• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web?
a. Layer 2
b. Layer 3
c. Layer 5
d. Layer 7
c. Layer 5 (session)
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?
a. WPA TLS
b. WPA PEAP
c. 64-bit WEP
d. 128-bit WEP
b. WPA PEAP (Protected Expensible Authentication Protocol) user + pw + rotating key
Which of the following is a topology used in networks for its scalability?
a. Bus
b. Star
c. Mesh
d. Ring
b. Star
Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?
a. CAT5
b. CAT6
c. CAT1
d. CAT3
b. CAT6
A company needs the ability to run a network that can handle 30Mbps data transfer speeds but also needs to keep the cost of installing the network down. Which of the following would best meet the requirements?
a. CAT5e
b. CAT1
c. CAT6
d. CAT3
a. CAT5e
Which of the following devices will segment a network and help cut down on network congestion?
a. Gateway
b. Hub
c. Switch
d. Repeater
c. Switch
A client wants to extend the range of their wireless network without running wires throughout the small office. Which of the following could be implemented with the LEAST administrative effort?
a. Install an 802.11n router and change all NICS
b. Install an additional router to help with congestion
c. Install a WAP in the middle of the office
d. Install a repeater at the end of the office
c. Install a WAP in the middle of the office.
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?
a. Four port switch
b. Four port wireless router
c. Four port WAP
d. Four port Hub
b. Four port wireless router
A network device that is used to connect multiple devices without segmenting a network is a?
a. hub
b. router
c. switch
d. bridge
a. hub
An RJ-11 connector is capable of having up to how many pairs?
a. 2
b. 4
c. 6
d. 8
c. 6
Which of the following is the length of a MAC address?
a. 24bit
b. 32bit
c. 48bit
d. 64bit
c. 48bit
Which of the following is used to simplify the process of setting up a network and the administration of the network?
a. DNS
b. ZEROCONF
c. WINS
d. SNMP
b. ZEROCONF
Which of the following cables would a technician make in order to identify a physical interface problem?
a. serial
b. loopback
d. rollover
c. console
b. loopback
Which of the following is the part of the IP protocol suite and is used to monitor network managed devices?
a. SMTP
b. LDAP
c. SMB
d. SNMP
d. SNMP
which of the following transfers data at a maximum rate of 44.7Mbps?
a. T1
b. T2
c. T3
d. T5
c. T3
A technician wants to remotely log into an office computer using remote desktop. The tech needs to do this in a secure manner. Which of the following would accomplish this?
a. VPN
b. Tagged Packets
c. VLAN
d. Telnet
a. VPN
Which of the following commands would provide the following output?
DNS request timed out.
timeout was 2 seconds.
***Cant find server name for address 172.30.0.5:
Timed out
***Default servers are not available
172.30.0.5 DNS request timed out
timeout was 2 seconds.
a. ipconfig
b. nslookup
c. netstat
d. winipcfg
b. nslookup
Which of the following command and switch combination's would provide the following output: Interface 172.30.0.102 --- 0x2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic?
a. arp -a
b. netstat -a
c. arp -s
d. netstat -s
a. arp -a
Which of the following commands is used to provide the output below in a windows environment:
*** Request timed out
*** Request timed out
a. nbtstat
b. netstat
c. ping
d. tracert
d. tracert
Which of the following actions should the administrator do FIRST to help access a gigabit connection?
a. Change the CAT5 cable to CAT3
b. Change the CAT5 cable to CAT6
c. Change the CAT3 cable to RG-58
d. Change the CAT5 cable to a CAT5 crossover
c. Change the CAT5 cable to CAT6
Which of the following outlines the purpose of using a proxy server in an enterprise environment?
a. Allows the admin to block malicious attacks on the network
b. Allows the user to access hard to find websites
c. Allows the client to get a fixed IP address when added to the network
d. Allows granular control over the traffic between the local LAN and the Internet
d. Allows granular control over the traffic between the local LAN and the Internet
Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?
a. arp
b. nslookup
c. tracert
d. ipconfig
a. arp
Internet connectivity for a company is mission critical. The tech must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?
a. SFTP
b. SLIP
c. SMTP
d. SNMP
d. SNMP
A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?
a. Load balancing
b. QoS
c. High availability
d. Fault tolerance
d. Fault tolerance
Which of the following frequency ranges does 802.11a operate at?
a. 2.4Ghz
b. 4.9Ghz
c. 5.0 Ghz
d. 54.0 Ghz
c. 5.0 Ghz
Which of the following is the standard data transmission rate for an OC-3 line?
a. 44.74Mbps
b. 51.84Mbps
c. 155.52Mbps
d. 622.08Mbps
c. 155.52Mbps
Which of the following is an advantage of 100Base-FX over 100Base-TX?
a. Ease of installation
b. Uses a more durable cable
c. Faster transmission speeds
d. Longer cable runs
d. Longer cable runs
Which of the following is an advantage of 100Base-T over 100Base-FX?
a. Longer cable runs
b. Faster transmission speeds
c. Can be used in a topology
d. Uses a more flexible cable
d. Uses a more flexible cable
Which of the following protocols provides the actual encryption used over VPN?
a. SSH
b. PPTP
c. HTTPS
d. PPP
b. PPTP
100Base-TF uses which of the following types of cabled medium?
a. Ethernet implementation over Fiber
b. Ethernet implementation over Coaxial
c. Ethernet implementation over Thicknet
d. Ethernet implementation over Thinnet
a. Ethernet implementation over Fiber
Which of the following cable standards has the highest effective range at a greater expense?
a. 1000Base-SX
b. 1000Base-CX
c. 1000Base-T
d. 1000Base-LX
d. 1000Base-LX
The below output is from which of the following utilities?
Active Connections Proto Local Address Foreign Address State
TCP 127.0.0.1:1085 172.30.0.5:3389 ESTABLISHED
a. ping
b. netstat
c. nslookup
d. ipconfig
b. netstat
The below output is from which of the following utilities?
Interface: 172.30.0.104 --- 0x2
Internet Address Physical Type
172.30.0.5 00-30-48-82-72-8c dynamic
a. netstat
b. arp
c. nbtstat
d. ping
b. arp
A technician is troubleshooting a workstation that is connected to a star network. The tech determines that the workstation is unable to connect to the network resources. Which of the following should be checked FIRST?
a. The installed network drivers
b. The link lights on the server network card
c. The link lights on the network card
d. The link lights on the switch
c. The link lights on the network card
A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
a. the SSID broadcast is disabled
b. wireless router is improperly configured
c. the user is connecting to the wrong SSID
d. The wireless NIC is defective
c. the user is connecting to the wrong SSID
Which network device filters packets based on rules that have been configured for it?
Firewall
What protocol is considered a connection-oriented protocol?
TCP
Which of the following will have problems functioning if a firewall has been setup to block all UDP traffic?
a. the internet
b. a server database application
c. VoIP
d. a network printer
c. VoIP
What internet service is required to ensure that users can type in a FQDN instead of an IP address?
DNS
What utility can translate the IP address to its physical network address?
arp
What utility can translate the physical network address to its IP address?
rarp -> Reverse Address Resolution Protocol
What switch is used with the ping command to ping until user stops?
ping -t
What ipconfig switch will show when the IP lease was obtained?
/all
Which of the following would limit the availability of the types of sites that users on a LAN have access to?
a. dc server
b. proxy server
c. dns server
d. DHCP server
b. proxy server
Which of the following is most likely the cause of wireless connection drop off in a wireless G network?
a. Cellular interference
b. FM radio
c. Cordless phones
d. AM radio
c. Cordless phones
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?
a. Update antivirus definitions
b. MAC filtering
c. Effective security policies
d. user awareness training
d. user awareness training
A client purchases a new wireless printer and wants to be able to bond it to their PDA. What type of wireless printer should be purchased?
Bluetooth
A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet in order to synch. Which of the following BEST describes the type of wireless device being used?
a. Serial
b. Bluetooth
c. Infrared
d. WiFi
c. Infrared
What device type uses IEEE 1394?
FireWire
A company web server is located in a climate controlled environment, with multiple power supplies, and a UPS to provide the maximum uptime available. Which of the following would allow the company the BEST opportunity to increase network uptime for the web server?
a. Upgrade all switches to Gigabit speed
b. Upgrade the outbound NIC to a gigabit card
c. Install an additional Router
d. Install additional NICs
d. Install additional NICs (thus ensuring that if one goes down there are others already in place)
What would be the first step for troubleshooting a computer unable to access a bus topology network?
Check the cable connection
What command would a tech use to see all open connections on a NetBIOS configuration?
nbtstat
Which of the following commands would allow the technician to identify the currently assigned DNS server?
a. nbtstat
b. netstat
c. nslookup
d. dig
c. nslookup
An admin is in charge of several remote servers in Japan. Users call and report they cannot connect tothe company's resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?
a. ping
b. netstat
c. nbtstat
d. telnet
a. ping
Which of the following protocols transmits using UDP packets?
a. HTTPS
b. HTTP
c. TFTP
d. RIPv2
c. TFTP
A tech is not able to ping a server by FQDN but can by the IP. Which of the following should the tech check?
a. Ensure that the IP addy is correct
b. Ensure that WINS is configured
c Ensure the MAC addy is correct
d. Ensure that the DNS is configured
d. Ensure the DNS is configured
Which of the following network protocols is used to ensure consistent time across network devices on the domain?
a. NTP
b. FTP
c. RTP
d. IGMP
a. NTP
An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the tech take FIRST?
a. Document the problem
b. Identify the symptoms
c. Test the results
d. Search the internet for the problem
b. Identify the symptoms
An employee is receiving an access denied error message when they try to access a network resource. Which of the following troubleshooting steps should the tech perform FIRST?
a. Document the process
b. Implement an action plan to resolve the issue
c. Ask the employee what has changed since yesterday
d. Identify what the employee cannot access
d. Identify what the employee cannot access.
A network technician wants to add fault tolerance to a file server. Which of the following should the tech do?
a. add an additional DNS server and modify the MX record
b. Install the latest NIC driver
c. Add an additional NIC and setup network teaming
d. Upgrade the NIC to a one gigabit card
c. Add an additional NIC and setup network teaming
A tech pings 127.0.0.1 and gets the following result: Unable to contact IP driver, error code 2. Which of the following would resolve this?
a. Install NetBEUI
b. Release the IP address
c. Install the TCP/IP protcol
d. Flush the DNS Cache.
c. Install the TCP/IP protocol