Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
100 Cards in this Set
- Front
- Back
1. Which of the OSI model layers is also referred to as Transport layer?
A. Layer 7 B. Layer 2 C. Layer 5 D. Layer 4 |
D. Layer 4
|
|
2. Remote Desktop Protocol (RDP) runs by default on TCP port:
A. 3389 B. 67 C. 443 D. 25 |
A. Port 3389
|
|
3. Examples of connectionless protocols include: (Select three answers)
A. SSH B. SNMP C. SMTP D. FTP E. TFTP F. DHCP |
B, E, and F. SNMP, TFTP, and DHCP
|
|
4. Once a plan of action to resolve a problem has been established, the next step in the network
troubleshooting methodology is to: A. Test the theory to determine cause B. Question users C. Implement the solution D. Establish a theory of probable cause |
C. Implement the solution
|
|
5. Which of the following commands can be used to display a routing table? (Select two answers)
A. traceroute B. route print C. netstat -r D. ipconfig /all E. print route |
B and C. route print and netstat -r
|
|
6. Switches and MAC addresses are defined at which of the OSI layers?
A. Data link layer B. Layer 4 C. Application layer D. Layer 1 |
A. Data link layer (Layer 2)
|
|
7. Media Access Control (MAC) address consists of:
A. 8 bits B. 16 bits C. 32 bits D. 48 bits |
D. 48 bits
|
|
8. Password combined with PIN used as an authentication requirement is an example of:
A. Multi-factor authentication B. Single sign-on C. Two-factor authentication D. Something that the user knows |
D. Something that the user knows
|
|
9. The practice of marking symbols in public places that indicate the presence of an unsecured wireless
connection is also referred to as: A. War chalking B. SSID discovery C. War driving D. Port scanning |
A. War chalking
|
|
10. What is PoE?
A. Media converter B. Another term for Wireless Access Point (WAP) C. Technology that allows for supplying electrical power over Ethernet cable D. Another term for Private Branch Exchange (PBX) system |
C. Technology that allows for supplying electrical power over Ethernet cable
|
|
11. Which of the following is used to prevent switching loops?
A. UDP B. STP C. FTP D. UTP |
B. STP - Spanning Tree Protocol
|
|
12. Disabling SSID:
A. Is one of the measures used for securing networks B. Makes a WLAN harder to discover C. Blocks access to a Wireless Access Point (WAP) D. Prevents wireless clients from accessing the network |
B. Makes a WLAN harder to discover
|
|
13. VLAN membership can be configured through: (Select two answers)
A. Switch ports B. VLAN multiplexing C. IP-address-to-VLAN mapping D. TCP and UDP port numbers E. MAC-address-to-VLAN mapping |
A and E. Switch ports and MAC-address-to-VLAN mapping
|
|
14. Data from multiple VLANs on a single switch is carried through a single network link between
switches. This is often referred to as: (Select two answers) A. Routing B. Trunking C. VLAN multiplexing D. Tunneling E. Load balancing |
B and C. VLAN multiplexing and Trunking
|
|
15. Communication that takes place in two directions simultaneously is also referred to as:
A. Full duplex B. Point-to-multipoint C. Simplex D. Half duplex |
A. Full duplex
|
|
16. Network access control method based on the physical address (MAC address) of the Network
Interface Card (NIC) is called: A. HIDS B. Accounting C. MAC filtering D. Quality of Service (QoS) |
C. MAC filtering
|
|
17. Which of the following connectors is used with copper cabling?
A. ST B. MTRJ C. BNC D. LC |
C. BNC
|
|
18. Which of the following connectors is used with fiber-optic cabling?
A. RJ-45 B. DB-9 C. SC D. F-connector |
C. SC
|
|
19. Which of the following technologies uses multiple antennas in order to increase performance and
range? A. MIMO B. Ethernet C. SONET D. Coax |
A. MIMO
|
|
20. Which of the following allows multiple hosts on a network to share an IP address?
A. APIPA B. CARP C. DNS D. RARP |
B. CARP
|
|
21. File Transfer Protocol (FTP) runs by default on TCP ports: (Select two answers)
A. 25 B. 23 C. 20 D. 21 E. 22 |
C and D. 20 and 21
|
|
22. An IPv6 address consists of:
A. 32 bits B. 48 bits C. 64 bits D. 128 bits |
D. 128 bits
|
|
23. Network access control method based on the physical address (MAC address) of the Network
Interface Card (NIC) is called: A. HIDS B. Accounting C. MAC filtering D. Quality of Service (QoS) |
C. MAC filtering
|
|
24. Which of the following is the default port number used by Kerberos authentication system?
A. 88 B. 443 C. 80 D. 3389 |
A. 88
|
|
25. While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's
port can be tested with the use of: A. Loopback plug B. Punch down tool C. Pliers D. Molex connector |
A. Loopback plug
|
|
26. Which of the following tools would be the best for attaching RJ-45 connector to the end of a twistedpair
Ethernet cable? A. Punch down tool B. Crimp tool C. Cable certifier D. Needle-nose pliers |
B. Crimp tool
|
|
27. Hubs operate at which level of the OSI model?
A. Layer 1 B. Data link layer C. Layer 3 D. Transport layer |
A. Layer 1 (physical layer)
|
|
28. The term war driving refers to:
A. Penetration testing B. Scanning for unsecured wireless networks while driving in a car C. Setting up a rogue access point D. Marking unsecured wireless networks |
B. Scanning for unsecured wireless networks while driving in a car
|
|
29. In computer security, the practice of obtaining confidential information by manipulating people is
also known as: A. Vulnerability B. Hacking C. Mantrap D. Social engineering |
D. Social engineering
|
|
30. Which of the following attacks uses multiple compromised computer systems against its target?
A. Logic bomb B. Botnet C. DDoS D. DoS |
C. DDoS
|
|
31. What is the name of a Windows command-line utility that displays TCP/IP configuration settings?
A. ifconfig B. dxdiag C. ipconfig D. msconfig |
C. ipconfig
|
|
32. Which of the following tools would be the best for attaching wires to a patch panel?
A. Punch down tool B. Crimp tool C. Cable certifier D. Needle-nose pliers |
A. Punch down tool
|
|
33. Windows command-line utility for displaying intermediary points on the packet route is called:
A. ping B. netstat C. ipconfig D. tracert |
D. tracert
|
|
34. Which of the following is an example of a multi-factor authentication?
A. Password and biometric scan B. User name and PIN C. Smart card and identification badge D. Iris and fingerprint scan |
A. Password and biometric scan
|
|
35. Which of the following terms refers to a rogue access point?
A. Computer worm B. Backdoor C. Evil twin D. Trojan horse |
C. Evil twin
|
|
36. A lightly protected subnet placed on the outside of the company's firewall consisting of publicly
available servers is also referred to as: A. VPN B. Access Point (AP) C. VLAN D. DMZ |
D. DMZ
|
|
37. T1 lines support data transfer rates of up to:
A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps |
A. 1.544 Mbps
|
|
38. Which of the following servers dynamically assigned IP addresses?
A. DHCP B. DNS C. WINS D. SMTP |
A. DHCP
|
|
39. An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type
of service? A. DNS B. SNMP C. SMTP D. DHCP |
D. DHCP
|
|
40. What is the speed of an E3 line?
A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps |
C. 34.368 Mbps
|
|
41. In routing metrics, the number of routers a packet needs to traverse before reaching its destination
is known as: A. Switching loop B. Hop count C. Route counter D. Latency |
B. Hop count
|
|
42. The largest data unit expressed in bytes which may be sent over a network link is also referred to as:
A. QoS B. MX C. Hop count D. MTU |
D. MTU - Maximum Transmission Unite
|
|
43. Which of the following command-line tools is used to display protocol statistics and active TCP/IP
network connections? A. ipconfig B. netstat C. dig D. tracert |
B. netstat
|
|
44. T3 lines support data transfers rates of up to:
A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps |
D. 44.736 Mbps
|
|
45. Which of the following allows an administrator to inspect the traffic passing through a network
switch? A. Port mirroring B. Fault-tolerant mode C. Authentication D. VLAN tagging |
A. Port mirroring
|
|
46. Which of the following should be the first step when troubleshooting networking problems?
A. Establishing a theory of probable cause B. Implementing the solution C. Identifying the problem D. Establishing a plan of action to resolve the problem |
C. Identifying the problem
|
|
47. Which type of cabling provides protection against EMI? (Select all that apply)
A. UTP B. Coaxial C. Fiber-optic D. STP |
B, C, and D. Coaxial, Fiber-optic, and STP
|
|
48. Which of the following cabling types are used with RJ-45 connectors? (Select all that apply)
A. STP B. fiber-optic C. twisted pair D. UTP |
A, C and D. STP, twisted pair, and UTP
|
|
49. E1 lines support data transfer rates of up to:
A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps |
B. 2.048 Mbps
|
|
50. Which of the following tools would be used for locating a break in a cable?
A. FDDI B. TDR C. EGP D. OSPF |
B. TDR - Time-Domain Reflectometer
|
|
51. Network cabling, hubs, and repeaters can be found at which OSI layer?
A. Physical layer B. Layer 3 C. Session layer D. Application layer |
A. Physical layer (layer 1)
|
|
52. Which of the following hides the internal IP addresses by modifying IP address information in IP
packet headers while in transit across a traffic routing device? A. NAC B. QoS C. NAT D. DMZ |
C. NAT
|
|
53. Which type of policy allows for controlling network resources and assigning priority to different
types of traffic? A. QoS B. Implicit deny C. IDS D. Privacy policy |
A. QoS
|
|
54. 802.11 is a set of standards for implementing:
A. Token ring B. SONET C. Ethernet D. WLANs |
D. WLANs
|
|
55. Coding errors and security vulnerabilities in software that has already been released can be rectified
through: A. User training B. Application hardening C. Patch management D. Incident response |
C. Patch management
|
|
56. Cabling with a fire-retardant jacket placed in the space between dropped ceiling and structural
ceiling is called: A. HVAC B. Plenum C. EMI D. Non-plenum |
B. Plenum
|
|
57. What is the name of a command-line utility used for checking the reachability of a remote host?
A. dxdiag B. ping C. cmd D. regedit |
B. ping
|
|
58. A monitored host or network specifically designed to detect unauthorized access attempts is also
known as: A. Botnet B. Rogue access point C. Honeypot D. Flood guard |
C. Honeypot
|
|
59. What type of filtering allows for restricting the access of specific Internet services?
A. IP B. URL C. Port D. MAC |
C. Port
|
|
60. An authentication subsystem that enables a user to access multiple, connected system components
(such as separate hosts on a network) after a single login at only one of the components is also referred to as: A. Single sign-on B. Multi-factor authentication C. Peer-to-peer (P2P) D. Network Access Control (NAC) |
A. Single sign-on
|
|
61. What kind of termination would be used to create a crossover cable?
A. BNC connector B. T568A on both ends C. T568A and T568B D. T568B on both ends |
C. T568A and T568B
|
|
62. What type of filtering allows for blocking or allowing access to specific Internet domains?
A. Port B. IP C. MAC D. URL |
D. URL
|
|
63. Which of the following are tunneling protocols? (Select two answers)
A. SMTP B. PPTP C. TFTP D. L2TP E. SNMP |
B and D. PPTP and L2TP
|
|
64. IPsec encrypts an entire packet in what kind of mode?
A. Secure B. Transport C. Default D. Tunnel |
D. Tunnel
|
|
65. What kind of termination would be used to create a straight-through cable? (Select two answers)
A. T568A on both ends B. Rollover / Yost C. T568A and T568B D. T568B on both ends |
A and D. T568A on both ends and T568B on both ends
|
|
66. Which of the following tools would be used for locating a cable in a cabling bundle?
A. Punch down tool B. Protocol analyzer C. Toner and probe kit D. Multimeter |
C. Toner and probe kit
|
|
67. Which of the following wireless encryption schemes offers the highest level of protection?
A. WEP B. WPA2 C. SSID D. WPA |
B. WPA2
|
|
68. Which type of IDS relies on known attack patterns in order to detect an intrusion?
A. Behavior-based B. Signature-based C. Port mirroring D. AD-IDS |
B. Signature-based
|
|
69. Which of the following protocols are used for implementing Voice over IP (VoIP)? (Select all that
apply) A. SIP B. IMAP C. RTP D. SNMP |
A and C. SIP and RTP
|
|
70. Address Resolution Protocol (ARP) provides what kind of resolution?
A. IPv6 to IPv4 B. MAC to IP C. Domain name to IP D. IP to MAC |
D. IP to MAC
|
|
71. Which of the following tools allow for obtaining domain name to IP address mapping? (Select two
answers) A. nslookup B. tracert C. pathping D. netstat E. dig |
A and E. nslookup and dig
|
|
72. Which of the following protocols is used in network management systems to monitor networkattached
devices? A. RTP B. SNMP C. IMAP4 D. SMTP |
B. SNMP
|
|
73. Which of the following protocols transmit data in an unencrypted form? (Select all that apply)
A. SCP B. IPsec C. SNMPv1 D. FTP E. Telnet F. SFTP |
C, D, and E. SNMPv1, FTP, and Telnet
|
|
74. Network switch with configuration features that can be changed through a user interface is called:
A. Unmanaged switch B. Layer 1 switch C. Managed switch D. Plug and play |
C. Managed switch
|
|
75. An IP address in the range 172.16.0.0 – 172.31.255.255 is an example of what kind of address?
A. Routable B. Loopback C. IPv6 D. Non-routable |
D. Non-routable
|
|
76. In half-duplex communication transmission takes place:
A. In two directions simultaneously B. Only in one direction at a time C. In one direction only D. In one direction at half the speed |
B. Only in one direction at a time
|
|
77. Which of the following are loopback addresses? (Select two answers)
A. MAC address B. 127.0.0.1 C. Link-local D. ::1 E. Multicast |
Answers: B and D. 127.0.0.1 and ::1
|
|
78. Frequency ranges used in 802.11 networks include: (Select two answers)
A. 2.4 GHz B. 54 Mbps C. 11 GHz D. 2.4 MHz E. 5.0 GHz |
Answers: A and E. 2.4 GHz and 5.0 GHz
|
|
79. Which of the following devices can cause disruptions in wireless network connectivity? (Select all
that apply) A. Cordless phone B. Baby monitor C. Microwave oven D. Ethernet switch |
79. Answers: A, B, and C. Cordless phone, Baby monitor, and Microwave oven
|
|
80. The period of time during which a networked host can use an IP address assigned by a DHCP server
is called: A. Scope B. DNS record C. Latency D. Lease |
D. Lease
|
|
81. Which of the following devices allows for connecting copper and fiber-optic cabling?
A. Multilayer switch B. 56k modem C. Media converter D. TDR |
C. Media converter
|
|
82. 255.255.255.248 subnet allows for how many hosts?
A. 2 B. 6 C. 14 D. 30 |
B. 6
|
|
83. Which type of cabling provides protection against EMI? (Select all that apply)
A. UTP B. Coaxial C. STP D. Fiber-optic |
B, C, and D. Coaxial, STP, and Fiber-optic
|
|
84. In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each
other in order to reduce: A. Cross-talk B. Eavesdropping C. Collisions D. Cable clutter |
A. Cross-talk
|
|
85. OC-3 line supports transmission rates of up to:
A. 1.544 Mbps B. 51.84 Mbps C. 44.736 Mbps D. 155.52 Mbps |
D. 155.52 Mbps
|
|
86. Which of the following are the characteristics of the 802.11b wireless standard? (Select two
answers) A. 5.0 frequency range B. 54 Mbps C. 2.4 GHz frequency range D. OFDM E. 11 Mbps |
C and E. 2.4 GHz frequency range and 11 Mbps
|
|
87. The maximum cable segment length for CAT 5e cable is:
A. 25 meters B. 50 meters C. 100 meters D. 250 meters |
Answer: C. 100 meters
|
|
88. Which of the following tools would be used for locating faults and breaks in fiber-optic cabling?
A. Crimping tool B. Toner and probe kit C. OTDR D. Channel bonding |
C. OTDR
|
|
89. OSPF and IS-IS are:
A. Authentication schemes B. DNS records C. Encryption standards D. Routing protocols |
D. Routing protocols
|
|
90. DNS database AAAA record identifies:
A. Mail server B. IPv4 address C. Canonical name D. IPv6 address |
D. IPv6 address
|
|
91. Convergence state in routing refers to a situation where:
A. A server receives the final ACK packet B. All routers have finished updating their routing tables C. Some of the WAPs have duplicate IP addresses D. Rogue access points are configured with legitimate SSIDs |
B. All routers have finished updating their routing tables
|
|
92. Which of the following tools would be used to check the contents of an IP packet?
A. Protocol analyzer B. Secure Shell (SSH) C. SNMP agent D. Port scanner |
A. Protocol analyzer
|
|
93. IEEE 802.11g standard is backwards compatible with:
A. 802.11n B. WiMAX C. 802.11a D. 802.11b |
D. 802.11b
|
|
94. 802.3 is the IEEE standard for implementing of what kind of networks?
A. WLANs B. Token ring C. Ethernet D. WiMAX |
C. Ethernet
|
|
95. Which of the following are the characteristics of 10GBaseT Ethernet? (Select all that apply)
A. CAT 6a cabling B. RJ-45 connectors C. Multimode fiber D. CAT 5e cabling E. 802.3an |
A, B, and E. CAT 6a cabling, RJ-45 connectors, and 802.3an
|
|
96. What is the most common type of a DSL Internet access?
A. VDSL B. ADSL C. SDSL D. UDSL |
B. ADSL
|
|
97. Which of the following TCP ports is used by Simple Mail transfer Protocol (SMTP)?
A. 25 B. 53 C. 80 D. 23 |
A. 25
|
|
98. Routers operate at which of the OSI layers?
A. Physical layer B. Data link layer C. Network layer D. Transport layer |
C. Network layer
|
|
99. Which of the following switches puts the ping command in a loop?
A. -a B. -l C. -n D. -t |
D. -t
|
|
100. Which of the following can stop attacks on the network?
A. HIPS B. HIDS C. NIPS D. NIDS |
C. NIPS
|