test king virtual test--network+

Post on 20-Jun-2015

1.698 Views

Category:

Technology

10 Downloads

Preview:

Click to see full reader

DESCRIPTION

CompTIA Network+ Test King Practice Test

TRANSCRIPT

COMPTIAExam Questions

Which of the following is a standard measure of signal power?

A) MhZ

B) mips

C) dBm

D) Gbps

Which of the following is the network topology in which computers connect in a closed circle?

A) Bus

B) Mesh

C) Ring

D) Star

The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?

A) 1

B) 3

C) 4

D) 5

Which of the following is the correct representation of an IPv6 address?

A) ::

B) 0:0:0:0:0:0:0:0:1

C) 1:2:3:4:AB:CD:EF

D) 2001::4860:800f::

Which of the following security devices would MOST likely be used on a network to screen & prevent malicious traffic?

A) IDS

B) VPN

C) NIPS

D) HIDS

What is a client?

A Client is a device an end user uses to access a network . This device can be a workstation, laptop, smart phone with wireless capabilities, or a variety of other end-user terminal devices.

Users report that their internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video music. Which of the following would BEST confirm Zach’s theory?

A) Traffic analysis

B) SNMP

C) History logs

D) System logs

A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

A) IS-IS

B) BGP

C) OSPF

D) RIP

Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?

A) Question users

B) Test the theory

C) Re-establish a theory of probable cause

D) Escalate the problem

A server technician notices that some changes were implemented on a server during non-business hours. Which of the following would allow the technician to identify the last time an administrator was remotely connected to the server?

A) Network sniffer

B) Traffic analyzer

C) System log

D) Security log

Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?

A) Gateway

B) Hub

C) Bridge

D) Router

Which of the following 802.11 standards is MIMO used in?

A) a

B) b

C) g

D) n

A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper & ink. Which of the following should the technician do NEXT?

A) Implement the solution

B) Question users

C) Test theory

D) Escalate the problem

Which of the following would be the BEST IDS topology for monitoring one specific device?

A) Signature-based

B) Network-based

C) Host –based

D) Behavior-based

Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

A) Supernetting

B) Dynamic

C) Subletting

D) Convergence

Which of the following fiber types is MOST often used indoors?

A) Plenum

B) Modal conditioning

C) Singlemode

D) Multimode

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

A) 20

B) 53

C) 80

D) 3389

A customer reports a network patch cable was unplugged from a switch & plugged back into an available switch port. The switch’s activity lights have been lit up constantly & network response times are extremely slow. Which of the following issues is MOST likely occurring?

A) Switching loop

B) DDoS attack

C) Mismatched MTU

D) Port mirroring

Which of the following protocols is used to assign IP addresses to network devices?

A) UTP B) DHCP

C) FTP

D) TCP/IP

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering

Which of the following allows access to a network, based on the hardware address of a network card?

A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering

Which of the following is true of NIPS?

A) Routes traffic to the proper port

B) Detects malicious host traffic

C) Detects and prevents harmful traffic

D) Prevents traffic on network hosts

Which of the following protocols is used for remote management of devices?

A) TFTP

B) SNMP

C) Syslog

D) SMTP

Which encryption type uses only a 28 character key?

A) 40/64 bit WEP

B) WPA Personal

C) 104/128 bit WEP

D) WPA@PSK

At which of the following layers of the OSI model do frames exist?

A) Application

B) Network

C) Transport

D) Data link

Which of the following utilities can be used to list the routing table?

A) Ipconficj

B) Nslookup

C) Dig

D) Netstat

Which of the following OSI model layers is between the Network and Session layers?

A) Presentation

B) Data link

C) Physical

D) Transport

 Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost? 

A) OTDR

B) Protocol analyzer

C) TDR

D) Toner probe

Which of the following tools would BEST be used to verify if a network cable is properly terminated?

A) Multimeter

B) Cable certifier

C) Toner probe

D) Cable stripper

Which of the following uses port 53 by default?

A) RDP

B) QoS

C) DHCP

D) DNS

Network administrators use which of the following to monitor and map network availability, performance, and error rates?

A) SMTP

B) PPoE

C) PoE

D) SNMP

Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Jeff implement?

A) DNS

B) NAT

C) PKI

D) RAS

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed through or dumped is a example of which of the following?

A) Packet sniffing

B) Packet filter

C) Stateful inspection

D) Content filter

Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters) from the house. Zach wants to extend the Internet connection from the home to the garage. Which of the following technologies would MOST likely accommodate this range?

A) DVI cable

B) Bluetooth

C) Wireless

D) CAT3 cable

A power failure caused a router to reboot. Now users are not able to reach remote networks. Which of the following is the MOST likely cause?

A) Dynamic NAT tables were erased by the reset

B) The DNS server settings on the workstations are incorrect

C) MAC entries in the ARP table were not saved

D) The technician did not save the running configuration

Which of the following is a device directly used by an end user to access a network?

A) Server B) LAN C) Client D) Router

What does a Switch do?

Interconnects network components like a hub except the switch interrogates the traffic to find out where its destined and forwards the traffic thru the right port. It is considered a Layer 2 device because it makes its forwarding decisions from the Media Access Control (MAC) address burned into the NIC card.

Which device makes traffic-forwarding decisions based on the MAC address?

A) Hub B) Router C) Switch D) Multiplexer

What type of network is a MAN?

MAN or Metro Ethernet is smaller than a WAN. a MAN interconnects locations throughout a metropolitan area via a service provider’s high speed network (10 Gbps)

A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?

A) WAN B) CAN C) PAN D) MAN

What type of network is a PAN?

PAN is network whose range is only a few meters and much smaller than a LAN. It consists of a connection between a PC and a digital camera via a universal serial bus (USB ) cable. It could also be a PC connected to an external hard drive via a FireWire connection, A PAN is not necessarily a wired connection, it can also be a Bluetooth connection between a cell phone & a car’s wireless audio system.

A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?

A) WAN B) CAN C) PAN D) MAN

What are some characteristics of the star topology?

Most popular physical LAN topology used today. The Ethernet switch is in the center of the star and unshielded twisted pair (UTP) cables run from the switch ports to the client and back. It uses more cables than the other topologies because each device requires its own wiring to the central device. If one of the cables breaks it only affects the device its connected to not the entire group.

Which of the following LAN topologies requires the most cabling?

A) Bus B) Ring C) Star D) WLAN

Which of all the Network Topologies is the least fault tolerant and why?

A bus network requires only a single cable per segment. If any device in the segment fails, then the whole segment crashes.

What are the characteristics of a Full- Mesh topology?

Offers the highest level of redundancy. Each site is directly connected to every other site so an optimal route exists between any two sites. It is also highly fault resistant. It is difficult and expensive to scale, because to add a new site requires a WAN link to every other site.

Which of the following topologies offers the highest level of redundancy?

A) Full Mesh B) Hub & Spoke C) BUS D) Partial Mesh

How to calculate the number of required WAN connections for a Full-Mesh topology?

Example: If you have 5 remote sites W= number of WAN links N = number of sites W=n * (n-1) / 2 w = 5 * (5-1) / 2 (4 / 2) w = 5 * 2 w = 10 Ans: 10 WAN links are required 5 there & 5

back

How many WAN links are required to create a full mesh of connections between 5 remote sites? A) 5 B) 10 C) 15 D) 20

How does the Hub and Spoke topology differ from the Full-Mesh topology?

Costs are reduced because each site is connected to a central hub, not to each other so a small amount of links are needed. It’s also more scalable because to add another site only requires a connection to the hub. It also lacks redundancy because every site goes through the central Hub so it becomes a single point of failure. If the hub is down so is the network.

Identify two advantages of a hub-and-spoke WAN topology as compared to a Full-Mesh WAN topology? (Pick 2)

A) Lower Cost B) Optimal Routes C) More scalable D) More redundancy

What are the characteristics of a Peer-to- peer network?

Used for small or home based businesses, less than 10 PC’s. It allows all interconnected devices to share resources like files, and printers. Inexpensive network to run, limited scalability. The more PC’s on the network decreases performance & increases the burden of managing multiple clients for the administration.

Which type of network is based on clients sharing resources with one another?

A) Client-server B) Client- peer C) Peer-to-peer D) Peer-to-server

Which of the following is an advantage of a peer–to-peer network, as compared with a client-server network?

A) More scalable B) Less expensive C) Better performance D) Simplified administration

What is a Server?

A server, serves up resources to a network. These resources might include e-mail access, (as provided by an e-mail server) web pages (as provided by a web server) or files (available on a file server)

What is a Hub?

It is a device that interconnects network components, such as clients, and servers. Hubs vary in their number of available ports. Hubs can be interconnected to a point. Too many hubs chained together will result in network errors. A hub does not perform any inspection of the traffic it passes. It receives traffic through a port that’s connected to a network cable then it repeats that traffic out of all the other ports.

What are the 7 layers of the OSI Model?

Layer 1 The Physical Layer Layer 2 The Data Link Layer Layer 3 The Network Layer Layer 4 The Transport Layer Layer 5 The Session Layer Layer 6 The Presentation Layer Layer 7 The Application Layer

What is the difference between the OSI reference model and the TCP/IP model? * The OSI ensures reliable delivery of

packets at the transport layer (4) * TCP/IP Model matches up to the OSI model as: The Network Interface (Link) layer compares to the Physical & Data Link, The Internet layer is comparable to the Network, Transport is the same in both, & The Application layer in TCP/IP handles layers 5, 6,& 7 in the OSI model. TCP/IP does not guarantee reliable delivery of packets at layer 4 (transport). TCP/IP also offers the UDP (connectionless transport layer protocol) option.

What is the function of the second layer know as The Data Link Layer?

The Data Link Layer has 2 sub layers

The 1st sub layer is the Media Access Control (MAC) This handles the: Physical Addressing Logical Topology Method of

transmitting on the media.

The 2nd sub layer is the Logical Link Control (LLC) This sub layer handles the:

Connection services

Synchronizing transmissions.

Which layer of the OSI reference model contains the MAC and LLCsub layers? A) The Network Layer B) The Transport Layer C) The Physical Layer D) The Data Link Layer

What is Baseband?

Baseband resides in the 1st layer of the OSI Model in the Physical Layer unlike broadband where it divides the bandwidth over copper etc.. Baseband uses all available frequencies on a medium to transmit data. Ethernet is an example of a network technology that uses baseband.

Which approach to bandwidth usage consumes all available frequencies on a medium to transmit data?

A) Broadband B) Baseband C) Time – Division Multiplexing D) Simplex

Windowing is provided at what layer of the OSI reference model?

A) Data Link Layer B) Network Layer C) Transport Layer D) Physical Layer

Which of the following IP addresses would be classified as private?

A) 10.100.200.0

B) 169.253.5.0

C) 172.168.5.0

D) 200.100.25.0

Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)

A) High availability

B) Fault tolerance

C) Reduce latency

D) Wi-MAX

E) CARP

PKI is a method of user authentication which uses which of the following?

A) Various router commands

B) Access control lists

C) Certificate services

D) A RADIUS server

Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).

A) IDS

B) Packet sniffer

C) Port scanner

D) Malware scanner

E) Ping sweep

IP addresses reside at which layer of the OSI reference model?

A) Network Layer

B) Session Layer

C) Data Link Layer

D) Transport Layer

Which of the following is a connectionless transport layer protocol?

A) IP

B) TCP

C) UDP

D) H.323

Identify the 4 layers of the TCP/IP stack (Choose four)

A) Session Layer B) Transport Layer C) Internet Layer D) Data Link Layer E) Network Layer F) Application Layer G) Network Control Layer

What is the range of well-known TCP and UDP ports?

A) Below 2048 B) Below 1024 C) 16,384 – 32,768 D) Above 8192

Which protocol supports a secure connection to a remote host via terminal emulation software?

A) Telnet

B) SSH

C) FTP

D) SFTP

Identify the well known port number for NTP?

A) 53

B) 69

C) 123

D) 143

Identify 3 e-mail protocols? (choose 3)

A) SNMP B) SMTP C) POP3 D) IMAP4

What type of coaxial cable was often used for 10Base2 Ethernet networks?

A) RG – 6 B) RG – 45 C) RG – 58 D) RG - 59

Which of the following categories of UTP cabling are commonly used for 1000Base-T networks? (choose 2)

A) CAT 5 B) CAT5e C) CAT6 D) CAT6e

Which type of cable might be required for installation in a drop ceiling, which is used as an open air return duct?

A) Riser B) Plenum C) Multimode D) Twin-axial

Which network infrastructure device primarily makes forwarding decisions based on MAC addresses?

A) Router – (Layer 3 device) B) Switch (Layer 2 device) C) HUB ( Layer 1 device) D) Multi-Layer switch (Layers 2 &

above)

A router(Layer 3) primarily makes its forwarding decisions based on what address?

A) Destination MAC address B) Source IP address C) Source MAC address D) Destination IP address

Identify 2 differences between an Ethernet bridge and an Ethernet switch (Choose 2)

A) Switches use ASIC’s to make forwarding decisions, while bridges make their forwarding decisions in software.

B) Bridges typically operate faster than switches

C) Switches typically have higher port densities than bridges

D) Bridges can base their forwarding decisions on logical network layer addresses

What layer do Bridges operate at?

Bridges operate at the Data Link Layer or Layer 2

What is the purpose of the SMB (server message block) protocol?

The SMB protocol runs on the UNIX or Linux server and helps the Windows server see the UNIX/Linux servers as if they were one of the Windows servers itself.

What are BNC connectors used for?

BNC connectors are used to connect computers to a 10Base2 (thinnet) cable in the BUS topology.

A router has 12 ports. How many broadcast domains does the router have?

A) None B) One C) Two D) Twelve

A switch has 12 ports. How many collision domains does the switch have?

A) None B) One C) Two D) Twelve

What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?

A) DHCPOFFER B) DHCPACK C) DHCPDISCOVER D) DHCPREQUEST

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

A) Content switch B) Proxy server C) DNS server D) Content engine

What is CSMA/CA AND WHAT DOES IT DO?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) It is the basic medium access method for IEEE 802.11(g) wireless networks. (CSMA/CD is collision detection, and it’s the basic access method for Ethernet networks)

What is DNS?

Domain Name System (DNS) A system that provides a way to map friendly host names or URL’s to IP addresses.

What is meant by Default Gateway?

It is the route taken so that a computer on one segment can communicate with a computer on another segment.

What is the Demilitarized Zone (DMZ) and what does it do?

The DMZ describes the area in a network design that is located between the internal network & the external network. Usually the internet. It is used for devices accessible to internet traffic such as the web server, FTP server, SMTP server, and DNS.

Which of the following describes a DNS server?

A) Translates an IP address to a name

B) Caches commonly viewed web pages

C) Assigns IP addresses to network devices

D) Provides port security for a network

After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

A) Bad Ethernet switch port B) TX/RX reversed C) Bad connectors D) Bad patch cable E) Mismatched MTU

Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?

A) RDP

B) SSL VPN

C) ISAKMP

D) TLS2.0

Which of the following can be an STP cable?

A) RG-6

B) CAT5E

C) Fiber

D) RG-59

Which of the following wireless authentication methods provides the GREATEST amount of security?

A) WEP

B) WPA Enterprise

C) WPA Personal

D) WPA2 Personal

Which of the following OSI model layers is used for logical addressing?

A) Physical

B) Transport

C) Network

D) Data link

In which of the following layers of the OSI model does the TCP protocol operate?

A) Session

B) Network

C) Data link

D) Transport

A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause?

A) Protocol mismatch

B) MTU size was not increased for the new distance

C) Incorrect VLAN assignment

D) Incorrect cabling

Which of the following protocols is used by the ping command?

A) SMTP

B) ICMP

C) TFTP

D) ARP

Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration?

A) Baseline

B) Physical network diagram

C) Wiring schematic

D) Logical diagram

Which of the following authenticates, allows, and controls the execution of router commands?

A) PKI

B) RADIUS

C) Kerberos

D) TACACS+

A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?

A) Document the solution and process

B) Establish the most probable cause

C) Implement and test the solution

D) Identify additional symptoms and problems

A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?

A) Packet filtering

B) Content filtering

C) Packet sniffing

D) Application gateway

Which of the following is a valid IPv6 address?

A) 1056: 958: E486:: F8:8962

B) 1596:H593:B5D8::B589

C) 2048:9584:A6B8::0983

D) 4820::0985:489D::8761

Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?

A) Change the DNS server IP on the client

B) Information gathering

C) Change the workstation IP address

D) Establish a plan of action

Logically separating the ports on a switch without physically separating them can be done using which of the following?

A) Routing tables

B) Hub logic

C) Spanning tree protocol

D) VLANs

Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?

A) nmap

B) nbtstat

C) dig

D) arp

A customer wants to have several internal services hosted on multiple servers, all of which need to be available to the Internet through a single public IP address. Which of the following would need to be configured?

A) QoS

B) PoE

C) PAT

D) VLAN

Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?

A) Connectionless

B) Stateful

C) Full duplex

D) Quality of Service

Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

A) Decreasing radio strength

B) MAC filtering

C) WEP encryption

D) SSID broadcast disable

Which of the following security measures is the LEAST intrusive on an end device?

A) NIPS

B) Host-based firewall

C) Antivirus

D) HIDS

At which of the following layers of the OSI model does an unmanaged switch operate?

A) Layer 1

B) Layer 2

C) Layer 3

D) Layer 4

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?

A) The subnet mask is incorrect

B) A routing loop has occurred

C) Jeff used a crossover cable to connect the switch to the gateway

D) The server is missing default-gateway information

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues?

A) Limit the devices to 802.11n only

B) Enable the SSID broadcast

C) Enable MAC filtering

D) Use WEP 128-bit key

When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A) Signal strength

B) SSID enable

C) Encryption

D) Password hardening

Which of the following is an environment where only a username and password are required for successful authentication results in access to multiple resources?

A) Multiple logins

B) Multifactor authentication

C) Two-factor authentication

D) Single sign-on

Which of the following methods limits access to a network based on characteristics of the network card?

A) IP filtering

B) MAC filtering

C) Port filtering

D) Encryption

Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A) DoS

B) Smurf attack

C) Virus

D) Man-in-the-middle

Which of the following Ethernet technologies has the LONGEST distance possible?

A) 1000BaseLX

B) 1000GBaseSR

C) 1000BaseSX

D) 1000BaseT

Which of the following technologies allows for redundant links within a layer 2 segment?

A OSPF

B RIP

C Port Mirroring

D Spanning Tree

Which of the following defines access for a network?

A) ACL

B) RDP

C) RAS

D) ARP

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?

A) Wire tap

B) Network sniffer

C) Load balancing appliance

D) NIPS

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

A) Routing loop

B) MTU black hole

C) Framing error

D) SYN flood

Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2)

A) traceroute E) Bandwidth shaper

B) ping F) Load Balancer

C) ipconfig G) DNS server

D) netstat H) IPS

A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?

A) Fiber multiplexer

B) Repeater

C) Attenuator

D) OTDR

A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?

A) DB loss

B) EMI

C) TXRX reversed

D) Open shorts

Which of the following is an example of two factor authentication?

A) Password device certificate and PIN

B) SSL web server certificate and password

C) User password and administrator Password

D) Password and hardware token OTP

Which of the following is used to restrict access according to user policies?

A) Content filter

B) DHCP server

C) DNS server

D) VPN concentrator

Which of the following describes a rationale for a network with redundant paths?

A) VPN compatibility

B) Unified communications implementation

C) High availability requirement

D) QoS

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

A) Increased uptime

B) Caching engines

C) Traffic shaping

D) Load balancing

Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?

A) Loopback plug

B) Protocol analyzer

C) Smart jack

D) Coupler

A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?

A) Replace the router with a layer 2 switch that supports VLANs

B) Change VLAN 20 computers Default Gateway to 192.168.1.127/27

C) Change VLAN 10 computers Default Gateway to 192.168.1.32/27

D) Allow ICMP to pass through the router

Identify the distance limitation of a 10BASE5 (thicknet)Ethernet network?

A) 100m B) 185m C) 500m D) 2km

m = meters

If 2 devices simultaneously transmit data on an Ethernet network & a collision occurs, what does each station do in an attempt to resend the data & avoid another collision?

A) Each device compares the other device’s priority value (determined by IP address) with its own, & the device with the highest priority value transmits first

B) Each device waits for a clear to send (CTS) signal from the switch

C) Each device randomly picks a priority value, & the device with the highest value transmits first

D) Each device sets a random back off timer, & the device will attempt retransmission after the timer expires

What kind of media is used by 100GBASE-SR10 Ethernet?

A) UTP B) MMF C) STP D) SMF

Which of the following statements are true regarding VLAN’s? (choose 2)

A) A VLAN has a single broadcast domain

B) For traffic to pass between 2 VLANs, that traffic must be routed.

C) Because of a switch’s MAC address table, traffic does not need to be routed to pass between 2 VLAN’s

D) A VLAN has a single collision domain

What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?

A) Native VLAN

B) Default VLAN

C) Management VLAN

D) VLAN 0

In a topology running STP, every network segment has a single __________ port, which is the port on that segment that is closest to the root bridge, in terms of cost?

A) Root

B) Designated

C) Non-Designated

D) Non-root

What is the IEEE standard for link aggregation?

A) 802.1Q

B) 802.3ad

C) 802.1d

D) 802.3af

What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?

A) 7.7 W

B) 15.4 W

C) 26.4 W

D) 32.4 W

What switch feature allows you to connect a network sniffer to a switch port & tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?

A) Port Interception

B) Port Duplexing

C) Port Mirroring

D) Port Redirect

Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?

A) Supplicant

B) Authentication server

C) Access point

D) Authenticator

What is the binary representation of the decimal number 117?

A) 10110101

B) 01110101

C) 10110110

D) 01101001

The binary number 10110100 has what decimal equivalent?

A) 114

B) 190

C) 172

D) 180

What is the class of IP address 10.1.2.3/24?

A) Class A

B) Class B

C) Class C

D) Class D

Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (choose 2)

A) BOOTP

B) APIPA

C) Zeroconf

D) DHCP

How many assignable IP addresses exist in the 172.16.1.10/27 network?

A) 30

B) 32

C) 14

D) 64

What is the prefix notation for a subnet mask of 255. 255. 255. 240?

A) /20

B) /24

C) /28

D) /29

Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate 7 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?

A) /24

B) /26

C) /27

D) /28

A client with an IP address of 172.16.18.5/18 belongs to what network?

A) 172.16.0.0/18

B) 172.16.4.0/18

C) 172.16.8.0/18

D) 172.16.16.0/18

How can the following IPv6 address be condensed? 0AA0:0123:4040:0000:0000:000:000A:100B

A) AA0::123:404:A:100B

B) AA::123:404:A:1B

C) AA0:123:4040::A:100B

D) 0AA0:0123:4040::0::000A:100Bsection

If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address & destination MAC address will be placed in the packet/frame header sent by the PC?

A) Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway

B) Dest.IP: IP address of remote host. Dest.MAC: MAC address of default gateway

C) Dest.IP: IP address of remote host. Dest. MAC: MAC address of remote host

D) Dest.IP: IP address of remote host. Dest.MAC: MAC address of local PC

What protocol is used to request a MAC address that corresponds to a known IP address?

A) IGMP

B) TTL

C) ICMP

D) ARP

What is the network address & subnet mask of a default route?

A) 255.255.255.255/32

B) 0.0.0.0/32

C) 255.255.255.255/0

D) 0.0.0.0/0

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?

A) Weight

B) Metric

C) Administrative distance

D) SPF algorithm

Which of the following are distance vector routing protocol features that can prevent routing loops? (choose 2)

A) Reverse path forwarding (RPF) check

B) Split Horizon

C) Poison Reverse

D) Rendezvous point

Which of the following is a distance-vector routing protocol with a maximum hop count of 15?

A) BGP

B) IS-IS

C) RIP

D) OSPF

Which of the following routing protocols is an EGP?

A) BGP

B) IS-IS

C) RIP

D) OSPF

What NAT IP address is a public IP address that references an inside device?

A) Inside Local

B) Inside Global

C) Outside Local

D) Outside Global

What NAT variation automatically assigns an inside global address from a pool of available addresses?

A) SNAT

B) DNAT

C) PAT

D) GNAT

What multicast protocol is used between clients & routers to let routers know which of their interfaces are connected to a multicast receiver?

A) IGMP

B) PIM-DM

C) PIM-SM

D) SPT switchover

ISDN is considered to be what type of WAN connection?

A) Dedicated leased line

B) Circuit-switched connection

C) Packet-switched connection

D) Cell-switched connection

What is the data rate of an OC-3 connection?

A) 51.84 Mbps

B) 622 Mbps

C) 155.52 Mbps

D) 159.25 Gbps

Which of the following WAN technologies commonly use unshielded twisted pair (UTP)? (choose 3)

A) Cable modem

B) ISDN

C) DSL modem

D) POTS dial-up connection

How many channels on an E1 circuit are available for voice, video, or data?

A) 23

B) 24

C) 30

D) 32

Which PPP authentication method provides one-way authentication & sends credentials in clear text data?

A) WEP

B) MS-CHAP

C) PAP

D) CHAP

What DSL variant has a distance limitation of 18,000 ft. between DSL modem & its DSLAM?

A) HDSL

B) ADSL

C) SDSL

D) VDSL

What kind of network is used by many cable companies to service their cable modems, & contains both fiber-optic and coaxial cable?

A) Head-end

B) DOCSIS

C) Composite

D) HFC

What locally significant identifier is used by a frame Relay network to reference a virtual circuit?

A) VPI/VCI

B) DLCI

C) TEI

D) MAC

How big is the payload portion of an ATM cell?

A) 5 bytes

B) 48 bytes

C) 53 bytes

D) 64 bytes

What type of antenna, commonly used in wireless AP’s & wireless routers in SOHO locations, radiates relatively equal power in all directions?

A) Unidirectional

B) Yagi

C) Parabolic

D) Omnidirectional

When using the 2.4 GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (choose 3)

A) 0 B) 1 C) 5 D) 6 E) 10 F) 11 G) 14

What technology do WLAN’s use to determine when they gain access to the wireless media?

A) SPF

B) CSMA/CA

C) RSTP

D) DUAL

What IEEE 802.11 variant supports a maximum speed of 54 Mbps & uses 2.4 GHz band?

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Which of the following is used by IEEE 802.11n to achieve high through-put through the use of multiple antennas for transmission & reception?

A) MIMO

B) DSSS

C) FHSS

D) LACP

A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

A) Enterprise mode

B) IBSS

C) Personal Mode

D) BSS

When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?

A) 5 – 10 percent B) 10 – 15 percent C) 15 – 20 percent D) 20 – 25 percent

If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentication is said to be in use?

A) WEP B) SSID C) Open D) IV

WEP’s RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?

A) Initialization vector B) Chips C) Orthogonal descriptor D) Session key

What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i ?

A) TKIP

B) MIC

C) WEP

D) WPA2

What is the MPLS header?

A) 4 bits

B) 8 bits

C) 16 bits

D) 32 bits

Which of the following is a social engineering attack?

A) Man in the middle

B) Worms

C) Evil Twin

D) Phishing

00:12:34:56:78 can be used in which of the following?

A Channel selection

B WPA-PSK password

C WEP key

D MAC filtering

Which of the following devices will monitor for propagating worms?

A IDS

B Firewall

C Proxy server

D Mail server

T568B wiring scheme is typically found on which of the following components?

A 66 block

B Demarc extension

C Patch Panel

D Vertical Cross Connect

Something you have, something you are and something you know are the three tenets of:

A) access control

B) remote access

C) change management

D) social engineering

After moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem

A Split cables

B Crosstalk

C TX/RX reversed

D DB loss

A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this?

A MAC filtering

B WPA encryption

C Changing antenna type

D Decreasing radio strength

In IPSec, which of the following is an agreement on how devices will securely transmit information? A) ESP

B) SA

C) AH

D) ISAKMP

Which of the following could be used to estimate RTT across a router?

A traceroute

B dig

C arp

D uptime

The cable tester displays the following information

11 2------- 2 3------- 3 4xxxxx 4 5xxxxx 5 6------- 6 7------- 7 8------- 8

What is being reported?

A) 5 is open, 1|4 are open B) 1 is open, 4|5 are

shorted C) 4|5 is shorted, 1 is ok D) 1 is shorted, 4|5 are

open

Which of the following represents the physical address of a network access card

A 00-30-48-83-9B-C8

B FF01:D2:C4:87::11

C 08-9D-35-22-L2-34-FF-21

D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

Which of the following records would be used for a Reverse DNS lookup?

A) MX

B) PTR

C) A

D) AAAA

Which of the following defines access for a network?

A) ACL

B) RDP

C) RAS

D) ARP

A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?

A) DB loss

B) EMI

C) TXRX reversed

D) Open shorts

Which of the following is used to restrict access according to user policies?

A) Content filter

B) DHCP server

C) DNS server

D) VPN concentrator

Which of the following describes a rationale for a network with redundant paths?

A) VPN compatibility

B) Unified communications implementation

C) High availability requirement

D) QoS

Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this?(select two) A) Packet sniffer B) Honeypot C) Port mirroring D) IPS E) Port scanner F) IDS

For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?

A) The server contains several virtual machines & the MAC addresses are from the virtual machines.

B) The server is hosting a web server & the MAC addresses are from connected browsers

C) The server is hosting a proxy server & the MAC addresses are from the connected clients

D) The server NIC is starting to fail & should be replaced.

Which of the following does SNMPv3 BEST provide over previous versions?

A) Simplified management

B) Increased security

C) More data types

D) Higher productivity

In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?

A) MDF

B) Caching engines

C) Demarc

D) IDF

A company’s database software runs the cloud. The device hosting the software is an example of which of the following?

A) Virtual server

B) Virtual switch

C) Virtual desktop

D) Virtual PBX

Kim, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Kim has permission to the server & the workstation is able to get to other network resources. Which of the following is the MOST likely cause?

A) The department server is having network issues

B) Kim’s workstation is a part of the wrong VLAN

C) The onboard NIC has outdated drivers installed

D) The wireless NIC has not been enabled for Kim’s workstation

Kim, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Kim’s wireless network to differentiate it from other wireless networks & still provide the BEST performance & security? (Choose 2)

A) SSID B) Channel C) Antenna type D) Wireless standard E) NAT

Which of the following allows a central point to simultaneously address other points without addressing all of them?

A) Multicast

B) Subnetting

C) Unicast

D) Broadcast

Zack, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?

A) PEAP

B) WPA Personal

C) WPA2 Enterprise

D) WPA2 PSK

Which of the following would a technician plug into a smartjack?

A) 25 pair cable

B) 100 pair cable

C) Patch cable

D) Patch panel

A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves & concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch? A) Fiber optic

B) Wireless

C) CAT5e

D) CAT3

Lisa, an administrator, is unable to route traffic between VLAN’s on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside?

A) Network

B) Data link

C) Transport

D) Session

Which of the following devices is used to distribute network traffic equally over multiple links?

A) Content filler

B) DNS server

C) Load balancer

D) Proxy server

Which of the following would cause signal interference in a 2.4 GHz WAP? (Choose 2)

A) Cell phone

B) Cordless phone

C) Microwave oven

D) Printer

E) Television

Which of the following default services uses TCP/UDP port 88?

A) LDAP

B) IGMP

C) HTTP

D) Kerberos

Which of the following TCP/IP & OSI model layers retransmits a TCP packet if it is not received successfully at this destination?

A) The transport OSI model layer & the Internet TCP/IP model layer

B) The transport OSI model layer & the transport TCP/IP model layer

C) The network OSI model layer & the transport TCP/IP model layer

D) The network OSI model layer & the internet TCP/IP model layer

Which of the following limits the number of devices that can be assigned IP addresses by DHCP?

A) A Lease

B) Reservation

C) DNS setting

D) Scope

Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?

A) Network map

B) Cable management

C) Change management

D) Asset management

When using high bandwidth applications over multiple WAN connections, which of the following should be used?

A) Static IP addressing

B) Half-duplex

C) PoE devices

D) Load balancing

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?

A) Butt set

B) Cable certifier

C) Toner probe

D) Snips

Which of the following ports is the default telnet port?

A) 20

B) 21

C) 22

D) 23

In which of the following wireless standards is MIMO used?

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Which of the following address blocks would MOST likely be blocked from crossing a border router?

A) 8.0.0.0/8

B) 172.16.0.0/12

C) 122.0.0.0/24

D) 248.0.0.0/8

Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?

A) Nmap

B) Nbtstat

C) Dig

D) Arp

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO)

A) 22 B) 23 C) 243 D) 161 E) 162 F) 8080

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?

A) OTDR

B) Multimeter

C) Punch down tool

D) Temperature monitor

Jeff, a technician is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

A) PoE

B) Port mirroring

C) Convergence

D) Port speed

Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? A) WAP placement

B) PoE devices

C) MAC filtering

D) Encryption type

Zach, a technician suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

A) Network map

B) Environmental monitor

C) Placement map

D) Syslog

Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?

A) Change management

B) Baselines

C) Asset management

D) Cable management

A VPN concentrator is used for which of the following purposes?

A) MAC filtering

B) Content filtering

C) Secure network access

D) Connectivity troubleshooting

Which of the following layers of the OSI model, maps to the Network Interface layer of the TCP/IP Protocol stack? (pick 2)

A) Physical B) Session C) Data Link D) Network E) Transport

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together? A) Cable tester

B) Toner probe

C) Cable crimper

D) Punch down tool

Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A) TXRX is reversed

B) Faulty crossover cable

C) Incorrect WEP key

D) A short in the cable pairs

Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?

A) Switch loop

B) Port bonding

C) Virtual switch

D) Port mirroring

Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?

A) SNMPv2

B) VPN

C) SYSLOG

D) SMTP

Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?

A) Netstat

B) Route

C) Nslookup

D) Arp

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?

A) Channel

B) WEP

C) SSID

D) WEPA

Which of the following can Jeff, a technician, modify on a 802.11n router that is not available as an option on an 802.11g device?

A) SSID

B) Encryption

C) Channels

D) Spectrum

Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?

A) VLAN malfunction

B) Broadcast storm

C) Quality of Service loss

D) Duplicate IP addresses

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?

A) Protocol analyzer

B) Butt set

C) OTDR

D) Toner probe

Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

A) TDR

B) Protocol analyzer

C) Multimeter

D) Cable crimper

Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?

A) Reservations

B) Lease times

C) Removing IPs from the active leases

D) Configuring the DNS options

Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach’s NEXT step?

A) Test the theory

B) Establish a plan of action

C) Establish a theory

D) Document findings

Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?

A) OTDR

B) Protocol analyzer

C) Toner probe

D) TDR

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?

A) WPA should be enabled

B) PKI should be turned off

C) WAP SID’s are matching

D) WAPs are transmitting on the same channel

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

A) Enable an SNMP agent

B) Enable network mapping

C) Set monitoring SSID

D) Select WPA2

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?

A) Channel bonding

B) MIMO

C) Spatial reuse

D) 20MHzchannel spacing

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

A) 20

B) 21

C) 22

D) 23

Which of the following separates broadcast domains?

A) Port mirroring

B) Router

C) Convergence

D) Switch

Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should be used?

A) Tone probe

B) Punch down

C) Wire tester

D) Crimper

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?

A) Protocol analyzer

B) Cable tester

C) Toner probe

D) Punch down tool

Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified?

A) Fast Ethernet 0/0

B) AUX 0

C) Console 0

D) Serial 0/0/0

Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

A) This is a private address that cannot be seen by external users

B) This address does not have the appropriate subnet mask assigned

C) This is a public address which can only be seen by internal users

D) This is a private address which can only be seen by external users

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?

A) Loopback plugs

B) Butt set

C) Cable certifier

D) Tone probe

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly, but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?

A) Port speed

B) Cryptokey

C) Data VLAN

D) NAT/PAT

Which of the following protocols is used to securely connect to a multi-layer switch? A) HTTP

B) SMTP

C) SSH

D) Telnet

Which of the following is the prefix for a link-local IPv6 address?

A) FE80::/10

B) FFOO::/8

C) 2FFE::/16

D) FEEF::/12

Zach, a technician, is checking newly installed CAT5 cabling and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?

A) Cable tester

B) Tone probe

C) OTDR

D) Loopback plug

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?

A) Protocol analyzer

B) Cable tester

C) Cable verifier

D) Environmental monitor

Which of the following is used to prevent Layer 2 switching loops within a local area network? A) STP

B) MTU

C) EGP

D) IGP

Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch?

A) SNMP trap

B) Bandwidth analyzer

C) Network sniffer

D) Syslog server

Which of the following is a method to prioritize network traffic coming on VoIP phones?

A) PAT

B) DNS

C) SIP

D) QoS

Which of the following network devices hides network nodes behind one public IP address?

A) Layer 3 switch

B) Content filter

C) VPN server

D) Proxy server

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

A) Net share

B) Hostname

C) IPconfig

D) Tracert

Which of the following Ethernet technologies has the LONGEST distance possible?

A) 1000BaseLX

B) 1000GBaseSR

C) 1000BaseSX

D) 1000BaseT

Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A) DoS

B) Smurf attack

C) Virus

D) Man-in-the-middle

Which of the following is a terminal emulator used to manage a network device?

A) VPN

B) IDS

C) PUTTY

D) IPS

Which of the following DNS record types is used for IPv6 resolution?

A) MX

B) AAAA

C) A

D) PTR

A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?

A) CSU

B) Demarc

C) Registered jack

D) DSU

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A) 100 kilometers (62 miles)

B) 10 kilometers (6 miles)

C) 1000 meters (3281 feet)

D) 100 meters (328 feet)

Kim, a network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets she wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

A) DHCP

B) ARP

C) DNS

D) Ping

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

A) Improper grounding

B) TXRX reversed

C) Incorrect termination

D) Outdated NIC drivers

Which of the following are components of IPSec? (Select 2)

A) AH B) ESP C) SSH D) ICA E) TLS

Which of the following authenticates, allows, and controls the execution of router commands?

A) PKI

B) RADIUS

C) Kerberos

D) TACACS+

A technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?

A) Channel

B) SSID

C) Firewall rule

D) Encryption

Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a potential security threat.Which of the following can be done to eliminate this threat?

A) Implement WEP encryption

B) Decrease signal strength

C) Change wireless channels

D) Rotate the SSID daily

Which of the following DNS record types provides the hostname to IP address mapping?

A) A record

B) NS record

C) CNAME record

D) MX record

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

A) Honeynet

B) Honeypot

C) Vulnerability scanner

D) Network based IDS

Which of the following would Kim, a technician, use in voice over IP communications?

A) SNTP

B) SCP

C) SMTP

D) SIP

Which of the following is the best way to mitigate security threats on a network?

A) Social engineering

B) User training

C) Incident response

D) Man-in-the-middle

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A) 255.255.255.0

B) 255.255.255.128

C) 255.255.255.192

D) 255.255.255.248

Jeff, an administrator, wishes to add a third network segment to the firewall where the company’s public web servers will be placed. Which of the following BEST describes this new segment? A) PKI

B) VPN

C) IPS

D) DMZ

Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

A) Baselines

B) Regulations

C) Logical network diagrams

D) Wiring schematics

Which of the following has the HIGHEST data rate speed?

A) T1

B) ADSL

C) SDSL

D) OC-3

Which of the following technologies is associated with the DOCSIS standard?

A) Cable

B) Dialup

C) Wireless

D) Cellular

Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

A) IPS

B) Application layer firewall

C) IDS

D) An unmanaged switch

Which of the following should an administrator do after running a command from the console on the perimeter router?

A) Update the configuration logs

B) Update the network wiring schematics

C) Update the network configuration procedures

D) Compare the configuration with the baseline

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for installation. The wires at each end are color coded as follows: END A orange-white, orange, green-white, blue, blue-white, green, brown-white, brown. END B green-white, green, orange-white, blue, blue-white, orange, brown-white, brown. Which of the following should Kim do to complete the installation?

A) Re-end the provided cable, keeping the wiring the same.

B) Use the provided cable C) Purchase a crossover cable D) Purchase a straight-through cable

Which of the following are fiber connectors? (Select 2)

A) LC

B) MTRJ

C) T1

D) DB-9

E) BNC

Which of the following solutions will detect and disable a rogue access point?

A) Port scan

B) packet sniffer

C) IPS

D) IDS

Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter?

A) 10GBaseLR

B) 10GBaseSR

C) 10G BaseX

D) 10GBaseT

Which of the following can be done to increase a wireless LAN cell size?

A) Add a higher gain omni antenna

B) Add diversity antennas

C) Add a higher gain yagi antenna

D) Increase the PoE wattage

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (select 2)

A) Layer 2 switch B) MAC address filtering C) ACLs D) IIS server E) Port scanner F) Firewall

Which of the following is used to identify active hosts along with their network addresses?

A) Port scan

B) Ping sweep

C) IDS

D) NIPS

Which of the following is used to share traffic between multiple network connections?

A) Load balancer

B) Content filter

C) VPN concentrator

D) Proxy server

What layers of the OSI model does Stateful Inspection operate at?

It assures the connection (session) between 2 parties is valid and inspects packets from this connection to assure the packets are not malicious (application level) and acts as a circuit level firewall. It operates at the network 3, session 5, & application 7 layers

Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A) Multimode fiber

B) CAT6a

C) Single mode fiber

D) Coaxial

Which of the following mediums is circuit switched?

A) PSTN

B) ATM

C) Frame relay

D) MPLS

top related