• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/288

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

288 Cards in this Set

  • Front
  • Back
Which of the following would a technician do to monitor remote traffic through an access point?
Enable an SNMP agent
Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable?
dig
Which of the following standards can operate at either 20MHz or 40MHz channel spacing?
802.11n
to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client's machine?
ipconfig
A user's computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
nslookup
Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?
Cable is run too close to a fluorescent light.
Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?
254
On which of the following OSI model layers would a MAC address be used?
Data Link
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
Change management
Which of the following TCP/IP model layers does the OSI model Presentation layer map to?
Application
Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?
Reservations
A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
PoE
Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?
Unified communications
Which of the following uses SSL encryption?
HTTPS
Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem?
EMI
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?
Document findings
A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
Establish a theory
A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
Establish a theory
Spanning-Tree Protocol is used with which of the following network devices?
Switch
In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?
Quality of service
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?
Low signal strength or interference
A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
VLAN
A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1
2-----------2
3-----------3
4-----------4
5-----------5
6-----------6
7-----------7
8-----------8

Which of the following should the technician do NEXT?
Redo the cable's connectors
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO).
Port mirroring and VLANs
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
Change management
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?
Central UPS system
During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?
WPA2, SSID disabled, and 802.11a.
Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?
Patch panel
Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?
SSL VPN
Which of the following is the difference between 802.11b and 802.11g?
Speed
Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?
Tracert
A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
Stateful firewall
In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?
MIMO, OFDM
A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?
Single sign on
A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).
MAC filtering and Port filtering
A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation?
STP
Which of the following wireless standards provide speeds up to 150Mbps?
802.11n
Which of the following defines a rack located in an office building between the main rack and other office equipment?
IDF
Which of the following connectors is usable in SFP modules?
LC
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering?
VPN between routers located in each office space
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
dig
A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?
Static IPs
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?
ipconfig
A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?
Channel overlap
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows:

IP address: 192.168.0.124
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?
Incorrect gateway
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).
PoE, VLANs, and QoS
A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network?
Change the channel to a different channel than the other wireless networks.
Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?
Session
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
MAC address filtering
Which of the following is the common port used for IMAP?
143
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?
QoS
Which of the following network protocols is used to resolve FQDNs to IP addresses?
DNS
Which of the following network protocols is used for a secure command line interface for management of network devices?
SSH
A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
Re-establish a new theory or escalate.
Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?
SMTP
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
Create a MAC filter containing the current users.
Which of the following should be used when throughput to the destination network is a priority?
Bandwidth
Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?
ping
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user's PC?
ICMP
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Implicit deny
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
DMZ
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
MDF
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
Transfer the replacement servers offsite to a data center.
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
Honeypot
Which of the following is the FASTEST Ethernet technology?
10GBaseSR
A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?
Enable MAC address filtering
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
Port filtering
Companies trying to cut down on constant documentation of IP addresses could use which of the following?
Dynamic IP addressing
Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher's station, a few feet away, to the same hub. The teacher is experiencing no network connectivity. Which of the following is MOST likely the problem?
Split cables
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?
ipconfig
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
tracert
A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?
SNMP
Which of the following network topologies describes a network where each node is connected to every other node?
Mesh
Which of the following DHCP properties defines the size of the pool of available IP addresses?
Scope
Which of the following supports faster wireless broadband speeds?
WiMAX
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
Port security on the Ethernet switch has disabled the port.
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
EAP-TTLS
A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
WEP
Which of the following protocols works at the LOWEST layer of the OSI model?
L2TP
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
WAP placement
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
SNMP and Syslog
Which of the following network appliances will only detect and not prevent malicious network activity?
IDS
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house.
Which of the following will accomplish this?
Decreasing radio strength
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
Traffic analysis
An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection?
RDP
A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?
SNMP
Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?
Network sniffer
Which of the following WAN technologies has the HIGHEST latency?
Satellite
Which of the following connectors are MOST commonly used on a POTS line?
RJ-11
Which of the following cable types is required to run through an air duct?
Plenum
Which of the following technologies can cause interference for 802.11g?
Bluetooth
A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?
Opposing antenna polarizations
Which of the following reduces the deployment cost of a wireless LAN?
PoE
Which of the following is a terminal emulator used to manage a network device?
PuTTY
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?
Protocol analyzer
Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?
Caching
Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?
DHCP
Which of the following commands displays the routing table on a server or workstation?
route
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?
netstat
Which of the following would be the BEST solution for an IDS to monitor known attacks?
Signature-based
At which of the following layers of the OSI model does ASCII work?
Presentation
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?
ping
Which of the following uses port 23 by default?
TELNET
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
Bad wiring
Which of the following is the MAXIMUM rated speed for CAT5 cabling?
100Mbps
Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?
VPN concentrator
Which of the following wireless security measures, although widely implemented, does not provide strong security?
MAC address filtering
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).
Bad connectors and Bad patch cable
Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?
RJ-45
Which of the following performance benefits would multiple domain controllers BEST provide?
Fault tolerance
A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?
DB loss
Assigning the same IP address to a network device is which of the following?
Reservation
Which of the following could be installed to allow a home user with one desktop computer to economically have Internet access in every room in the house?
Broadband over powerline
Which of the following 802.11 standards transmits the signals the GREATEST distance?
n
Which of the following fiber types is MOST often used indoors?
Multimode
Which of the following DNS records is used to identify a domain's SMTP server?
MX
Which of the following TCP ports are used by FTP? (Select TWO).
20 and 21
Which of the following protocols is MOST commonly used for the transfer of router configuration files?
TFTP
Which of the following protocols resolves IP addresses to MAC addresses?
ARP
Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?
Honeynet
Some visitors are unable to access the wireless network. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?

Building A Building B Building C
Channel: 2 Channel: 6 Channel: 11
Encryption: WPA2 Encryption: WPA2 Encryption: WPA2
Encryption set to Open in Building B
Some employees are unable to maintain a wireless network connection. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?

Building A Building B Building C
Channel: 1 Channel: 6 Channel: 11
Encryption: WPA2 Encryption: Open Encryption: WPA2
SSID. CorpSSID. GuestSSID. Sales
Change SSID in Building C to match Building A
Which of the following port numbers is used for SNMP?
161
A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO).
That there is strong encryption enabled and configured on the access point.

There are no conflicts of channels in use by neighboring wireless networks.
Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue?
Cable certifier
Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?
A
Which of the following is the definition of a DNS server?
Translates FQDN's to IP addresses
Which of the following features can BEST be used to facilitate authorized remote access to a network?
VPN concentrator
Which of the following WAN technology types has the GREATEST latency?
Satellite
Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:
virtual servers.
Which of the following is a Class A IP address?
10.4.0.1
A network where all traffic feeds through a centralized gateway uses which of the following topologies?
Star
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
rogue access point.
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?
Patch cable
Which of the following can be used to limit wireless network access to a single computer?
MAC address filtering
Which of the following is the Telco end of a T1 demarc?
Smart jack
The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna. Which of the following is the MOST likely cause of the issue?
The installation exceeds the link limitations
Which of the following WAN technologies uses an analog phone line to transmit data?
DSL
In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?
Reservations
Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server?
dig
A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?
A router
A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?
Run the ifconfig command on the workstation.
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?
ipconfig
A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).
Crimper and Cable tester
A user's workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors?
Application Log
802.11n can operate at which of the following frequencies? (Select TWO).
2.4Ghz and 5Ghz
Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO).
LC and SC
Which of the following cable types supports the FURTHEST distance when connecting various MDFs
Singlemode
Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection?
Media converter
Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?
Implement a software solution that facilitates single sign-on authentication.
A network consultant arrives at a customer's site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?
Escalate the problem
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
168W
Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network
Set up encryption on the WAP and clients
A small office client is requesting a network redesign. Both wired and wireless devices must connect to the network. All of the wireless devices can communicate using the latest standards. The building has a long courtyard in the middle with reinforced walls, which extends up through all the floors. The distance from the switch to the furthest drop is 88 meters. Which of the following is the correct network redesign choice?
The wired network should be run with at least CAT6 cabling.
An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)
20 and 21
Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network?
System baselines
Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO).
200.200.100.63/27 and 200.200.100.95/27
Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).
Switch and Router
Which of the following is a path vector routing protocol?
BGP
Which of the following routing protocols utilizes the DUAL algorithm for determining best path?
EIGRP
Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
Load balancer
Which of the following devices can be utilized to monitor and block websites accessible by a company?
Physical layer and Data link layer
Which of the following BEST describes the definition of DHCP?
DHCP is utilized to dynamically lease IP addresses to hosts.
Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?
The administrator should create exclusions for the servers IP addresses.
The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented?
DMZ
A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?
PoE
A network administrator tests a multimode fiber cable from end-to-end on a new link that is down and notices that the dB loss is -.09. Which of the following is the MOST likely cause?
TXRX reversed
A technician is reviewing the following company diagram to determine proper connectivity

settings:

Device Connection Type Distance
Server A CAT6e 380ft
Laptop B 802.11g 310ft
PC1 CAT5 300ft
LaptopC 802.11n 100ft
ServerE Single Mode 500ft

Which of the following device configurations is out of specifications?
ServerA
A technician is reviewing the following aggregated information on a server to determine the cause of a user's connection problem:

Facility Severity Mnemonic MSG
FW1 4 FPD Packet
AP2 7 AUTH User SW1 7 PUPD Port

Which of the following is the technician reviewing?
Syslog server logs
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
802.1q
A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT?
Re-run the network cabling so that they are 12 inches or more away from the electrical lines.
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
QoS
Honeypots and honeynets are different in which of the following ways?
Honeynets are managed collections of honeypots.
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login

Which of the following security setups does this company employ?
Two factor authentication
Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?
N
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?
Signal bounce
Which of the following is the MAXIMUM potential speed of CAT5e UTP cable?
1000BaseT
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
MAC filtering
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
IP filtering
Which of the following remote access types requires a certificate for connectivity?
SSH
A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings. Which of the following methods provides this functionality?
Use a wireless controller
The APIPA address 169.254.10.123 falls into which of the following class of addresses?
B
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
Implement caching engines
A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?
The route of last resort is missing
Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.

AP1 (a/b/g/n)
----------------
SSID.iCorpOne
WEP Key: 337D1FAB10
Index1
Channel: 1
SSID Mismatch
A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?
The router is not the only DHCP server
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
Kerberos
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
WPA2-CCMP
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
Layer 6
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
Dictionary file
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
Evil twin
A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
Signature based IDS
A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?
Asset management
Which of the following can be described as a DoS attack?
Disabling a specific system and making it unavailable to users
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
Man-in-the-middle
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
Packet sniffer
Which of the following provides secure access to a network device?
SSH
Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?
RIP
Which of the following uses classless subnet masks across a network?
CIDR
Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents?
Logical network diagrams
While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?
Toner
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
Traffic shaping
While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate?
It is the default route.
Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?
Create another VLAN for SIP and RTP traffic.
If a NIC does not have a link light, there is a failure at which of the following OSI layers?
Physical
Which of the following is the control when observing network bandwidth patterns over time?
Baseline
Which of the following technologies is used on cellular networks?
CDMA
Which of the following technologies allows multiple staff members to connect back to a centralized office?
VPN
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
Console access only
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
Man-in-the-middle attack
Which of the following OSI layers allows users to access network services such as file sharing?
Layer 7
Which of the following can function in an unsecure mode?
SNMPv3
Which of the following is used to register and resolve IP addresses with their plain language equivalents?
DNS server
An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
Signature identification
Which of the following protocols is MOST commonly associated with VoIP?
SIP
Stateful packet inspection is a security technology used by which of the following devices?
Hardware firewall
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?
traceroute
Which of the following is needed when using WPA2-Enterprise wireless encryption?
RADIUS
Which of the following technologies is used to connect public networks using POTS lines?
PSTN
An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
Packet sniffer and Port mirroring
Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time?
Full-duplex
Which of the following is a common physical network topology?
Star
PKI is a method of user authentication which uses which of the following?
Certificate services
A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex?
Auto-negotiate
An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation?
PoE
Which of the following is always true when a router selects a destination?
The most specific route is selected over the default gateway.
A proxy server would MOST likely be installed to provide which of the following functions? (Select two
Content filtering and Website caching
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
MPLS
An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?
25
Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut?
Bus
Which of the following is an example of a Class C address?
192.168.1.105
A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured?
WAP radio power
The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need?
MAC address filtering
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
SSH
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).
Physical and Data link
In which of the following layers of the OSI model would MAC addressing be found?
Data Link
Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues?
Improper VLAN assignment
A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic?
VLAN assignments
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
Firewall rules
Several users are reporting connectivity issues with their laptops. Upon further investigation, the network technician identifies that their laptops have been attacked from a specific IP address outside of the network. Which of the following would need to be configured to prevent any further attacks from that IP address?
Firewall rules
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
DMZ
Which of the following attacks would allow an intruder to do port mapping on a company's internal server from a separate company server on the Internet?
FTP bounce
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
Network sniffer
A network technician has just upgraded a switch. The new switch's IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch's own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
The network gateway is set incorrectly.
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
Virtual PBX
An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?
Protocol analyzer
Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?
VLAN mismatch
Which of the following can a network technician change to help limit war driving?
Signal strength
Which of the following is an example of a CSMA/CD medium?
Ethernet
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
Traffic shaping and Quality of service
A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?
Latency
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?
Channels
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?
110
Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?
Plenum CAT5e
Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
Proxy server
Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards.
Which of the following is the correct tool?
Cable certifier
A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?
WPA2
Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?
Packet sniffer
customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).
Shielding servers from attacks on internal services and Blocking external probes for vulnerabilities
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
Faulty routing rule
The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:
patch management.
A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task?
Switch
Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released?
DHCP lease
Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availability solution?
VPN concentrator
A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?
PAT
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
Establish a theory of probable cause.
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
802.11b
A technician tests a cable going to the patch panel and notices the following output from the cable tester:

1------------------1
2------------------2
3------------------3
4------------------4
5------------------5
6------------------6
7------------------7
8------------------8

On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?
White Green
Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?
Application based IDS
Which of the following security appliances are used to only identify traffic on individual systems?
Host based IDS
Which of the following components of wiring distribution is referred to as the core communications closet for an organization?
MDF
Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber?
1000BaseX
Which of the following does Kerberos provide?
Authentication
Which of the following does Kerberos use to authenticate?
Tickets
After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?
A switching loop was created.
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
QoS
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?
DSL
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).
Cable modem with a separate firewall
At which of the following layers do frames exist? (Select TWO).
OSI model Data link layer and TCP/IP model Network Interface layer
A user is unable to access any network resources. The IP configuration of the workstation is as follows:

IP Address: 192.168.10.32
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.10.46

Which of the following would allow the user to connect to network resources?
Change the IP address to 192.168.10.33
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem?
Outside interface shutdown
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).
ifconfig and ipconfig
A router operates at which of the following layers of the OSI model?
Layer 3
When querying a DNS server for an AAAA record, which of the following is an appropriate response?
3ffe:1900:4545:3:200:f8ff:fe21:67cf
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?
Allow ICMP to pass through the Router
Which of the following network devices restricts traffic based on words, signatures, and URLs?
Content filter
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?
Implicit deny is blocking all traffic.
Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?
(Question 298)
Logical network diagram