Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
300 Cards in this Set
- Front
- Back
QESTION NO: 1
After adding a new cable segment to the network, the technician should: A. Update the disaster recovery plan. B. Document the changes in the business continuity plan. C. Update the wiring schematics. D. Create a new baseline document. |
C. Update the wiring schematics.
|
|
QUESTION NO: 2
Which of the following devices can be used to breakup a broadcast domain? A. Unmanaged switch B. Router C. DHCP server D. Bridge |
B. Router
|
|
QUESTION NO: 3
Which of the following is a secure way to transfer files from one device to another? A. SFTP B. SNMPv3 C. TFTP D. FTP |
A. SFTP
|
|
QUESTION NO: 4
An administrator has a networking closet on the first floor of a building with all of the network and communication equipment. However, the telephony provider installed the communications line in the basement. Which of the following needs to be extended to connect the line to the networking closet? A. Smart jack B. Demarcation point C. Patch panel D. Router |
C. Patch panel
|
|
QUESTION NO: 5
Which of the following methods is used to provide access to a VPN? A. IGP B. PPTP C. PPP D. RAS |
B. PPTP
|
|
QUESTION NO: 6
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response? A. 1 and 2 B. 2 and 3 C. 3 and 6 D. 5 and 6 |
3 and 6
|
|
QUESTION NO: 7
Which of the following network access security methods involves the analysis of a physical hardware addresses? A. IP filtering B. L2TP C. MAC filtering D. RAS |
MAC filtering
|
|
QUESTION NO: 8
Which of the following is a direct advantage of having wireless standards? A. Increased use of wireless spectrum B. Greater device security C. Interoperability between devices D. Increased number of protocols can be used |
Interoperability between devices
|
|
QUESTION NO: 9
Which of the following is a best practice when implementing a basic wireless network? A. Disabling ESSID broadcast B. Configuring encryption with a WEP key and labeling the key on the WAP C. Adding two access points per area of service D. Not configuring the ESSID point |
Disabling ESSID broadcast
|
|
QUESTION NO: 10
Which of the following wiring standards would MOST likely be used to connect a single network node to a switch? A. Loopback B. Straight C. Rollover D. Crossover |
Straight
|
|
QUESTION NO: 11
Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss? A. 100 feet (30.5meters) B. 207 feet (63.1 meters) C. 328 feet (100 meters) D. 358 feet (109.12meters) |
328 feet (100 meters)
|
|
QUESTION NO: 12
A media converter is also known as a: A. transceiver. B. hub. C. modem. D. repeater. |
transceiver
|
|
QUESTION NO: 13
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed? A. Bandwidth shaper B. Intrusion detection C. Proxy server D. Load balancer |
Bandwidth shaper
|
|
QUESTION NO: 14
A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps should be done FIRST to diagnose the problem? A. Escalate the problem to administrative technician. B. Compare wiring schematics to industry standards. C. Identify symptoms and draw a network diagram. D. Use a port analyzer to determine network topology. |
Identify symptoms and draw a network diagram.
|
|
QUESTION NO: 15
Which of the following commands can be used to find the MAC address of a connecting router? A. arp B. traceroute C. ping D. ping sweep |
arp
|
|
QUESTION NO: 16
Which of the following describes an email that is sent to users with web links that direct them to malicious websites? A. Viruses B. Phishing C. Rogue access points D. Man-in-the-middle |
Phishing
|
|
QUESTION NO: 17
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a cubicle corresponds to a given RJ-45 jack in a patch panel? A. Punch-down tool B. Spectrum analyzer C. Toner probe D. Multimeter |
Multimeter
|
|
QUESTION NO: 18
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs? A. 100Base-FX B. 10GBase-SR C. 10GBase-ER D. 10GBase-SW |
10GBase-SR
|
|
QUESTION NO: 19
An administrator is troubleshooting network connectivity and would like to view the path that packets are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use? A. nslookup B. route C. traceroute D. ping |
traceroute
|
|
QUESTION NO: 20
Which of the following is the MOST appropriate policy for updating physical network diagrams? A.Update whenever a connection is changed. B. Update after new personnel are hired. C. Update before regularly scheduled network audits. D. Update after weekly network support team review. |
Update whenever a connection is changed
|
|
After accepting a request packet on port 80, the firewall automatically allows the reply packet to
pass. Which of the following terms BEST describes this firewall behavior? A. Stateful inspection B. Intrusion detection C. Content filtering D. Passive fingerprinting |
Stateful inspection
|
|
QUESTION NO: 22
Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly together? A. Collision B. Attenuation C. Crosstalk D. Open circuit |
Crosstalk
|
|
QUESTION NO: 23
Which of the following ports does IPSec use, by default? A. 53 B. 500 C. 3389 D. 8080 |
500
|
|
QUESTION NO: 24
Which of the following can be used to find the location of a cable short? A. Multimeter B. CSU/DSU C. Protocol analyzer D. TDR |
TDR
Explanation: A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables). |
|
QUESTION NO: 25
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server? A. Kerberos B. TKIP C. RADIUS D. WEP |
RADIUS
|
|
QUESTION NO: 26
Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user? A. Baseband B. Broadband C. Satellite D. POTS |
Broadband
|
|
QUESTION NO: 27
A company needs to perform stateful packet filtering on the core network. Which of the following network devices would BEST be suited to match this equipment? A. Firewall B. Proxy C. Router ACLs D. DHCP server |
Firewall
|
|
QUESTION NO: 28
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO). A. SFTP B. HTTP C. SNTP D. RCP E. SCP |
SFTP & SCP
|
|
QUESTION NO: 29
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used? A. Straight B. Rollover C. Crossover D. Loopback |
Crossover
|
|
QUESTION NO: 30
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this? A. 802.1ad B. TKIP C. WPA2 D. 802.1x |
802.1x
|
|
QUESTION NO: 31
Which of the following is a commonly used protocol for VoIP network communication? A. SNMP B. SSH C. DNS D. RTP |
RTP
|
|
QUESTION NO: 32
Which of the following protocols uses port 143 by default? A. NTP B. SNMP C. SSH D. IMAP4 |
IMAP4
|
|
QUESTION NO: 33
A user calls network support and reports that email is not working. Which of the following should the technician do FIRST? A. Ask the user what operation was performed, what the expected result was, and what the actual result was. B. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network administrator if needed. C. Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent. D. Determine which mail hub the user was connected to and perform a graceful restart. |
Ask the user what operation was performed, what the expected result was, and what the actual
result was. |
|
QUESTION NO: 34
Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and broadcast addresses on network clients and workstations? A. Networkbridge B. Layer 2 switch C. DHCP server D. Smart jack |
DHCP server
|
|
QUESTION NO: 35
Which of the following exchanges routing information between two autonomous systems? A. EGP B. OSPF C. IGP D. EIGRP |
EGP
|
|
QUESTION NO: 36
Which of the following is the GREATEST concern when using an orbital satellite WAN link? A. Collisions B. Latency C. Duplex D. Cable length |
Latency
|
|
QUESTION NO: 37
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following could be used to accomplish this connection? A. Smart jack B. Optical media C. Token ring D. Media converter |
Media converter
|
|
QUESTION NO: 38
VLANs occur at which of the following layers of the OSI model? A. 1 B. 2 C. 3 D. 4 |
2
|
|
QUESTION NO: 39
Which of the following is the metric used for OSPF? A. Latency B. Cost C. Bandwidth D. Next hop |
Bandwidth
|
|
QUESTION NO: 40
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem? Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic A. Reverse ARP failure B. IP address conflict C. MAC spoofing D. Static ARP entries |
MAC spoofing
|
|
QUESTION NO: 41
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution? A. Request another class C IP scope from the ISP. B. Switch to static IP addressing. C. Change the subnet mask to 255.255.254.0. D. Add a router to connect both networks. |
Change the subnet mask to 255.255.254.0.
|
|
QUESTION NO: 42
An administrator suspects that packets to an IP address are being dropped over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets? A. ping B. nslookup C. traceroute D. netstat |
traceroute
|
|
QUESTION NO: 43
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the internet. Other hosts on the same network can connect to the internet. Which of the following should the technician check? A. The DNS server entries B. The network card C. The default gateway D. The hosts file |
The default gateway
|
|
QUESTION NO: 44
Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80? A. netstat -at B. netstat -aupn C. netstat -r D. netstat -v E. netstat -p tcp |
netstat -p tcp
|
|
QUESTION NO: 45
An administrator would like to evaluate network traffic. Which of the following tools should the administrator use? A. OTDR B. Protocol analyzer C. Certifier D. Toner probe |
Protocol analyzer
|
|
Which of the following ports would be commonly used for FTP traffic?
A. 20 B. 22 C. 23 D. 25 |
20
|
|
QUESTION NO: 47
Which of the following device can connect multiple workstations, support VLANs, and function as a router? A. Repeater B. Switch C. Hub D. Multilayer switch |
Multilayer switch
|
|
QUESTION NO: 48
Which of the following classes is the address 208.177.23.1? A. Class A B. Class B C. Class C D. Class D |
Class C
|
|
QUESTION NO: 49
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
802.11n
|
|
QUESTION NO: 50
Which of the following protocols could be used in a peer-to-peer topology? A. NetBIOS B. IGMP C. RADIUS D. TACACS+ |
IGMP
|
|
QUESTION NO: 51
A private AS number is useful in which of the following situations? A. Internet multihoming with multiple carriers B. Isolated network at a single site C. Enterprise network without redundant links D. Internet multihoming with all ISPs in same BGP area |
Internet multihoming with all ISPs in same BGP area
|
|
QUESTION NO: 52
A network with twenty clients needs to view a video file. Which of the following should be configured on the client's computers to reduce network traffic? A. Class C addresses B. Class A addresses C. Broadcast D. Multicast |
Multicast
|
|
QUESTION NO: 53
A new LAN switch is installed with on fiber ports. Which of the following would a technician need on the new switch to allow compatibility to the existing fiber network? A. Router B. Repeater C. Media converter D. Hub |
Media converter
|
|
QUESTION NO: 54
Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network? A. Dial-in access B. RDP access C. IPSec VPN D. SSL VPN |
SSL VPN
|
|
QUESTION NO: 55
Which of the following protocols are commonly used for VoIP? (Select TWO). A. NPP B. SIP C. HSRP D. RTP E. NNTP |
SIP & RTP
|
|
QUESTION NO: 56
Which of the following describes how original network diagrams contained in the documentation should be maintained? A. Used only to satisfy a network upgrade checklist requirement B. Used as a point-in-time reference but never relied upon C. Regular audits to ensure that diagrams remain accurate D. Considered to be the only source-of-truth of the network state |
Regular audits to ensure that diagrams remain accurate
|
|
QUESTION NO: 57
Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WEP? (Select TWO) A. IP address B. Name servers C. SSID D. Subnet mask E. Shared key |
SSID & Subnet mask
|
|
QUESTION NO: 58
To ensure that VoIP phones are provided with power without using independent power supplies, switches on the network must have which of the following features? A. PoE B. VLAN tagging C. PPPoE D. Spanning tree |
PoE
|
|
QUESTION NO: 59
A user contacts a technician and states, "The network is down." After further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem? A. Have the user ping the default gateway. B. Unplug and then plug the network cable back in. C. Reboot the core router. D. Have the user run netstat |
Have the user run netstat
|
|
QUESTION NO: 60
An end user is able to connect to a wireless network and is able to browse the internet, yet is unable to access network servers. Which of the following is the MOST likely cause of the problem? A. The end user is connected to the incorrect wireless network. B. The device is configured with an incorrect subnet mask. C. There is a problem with the DNS server. D. The network card is malfunctioning |
The end user is connected to the incorrect wireless network.
|
|
QUESTION NO: 61
The primary goal of implementing network QoS features is A. Provide predictable network performance. B. Increase network throughput. C. Prevent undesirable network traffic from entering the network. D. Provide fault tolerance to the network design. |
Provide predictable network performance.
|
|
QUESTION NO: 62
A LAN support team is installing new cables when all networked applications slow and then stop working. Switches in the server room show all connected ports at 100% activity. Which of the following has MOST likely occurred? A. Cable run has a short. B. New switch port is in wrong VLAN. C. Switching loop. D. Cable run has a break |
Switching loop.
|
|
QUESTION NO: 63
After receiving network problem reports from users, the technician notices that the router is rebooting itself several times a day. Which of the following would the technician do NEXT to further diagnose this problem? A. Test the router's connection with a throughput tester. B. Replace the router's memory and CPU. C. Install redundant network connections to the router. D. Review the router's event logs |
Review the router's event logs
|
|
QUESTION NO: 64
Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet? A. TFTP B. SSH C. SNAT D. RSH |
SSH
|
|
QUESTION NO: 65
A technician would use a logical network diagram to determine the number of: A. Cables in the network. B. Broadcast domains on the network. C. Switches on the network. D. Users on the network |
Broadcast domains on the network
|
|
QUESTION NO: 66
Which of the following methods is used in creating an ACL? A. IP filtering B. PPPs C. Content filtering D. VPNs |
IP filtering
|
|
QUESTION NO: 67
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network devices? (Select TWO). A. Server B. Workstation C. Printer D. Hub E. Laptop |
Server & Printer
|
|
QUESTION NO: 68
Which of the following technologies can prevent a department's network broadcast from propagating to another department's network if they are located on the same switch? A. A hub B. A firewall C. A trunk D. A VLAN |
A VLAN
|
|
QUESTION NO: 69
Where does the responsibility for maintenance and support shift from the telecommunication company to the customer? A. Central office B. Where the telecommunication lines enter the building C. Smart jack D. Demarc |
Demarc
|
|
QUESTION NO: 70
An administrator wants to connect users at three branch offices to the main office through the internet. Which of the following devices should the administrator install at the main office to BEST accomplish this goal? A. IPS sensor B. Proxy server C. Layer 2 switch D. VPN concentrator |
VPN concentrator
|
|
Which of the following protocols is the MOST secure for transferring network device
configurations? A. TFTP B. FTP C. SCP D. RCP |
SCP
|
|
QUESTION NO: 72
A network has four switches; each switch has a physical link to all other switches. Which of the following topologies is being used? A. Ring B. Point-to-multipoint C. Star D. Mesh |
Mesh
|
|
QUESTION NO: 73
Which of the following commands is MOST appropriate to determine whether a network interface is up or down? A. SNORT B. ISAKMPD C. ARP D. IFCONFIG |
IFCONFIG
|
|
QUESTION NO: 74
Which of the following WAN technologies requires fiber optics? A. POTS B. SONET C. ADSL D. PSTN |
SONET
|
|
QUESTION NO: 75
Internet-working devices operate at OSI layer: A. 2 B. 3 C. 4 D. 5 |
3
|
|
QUESTION NO: 76
A small company needs to temporarily extend its call center by ten employees. The company decides to rent office space on the opposite side of the building; the two spaces are 400 feet (122 meters) apart. Which of the following is the MOST cost effective solution? A. Install a new T1 line for that office. B. Use a wireless repeater and a WAP. C. Connect the two offices with fiber. D. Install gigabit switches and run Ethernet. |
Use a wireless repeater and a WAP.
|
|
QUESTION NO: 77
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use? A. Multimode fiber B. RG-6 copper C. Single-mode fiber D. CAT6 copper |
Multimode fiber
|
|
QUESTION NO: 78
Which of the following network protocols is used for sending outbound email from a host? A. SMTP B. POP C. RTP D. IMAP |
SMTP
Explanation: Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline. The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails. Both protocols are supported by all modern email clients andweb servers. Main difference between IMAP and POP3: The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the IMAP protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your mailbox is about to be managed by multiple users. Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the Internet. SMTP uses TCP port 25. |
|
QUESTION NO: 79
Which of the following is a correct Ethernet MAC address? A. 12:7H:45:89:9F:65 B. 16-15-4D-31-59-5J C. 11:34:7A:88:0C:DB D. 12-88-FF-9X-58-9E |
11:34:7A:88:0C:DB
|
|
QUESTION NO: 80
Which of the following would a technician set up for a building to building within a campus? A. ESD B. MDF C. IDF D. EMI |
IDF
|
|
QUESTION NO: 81
Which of the following allows an administrator to view malicious activity after it has taken place? A. IDS B. IPS C. Port scanner D. Packet sniffer |
IDS
|
|
QUESTION NO: 82
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch panel? A. Cable crimper B. Punch down tool C. Toner probe D. Multimeter |
Cable crimper
|
|
QUESTION NO: 83
Which of the following is an acceptable method for deciding placement of wireless access points? A. Where there are electrical service and network connections available B. Every300 feet (91 meters) C. In the middle of each room D. A site survey |
A site survey
|
|
QUESTION NO: 84
Which of the following command line tools can be used to display listening sockets and established connections on the local computer? A. nslookup B. nbtstat C. netstat D. ipconfig |
netstat
|
|
QUESTION NO: 85
Which of the following tools is used to connect analog telephony wire pairs to a block, such as a 110 or 66 block? A. Butt set B. Protocol analyzer C. Toner probe D. Punch down tool |
Punch down tool
|
|
QUESTION NO: 86
An application layer firewall is MOST beneficial when used with which of the following protocols? A. VoIP B. GRE C. HTTP D. SNMP |
SNMP
|
|
QUESTION NO: 87
Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)? A. Coaxial B. Ethernet C. Serial D. Fiber |
Ethernet
|
|
QUESTION NO: 88
A network administrator would MOST likely use a port scanner to do which of the following? A. Capture incoming network packets to port 80 on a workstation. B. Trace a physical network port through a building. C. Remotely test a firewall configuration on a server. D. Report the link speed and duplex of all ports on a switch. |
Remotely test a firewall configuration on a server
|
|
QUESTION NO: 89
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use? A. Physical network diagram B. Baseline configurations C. Security policy D. CAT5 wiring schematics |
Physical network diagram
|
|
QUESTION NO: 90
Which of the following standards provides port authentication? A. 802.1x B. 802.11 C. 802.1q D. 802.2 |
802.1x
|
|
QUESTION NO: 91
Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed? A. SNMP trap B. History log C. System log D. SNMP agent |
SNMP trap
|
|
QUESTION NO: 92
A user is reporting issues connecting to the corporate web server. When analyzing the output from a packet sniffer an administrator sees: Client-> Server SYN Server ->Client ACK Client-> Server RST Which of the following is the user experiencing? A. The client is prematurely closing the connection. B. The server is failing to properly respond. C. The 3-way handshake is complete but the browser is unresponsive. D. The server is prematurely closing the connection. |
The client is prematurely closing the connection.
|
|
QUESTION NO: 93
Which of the following connectors can be used for serial connections? A. SC B. RS-232 C. BNC D. ST |
RS-232
Explanation: Recommended Standard 232 (RS ? 232) was a cable standard commonly used for serial data signals connecting data ? terminal equipment and data ? communications equipment, as when you connect a computer's serial port to an external modem. |
|
QUESTION NO: 94
A client attempts to connect to a network resource and is given an error message about their access being restricted. Which of the following BEST describes the reason for denial? A. The user's account failed to authenticate with correct permissions. B. The user's account is disabled. C. The network resource is unavailable. D. The user is not connected to the network. |
The user's account failed to authenticate with correct permissions.
|
|
QUESTION NO: 95
Which of the following routing algorithms would provide the fastest convergence time? A. A distance-vector algorithm B. A static algorithm C. A link-state algorithm D. A path-vector algorithm |
A link-state algorithm
|
|
QUESTION NO: 96
Where would a technician MOST likely place the company MX and A records? A. Proxy server B. Load balancer C. DNS server D. Firewall |
DNS server
|
|
QUESTION NO: 97
Which of the following BEST explains the function of OSI layer 4? A. Connecting hosts on the same segment B. Specifying signal timing and amplitude C. Reliable delivery of packets D. Routing packets across segments |
Reliable delivery of packets
|
|
QUESTION NO: 98
Which of the following tools can be used to determine the MAC address of a machine on the local subnet? A. ping B. arp C. host D. dig |
arp
|
|
QUESTION NO: 99
The task of replacing hubs with switches reduces retransmissions by increasing which of the following? A. Frequency domains B. Broadcast domains C. Domain kiting D. Collision domains |
Collision domains
|
|
QUESTION NO: 100
Which of the following WAN technologies allows for the fastest connection? A. ADSL B. SONET C. T1 D. OC-12 |
SONET
|
|
QUESTION NO: 101
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection. Which of the following network technologies would BEST handle voice traffic prioritization above all other data? A. QoS B. IPSec C. PoE D. Load balancing |
QoS
|
|
QUESTION NO: 102
Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack? A. Authentication B. Encryption C. Popup blocker D. ACL |
Authentication
|
|
QUESTION NO: 103
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distances? A. DSL B. WiMAX C. E3/T3 D. ATM |
WiMAX
|
|
QUESTION NO: 104
Which of the following Internet technologies would provide the GREATEST bandwidth? A. T1 B. Cable C. OC3 D. T3 |
OC3
|
|
QUESTION NO: 105
An administrator has configured two hosts as follows: HOST A IP 192.168.3.100 NETMASK 255.255.254.0 GATEWAY 192.168.2.1 HOSTB IP 192.168.1.200 NETMASK 255.255.254.0 GATEWAY 192.168.2.1 Which of the following MUST be changed in order to allow HOST A to talk to HOST B? A. HOST B netmask to 255.255.252.0 B. HOSTA netmask to 255.255.255.0 C. HOST A IP address to192.168.2.100 D. HOST B IP address to192.168.2.200 |
HOST B IP address to192.168.2.200
|
|
QUESTION NO: 106
When installing a new secure wireless network the administrator should turn on: A. WEP and turn on SSID broadcast. B. WPA and turn on SSID broadcast. C. WPA and turn off SSID broadcast. D. WEP and turn off SSID broadcast. |
WPA and turn off SSID broadcast.
|
|
QUESTION NO: 107
An administrator is at a client's site to figure out an intermittent network problem. Which of the following is the FIRST step in the troubleshooting methodology that should be performed? A. Implement and test the solution. B. Create an action plan and solution identifying potential effects. C. Identify the affected areas of the network. D. Gather information. |
Gather information.
|
|
QUESTION NO: 108
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected computer is on the network and checks if a node is saturating the network. Which of the following tools should be utilized in this situation? A. Multimeter B. Port scanner C. Protocol analyzer D. IGMP |
Protocol analyzer
|
|
QUESTION NO: 109
A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable to connect to the network. An administrator verifies that the port is configured correctly and the LAN drop is active. Which of the following is the MOST likely cause? A. Crosstalk on the cable B. Duplex mismatch C. Speed mismatch D. Open pairs are present |
Duplex mismatch
|
|
QUESTION NO: 110
Which of the following devices does not limit network broadcast traffic and does not increase performance? A. Router B. Brouter C. Hub D. Switch |
Hub
|
|
QUESTION NO: 111
Multiple users are reporting network issues. Before taking any course of action, which of the following is the FIRST step a technician should take? A. Create a plan of action and a final solution for the issues. B. Gather information about the problems/symptoms. C. Establish the probable cause behind the network issues. D. Document the solution and update all logical/physical network diagrams. |
Gather information about the problems/symptoms.
|
|
QUESTION NO: 112
Which of the following network devices would MOST likely be installed to allow a fiber optic cable to be plugged into a network device with only RJ-45 connections? A. WAP B. Basic switch C. Hub D. Media convertor |
Media convertor
|
|
QUESTION NO: 113
A particular route's destination address is referred to as the: A. RIP peer. B. shot vector. C. link state. D. next hop. |
next hop
|
|
QUESTION NO: 114
The helpdesk has been informed that the company's ISP is experiencing network outages. Which of the following commands can an administrator run to quickly locate and determine the TTL of the further reachable node? A. route B. ping C. traceroute D. arp |
traceroute
|
|
QUESTION NO: 115
Which of the following uses a certificate for a tunneling connection? A. RDP B. PPTP C. VNC D. SSL VPN |
SSL VPN
|
|
QUESTION NO: 116
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a cable to plug their laptop into the router in order to be able to console into it. Which of the following would the administrator need to make this connection? A. Crossover B. Loopback C. Rollover D. 568B |
Rollover
|
|
QUESTION NO: 117
Which of the following activities will not be possible if the gateway IP address is set incorrectly on a client's machines? A. Printing over a local network B. Sniffing the network traffic C. Pinging a remote computer D. Sharing local network files |
Pinging a remote computer
|
|
QUESTION NO: 118
Which of the following replaces the destination IP address of a packet? A. NAT B. DNS C. SNAT D. DHCP |
SNAT
|
|
QUESTION NO: 119
Which of the following is the BEST tool to use when terminating a network jack? A. Snips B. Cable stripper C. Toner probe D. Punch down |
Punch down
|
|
QUESTION NO: 120
An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used? A. Stateful packet inspection B. Load balancing C. Packet sniffing D. Throughput testing |
Packet sniffing
|
|
QUESTION NO: 121
A solution provided less than ideal results, and the technician is forced to go back and devise a new solution. Which of the following would be done NEXT, assuming probable cause is established and escalation is not necessary? A. Determine if anything has changed. B. Gather information about the problem. C. Document the solution and steps taken during the process. D. Create an action plan and accompanying solution. |
Create an action plan and accompanying solution.
|
|
QUESTION NO: 122
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity issues. Which of the following is MOST likely causing the new issues? A. Antenna placement B. Environment factors C. Antenna distance D. Signal bounce |
Environment factors
|
|
How many potential MAC address schemes are possible?
A. 232 B. 246 C. 248 D. 264 |
248
|
|
QUESTION NO: 124
Which of the following would MOST likely contain information about unlabeled datacenter connections? A. Procedures manual B. Emergency call list C. Logical network diagram D. Wiring schematic |
Wiring schematic
|
|
QUESTION NO: 125
A technician needs to install phones that will only require one cable for both data and power to be supplied. Which of the following features MUST the switch support? A. Port mirroring B. VLAN C. Spanning tree D. PoE |
PoE
|
|
QUESTION NO: 126
Which of the following connection methods is considered secure? A. HTTP B. RCP C. HTTPS D. TELNET |
HTTPS
|
|
QUESTION NO: 127
In which of the following networking types can a computer be a client to other computers and act as a server as well? A. Bus B. Ring C. VPN D. Peer to peer |
Peer to peer
|
|
QUESTION NO: 128
An administrator has determined that auto-negotiation has failed on a connection. Which of the following are the MOST important settings that should be matched on each side of the connection? A. IP address, OSPF area, route propagation B. Port enable, port mirroring,link aggregation C. Port speed, port duplex, flow control D. VLAN assignment, port authentication, flow control |
Port speed, port duplex, flow control
|
|
QUESTION NO: 129
A technician needs to segment a network to provide additional security for the HR department shares. Which of the following features would need to be configured to provide this? A. VLAN B. Port mirroring C. Spanning tree D. PoE |
VLAN
|
|
QUESTION NO: 130
A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which of the following destination IP addresses must the technician configure on the server to send keep-alive packets to all the devices? A. 10.137.24.0 B. 10.137.24.1 C. 10.137.24.127 D. 10.137.24.128 |
10.137.24.127
|
|
QUESTION NO: 131
Which of the following OSI layers does a Layer 3 switch operate at? (Select TWO). A. Presentation B. Session C. Transport D. Data link E. Network |
Network & Transport
|
|
QUESTION NO: 132
An administrator wants to monitor live traffic on a switch to determine if a malicious source is broadcasting ARP traffic. Which of the following utilities would BEST accomplish this? A. Switchport mapper B. Packet injector C. Network mapper D. Packet sniffer |
Packet sniffer
|
|
QUESTION NO: 133
Which of the following requires the pin-outs to be the same on both ends of a cable? A. Straight B. Crossover C. Rollover D. Loopback |
Straight
|
|
QUESTION NO: 134
Which of the following tools is designed to send a signal through one end of a cable, so that it can be found at the other end of the cable? A. Multimeter B. Toner probe C. Cable tester D. Voltage event recorder |
Cable tester
|
|
QUESTION NO: 135
An administrator needs to check the number of active connections on their computer. Which of the following should be administrator use? A. dig B. ping C. ipconfig D. netstat |
netstat
|
|
QUESTION NO: 136
Which of the following is used by a company's ISP to troubleshoot network issues? A. Demarc B. 66 Block C. Smart Jack D. 110 Block |
Smart Jack
|
|
IGP differs from EGP because IGP is designed for use in which of the following?
A. Communication between WANs B. Communication between networks C. Single autonomous network D. Single non-autonomous network |
Single non-autonomous network
|
|
QUESTION NO: 138
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet? A. 255.255.240.0 B. 255.255.255.128 C. 255.255.255.0 D. 255.255.255.240 |
255.255.240.0
|
|
QUESTION NO: 139
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444? A. ipconfig /all B. ifconfig -a C. netstat -nav D. netstat -nap |
netstat -nav
|
|
QUESTION NO: 140
Which of the following network cable types is LEAST susceptible to EMI? A. Plenum STP CAT5 B. UTP CAT5 C. UTP CAT3 D. Coaxial |
Coaxial
|
|
QUESTION NO: 141
A user has reported slow network response in a large training room; the class requires many students to access the same website each day. Which of the following would BEST remedy this problem? A. Caching engine B. Jitter correction C. Firewall D. Fault tolerance |
Caching engine
|
|
QUESTION NO: 142
Which of the following pairs should be crossed to create a crossover cable? A. 1,2 and 3,4 B. 1,2 and 3,6 C. 5,6 and 7,8 D. 4,5 and 6,7 |
1,2 and 3,6
|
|
QUESTION NO: 143
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX. Which of the following should the administrator do NEXT? A. Reboot the switch to enable the new connection B. Update the logical network diagram C. Update the switch configuration logs D. Update the wiring schematics |
Update the wiring schematics
|
|
QUESTION NO: 144
A technician moves a VoIP phone to a new location, but discovers the phone does not start up when plugged into the network. Which of the following explains this situation? A. The switch does not support PoE. B. The jack needs to be rewired using the 568B standard. C. QoS is not enabled on the switch. D. The phone needs a fiber port. |
The switch does not support PoE.
|
|
QUESTION NO: 145
A port scanner is used by network administrator for which of the following? A. To find routers with weak passwords B. To determine open ports on network hosts C. To secure switches and routers D. To make a physical network diagram |
To determine open ports on network hosts
|
|
QUESTION NO: 146
Which of the following can be used to help verify that a remote web server is not blocked by a firewall? A. Packet injector B. Toner probe C. Protocol analyzer D. Port scanner |
Port scanner
|
|
QUESTION NO: 147
SONET is normally associated with which of the following? A. Point to point B. Point to multipoint C. Ring D. Bus |
Ring
|
|
QUESTION NO: 148
An administrator wants to provide redundant paths to network resources in case a link fails. Which of the following switch features would the administrator need to use to accomplish this task? A. PoE B. VLAN C. Trunking D. Spanning tree |
Spanning tree
|
|
QUESTION NO: 149
TCP occurs at which layer of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 |
Layer 4
|
|
QUESTION NO: 150
Which of the following would an administrator MOST likely require in order to connect a client to a WPA encrypted network? A. Pre-shared key B. Gateway address C. PIN D. DSA public key E. SSID |
Pre-shared key
|
|
QUESTION NO: 151
Which of the following technologies is the MOST cost-effective when protecting a large number of networked workstations from external attacks? A. Host-based IDS B. External scanning service C. Network-based firewall D. Network-based IPS |
Network-based firewall
|
|
QUESTION NO: 152
Which of the following transport protocols should be used to avoid retransmitting lost packets? A. UDP B. TCP C. ARP D. IGMP |
UDP
|
|
QUESTION NO: 153
A firewall is set to block inbound connections on port 25. Which of the following protocols would enable the administrator to retrieve email without reconfiguring the firewall? A. SNMP B. SMTP C. POP3 D. FTPD. FTP |
POP3
|
|
QUESTION NO: 154
The 802.11n protocol operates at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 |
Layers 1 & 2
|
|
QUESTION NO: 155
When installing an access point, which of the following encryption schemes should be implemented to BEST secure the network? A. WPA B. WEP C. WPA with PSK D. WPA2 with PSK |
WPA2 with PSK
|
|
QUESTION NO: 156
Which of the following networking protocols is used to give the remote computer secure command line access to the server? A. SSH B. Telnet C. ICMP D. RTP |
SSH
|
|
QUESTION NO: 157
Which of the following defines the required distance between each LAN drop that will be installed within a building? A. Acceptance use policy B. Wiring schematics C. Logical network diagrams D. Company regulations |
Wiring schematics
|
|
QUESTION NO: 158
Plenum cable should be used to: A. protect against ESD. B. increase reliability. C. decrease cost. D. comply with fire codes. |
comply with fire codes
|
|
QUESTION NO: 159
Which of the following describes what happens when a technician pings the broadcast address? A. All clients on the subnet respond B. The broadcast server responds C. An ICMP loop floods the network D. All clients in the multicast group respond |
All clients on the subnet respond
|
|
QUESTION NO: 160
Which of the following describes a routing table that needs to be maintained manually? A. Hop count based B. Link-state C. Static D. Dynamic |
Static
|
|
QUESTION NO: 161
Which of the following protocols resolves MAC addresses from IP addresses? A. RTP B. DHCP C. DNS D. ARP |
ARP
|
|
QUESTION NO: 162
Which of the following is strictly used to convert analog to digital signals? A. NIC B. Modem C. Repeater D. Hub |
Modem
|
|
QUESTION NO: 163
In a new wireless network installation, the administrator has successfully installed and tested the equipment. The NEXT step after turning wireless access on would be to: A. Document the physical layout. B. Configure the DHCP server. C. Configure wireless adapters. D. Perform a war drive to test for vulnerabilities |
Document the physical layout.
|
|
QUESTION NO: 164
The MAIN difference between an IDS and an IPS is the: A. IPS blocks malicious activity while the IDS only alerts about malicious activity. B. IDS blocks malicious activity while the IPS only alerts about malicious activity. C. IDSuses a deterministic engine while the IPS uses probabilistic engine. D. IDSis an inline system while the IPS is placed on a span port and has no IP address. |
IPS blocks malicious activity while the IDS only alerts about malicious activity.
|
|
QUESTION NO: 165
An administrator would like to determine which wire pair on a 100 block connects a jack in the next room. Which of the following utilities would MOST likely be used to determine this? A. Port scanner B. Toner probe C. Multimeter D. Protocol analyzer |
Multimeter
|
|
QUESTION NO: 166
Which of the following commands would test the loopback adapter of an internal NIC? A. ping 127.127.0.0 B. ping 127.127.1.0 C. ping 127.0.0.1 D. ping 127.1.1.1 |
ping 127.0.0.1
|
|
QUESTION NO: 167
Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses a CAT5e cable? A. 1000BaseX B. 100BaseFX C. 1000BaseTX D. 100BaseT |
100BaseT
|
|
QUESTION NO: 168
A technician must enable which of the following services to prevent broadcast storms? A. DHCP B. Port mirroring C. Spanning tree D. Bonding |
Spanning tree
|
|
QUESTION NO: 169
One end of a CAT5 cable is punched down following the 568B standard. The other end should be terminated using which standard to make a straight through cable? A. 568B B. RJ45 C. 568A D. RJ11 |
568B
|
|
QUESTION NO: 170
Which of the following IPv4 address pairs would be able to share files on a network using a hub? A. 10.192.2.220/16 and 10.254.2.222/16 B. 10.254.2.220/16 and 10.254.2.222/24 C. 10.192.2.220/16 and 10.254.2.222/16 D. 10.254.2.220/16 and 10.254.2.222/16 |
10.254.2.220/16 and 10.254.2.222/16
|
|
QUESTION NO: 171
Which of the following networks has the LEAST likelihood of collisions? A. Ring B. Mesh C. Star D. Bus |
Ring
|
|
QUESTION NO: 172
A technician is configuring a router for a SOHO network. The technician has changed the IP address scheme on the router and disabled DHCP service before the wireless was configured. After the router updates the information, the PC can no longer connect to the router. Which of the following would be the BEST solution to reestablish the connection while maintaining the routers current configuration state? A. Restart the PC so it obtains a new IP address from the router. B. Restart the router so that the PC obtains a new IP address. C. Assign a static IP address on the PC that matches the router. D. Use APIPA to connect the PC to the router. |
Assign a static IP address on the PC that matches the router.
|
|
QUESTION NO: 173
Which of the following is the number of bits used for IPv6? A.128 B. 32 C. 64 D. 256 |
128
|
|
QUESTION NO: 174
Which of the following network components would be used to create VLANs? A. Routers B. Gateways C. Switches D. Bridges |
Switches
Answer: C Explanation: A switch filters and forwards traffic that is based on certain criteria. A bridge and a router is both an example of a switch. A switch is able to manage multiple, simultaneous pairs of connections between communicating systems. Switches can in many cases be used as a network concentrator that will split flat network segments into dedicated communication links. Switches are able to split collision domains but can also provide a greater aggregate bandwidth between groups of communicating devices. Switches can also improve the overall performance. Incorrect Answers: A: A Router is a network device that can interconnect two or more network segments.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp 32-33 B: A gateway is able to operate on all levels of the OSI model. It will interface between different types of networks or protocols. It also executes conversions between the numbers of protocols at the application layer. D: A bridge will connect two networks. It will also pass traffic between them base only on the node address. You can thus say that the main function of a bridge is to keep the traffic separated on both sides of the bridge. Bridges operate on the Data Link Layer of the OSI model. |
|
QUESTION NO: 175
Which of the following protocols is the MOST susceptible to a packet sniffer? A. SFTP B. SSH C. HTTPS D. SNMPv2 |
SNMPv2
Explanation: SNMP is a network management protocol that collects information about network devices, such as hubs, routers, and bridges and permits communications via network devices and a management console. SNMP is upgraded to SNMPv2 to provide improved remote monitoring and security. |
|
QUESTION NO: 176
Which of the following WAN technologies uses fiber as a transmission medium? A. T1 B. ADSL C. E1 D. SONET |
SONET
Explanation: The SONET uses fiber as a transmission medium. The SONET transport a wide range of digital telecommunication services over optical fiber |
|
QUESTION NO: 177
Which of the following would be a correct statement about VLANs? A. VLANs help isolate network traffic. B. VLAN broadcasts are limited to the switch. C. VLANs create physical segments. D. VLANs help prevent overlapping |
VLANs help isolate network traffic.
Explanation: VLAN's assists you in isolating network traffic. It is software technology that permits for the grouping of network nodes that is connected to one or more network switches into a single logical network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network . |
|
QUESTION NO: 178
When configuring a wireless access point, which of the following principles should be used to select a channel to operate on? A. Select the same channel as that configured on the neighboring access points. B. Select the channel closest to that configured on neighboring access points. C. Select the channel with the frequency range least used in the given area. D. Select the channel farthest from that configured on neighboring access points |
Select the channel with the frequency range least used in the given area.
|
|
Which of the following protocols enables administrators to control network devices like routers and
switches? A. NAT B. SNMP C. DNS D. NFS |
SNMP
Incorrect Answers: A: You should not consider making use of NAT because NAT translates addresses that are legal for an inside network but illegal for a corresponding outside network into addresses that are legal for the outside network. C: You should not consider making use of DNS because you use DNS to translate host names and domain names to IP addresses and vice versa, using a standardized lookup table that the network administrator defines and configures. D: You should not consider making use of NFS because the Network File System (NFS) Application layer protocol was originally designed to allow shared file systems on UNIX servers to appear as local file systems on UNIX clients.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 117, 138, 139, 470 |
|
QUESTION NO: 180
Which of the following is used to test the operation of a NIC? A. Loopback B. 568B C. Rollover D. Crossover |
Loopback
Explanation: The Loopback is use to test the transmission and reception capabilities of the NIC. |
|
QUESTION NO: 181
Which of the following protocols are used for tunneling and encryption purposes?(Select TWO). A. L2TP B. PAP C. SLIP D. PPPoE E. IPSec |
L2TP, IPSec
Explanation: Your best option in this scenario would be to use identify IPSec and L2TP. IPSec is a tunneling protocol that can be used between LANs. It is not secure. You should thus make use of IPSec with this protocol to provide data security. L2TP is a tunneling protocol that will add functionality to PPP. L2TP was created by Cisco and Microsoft. It is often used with virtual private networks. |
|
QUESTION NO: 182
Which of the following TCP connect scanners is always set for normal data flow once a connection is established? A. TCP B. ACK C. SYN D. RSH |
ACK
|
|
QUESTION NO: 183
A company has a wired bus topology and a client accidentally unplugs the network cabling to their computer. Which of the following is true about the company's network? A. It will function properly once all affected PCs are rebooted and authenticateto the network. B. It will function with no downtime. C. It will function with minimal downtime. D. It will not function properly until the wires are reconnected. |
It will not function properly until the wires are reconnected.
|
|
Which of the following protocols is used to encrypt packets over the Internet? (Select TWO).
A. SIP B. HTTPS C. SMTP D. SMNP E. SSH |
HTTPS, SSH
Explanation: In the scenario you should consider making use of HTTPS because HTTPS allows browsers and servers to sign, authenticate, and encrypt an HTTP message. You additionally can also make use of SSH because the Secure Shell (SSH) protocol is used to establish a secure Telnet session over a standard TCP/ IP connection. You should keep in mind that SSH is also used to run programs on remote systems, log in to other systems, and move files from one system to another whilst maintaining a strong, encrypted connection. |
|
QUESTION NO: 185
A user is able to access the network shares and their email, but is unable to connect to any website. Which of the following command line tools should a technician use on that users workstation to begin troubleshooting? A. Traceroute to any website to see where the disconnection is occurring. B. Perform theipconfig command to verify settings on that workstation are correct. C. Use the routeadd command to add static routes to see if the routes are an issue. D. Use the ping command to see if the workstation can access the DHCP server. |
Traceroute to any website to see where the disconnection is occurring.
Explanation: Your best option would be to make use of the traceroute command. The traceroute command lists the IP path that it takes to reach the targeted IP and how long it takes to reach every jump. It is particularly useful when establishing where certain bottlenecks are at a particular router. Incorrect Answers: |
|
QUESTION NO: 186
Users at a branch office have informed a technician that access to static web content is slow from their location. It is determined that most users are visiting the same site repeatedly throughout the day. Which of the following would improve WAN utilization? A. A caching proxy server at the branch B. A traffic shaper C. A load balancer at the datacenter hosting the web servers D. An application level firewall |
A. A caching proxy server at the branch
Explanation: Your best option in this scenario would be to make use of a proxy server to enhance the WAN usage at the branch office. Internet traffic will be reduced when you cache the proxy server. |
|
QUESTION NO: 187
A technician is asked to verify available phone numbers at a telecommunication block. Which of the following tools is required to verify the available numbers? A.Multimeter B.Butt set C.Punch down tool D.Toner probe |
Butt set
Incorrect Answers: A: A multimeter is a device that is used to measure voltages and resistances in electronic components. C: A punchdown tool is used to insert the wire in the IDC.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 270-272 D: The tone generator is a small electronic device used to test network cables for breakages as well as other problems by sending an electronic signal down one segment of UTP wires. |
|
QUESTION NO: 188
When connecting two switches together, which of the following protocols would be used to trunk multiple VLAN traffic across the same physical link? A. Porttrunking B. 802.1q C. Port mirroring D. 802.1x |
802.1q
|
|
QUESTION NO: 189
Which of the following cables is used to connect multiple layer 2 switches? A. Loopback B. Crossover C. Serial D. Rollover |
Crossover
Explanation: Your best option in this scenario would be to make use of a crossover cable. Crossover cables allows for the direct connection of two devices without necessarily being part of a network. A crossover cable is able to connect two switches or hubs together. Incorrect Answers: A: A loopback cable is a special connection for Ethernet 10Base-T NIC's. It can be attached to the network interface of the NIC and connects its outputs to its inputs in order to test the transmission as well as reception capabilities of the NIC. C: This is one of the oldest media used in networks. This type of cable is used in network wiring. It supports baseband as well as broadband signaling. D: A rollover cable is a transmission medium that contains pairs of color coded insulated copper wires that are twisted around each other. You get shielded twisted pair as well as an unshielded twisted pair. This is the cheapest type of cabling as well as being easy to work with. |
|
QUESTION NO: 190
An active/passive server cluster in which only one server is active and handling requests, is an example of which of the following network performance optimization? A. Traffic shaping B. QoS C. High availability D. Load balancing |
High availability
Explanation: The scenario sketched above is an example of High availability performance optimization. High Availability refers to the capability of a server system to endure a software or hardware disaster and still being able to function. You need to incorporate some system duplication in order to remove any single point of failure. Server clusters are equipped with high availability resolve for systems that may require read and write admittance to data. |
|
QUESTION NO: 191
A company needs the ability to run a network that can handle 30Mbps datatransfer speeds but also needs to keep the cost of installing the network down. Which of the following cable types would BEST meet the company's needs? A. CAT6 B. CAT3 C. CAT5e D. CAT1 |
CAT5e
Explanation: The best cable type to use is the Category 5e because it has a maximum speed of 100 Mbps. |
|
QUESTION NO: 192
Which of the following data is included in a wireless access points beacon frame? A. SSID and MAC address B. IP and MAC address C. SSID and WEP key D. Channel and WEP key |
SSID and MAC address
|
|
QUESTION NO: 193
Which of the following devices has a primary purpose of proactively detecting and reacting to security threats? A. SSL B. IDS C. IPS D. VPN |
IPS
Incorrect Answers: A: SSL is a protocol that will secure messages by operating between the Application layer HTTP and the Transport layer. The SSL protocol makes use of an encryption scheme between two systems. SSL makes use of the handshake method in order to establish a session. B: You make use of IDS to protect and report network abnormalities. IDS works with audit files and rule based processing in order to determine how to act in the event of an unusual situation on the network. D: A Virtual Private Network (VPN) makes use of the public Internet as a backbone for a private interconnection between locations. This technology supports reasonably secure, logical, private network links and insecure public network infrastructure. It reduces the Public Switched Telephone Network (PSTN) costs. VPNs are more secure that the traditional remote access as it can be encrypted. |
|
QUESTION NO: 194
Which of the following is the default port for telnet? A. 21 B. 23 C. 20 D. 22 |
23
Explanation: In the scenario you should remember that the Telnet protocol made use of port 23 and was replaced by the SSH protocol as well as rsh and the rlogin utility. Incorrect Answers: A: Port 21 is used by the FTP control protocol for communications. C: Port 20 is used by the FTP protocol for data communications. D: Port 22 is used by the SSH protocol for communications |
|
QUESTION NO: 195
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred? A. The computers gateway is not routing to a public IP address. B. The computer is using an invalid IP address. C. The computer and the gateway are not on the same network. D. The computer is not using a private IP address. |
The computers gateway is not routing to a public IP address.
|
|
QUESTION NO: 196
In an office visitors need to be connected to the Internet without attaching to the company server. Employees also need to connect to the company server and to the Internet. All the connections are managed by the same switch. Which of the following should be used to meet these requirements? A. RIP B. OSPF C. Port trunking D. VLAN |
VLAN
Explanation: Your best option in this scenario would be to make use of a VLAN. VLAN's assists you in isolating network traffic. It is software technology that permits for the grouping of network nodes that is connected to one or more network switches into a single logical network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network. |
|
QUESTION NO: 197
How much bandwidth does an OC12 provide? A. 12Mbps B. 622Mbps C. 1.2Gbps D. 45Mbps |
622Mbps
Explanation: The OC12 will provide 622.08Mbps. |
|
QUESTION NO: 198
An office has just added an employee kitchen area. The work area and equipment has stayed the same. Which of the following is the MOST likely reason why they are now having wireless connectivity problems? A. Distance B. Interference C. Encryption D. Antenna placement |
Interference
Explanation: In this scenario the error occurred due to interference. Wireless performance is affected by outside interference. A microwave can be classified as an outside interference. |
|
QUESTION NO: 199
A scanner has determined the open ports on a network device.Assuming services are running on their default ports, which of the following ports will provide secure communications? A. 25 B. 21 C. 22 D. 23 |
22
Explanation: In the scenario you should know that port 22 is used by SSH because the Secure Shell (SSH) protocol is used to establish a secure Telnet session over a standard TCP/ IP connection. You should also keep in mind that SSH is used to run programs on remote systems, log in to other systems, and move files from one system to another, all while maintaining a strong, encrypted connection. |
|
QUESTION NO: 200
Implementing a set of policies and procedures that define the corporate information is confidential and training employees on these procedures can help prevent which of the following? A. Smurf attacks B. Man in the middle attacks C. Social engineering D. Patch management |
Social engineering
Explanation: Your best option in this scenario would be to identify social engineering. Social engineering deals with the human aspects of gaining access and passwords. Social engineering attacks can occur via the telephone, e-mail or a visit. The purpose of social engineering is to obtain access data like user ID's and passwords. |
|
QUESTION NO: 201
A network technician is asked to implement a separate network for guests that arrive onsite. Which of the following would be the MOST cost effective solution? A. Create a VLAN. B. Install a firewall. C. Install a VPN. D. Implement trunking. |
Create a VLAN
|
|
QUESTION NO: 202
A user is unable to send an email to another user at company. A network technician believes that the issue is DNS related. After typing nslookup, which of the following commands would help determine the IP address of company As mail server? A. set type=mx B. set type=ptr C. set type=soa D. set type=cname |
set type=mx
Explanation: The nslookup command displays information about a particular domain name, the name servers that serve it, and how they are configured. The type-mx command sets the future query type to email servers for that particular domain. |
|
QUESTION NO: 203
Which of the following does a star ring topology use for data transfer? A. CSMA/CA B. CHAP C. CSMA/CD D. Token passing |
Token passing
Explanation: The token passing uses the physical star and the logical ring topology. |
|
QUESTION NO: 204
Which of the following commands would allow a technician to see the DNS servers that a computer is configured to use? A. netstat B. nbtstat C. nslookup D. arp |
nslookup
|
|
QUESTION NO: 205
A network with multiple devices needs to have a smaller broadcast domain while working with a small budget. Which of the following is the BEST solution? A. Create VLANs. B. Implement more hubs. C. Implement more switches. D. Assign static IPs. |
Create VLANs
|
|
QUESTION NO: 206
None of the users in an office can connect to the servers using the FQDN. Which of the following is MOST likely the cause of this issue? A. WINS is not enabled B. NetBIOS is not enabled C. DNS is not enabled D. DHCP is not enabled |
DNS is not enabled
Explanation: A Fully Qualified Domain Name (FQDN) is the type of name that you use when surfing the Web. It consists of a top-level domain name, such as .com, for example, preceded by a second-level domain name, such as CompTIA, preceded by a server name or subdomain string, such as www. For FQDN-to-IP address resolution, TCP/IP uses Domain Name Service (DNS). Many operating systems use DNS for name resolution, but Unix (whose networking is based on TCP/IP) uses DNS almost exclusively, and today, so does Microsoft Windows . |
|
QUESTION NO: 207
The role of intelligently forwarding frames from one broadcast domain to another would be performed by which of the following network equipment? A. Router B. Hub C. Media converter D. Unmanaged switch |
Router
|
|
QUESTION NO: 208
Which of the following protocols is used for connecting clients to a news server? A. IMAP4 B. NCP C. NNTP D. SMTP |
NNTP
Explanation: The Network News Transfer Protocol (NNTP) is the TCP/IP protocol used to access Usenet news servers. Usenet news servers contain thousands of individual message boards known as newsgroups. Each newsgroup is about a particular subject (cars, dating, computers, etc.). Chances are, if you have an interest, there is a newsgroup about it. The details of the NNTP protocol are specified in RFC 977. |
|
QUESTION NO: 209
Which of the following OSI layers handles the routing of data across segments? A. Network B. Transport C. Session D. Data Link |
Network
Explanation: The Network Layer of the OSI ensures that the data arrives at the correct destination. As such, it is concerned with network addressing and routing. A router is responsible for routing and functions at the Network Layer. |
|
Which of the following wireless networks is configured without an access point?
A. Adhoc B. Multiport repeating C. Local D. Extended |
Adhoc
Explanation: This type of network permits multiple devices to intercommunicate without going through an access point. |
|
QUESTION NO: 211
Which of the following network devices could be used to extend the range limitation of Ethernet networks? A. Load balancer B. Repeater C. IDS D. Firewall |
Repeater
|
|
QUESTION NO: 212
Using a routing table, which of the following routes will be selected MOST frequently? A. The lowest administrative distance B. The highest administrative distance C. The BGP route D. The one with the greatest number of hops |
The lowest administrative distance
|
|
QUESTION NO: 213
Automatic private Internet protocol addressing (APIPA) assigns IP addresses from which of the following ranges? A. 10.0.x.x B. 169.254.x.x C. 192.168.x.x D. 172.16.x.x |
169.254.x.x
|
|
QUESTION NO: 214
How many broadcast domains are created by a 24 port switch configured with 12 VLANs with all of the ports being actively used? A. 2 B. 12 C. 36 D. 24 |
12
|
|
QUESTION NO: 215
A client wants to extend the range of their wireless network without running wires throughout the small office. Which of the following could be implemented with the LEAST administrative effort? A. Install a repeater at the end of the office. B. Install an 802.11n router and change all NICS to match. C. Install a WAP in the middle of the office. D. Install an additional router to help with congestion. |
Install a WAP in the middle of the office.
|
|
QUESTION NO: 216
Which of the following is the default port for SMTP? A. 443 B. 21 C. 110 D. 25 |
25
|
|
QUESTION NO: 217
When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which of the following network devices is the laptop plugged into? A. Gateway B. Router C. Hub D. Basic switch |
Hub
|
|
QUESTION NO: 218
Which of the following could be installed to improve network performance when accessing Internet websites? A. Caching engine B. Traffic shaping C. Load balancing D. Firewall |
Caching engine
|
|
QUESTION NO: 219
Which of the following WAN layer two protocols would be BEST suited for a full mesh topology? A. PPP B. ATM C. MPLS D. Framerelay |
MPLS
|
|
QUESTION NO: 220
A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view? A. OSPF B. IGRP C. RIP D. BGP |
OSPF
|
|
QUESTION NO: 221
Which of the following is the maximum amount of wires that fit into a RJ11 connector? A. 2 B. 8 C. 4 D. 6 |
4
Explanation: The RJ-11 connector has four wires or 2 pairs. |
|
QUESTION NO: 222
Which of the following components in a structured wiring system supports an Ethernet network? A. 110 block B. 66 block C. 25 pair cable D. Smart jack |
110 block
|
|
QUESTION NO: 223
Which of the following is the maximum CAT3 length acceptable for a horizontal crossconnect? A. 100 meters (328 feet) B. 125 meters (410 feet) C. 256 meters (840 feet) D. 328 meters (1076 feet |
100 meters (328 feet)
|
|
QUESTION NO: 224
A technician has gathered information on a network issue, and has determined the affected area. Which of the following would be the NEXT step in resolving this issue? A. The technician should test the best solution for the issue. B. The technician should check to see if there have been any recent changes to this area of the network. C. The technician should consider any negative impacts to the network that might be caused by a solution. D. The technician should implement whatthe is the best solution for the issue. |
The technician should check to see if there have been any recent changes to this area of the
network. |
|
QUESTION NO: 225
A company's web server is located in a climate controlled environment, with multiple power supplies, and a UPS to provide the maximum uptime available. Which of the following would allow the company the BEST opportunity to increase network uptime for the web server? A. Upgrade all switches to Gigabit speed B. Install an additional Router C. Upgrade the outbound NIC to a gigabit card D. Install additional NICs |
Install additional NICs
|
|
QUESTION NO: 226
Which of the following devices will segment a network and help cut down on network congestion? A. Switch B. Repeater C. Gateway D. Hub |
Switch
|
|
QUESTION NO: 227
Which of the following protocols is used in a ping command? A. IGMP B. ICMP C. SMTP D. TFTP |
ICMP
|
|
QUESTION NO: 228
Which of the following would allow for encrypted login credentials to be sent over the network? A. Telnet B. FTP C. SSH D. HTTP |
SSH
|
|
QUESTION NO: 229
Which of the following is the maximum hop count for RIPv2? A. 18 B. 10 C. 16 D. 17 |
16
|
|
QUESTION NO: 230
Which of the following is used to simplify the process of setting up a network and the administration of the network? A. ZEROCONF B. SNMP C. WINS D. DNS |
ZEROCONF
|
|
QUESTION NO: 231
When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. The resulting cable is: A. astraightthrough cable. B. nonfunctional. C. a crossover cable. D. capable of 10GBaseT. |
a crossover cable.
|
|
QUESTION NO: 232
Which of the following is the maximum CAT5 length acceptable for a horizontal crossconnect? A. 500 feet (152 meters) B. 100 feet (30.5 meters) C. 336 feet (102 meters) D. 328 feet (100 meters) |
328 feet (100 meters)
|
|
QUESTION NO: 233
Some users are unable to access the network. A technician determines that the computers that were unable to access the network have an IP address of 169.254.0.1. Which of the following network services should the technician check? A. TFTP B. DNS C. BOOTP D. DHCP |
DHCP
|
|
QUESTION NO: 234
A technician is troubleshooting a workstation that is connected to a star network. The technician determines that the workstation is unable to connect to the network resources. Which of the following should be checked FIRST? A. The link lights on the server network card B. The link lights on the network card C. The link lights on the switch D. The installed network drivers |
The link lights on the network card
|
|
QUESTION NO: 235
An administrator is in charge of several remote servers in Japan. Users call and report they cannot connect to the company's resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running? A. nbtstat B. ping C. telnet D. netstat |
ping
|
|
QUESTION NO: 236
Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors? A. Frequency configuration B. SSID naming C. Channel overlap D. Encryption algorithm |
Channel overlap
|
|
QUESTION NO: 237
A network technician is contacted about a system that is unable to connect to a file server. After investigating the problem thoroughly the technician is able to successfully test and resolve the issue. Which of the following is the NEXT step the technician should take? A. Document the solution. B. Create an action plan. C. Reboot the server. D. Identify the problem |
Document the solution.
|
|
QUESTION NO: 238
Which of the following is implemented on multiple switches to allow alternate paths? A. Spanning tree B. VLAN C. Port authentication D. Port mirroring |
Spanning tree
|
|
QUESTION NO: 239
A small office home office (SOHO)wireless user reports their new laptop is 802.11b and 802.11g capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of the problem? A. The laptop wireless card is running on a different frequency. B. The wireless router needs a firmware update. C. The wireless router is 802.11b only. D. The wireless router is defective. |
The wireless router is 802.11b only.
|
|
QUESTION NO: 240
An automated application capable of infecting computers without user interaction would be described as which of the following? A. A social engineering attack B. A Trojan C. A smurf attack D. A worm |
A worm
|
|
QUESTION NO: 241
Which of the following is a valid IP address in the public addressing scheme? A. 172.20.10.1 B. 10.20.1.1 C. 168.192.10.1 D. 233.10.20.1 |
168.192.10.1
|
|
QUESTION NO: 242
A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem? A. Port scanner B. History log C. DNS log D. Application log |
Application log
|
|
QUESTION NO: 243
While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNextHop IPInterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2 Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4? |
The packet will be forwarded to 172.16.31.2
|
|
QUESTION NO: 244
Which of the following wireless standards allows for increased bandwidth by allowing channel bonding? A. 802.11g B. 802.11a C. 802.11b D. 802.11n |
802.11n
|
|
QUESTION NO: 245
If static addressing is not configured and the DHCP server for a network is unavailable, which of the following will a PC use to configure its IP address? A. APIPA B. BOOTP C. DNS D. TFTP |
APIPA
|
|
QUESTION NO: 246
A technician is creating a crossover cable to connect two devices. Which of the following pins would be different between connector A and connector B? A. Pin4, Pin5, Pin7, Pin8 B. Pin6, Pin7, Pin8, Pin1 C. Pin4, Pin5, Pin1, Pin2 D. Pin1, Pin2, Pin3, Pin6 |
Pin1, Pin2, Pin3, Pin6
|
|
QUESTION NO: 247
A network technician is troubleshooting a network issue that has just been reported. Which of the following troubleshooting steps should the technician take FIRST to help resolve this issue? A. Record what steps should be taken to resolve the issue. B. Ask the user who reported the issue what past documentation they have. C. Ask the user who reported the issue to explain the symptoms in detail. D. Record the solution in the appropriate logs for future use. |
Ask the user who reported the issue to explain the symptoms in detail.
|
|
QUESTION NO: 248
A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting teams printer and cannot print to the human resources teams printer. Which of the following is the cause of the problem? A. Wrong gateway B. Wrong DNS C. Wrong host file D. Wrong VLAN |
Wrong VLAN
|
|
QUESTION NO: 249
Which of the following protocols allows secure access to a VPN? A. PPP B. SLIP C. PPPoE D. PPTP |
PPTP
|
|
QUESTION NO: 250
Which of the following devices uses the IEEE 1394 standard? A. FireWire B. USB 2.0 C. iSCSI D. Parallel |
FireWire
|
|
QUESTION NO: 251
Which of the following is the maximum segment distance of a 100BaseFX network? A. 100 meters (328 feet) B. 2,000 meters (6,561 feet) C. 1,024 meters (3,359 feet) D. 1,023 meters (3,356 feet) |
2,000 meters (6,561 feet)
|
|
QUESTION NO: 252
Which of the following devices is used to extend the signal strength on a network segment? A. Repeater B. NIC C. Transceiver D. Modem |
Repeater
|
|
QUESTION NO: 253
Which of the following remote access solutions allows the LEAST connection overhead? A. L2TP VPN B. IPSec VPN C. SSL VPN D. PPTP VPN |
SSL VPN
|
|
QUESTION NO: 254
A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file and print sharing. One computer becomes unable to connect to the network, while the other four are still connecting properly. Which of the following could be causing the computer to not connect to the network? A. The server has failed. B. The computers OS needs to be updated. C. The switch has failed. D. The NIC has failed. |
The NIC has failed.
|
|
QUESTION NO: 255
After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no longer able to send packets with a size of 1501 bytes. Which of the following is the cause? A. The WAN link does not support frames over 1500 bytes in size. B. The branch router cannot process frames larger than 1500 bytes. C. The router at the other end of the WAN link is configured with an MTU of 1500. D. The frames take too long to send causing collisions with other devices attempting to send traffic. |
The router at the other end of the WAN link is configured with an MTU of 1500.
|
|
QUESTION NO: 256
Users on the network can no longer access a custom application that uses TCP 8090 hosted on the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the following commands would verify the server is still accepting connections on TCP 8090? A. netstat B. ipconfig C. telnet D. nslookup |
netstat
|
|
QUESTION NO: 257
Which of the following is commonly used to test fiber connectivity? A. OTDR B. Toner probe C. Butt set D. Multimeter |
OTDR
|
|
QUESTION NO: 258
Which of the following protocols transmits using UDP ports? A. RIPv2 B. HTTP C. HTTPS D. TFTP |
TFTP
|
|
QUESTION NO: 259
Which of the following routing protocols uses AS-Path as one of the methods to build the routing table? A. OSPF B. ISIS C. BGP D. EIGRP |
BGP
|
|
QUESTION NO: 260
A network technician wants a server to have fault tolerance. Which of the following would be the MOST cost effective solution? A. Install two NICs for teaming. B. Install two switches. C. Install a single fiber NIC. D. Install a single router. |
Install two NICs for teaming.
|
|
QUESTION NO: 261
An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the technician take FIRST? A. Document the problem B. Search the internet for the problem C. Test the results D. Identify the symptoms |
Identify the symptoms
|
|
QUESTION NO: 262
A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal? A. Incorrect encryption B. Standards mismatch C. Incorrect SSID D. Environmental factors |
Environmental factors
|
|
QUESTION NO: 263
A user reports their wireless 802.11g Internet connection is intermittently disrupted. Which of the following is the cause of the problem? A. Infrared printer B. Cordless phone C. Cell phone D. Incandescent light |
Cordless phone
|
|
QUESTION NO: 264
Which of the following will list the destination MAC addresses? A. arp B. ping C. dig D. nbtstat |
arp
|
|
QUESTION NO: 265
Which of the following cable types has the shortest maximum cable run length? A. Singlemode fiber B. Coaxial C. Plenum D. CAT3 |
CAT3
|
|
QUESTION NO: 266
Which of the following is the MOST common pinout configuration used when crimping RJ45 connectors? A. UTP B. IEEE 802.5 C. T568A/B D. STP |
T568A/B
|
|
QUESTION NO: 267
A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0 /24 192.168.1.0 /24 192.168.2.0 /24 192.168.3.0 /24 Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed? A. 192.168.0.0 /21 B. 192.168.0.0 /23 C. 192.168.0.0 /16 D. 192.168.0.0 /22 |
192.168.0.0 /22
|
|
QUESTION NO: 268
A network technician has been asked to retrieve device statistics, information, and errors. Which of the following tools would the technician likely use? A. TFTP B. Packet sniffer C. SNMP D. SMTP |
SNMP
|
|
QUESTION NO: 269
Which of the following is found in a layer two switch? A. SSID settings B. Routing protocols C. DNS zones D. VLAN settings |
VLAN settings
|
|
QUESTION NO: 270
Which of the following cable types transmits data over 100Mbps per direction? A. 100BaseTX B. 10BaseT C. 100BaseT D. 10GBaseT |
10GBaseT
|
|
QUESTION NO: 271
A technician is dispatched to a remote office to install a new NIC in a client computer. After successfully installing and configuring the operating system to recognize the device, the computer still cannot access the network. Which of the following would MOST likely be the problem? A. The CAT5 cable is defective B. The NIC is disabled in BIOS C. The NIC is disabled in Device Manager D. The RJ11 jack is defective |
The CAT5 cable is defective
|
|
QUESTION NO: 272
Which of the following is the MOST likely cause of a wireless connection dropoff in a wireless G network? A. Cellular interference B. AM Radio C. Cordless phones D. FM Radio |
Cordless phones
|
|
QUESTION NO: 273
Which of the following tools will identify if a CAT5e cable is operating at optimal performance? A. Toner probe B. Multimeter C. Certifier D. Butt set |
Certifier
|
|
QUESTION NO: 274
Which of the following is the default port for POP3? A. 21 B. 80 C. 110 D. 25 |
110
|
|
QUESTION NO: 275
A user contacts a technician and states that they are unable to access the network. The technician discovers that the IP address of the workstation is 169.123.142.34. Which of the following has occurred? A. The workstation has obtained a public address. B. The workstation has obtained a multicast address. C. The workstation has obtained a private address. D. The workstation has obtained an APIPA address. |
The workstation has obtained an APIPA address.
|
|
QUESTION NO: 276
A technician needs to trace a wire that is in the wall. Which of the following is the BEST way for the technician to identify the wires location? A. Media Tester B. Continuity Tester C. Tone Generator D. Multimeter |
Tone Generator
|
|
QUESTION NO: 277
Users are reporting that they can access Internet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem? A. The intranet server is down. B. The intranet DNS entry isnonauthoritative. C. The DNS address handed out by DHCP is incorrect. D. The default gateway is incorrect. |
The intranet server is down.
|
|
QUESTION NO: 278
When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices? A. Crossconnect wire B. 25 pair cable C. CAT3 D. CAT5 |
25 pair cable
|
|
QUESTION NO: 279
Which of the following protocols allows email to be viewed while remaining on the email server? A. SMTP B. SSL C. POP3 D. IMAP4 |
IMAP4
|
|
QUESTION NO: 280
A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classlessinterdomain routing notation (CIDR) as which of the following? A. 220.100.100.100 /24 B. 220.100.100.100 /16 C. 220.100.100.100 /8 D. 220.100.100.100 /32 |
220.100.100.100 /24
|
|
QUESTION NO: 281
A company is getting a new sales system that must remain secure and isolated. The network administrator needs to segregate network traffic for security reasons. Currently there is one addressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0.Which of the following methods would BEST help in segregating the traffic? A. Implementing a dedicated broadcast network B. Implementing a dedicated multicast network C. Changing the IP scheme to class C addresses D. Creating a new subnet for this system |
Creating a new subnet for this system
|
|
QUESTION NO: 282
A network administrator has been receiving work orders about poor voice quality crossing a branch T1.The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality? A. Install a content caching proxy at the branch to reduce inbound WAN traffic. B. Configure traffic shaping to reduce the bandwidth available to the file sharing application. C. Configure a separate VLAN for the IP phones. D. Upgrade switches to provide higher bandwidth ports for workstations and IP phones. |
Configure traffic shaping to reduce the bandwidth available to the file sharing application.
|
|
QUESTION NO: 283
Which of the following uses pointer records and A records? A. NAT server B. IPS C. DNS server D. IDS |
DNS server
|
|
QUESTION NO: 284
DNS services are in a failed state on a network. Some users require FQDN to access specific services. A temporary solution would be to: A. create a local host file on the PC. B. release and renew DHCP. C. change the IP address of the specific services needed. D. change all domain relationships to WINS. |
create a local host file on the PC
|
|
QUESTION NO: 285
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this? A. Four port wireless router B. Four port switch C. Four port hub D. Four port WAP |
Four port wireless router
|
|
QUESTION NO: 286
Which of the following devices allows segregation of collision domains but not broadcasting domains? A. NIC B. Switch C. Hub D. Router |
Switch
|
|
QUESTION NO: 287
A user reports that when the phone rings in their house the wireless on their laptops becomes disconnected. Which of the following BEST describes the issue? A. The cordless phones are2.4Ghz which interferes with wireless B. The cordless phones are plugged into the RJ11 jack C. The cordless phones are5.8Ghz which interferes with wireless D. The cordless phones are plugged into same outlet as the router |
The cordless phones are2.4Ghz which interferes with wireless
|
|
QUESTION NO: 288
Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN? A. Wiring schematics B. Logical network diagram C. Physical network diagram D. Baseline and configuration documentation |
Baseline and configuration documentation
|
|
After deploying three large additional servers in a rack there are reports of network instability and
other issues across all servers in the rack. It has been verified that there is sufficient power resources and network bandwidth. Which of the following should the technician check NEXT? A. Cable tester B. Certifier C. Temperature monitor D. Multimeter |
Temperature monitor
|
|
QUESTION NO: 290
A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The network administrator for the branch has three separate VLANs for voice, workstations, and servers. There are approximately 50 end user workstations, 50 IP phones that require addressing, and a dozen servers. How should the network administrator use the block allocated to the branch? A. Subnet the block into /26s and assign one to each VLAN.b B. Do not subnet the block?use the /24 for all VLANs. C. The administrator must request more networks and use the networks given so far for the servers and workstation VLANs. D. Subnet the block into /25s and assign one to each voice and workstation VLANs. |
Subnet the block into /26s and assign one to each VLAN.b
|
|
QUESTION NO: 291
Which of the following is the standard data transmission rate for an OC3 line? A. 51.84Mbps B. 44.74Mbps C. 622.08Mbps D. 155.52Mbps |
155.52Mbps
|
|
QUESTION NO: 292
A router receives a packet with a destination address 72.44.69.254?however, no entry in the routing table exists for the network. Which of the following actions will the router take? A. The packet will be queued while the router queries for an acceptable path to the destination. B. The packet will be dropped as nonroutable. C. The packet will be forwarded out until another router forwards the packet. D. The packet will be forwarded to the next hop address of the default route. |
The packet will be forwarded to the next hop address of the default route.
|
|
QUESTION NO: 293
A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of the following is the NEXT step after verifying that one of the NICs has no LEDs flashing? A. Reinstall application. B. Check for hardware conflicts or disabled devices. C. Reinstall drivers. D. Check system properties for correct caching settings. |
Check for hardware conflicts or disabled devices.
|
|
QUESTION NO: 294
Which of the following WAN technologies uses thirty 64Kbps channels? A. ATM B. T1 C. E1 D. MPLS |
E1
|
|
QUESTION NO: 295
Which of the following is considered a connection oriented protocol? A. UDP B. SPX C. TCP D. IP |
TCP
|
|
QUESTION NO: 296
A technician wants to remotely log into an office computer using remote desktop. The technician needs to do this in a secure manner. Which of the following would accomplish this? A. VPN B. Telnet C. VLAN D. Tagged packets |
VPN
|
|
QUESTION NO: 297
A user is trying to establish an FTP connection to a computer at home. The home computer is turned on and has Internet connectivity? however, they are unable to connect from the PC at work. The IP address that the user is trying to connect to is 192.168.1.125.Which of the following is the MOST likely problem? A. The firewall at the office is blocking the outgoing connection. B. FTP client is not installed in the work computer. C. FTP server is not installed on the home computer. D. The IP address of the home computer is not routable across the Internet |
The IP address of the home computer is not routable across the Internet.
|
|
QUESTION NO: 298
A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE). A. ISDN B. MPLS C. ADSL D. SONET E. Framerelay F. ATM G. DOCSIS |
MPLS, Frame relay, ATM
|
|
QUESTION NO: 299
Which of the following tools enables the technician to trace cables in multiple pair wiring? A. Cable tester B. Multimeter C. Butt set D. Toner probe |
Toner probe
|
|
QUESTION NO: 300
Which of the following is a routable public class A address? A. 10.0.0.255 B. 19.16.18.255 C. 10.0.0.10 D. 19.16.18.1 |
19.16.18.1
|