. 568B on one and 568A on the other B. 568A on one end and 568B on the ends C. 568B kn both ends D. 568A on both ends Chapter 4 |
79.
A. 568B on one and 568A on the other B. 568A on one end and 568B on the ends Chapter 4 |
|
80. Your company has just experience an attack that cause the website www.yourwebsite.com to go down. What term best describes this?
A. Man in the middle B. War driving C. DoS attack D. Bluesnarfing Chapter 16 |
80.
A. Man in the middle Chapter 16 |
|
81. You have just been given an IP address for your small company. You must use this IP address to get your company's web server access to the public internet, but at the same time, you want the server hidden behind your private network. Which of the following would be used to used to implement this?
A. SNAT B. DNAT C. BGP D. RIP Chapter 8 |
81.
A. SNAT Chapter 8 |
|
82. Which of the following networking technology have the shortest maximum length?
A. 10BaseFL B. 10BaseT C. 10Base2 D. 10Base5 Chapter 4 |
82.
B. 10BaseT Chapter 4 |
|
83. You are waiting to make a short crossover cable to connect two switches in your IDF. You have just finished cramping down one end of the cable using the 568 B wire pattern Which color pairs will be cramped down on the outer pins of the RJ 45 connector on the other end of the cable?
A. White/orange, orange B. White/brown, brown C. White/green, green D. White/blue, blue E. White/green, blue F. White/ orange, blue Chapter 4 |
83.
B. White/brown, brown C. White/green, green Chapter 4 |
|
84. Tracy is a network administrator for a company. She has a set up VOIP in data traffic on a different subnet. Which of the following strategies could she used to provide both services to the hose on the same you TP cable?
A. Change the RJ-45 connectors from 568A to 568B B. Enable STP on the switches C. Use PPP D. Implement separate VLANs Chapter 12 |
84.
D. Implement separate VLANs Chapter 12 |
|
85. Your company requires the use of a smart card, biometric device in a password to log into your system. What kind of authentication are they using?
A. Change the RJ-45 connectors from 568A to 568B B. Enable STP on the switches C. Use PPP D. Implement separate VLANs Chapter 12 |
85,
Chapter 12 |
|
86. A 10BaseT must be within how many meters of its hub?
A. 100 meters B. 185 meters C. 200 meters D. 2000 meters Chapter 4 |
86.
A. 100 meters Chapter 4 |
|
87. You have a segment of computers with a network ID of 172.2 .0 .2/16. How to enable the segment to access the public Internet which of the following must the road to perform?
A. NAT B. RIP C. DHCP D. APIPA Chapter 8 |
87.
A. NAT Chapter 8 |
|
88. Henry is setting up an email account for his user. Which TCP/IP protocol does he use to download message from the mail server?
A. SMTP B. SNMP C. HTTP D. POP3 Chapter 9 |
88.
D. POP3 Chapter 9 |
|
89. Which of the following is the most reliable transport layer protocol in the TCP/IP protocol suite?
A. ARP B. UDP C. TCP D. FTP Chapter 9 |
89.
C. TCP Chapter 9 |
|
90. You are getting some pressure from upper management about saving energy. The company is wanting to reduce power consumption on a wide scale. Which technology would help in accomplish this?
A. Managed switches B. Load balancing C. Virtual servers D. Power over Ethernet Chapter 17 |
90.
C. Virtual servers Chapter 17 |
|
91. What is the default VLAN that is right out the box?
A. 0 B. 1 C. 100 D. 1O24 Chapter 12 |
91.
B. 1 Chapter 12 |
|
92. Of the following WAN technologies. which would MOST likely be used in a SOHO?
A. Cable modem B. OC3 C. E1 D. MPLS Chapter 19 |
92.
A. Cable modem Chapter 19 |
|
93. A network IPS will give your network which of the following capabilities?
A. Packet-based detection and prevention of network attack B. Enable IPSec for all workstations on your local network C. Uninterruptible power for the network devices on the LAN D. Bandwidth shaping for all packets entering the private, internal network Chapter 12 |
93.
A. Packet-based detection and prevention of network attack Chapter 12 |
|
94. You need to connect to your company's VPN. What protocol will you most likely use?
A. PPTP B. RAS C. AAAA D. RIP Chapter 13 |
94.
A. PPTP Chapter 13 |
|
95. You are toubleshooting and repairing a network by implementing a new IPS. After installing the new device and configuring it for the network, what should you do next?
A. Verity network functionality B. Identify the problem C. Document your installation and the results D. Contact your network admistator for further instructions Chapter 20 |
95.
A. Verity network functionality Chapter 20 |
|
96. Which of the following utilites can you use to confirm connectivity to another TCP/IP hosts?
A. ARP B. Ping C. Nbstat D. Netstat Chapter 20 |
96.
B. Ping Chapter 20 |
|
97. You have recently made changes to your network by separating the printr into the own network in order to increase security. An employee begins the day at work by moving they work station and printer to a new desk. They hookup equipment and connect both device to the network using a nearby wall jack. Both device attain an IP address from the DHCP server. The use calls you complaining because they no longer can access the internet from the PC. You have them check to see if they can print it, and it works just fine. What has happened?
A. The laptop connects to a switch that is having a duplex mismatch B. The laptop has a 100BaseTX NIC, while switch is 1000BaseT C. The Printer isn't configured correctly D. The laptop is in the wrong VLAN. Chapter 12 |
97.
D. The laptop is in the wrong VLAN. Chapter 12 |
|
98. You are looking into setting up a VPN connection at your office and you want the VPN to operate at the highest layer of OSI model. Which protocol would allowe this?
A. PPTP B. IPSec C. L2TP D. SSL Chapter 12 |
98.
D. SSL Chapter 12 |
|
99. Which of the following network protocol does not function at the transport layer os the OSI seven layer model?
A. ICMP B. TCP C. UDP D. IP Chapter 2 |
99.
D. IP Chapter 2 |
|
100. You are working with a certified cable installer to troubleshoot the DSL line coming to your office. He thinks that DSL signal is coming the wrong POTS line. Which tool would be use to troubleshoot the issue?
A. Multimeter B. Toner Probe C. Butt set D. TDR |
100.
C. Butt set |