• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/300

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

300 Cards in this Set

  • Front
  • Back
QESTION NO: 1
After adding a new cable segment to the network, the technician should:
A. Update the disaster recovery plan.
B. Document the changes in the business continuity plan.
C. Update the wiring schematics.
D. Create a new baseline document.
C. Update the wiring schematics.
QUESTION NO: 2
Which of the following devices can be used to breakup a broadcast domain?
A. Unmanaged switch
B. Router
C. DHCP server
D. Bridge
B. Router
QUESTION NO: 3
Which of the following is a secure way to transfer files from one device to another?
A. SFTP
B. SNMPv3
C. TFTP
D. FTP
A. SFTP
QUESTION NO: 4
An administrator has a networking closet on the first floor of a building with all of the network and
communication equipment. However, the telephony provider installed the communications line in
the basement. Which of the following needs to be extended to connect the line to the networking
closet?
A. Smart jack
B. Demarcation point
C. Patch panel
D. Router
C. Patch panel
QUESTION NO: 5
Which of the following methods is used to provide access to a VPN?
A. IGP
B. PPTP
C. PPP
D. RAS
B. PPTP
QUESTION NO: 6
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The
first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client
expect to receive a response?
A. 1 and 2
B. 2 and 3
C. 3 and 6
D. 5 and 6
3 and 6
QUESTION NO: 7
Which of the following network access security methods involves the analysis of a physical
hardware addresses?
A. IP filtering
B. L2TP
C. MAC filtering
D. RAS
MAC filtering
QUESTION NO: 8
Which of the following is a direct advantage of having wireless standards?
A. Increased use of wireless spectrum
B. Greater device security
C. Interoperability between devices
D. Increased number of protocols can be used
Interoperability between devices
QUESTION NO: 9
Which of the following is a best practice when implementing a basic wireless network?
A. Disabling ESSID broadcast
B. Configuring encryption with a WEP key and labeling the key on the WAP
C. Adding two access points per area of service
D. Not configuring the ESSID point
Disabling ESSID broadcast
QUESTION NO: 10
Which of the following wiring standards would MOST likely be used to connect a single network
node to a switch?
A. Loopback
B. Straight
C. Rollover
D. Crossover
Straight
QUESTION NO: 11
Which of the following is the maximum distance that CAT5 cable can run before experiencing db
loss?
A. 100 feet (30.5meters)
B. 207 feet (63.1 meters)
C. 328 feet (100 meters)
D. 358 feet (109.12meters)
328 feet (100 meters)
QUESTION NO: 12
A media converter is also known as a:
A. transceiver.
B. hub.
C. modem.
D. repeater.
transceiver
QUESTION NO: 13
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the
following device types is being installed?
A. Bandwidth shaper
B. Intrusion detection
C. Proxy server
D. Load balancer
Bandwidth shaper
QUESTION NO: 14
A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following
steps should be done FIRST to diagnose the problem?
A. Escalate the problem to administrative technician.
B. Compare wiring schematics to industry standards.
C. Identify symptoms and draw a network diagram.
D. Use a port analyzer to determine network topology.
Identify symptoms and draw a network diagram.
QUESTION NO: 15
Which of the following commands can be used to find the MAC address of a connecting router?
A. arp
B. traceroute
C. ping
D. ping sweep
arp
QUESTION NO: 16
Which of the following describes an email that is sent to users with web links that direct them to
malicious websites?
A. Viruses
B. Phishing
C. Rogue access points
D. Man-in-the-middle
Phishing
QUESTION NO: 17
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in
a cubicle corresponds to a given RJ-45 jack in a patch panel?
A. Punch-down tool
B. Spectrum analyzer
C. Toner probe
D. Multimeter
Multimeter
QUESTION NO: 18
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33
feet) fiber runs?
A. 100Base-FX
B. 10GBase-SR
C. 10GBase-ER
D. 10GBase-SW
10GBase-SR
QUESTION NO: 19
An administrator is troubleshooting network connectivity and would like to view the path that
packets are taking from workstation A to server 1. Which of the following command line tools is
MOST appropriate to use?
A. nslookup
B. route
C. traceroute
D. ping
traceroute
QUESTION NO: 20
Which of the following is the MOST appropriate policy for updating physical network diagrams?
A.Update whenever a connection is changed.
B. Update after new personnel are hired.
C. Update before regularly scheduled network audits.
D. Update after weekly network support team review.
Update whenever a connection is changed
After accepting a request packet on port 80, the firewall automatically allows the reply packet to
pass. Which of the following terms BEST describes this firewall behavior?
A. Stateful inspection
B. Intrusion detection
C. Content filtering
D. Passive fingerprinting
Stateful inspection
QUESTION NO: 22
Which of the following connectivity issues is the MOST likely to result from bundling network
cables tightly together?
A. Collision
B. Attenuation
C. Crosstalk
D. Open circuit
Crosstalk
QUESTION NO: 23
Which of the following ports does IPSec use, by default?
A. 53
B. 500
C. 3389
D. 8080
500
QUESTION NO: 24
Which of the following can be used to find the location of a cable short?
A. Multimeter
B. CSU/DSU
C. Protocol analyzer
D. TDR
TDR
Explanation:
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate
faults in metallic cables (for example, twisted wire pairs, coaxial cables).
QUESTION NO: 25
Which of the following authentication mechanisms on a wireless network uses a separate network
authentication server?
A. Kerberos
B. TKIP
C. RADIUS
D. WEP
RADIUS
QUESTION NO: 26
Which of the following physical connections allows for the BEST performance when connecting to
a VPN server for a remote user?
A. Baseband
B. Broadband
C. Satellite
D. POTS
Broadband
QUESTION NO: 27
A company needs to perform stateful packet filtering on the core network. Which of the following
network devices would BEST be suited to match this equipment?
A. Firewall
B. Proxy
C. Router ACLs
D. DHCP server
Firewall
QUESTION NO: 28
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).
A. SFTP
B. HTTP
C. SNTP
D. RCP
E. SCP
SFTP & SCP
QUESTION NO: 29
Two network switches need to be cabled together via copper cabling. These switches do not
support MDI-X. Which of the following cabling will need to be used?
A. Straight
B. Rollover
C. Crossover
D. Loopback
Crossover
QUESTION NO: 30
A technician wishes to implement network authentication at the switch port level. Which of the
following standards is designed to accomplish this?
A. 802.1ad
B. TKIP
C. WPA2
D. 802.1x
802.1x
QUESTION NO: 31
Which of the following is a commonly used protocol for VoIP network communication?
A. SNMP
B. SSH
C. DNS
D. RTP
RTP
QUESTION NO: 32
Which of the following protocols uses port 143 by default?
A. NTP
B. SNMP
C. SSH
D. IMAP4
IMAP4
QUESTION NO: 33
A user calls network support and reports that email is not working. Which of the following should
the technician do FIRST?
A. Ask the user what operation was performed, what the expected result was, and what the actual
result was.
B. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network
administrator if needed.
C. Attempt to send a test email message to a known account at a remote facility and scan logs to
see if it is sent.
D. Determine which mail hub the user was connected to and perform a graceful restart.
Ask the user what operation was performed, what the expected result was, and what the actual
result was.
QUESTION NO: 34
Which of the following can be used to set options such as TFTP server addresses, DNS search
lists, and broadcast addresses on network clients and workstations?
A. Networkbridge
B. Layer 2 switch
C. DHCP server
D. Smart jack
DHCP server
QUESTION NO: 35
Which of the following exchanges routing information between two autonomous systems?
A. EGP
B. OSPF
C. IGP
D. EIGRP
EGP
QUESTION NO: 36
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
A. Collisions
B. Latency
C. Duplex
D. Cable length
Latency
QUESTION NO: 37
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the
following could be used to accomplish this connection?
A. Smart jack
B. Optical media
C. Token ring
D. Media converter
Media converter
QUESTION NO: 38
VLANs occur at which of the following layers of the OSI model?
A. 1
B. 2
C. 3
D. 4
2
QUESTION NO: 39
Which of the following is the metric used for OSPF?
A. Latency
B. Cost
C. Bandwidth
D. Next hop
Bandwidth
QUESTION NO: 40
A computer is unable to access the corporate web server, which has an IP address of
172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based
on the output below, which of the following is the MOST likely cause of this problem?
Internet Address Physical Address Type
172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic
A. Reverse ARP failure
B. IP address conflict
C. MAC spoofing
D. Static ARP entries
MAC spoofing
QUESTION NO: 41
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After
consolidating the officer's networks, they have run out of IP addresses. Which of the following is
the MOST cost-effective solution?
A. Request another class C IP scope from the ISP.
B. Switch to static IP addressing.
C. Change the subnet mask to 255.255.254.0.
D. Add a router to connect both networks.
Change the subnet mask to 255.255.254.0.
QUESTION NO: 42
An administrator suspects that packets to an IP address are being dropped over the internet.
Which of the following tools would be the BEST to determine the hop that is dropping the packets?
A. ping
B. nslookup
C. traceroute
D. netstat
traceroute
QUESTION NO: 43
A workstation on the network can ping hosts on the network but it cannot ping any addresses on
the internet. Other hosts on the same network can connect to the internet. Which of the following
should the technician check?
A. The DNS server entries
B. The network card
C. The default gateway
D. The hosts file
The default gateway
QUESTION NO: 44
Which of the following commands would MOST likely be used to list the status of all established
TCP connections on port 80?
A. netstat -at
B. netstat -aupn
C. netstat -r
D. netstat -v
E. netstat -p tcp
netstat -p tcp
QUESTION NO: 45
An administrator would like to evaluate network traffic. Which of the following tools should the
administrator use?
A. OTDR
B. Protocol analyzer
C. Certifier
D. Toner probe
Protocol analyzer
Which of the following ports would be commonly used for FTP traffic?
A. 20
B. 22
C. 23
D. 25
20
QUESTION NO: 47
Which of the following device can connect multiple workstations, support VLANs, and function as a
router?
A. Repeater
B. Switch
C. Hub
D. Multilayer switch
Multilayer switch
QUESTION NO: 48
Which of the following classes is the address 208.177.23.1?
A. Class A
B. Class B
C. Class C
D. Class D
Class C
QUESTION NO: 49
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
802.11n
QUESTION NO: 50
Which of the following protocols could be used in a peer-to-peer topology?
A. NetBIOS
B. IGMP
C. RADIUS
D. TACACS+
IGMP
QUESTION NO: 51
A private AS number is useful in which of the following situations?
A. Internet multihoming with multiple carriers
B. Isolated network at a single site
C. Enterprise network without redundant links
D. Internet multihoming with all ISPs in same BGP area
Internet multihoming with all ISPs in same BGP area
QUESTION NO: 52
A network with twenty clients needs to view a video file. Which of the following should be
configured on the client's computers to reduce network traffic?
A. Class C addresses
B. Class A addresses
C. Broadcast
D. Multicast
Multicast
QUESTION NO: 53
A new LAN switch is installed with on fiber ports. Which of the following would a technician need
on the new switch to allow compatibility to the existing fiber network?
A. Router
B. Repeater
C. Media converter
D. Hub
Media converter
QUESTION NO: 54
Mobile users are connecting from sites that have strong security policies and filter most traffic
except HTTPS. Which of the following would be the BEST solution to allow them access to the
corporate network?
A. Dial-in access
B. RDP access
C. IPSec VPN
D. SSL VPN
SSL VPN
QUESTION NO: 55
Which of the following protocols are commonly used for VoIP? (Select TWO).
A. NPP
B. SIP
C. HSRP
D. RTP
E. NNTP
SIP & RTP
QUESTION NO: 56
Which of the following describes how original network diagrams contained in the documentation
should be maintained?
A. Used only to satisfy a network upgrade checklist requirement
B. Used as a point-in-time reference but never relied upon
C. Regular audits to ensure that diagrams remain accurate
D. Considered to be the only source-of-truth of the network state
Regular audits to ensure that diagrams remain accurate
QUESTION NO: 57
Which of the following are usually needed during manual configuration of a client on an 802.11g
network segment using DHCP and WEP? (Select TWO)
A. IP address
B. Name servers
C. SSID
D. Subnet mask
E. Shared key
SSID & Subnet mask
QUESTION NO: 58
To ensure that VoIP phones are provided with power without using independent power supplies,
switches on the network must have which of the following features?
A. PoE
B. VLAN tagging
C. PPPoE
D. Spanning tree
PoE
QUESTION NO: 59
A user contacts a technician and states, "The network is down." After further investigation the user
is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician
should take to help determine the root cause of the problem?
A. Have the user ping the default gateway.
B. Unplug and then plug the network cable back in.
C. Reboot the core router.
D. Have the user run netstat
Have the user run netstat
QUESTION NO: 60
An end user is able to connect to a wireless network and is able to browse the internet, yet is
unable to access network servers. Which of the following is the MOST likely cause of the
problem?
A. The end user is connected to the incorrect wireless network.
B. The device is configured with an incorrect subnet mask.
C. There is a problem with the DNS server.
D. The network card is malfunctioning
The end user is connected to the incorrect wireless network.
QUESTION NO: 61
The primary goal of implementing network QoS features is
A. Provide predictable network performance.
B. Increase network throughput.
C. Prevent undesirable network traffic from entering the network.
D. Provide fault tolerance to the network design.
Provide predictable network performance.
QUESTION NO: 62
A LAN support team is installing new cables when all networked applications slow and then stop
working. Switches in the server room show all connected ports at 100% activity. Which of the
following has MOST likely occurred?
A. Cable run has a short.
B. New switch port is in wrong VLAN.
C. Switching loop.
D. Cable run has a break
Switching loop.
QUESTION NO: 63
After receiving network problem reports from users, the technician notices that the router is
rebooting itself several times a day. Which of the following would the technician do NEXT to
further diagnose this problem?
A. Test the router's connection with a throughput tester.
B. Replace the router's memory and CPU.
C. Install redundant network connections to the router.
D. Review the router's event logs
Review the router's event logs
QUESTION NO: 64
Which of the following protocols has similar functionality to Telnet but operates more securely than
Telnet?
A. TFTP
B. SSH
C. SNAT
D. RSH
SSH
QUESTION NO: 65
A technician would use a logical network diagram to determine the number of:
A. Cables in the network.
B. Broadcast domains on the network.
C. Switches on the network.
D. Users on the network
Broadcast domains on the network
QUESTION NO: 66
Which of the following methods is used in creating an ACL?
A. IP filtering
B. PPPs
C. Content filtering
D. VPNs
IP filtering
QUESTION NO: 67
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following
network devices? (Select TWO).
A. Server
B. Workstation
C. Printer
D. Hub
E. Laptop
Server & Printer
QUESTION NO: 68
Which of the following technologies can prevent a department's network broadcast from
propagating to another department's network if they are located on the same switch?
A. A hub
B. A firewall
C. A trunk
D. A VLAN
A VLAN
QUESTION NO: 69
Where does the responsibility for maintenance and support shift from the telecommunication
company to the customer?
A. Central office
B. Where the telecommunication lines enter the building
C. Smart jack
D. Demarc
Demarc
QUESTION NO: 70
An administrator wants to connect users at three branch offices to the main office through the
internet. Which of the following devices should the administrator install at the main office to BEST
accomplish this goal?
A. IPS sensor
B. Proxy server
C. Layer 2 switch
D. VPN concentrator
VPN concentrator
Which of the following protocols is the MOST secure for transferring network device
configurations?
A. TFTP
B. FTP
C. SCP
D. RCP
SCP
QUESTION NO: 72
A network has four switches; each switch has a physical link to all other switches. Which of the
following topologies is being used?
A. Ring
B. Point-to-multipoint
C. Star
D. Mesh
Mesh
QUESTION NO: 73
Which of the following commands is MOST appropriate to determine whether a network interface
is up or down?
A. SNORT
B. ISAKMPD
C. ARP
D. IFCONFIG
IFCONFIG
QUESTION NO: 74
Which of the following WAN technologies requires fiber optics?
A. POTS
B. SONET
C. ADSL
D. PSTN
SONET
QUESTION NO: 75
Internet-working devices operate at OSI layer:
A. 2
B. 3
C. 4
D. 5
3
QUESTION NO: 76
A small company needs to temporarily extend its call center by ten employees. The company
decides to rent office space on the opposite side of the building; the two spaces are 400 feet (122
meters) apart. Which of the following is the MOST cost effective solution?
A. Install a new T1 line for that office.
B. Use a wireless repeater and a WAP.
C. Connect the two offices with fiber.
D. Install gigabit switches and run Ethernet.
Use a wireless repeater and a WAP.
QUESTION NO: 77
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches.
Which of the following cable types should the administrator plan to use?
A. Multimode fiber
B. RG-6 copper
C. Single-mode fiber
D. CAT6 copper
Multimode fiber
QUESTION NO: 78
Which of the following network protocols is used for sending outbound email from a host?
A. SMTP
B. POP
C. RTP
D. IMAP
SMTP

Explanation:
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a
remote server to a local email client. POP3 allows you to download email messages on your local
computer and read them even when you are offline.
The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a
remote web server from a local client. IMAP and POP3 are the two most commonly used Internet
mail protocols for retrieving emails. Both protocols are supported by all modern email clients andweb servers.
Main difference between IMAP and POP3:
The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the
IMAP protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your
mailbox is about to be managed by multiple users.
Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the
Internet. SMTP uses TCP port 25.
QUESTION NO: 79
Which of the following is a correct Ethernet MAC address?
A. 12:7H:45:89:9F:65
B. 16-15-4D-31-59-5J
C. 11:34:7A:88:0C:DB
D. 12-88-FF-9X-58-9E
11:34:7A:88:0C:DB
QUESTION NO: 80
Which of the following would a technician set up for a building to building within a campus?
A. ESD
B. MDF
C. IDF
D. EMI
IDF
QUESTION NO: 81
Which of the following allows an administrator to view malicious activity after it has taken place?
A. IDS
B. IPS
C. Port scanner
D. Packet sniffer
IDS
QUESTION NO: 82
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the
patch panel?
A. Cable crimper
B. Punch down tool
C. Toner probe
D. Multimeter
Cable crimper
QUESTION NO: 83
Which of the following is an acceptable method for deciding placement of wireless access points?
A. Where there are electrical service and network connections available
B. Every300 feet (91 meters)
C. In the middle of each room
D. A site survey
A site survey
QUESTION NO: 84
Which of the following command line tools can be used to display listening sockets and
established connections on the local computer?
A. nslookup
B. nbtstat
C. netstat
D. ipconfig
netstat
QUESTION NO: 85
Which of the following tools is used to connect analog telephony wire pairs to a block, such as a
110 or 66 block?
A. Butt set
B. Protocol analyzer
C. Toner probe
D. Punch down tool
Punch down tool
QUESTION NO: 86
An application layer firewall is MOST beneficial when used with which of the following protocols?
A. VoIP
B. GRE
C. HTTP
D. SNMP
SNMP
QUESTION NO: 87
Which of the following cable types have a maximum recommended cable length of 100 meters
(328 feet)?
A. Coaxial
B. Ethernet
C. Serial
D. Fiber
Ethernet
QUESTION NO: 88
A network administrator would MOST likely use a port scanner to do which of the following?
A. Capture incoming network packets to port 80 on a workstation.
B. Trace a physical network port through a building.
C. Remotely test a firewall configuration on a server.
D. Report the link speed and duplex of all ports on a switch.
Remotely test a firewall configuration on a server
QUESTION NO: 89
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the
following configuration management documentation would be the BEST choice to use?
A. Physical network diagram
B. Baseline configurations
C. Security policy
D. CAT5 wiring schematics
Physical network diagram
QUESTION NO: 90
Which of the following standards provides port authentication?
A. 802.1x
B. 802.11
C. 802.1q
D. 802.2
802.1x
QUESTION NO: 91
Which of the following would be sent to an SNMP network management system in the event that a
failure or predefined threshold was crossed?
A. SNMP trap
B. History log
C. System log
D. SNMP agent
SNMP trap
QUESTION NO: 92
A user is reporting issues connecting to the corporate web server. When analyzing the output from
a packet sniffer an administrator sees:
Client-> Server SYN
Server ->Client ACK
Client-> Server RST
Which of the following is the user experiencing?
A. The client is prematurely closing the connection.
B. The server is failing to properly respond.
C. The 3-way handshake is complete but the browser is unresponsive.
D. The server is prematurely closing the connection.
The client is prematurely closing the connection.
QUESTION NO: 93
Which of the following connectors can be used for serial connections?
A. SC
B. RS-232
C. BNC
D. ST
RS-232

Explanation:
Recommended Standard 232 (RS ? 232) was a cable standard commonly used for serial data
signals connecting data ? terminal equipment and data ? communications equipment, as when
you connect a computer's serial port to an external modem.
QUESTION NO: 94
A client attempts to connect to a network resource and is given an error message about their
access being restricted. Which of the following BEST describes the reason for denial?
A. The user's account failed to authenticate with correct permissions.
B. The user's account is disabled.
C. The network resource is unavailable.
D. The user is not connected to the network.
The user's account failed to authenticate with correct permissions.
QUESTION NO: 95
Which of the following routing algorithms would provide the fastest convergence time?
A. A distance-vector algorithm
B. A static algorithm
C. A link-state algorithm
D. A path-vector algorithm
A link-state algorithm
QUESTION NO: 96
Where would a technician MOST likely place the company MX and A records?
A. Proxy server
B. Load balancer
C. DNS server
D. Firewall
DNS server
QUESTION NO: 97
Which of the following BEST explains the function of OSI layer 4?
A. Connecting hosts on the same segment
B. Specifying signal timing and amplitude
C. Reliable delivery of packets
D. Routing packets across segments
Reliable delivery of packets
QUESTION NO: 98
Which of the following tools can be used to determine the MAC address of a machine on the local
subnet?
A. ping
B. arp
C. host
D. dig
arp
QUESTION NO: 99
The task of replacing hubs with switches reduces retransmissions by increasing which of the
following?
A. Frequency domains
B. Broadcast domains
C. Domain kiting
D. Collision domains
Collision domains
QUESTION NO: 100
Which of the following WAN technologies allows for the fastest connection?
A. ADSL
B. SONET
C. T1
D. OC-12
SONET
QUESTION NO: 101
A company recently installed a new VoIP phone system that runs over their existing T3 Internet
connection. Which of the following network technologies would BEST handle voice traffic
prioritization above all other data?

A. QoS
B. IPSec
C. PoE
D. Load balancing
QoS
QUESTION NO: 102
Which of the following mitigation techniques is MOST effective against a man-in-the-middle
attack?

A. Authentication
B. Encryption
C. Popup blocker
D. ACL
Authentication
QUESTION NO: 103
Which of the following WAN technology types does not use an Ethernet cable as a medium for
communication and is used for long distances?

A. DSL
B. WiMAX
C. E3/T3
D. ATM
WiMAX
QUESTION NO: 104
Which of the following Internet technologies would provide the GREATEST bandwidth?

A. T1
B. Cable
C. OC3
D. T3
OC3
QUESTION NO: 105
An administrator has configured two hosts as follows:
HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1

HOSTB
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1

Which of the following MUST be changed in order to allow HOST A to talk to HOST B?

A. HOST B netmask to 255.255.252.0
B. HOSTA netmask to 255.255.255.0
C. HOST A IP address to192.168.2.100
D. HOST B IP address to192.168.2.200
HOST B IP address to192.168.2.200
QUESTION NO: 106
When installing a new secure wireless network the administrator should turn on:
A. WEP and turn on SSID broadcast.
B. WPA and turn on SSID broadcast.
C. WPA and turn off SSID broadcast.
D. WEP and turn off SSID broadcast.
WPA and turn off SSID broadcast.
QUESTION NO: 107
An administrator is at a client's site to figure out an intermittent network problem. Which of the
following is the FIRST step in the troubleshooting methodology that should be performed?

A. Implement and test the solution.
B. Create an action plan and solution identifying potential effects.
C. Identify the affected areas of the network.
D. Gather information.
Gather information.
QUESTION NO: 108
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected
computer is on the network and checks if a node is saturating the network. Which of the following
tools should be utilized in this situation?

A. Multimeter
B. Port scanner
C. Protocol analyzer
D. IGMP
Protocol analyzer
QUESTION NO: 109
A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable to
connect to the network. An administrator verifies that the port is configured correctly and the LAN
drop is active. Which of the following is the MOST likely cause?

A. Crosstalk on the cable
B. Duplex mismatch
C. Speed mismatch
D. Open pairs are present
Duplex mismatch
QUESTION NO: 110
Which of the following devices does not limit network broadcast traffic and does not increase
performance?

A. Router
B. Brouter
C. Hub
D. Switch
Hub
QUESTION NO: 111
Multiple users are reporting network issues. Before taking any course of action, which of the
following is the FIRST step a technician should take?

A. Create a plan of action and a final solution for the issues.
B. Gather information about the problems/symptoms.
C. Establish the probable cause behind the network issues.
D. Document the solution and update all logical/physical network diagrams.
Gather information about the problems/symptoms.
QUESTION NO: 112
Which of the following network devices would MOST likely be installed to allow a fiber optic cable
to be plugged into a network device with only RJ-45 connections?

A. WAP
B. Basic switch
C. Hub
D. Media convertor
Media convertor
QUESTION NO: 113
A particular route's destination address is referred to as the:

A. RIP peer.
B. shot vector.
C. link state.
D. next hop.
next hop
QUESTION NO: 114
The helpdesk has been informed that the company's ISP is experiencing network outages. Which
of the following commands can an administrator run to quickly locate and determine the TTL of the
further reachable node?

A. route
B. ping
C. traceroute
D. arp
traceroute
QUESTION NO: 115
Which of the following uses a certificate for a tunneling connection?

A. RDP
B. PPTP
C. VNC
D. SSL VPN
SSL VPN
QUESTION NO: 116
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a
cable to plug their laptop into the router in order to be able to console into it. Which of the following
would the administrator need to make this connection?

A. Crossover
B. Loopback
C. Rollover
D. 568B
Rollover
QUESTION NO: 117
Which of the following activities will not be possible if the gateway IP address is set incorrectly on
a client's machines?

A. Printing over a local network
B. Sniffing the network traffic
C. Pinging a remote computer
D. Sharing local network files
Pinging a remote computer
QUESTION NO: 118
Which of the following replaces the destination IP address of a packet?

A. NAT
B. DNS
C. SNAT
D. DHCP
SNAT
QUESTION NO: 119
Which of the following is the BEST tool to use when terminating a network jack?

A. Snips
B. Cable stripper
C. Toner probe
D. Punch down
Punch down
QUESTION NO: 120
An administrator would like to monitor the network to evaluate which employees are using an
excessive amount of bandwidth on peer to peer sharing services. Which of the following
monitoring techniques would BEST be used?

A. Stateful packet inspection
B. Load balancing
C. Packet sniffing
D. Throughput testing
Packet sniffing
QUESTION NO: 121
A solution provided less than ideal results, and the technician is forced to go back and devise a
new solution. Which of the following would be done NEXT, assuming probable cause is
established and escalation is not necessary?

A. Determine if anything has changed.
B. Gather information about the problem.
C. Document the solution and steps taken during the process.
D. Create an action plan and accompanying solution.
Create an action plan and accompanying solution.
QUESTION NO: 122
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity
issues. Which of the following is MOST likely causing the new issues?

A. Antenna placement
B. Environment factors
C. Antenna distance
D. Signal bounce
Environment factors
How many potential MAC address schemes are possible?

A. 232
B. 246
C. 248
D. 264
248
QUESTION NO: 124
Which of the following would MOST likely contain information about unlabeled datacenter
connections?

A. Procedures manual
B. Emergency call list
C. Logical network diagram
D. Wiring schematic
Wiring schematic
QUESTION NO: 125
A technician needs to install phones that will only require one cable for both data and power to be
supplied. Which of the following features MUST the switch support?

A. Port mirroring
B. VLAN
C. Spanning tree
D. PoE
PoE
QUESTION NO: 126
Which of the following connection methods is considered secure?

A. HTTP
B. RCP
C. HTTPS
D. TELNET
HTTPS
QUESTION NO: 127
In which of the following networking types can a computer be a client to other computers and act
as a server as well?

A. Bus
B. Ring
C. VPN
D. Peer to peer
Peer to peer
QUESTION NO: 128
An administrator has determined that auto-negotiation has failed on a connection. Which of the
following are the MOST important settings that should be matched on each side of the
connection?

A. IP address, OSPF area, route propagation
B. Port enable, port mirroring,link aggregation
C. Port speed, port duplex, flow control
D. VLAN assignment, port authentication, flow control
Port speed, port duplex, flow control
QUESTION NO: 129
A technician needs to segment a network to provide additional security for the HR department
shares. Which of the following features would need to be configured to provide this?

A. VLAN
B. Port mirroring
C. Spanning tree
D. PoE
VLAN
QUESTION NO: 130
A technician has deployed multiple temperature monitoring devices with IP addresses in the
10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server
every five minutes. Which of the following destination IP addresses must the technician configure
on the server to send keep-alive packets to all the devices?

A. 10.137.24.0
B. 10.137.24.1
C. 10.137.24.127
D. 10.137.24.128
10.137.24.127
QUESTION NO: 131
Which of the following OSI layers does a Layer 3 switch operate at? (Select TWO).

A. Presentation
B. Session
C. Transport
D. Data link
E. Network
Network & Transport
QUESTION NO: 132
An administrator wants to monitor live traffic on a switch to determine if a malicious source is
broadcasting ARP traffic. Which of the following utilities would BEST accomplish this?
A. Switchport mapper
B. Packet injector
C. Network mapper
D. Packet sniffer
Packet sniffer
QUESTION NO: 133
Which of the following requires the pin-outs to be the same on both ends of a cable?

A. Straight
B. Crossover
C. Rollover
D. Loopback
Straight
QUESTION NO: 134
Which of the following tools is designed to send a signal through one end of a cable, so that it can
be found at the other end of the cable?

A. Multimeter
B. Toner probe
C. Cable tester
D. Voltage event recorder
Cable tester
QUESTION NO: 135
An administrator needs to check the number of active connections on their computer. Which of the
following should be administrator use?

A. dig
B. ping
C. ipconfig
D. netstat
netstat
QUESTION NO: 136
Which of the following is used by a company's ISP to troubleshoot network issues?

A. Demarc
B. 66 Block
C. Smart Jack
D. 110 Block
Smart Jack
IGP differs from EGP because IGP is designed for use in which of the following?

A. Communication between WANs
B. Communication between networks
C. Single autonomous network
D. Single non-autonomous network
Single non-autonomous network
QUESTION NO: 138
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same
subnet?

A. 255.255.240.0
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.255.240
255.255.240.0
QUESTION NO: 139
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the
following commands can be run on HOST A to determine the process attached to TCP port 4444?
A. ipconfig /all
B. ifconfig -a
C. netstat -nav
D. netstat -nap
netstat -nav
QUESTION NO: 140
Which of the following network cable types is LEAST susceptible to EMI?

A. Plenum STP CAT5
B. UTP CAT5
C. UTP CAT3
D. Coaxial
Coaxial
QUESTION NO: 141
A user has reported slow network response in a large training room; the class requires many
students to access the same website each day. Which of the following would BEST remedy this
problem?

A. Caching engine
B. Jitter correction
C. Firewall
D. Fault tolerance
Caching engine
QUESTION NO: 142
Which of the following pairs should be crossed to create a crossover cable?

A. 1,2 and 3,4
B. 1,2 and 3,6
C. 5,6 and 7,8
D. 4,5 and 6,7
1,2 and 3,6
QUESTION NO: 143
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new
1000BaseFX. Which of the following should the administrator do NEXT?

A. Reboot the switch to enable the new connection
B. Update the logical network diagram
C. Update the switch configuration logs
D. Update the wiring schematics
Update the wiring schematics
QUESTION NO: 144
A technician moves a VoIP phone to a new location, but discovers the phone does not start up
when plugged into the network. Which of the following explains this situation?

A. The switch does not support PoE.
B. The jack needs to be rewired using the 568B standard.
C. QoS is not enabled on the switch.
D. The phone needs a fiber port.
The switch does not support PoE.
QUESTION NO: 145
A port scanner is used by network administrator for which of the following?

A. To find routers with weak passwords
B. To determine open ports on network hosts
C. To secure switches and routers
D. To make a physical network diagram
To determine open ports on network hosts
QUESTION NO: 146
Which of the following can be used to help verify that a remote web server is not blocked by a
firewall?
A. Packet injector
B. Toner probe
C. Protocol analyzer
D. Port scanner
Port scanner
QUESTION NO: 147
SONET is normally associated with which of the following?

A. Point to point
B. Point to multipoint
C. Ring
D. Bus
Ring
QUESTION NO: 148
An administrator wants to provide redundant paths to network resources in case a link fails. Which
of the following switch features would the administrator need to use to accomplish this task?

A. PoE
B. VLAN
C. Trunking
D. Spanning tree
Spanning tree
QUESTION NO: 149
TCP occurs at which layer of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Layer 4
QUESTION NO: 150
Which of the following would an administrator MOST likely require in order to connect a client to a
WPA encrypted network?

A. Pre-shared key
B. Gateway address
C. PIN
D. DSA public key
E. SSID
Pre-shared key
QUESTION NO: 151
Which of the following technologies is the MOST cost-effective when protecting a large number of
networked workstations from external attacks?

A. Host-based IDS
B. External scanning service
C. Network-based firewall
D. Network-based IPS
Network-based firewall
QUESTION NO: 152
Which of the following transport protocols should be used to avoid retransmitting lost packets?

A. UDP
B. TCP
C. ARP
D. IGMP
UDP
QUESTION NO: 153
A firewall is set to block inbound connections on port 25. Which of the following protocols would
enable the administrator to retrieve email without reconfiguring the firewall?

A. SNMP
B. SMTP
C. POP3
D. FTPD. FTP
POP3
QUESTION NO: 154
The 802.11n protocol operates at which of the following layers of the OSI model? (Select TWO).

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
Layers 1 & 2
QUESTION NO: 155
When installing an access point, which of the following encryption schemes should be
implemented to BEST secure the network?

A. WPA
B. WEP
C. WPA with PSK
D. WPA2 with PSK
WPA2 with PSK
QUESTION NO: 156
Which of the following networking protocols is used to give the remote computer secure command
line access to the server?

A. SSH
B. Telnet
C. ICMP
D. RTP
SSH
QUESTION NO: 157
Which of the following defines the required distance between each LAN drop that will be installed
within a building?

A. Acceptance use policy
B. Wiring schematics
C. Logical network diagrams
D. Company regulations
Wiring schematics
QUESTION NO: 158
Plenum cable should be used to:

A. protect against ESD.
B. increase reliability.
C. decrease cost.
D. comply with fire codes.
comply with fire codes
QUESTION NO: 159
Which of the following describes what happens when a technician pings the broadcast address?

A. All clients on the subnet respond
B. The broadcast server responds
C. An ICMP loop floods the network
D. All clients in the multicast group respond
All clients on the subnet respond
QUESTION NO: 160
Which of the following describes a routing table that needs to be maintained manually?
A. Hop count based
B. Link-state
C. Static
D. Dynamic
Static
QUESTION NO: 161
Which of the following protocols resolves MAC addresses from IP addresses?
A. RTP
B. DHCP
C. DNS
D. ARP
ARP
QUESTION NO: 162
Which of the following is strictly used to convert analog to digital signals?
A. NIC
B. Modem
C. Repeater
D. Hub
Modem
QUESTION NO: 163
In a new wireless network installation, the administrator has successfully installed and tested the
equipment. The NEXT step after turning wireless access on would be to:
A. Document the physical layout.
B. Configure the DHCP server.
C. Configure wireless adapters.
D. Perform a war drive to test for vulnerabilities
Document the physical layout.
QUESTION NO: 164
The MAIN difference between an IDS and an IPS is the:
A. IPS blocks malicious activity while the IDS only alerts about malicious activity.
B. IDS blocks malicious activity while the IPS only alerts about malicious activity.
C. IDSuses a deterministic engine while the IPS uses probabilistic engine.
D. IDSis an inline system while the IPS is placed on a span port and has no IP address.
IPS blocks malicious activity while the IDS only alerts about malicious activity.
QUESTION NO: 165
An administrator would like to determine which wire pair on a 100 block connects a jack in the next
room. Which of the following utilities would MOST likely be used to determine this?
A. Port scanner
B. Toner probe
C. Multimeter
D. Protocol analyzer
Multimeter
QUESTION NO: 166
Which of the following commands would test the loopback adapter of an internal NIC?
A. ping 127.127.0.0
B. ping 127.127.1.0
C. ping 127.0.0.1
D. ping 127.1.1.1
ping 127.0.0.1
QUESTION NO: 167
Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses
a CAT5e cable?
A. 1000BaseX
B. 100BaseFX
C. 1000BaseTX
D. 100BaseT
100BaseT
QUESTION NO: 168
A technician must enable which of the following services to prevent broadcast storms?
A. DHCP
B. Port mirroring
C. Spanning tree
D. Bonding
Spanning tree
QUESTION NO: 169
One end of a CAT5 cable is punched down following the 568B standard. The other end should be
terminated using which standard to make a straight through
cable?
A. 568B
B. RJ45
C. 568A
D. RJ11
568B
QUESTION NO: 170
Which of the following IPv4 address pairs would be able to share files on a network using a hub?
A. 10.192.2.220/16 and 10.254.2.222/16
B. 10.254.2.220/16 and 10.254.2.222/24
C. 10.192.2.220/16 and 10.254.2.222/16
D. 10.254.2.220/16 and 10.254.2.222/16
10.254.2.220/16 and 10.254.2.222/16
QUESTION NO: 171
Which of the following networks has the LEAST likelihood of collisions?
A. Ring
B. Mesh
C. Star
D. Bus
Ring
QUESTION NO: 172
A technician is configuring a router for a SOHO network. The technician has changed the IP
address scheme on the router and disabled DHCP service before the wireless was configured.
After the router updates the information, the PC can no longer connect to the router. Which of the
following would be the BEST solution to reestablish the connection while maintaining the routers
current configuration state?
A. Restart the PC so it obtains a new IP address from the router.
B. Restart the router so that the PC obtains a new IP address.
C. Assign a static IP address on the PC that matches the router.
D. Use APIPA to connect the PC to the router.
Assign a static IP address on the PC that matches the router.
QUESTION NO: 173
Which of the following is the number of bits used for IPv6?
A.128
B. 32
C. 64
D. 256
128
QUESTION NO: 174
Which of the following network components would be used to create VLANs?
A. Routers
B. Gateways
C. Switches
D. Bridges
Switches

Answer: C
Explanation:
A switch filters and forwards traffic that is based on certain criteria. A bridge and a router is both
an example of a switch. A switch is able to manage multiple, simultaneous pairs of connections
between communicating systems. Switches can in many cases be used as a network concentrator
that will split flat network segments into dedicated communication links. Switches are able to split
collision domains but can also provide a greater aggregate bandwidth between groups of
communicating devices. Switches can also improve the overall performance.
Incorrect Answers:
A: A Router is a network device that can interconnect two or more network
segments.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition),
Sybex, Alameda CA, 2005, pp 32-33
B: A gateway is able to operate on all levels of the OSI model. It will interface between different
types of networks or protocols. It also executes conversions between the numbers of protocols at
the application layer.
D: A bridge will connect two networks. It will also pass traffic between them base only on the node
address. You can thus say that the main function of a bridge is to keep the traffic separated on
both sides of the bridge. Bridges operate on the Data Link Layer of the OSI model.
QUESTION NO: 175
Which of the following protocols is the MOST susceptible to a packet sniffer?
A. SFTP
B. SSH
C. HTTPS
D. SNMPv2
SNMPv2

Explanation:
SNMP is a network management protocol that collects information about network devices, such as
hubs, routers, and bridges and permits communications via network devices and a management
console. SNMP is upgraded to SNMPv2 to provide improved remote monitoring and security.
QUESTION NO: 176
Which of the following WAN technologies uses fiber as a transmission medium?
A. T1
B. ADSL
C. E1
D. SONET
SONET

Explanation:
The SONET uses fiber as a transmission medium. The SONET transport a wide range of digital
telecommunication services over optical fiber
QUESTION NO: 177
Which of the following would be a correct statement about VLANs?
A. VLANs help isolate network traffic.
B. VLAN broadcasts are limited to the switch.
C. VLANs create physical segments.
D. VLANs help prevent overlapping
VLANs help isolate network traffic.

Explanation:
VLAN's assists you in isolating network traffic. It is software technology that permits for the
grouping of network nodes that is connected to one or more network switches into a single logical
network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer
simplified user management and network resource access controls for switched network .
QUESTION NO: 178
When configuring a wireless access point, which of the following principles should be used to
select a channel to operate on?
A. Select the same channel as that configured on the neighboring access points.
B. Select the channel closest to that configured on neighboring access points.
C. Select the channel with the frequency range least used in the given area.
D. Select the channel farthest from that configured on neighboring access points
Select the channel with the frequency range least used in the given area.
Which of the following protocols enables administrators to control network devices like routers and
switches?
A. NAT
B. SNMP
C. DNS
D. NFS
SNMP

Incorrect Answers:
A: You should not consider making use of NAT because NAT translates addresses that are legal
for an inside network but illegal for a corresponding outside network into addresses that are legal
for the outside network.
C: You should not consider making use of DNS because you use DNS to translate host names
and domain names to IP addresses and vice versa, using a standardized lookup table that the
network administrator defines and configures.
D: You should not consider making use of NFS because the Network File System (NFS)
Application layer protocol was originally designed to allow shared file systems on UNIX servers to
appear as local file systems on UNIX clients.References:David Groth and Toby Skandier,
Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 117, 138, 139, 470
QUESTION NO: 180
Which of the following is used to test the operation of a NIC?
A. Loopback
B. 568B
C. Rollover
D. Crossover
Loopback

Explanation:
The Loopback is use to test the transmission and reception capabilities of the NIC.
QUESTION NO: 181
Which of the following protocols are used for tunneling and encryption purposes?(Select TWO).
A. L2TP
B. PAP
C. SLIP
D. PPPoE
E. IPSec
L2TP, IPSec

Explanation:
Your best option in this scenario would be to use identify IPSec and L2TP. IPSec is a tunneling
protocol that can be used between LANs. It is not secure. You should thus make use of IPSec with
this protocol to provide data security. L2TP is a tunneling protocol that will add functionality to
PPP. L2TP was created by Cisco and Microsoft. It is often used with virtual private networks.
QUESTION NO: 182
Which of the following TCP connect scanners is always set for normal data flow once a connection
is established?
A. TCP
B. ACK
C. SYN
D. RSH
ACK
QUESTION NO: 183
A company has a wired bus topology and a client accidentally unplugs the network cabling to their
computer. Which of the following is true about the company's network?
A. It will function properly once all affected PCs are rebooted and authenticateto the network.
B. It will function with no downtime.
C. It will function with minimal downtime.
D. It will not function properly until the wires are reconnected.
It will not function properly until the wires are reconnected.
Which of the following protocols is used to encrypt packets over the Internet? (Select TWO).
A. SIP
B. HTTPS
C. SMTP
D. SMNP
E. SSH
HTTPS, SSH

Explanation:
In the scenario you should consider making use of HTTPS because HTTPS allows browsers and
servers to sign, authenticate, and encrypt an HTTP message. You additionally can also make use
of SSH because the Secure Shell (SSH) protocol is used to establish a secure Telnet session over
a standard TCP/ IP connection. You should keep in mind that SSH is also used to run programs
on remote systems, log in to other systems, and move files from one system to another whilst
maintaining a strong, encrypted connection.
QUESTION NO: 185
A user is able to access the network shares and their email, but is unable to connect to any
website.
Which of the following command line tools should a technician use on that users workstation to
begin troubleshooting?
A. Traceroute to any website to see where the disconnection is occurring.
B. Perform theipconfig command to verify settings on that workstation are correct.
C. Use the routeadd command to add static routes to see if the routes are an issue.
D. Use the ping command to see if the workstation can access the DHCP server.
Traceroute to any website to see where the disconnection is occurring.

Explanation:
Your best option would be to make use of the traceroute command. The traceroute command lists
the IP path that it takes to reach the targeted IP and how long it takes to reach every jump. It is
particularly useful when establishing where certain bottlenecks are at a particular router.
Incorrect Answers:
QUESTION NO: 186
Users at a branch office have informed a technician that access to static web content is slow from
their location. It is determined that most users are visiting the same site repeatedly throughout the
day. Which of the following would improve WAN utilization?
A. A caching proxy server at the branch
B. A traffic shaper
C. A load balancer at the datacenter hosting the web servers
D. An application level firewall
A. A caching proxy server at the branch

Explanation:
Your best option in this scenario would be to make use of a proxy server to enhance the WAN
usage at the branch office. Internet traffic will be reduced when you cache the proxy server.
QUESTION NO: 187
A technician is asked to verify available phone numbers at a telecommunication block. Which of
the following tools is required to verify the available numbers?
A.Multimeter
B.Butt set
C.Punch down tool
D.Toner probe
Butt set

Incorrect Answers:
A: A multimeter is a device that is used to measure voltages and resistances in electronic
components.
C: A punchdown tool is used to insert the wire in the IDC.References:David Groth and Toby
Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 270-272
D: The tone generator is a small electronic device used to test network cables for breakages as
well as other problems by sending an electronic signal down one segment of UTP wires.
QUESTION NO: 188
When connecting two switches together, which of the following protocols would be used to trunk
multiple VLAN traffic across the same physical link?
A. Porttrunking
B. 802.1q
C. Port mirroring
D. 802.1x
802.1q
QUESTION NO: 189
Which of the following cables is used to connect multiple layer 2 switches?
A. Loopback
B. Crossover
C. Serial
D. Rollover
Crossover

Explanation:
Your best option in this scenario would be to make use of a crossover cable. Crossover cables
allows for the direct connection of two devices without necessarily being part of a network. A
crossover cable is able to connect two switches or hubs together.
Incorrect Answers:
A: A loopback cable is a special connection for Ethernet 10Base-T NIC's. It can be attached to the
network interface of the NIC and connects its outputs to its inputs in order to test the transmission
as well as reception capabilities of the NIC.
C: This is one of the oldest media used in networks. This type of cable is used in network wiring. It
supports baseband as well as broadband signaling.
D: A rollover cable is a transmission medium that contains pairs of color coded insulated copper
wires that are twisted around each other. You get shielded twisted pair as well as an unshielded
twisted pair. This is the cheapest type of cabling as well as being easy to work with.
QUESTION NO: 190
An active/passive server cluster in which only one server is active and handling requests, is an
example of which of the following network performance optimization?
A. Traffic shaping
B. QoS
C. High availability
D. Load balancing
High availability

Explanation:
The scenario sketched above is an example of High availability performance optimization. High
Availability refers to the capability of a server system to endure a software or hardware disaster and still being able to function. You need to incorporate some system duplication in order to
remove any single point of failure. Server clusters are equipped with high availability resolve for
systems that may require read and write admittance to data.
QUESTION NO: 191
A company needs the ability to run a network that can handle 30Mbps datatransfer speeds but
also needs to keep the cost of installing the network down. Which of the following cable types
would BEST meet the company's needs?
A. CAT6
B. CAT3
C. CAT5e
D. CAT1
CAT5e

Explanation:
The best cable type to use is the Category 5e because it has a maximum speed of 100 Mbps.
QUESTION NO: 192
Which of the following data is included in a wireless access points beacon frame?
A. SSID and MAC address
B. IP and MAC address
C. SSID and WEP key
D. Channel and WEP key
SSID and MAC address
QUESTION NO: 193
Which of the following devices has a primary purpose of proactively detecting and reacting to
security threats?
A. SSL
B. IDS
C. IPS
D. VPN
IPS

Incorrect Answers:
A: SSL is a protocol that will secure messages by operating between the Application layer HTTP
and the Transport layer. The SSL protocol makes use of an encryption scheme between two
systems. SSL makes use of the handshake method in order to establish a session.
B: You make use of IDS to protect and report network abnormalities. IDS works with audit files and
rule based processing in order to determine how to act in the event of an unusual situation on the
network.
D: A Virtual Private Network (VPN) makes use of the public Internet as a backbone for a private
interconnection between locations. This technology supports reasonably secure, logical, private
network links and insecure public network infrastructure. It reduces the Public Switched Telephone
Network (PSTN) costs. VPNs are more secure that the traditional remote access as it can be
encrypted.
QUESTION NO: 194
Which of the following is the default port for telnet?
A. 21
B. 23
C. 20
D. 22
23

Explanation:
In the scenario you should remember that the Telnet protocol made use of port 23 and was
replaced by the SSH protocol as well as rsh and the rlogin utility.

Incorrect Answers:
A: Port 21 is used by the FTP control protocol for communications.
C: Port 20 is used by the FTP protocol for data communications.
D: Port 22 is used by the SSH protocol for communications
QUESTION NO: 195
A technician is resolving an issue where a computer is unable to connect to the Internet using a
wireless access point. The computer is able to transfer files locally to other machines, but cannot
successfully reach the Internet. When the technician examines the IP address and default
gateway they are both on the 192.168.1.0/24. Which of the following has occurred?
A. The computers gateway is not routing to a public IP address.
B. The computer is using an invalid IP address.
C. The computer and the gateway are not on the same network.
D. The computer is not using a private IP address.
The computers gateway is not routing to a public IP address.
QUESTION NO: 196
In an office visitors need to be connected to the Internet without attaching to the company server.
Employees also need to connect to the company server and to the Internet. All the connections
are managed by the same switch. Which of the following should be used to meet these
requirements?
A. RIP
B. OSPF
C. Port trunking
D. VLAN
VLAN

Explanation:
Your best option in this scenario would be to make use of a VLAN. VLAN's assists you in isolating
network traffic. It is software technology that permits for the grouping of network nodes that is
connected to one or more network switches into a single logical network. By permitting logical
aggregation of devices into virtual network segments, VLAN's offer simplified user management
and network resource access controls for switched network.
QUESTION NO: 197
How much bandwidth does an OC12
provide?
A. 12Mbps
B. 622Mbps
C. 1.2Gbps
D. 45Mbps
622Mbps

Explanation:
The OC12
will provide 622.08Mbps.
QUESTION NO: 198
An office has just added an employee kitchen area. The work area and equipment has stayed the
same. Which of the following is the MOST likely reason why they are now having wireless
connectivity problems?
A. Distance
B. Interference
C. Encryption
D. Antenna placement
Interference

Explanation:
In this scenario the error occurred due to interference. Wireless performance is affected by outside
interference. A microwave can be classified as an outside interference.
QUESTION NO: 199
A scanner has determined the open ports on a network device.Assuming services are running on
their default ports, which of the following ports will provide secure communications?
A. 25
B. 21
C. 22
D. 23
22

Explanation:
In the scenario you should know that port 22 is used by SSH because the Secure Shell (SSH)
protocol is used to establish a secure Telnet session over a standard TCP/ IP connection. You
should also keep in mind that SSH is used to run programs on remote systems, log in to other
systems, and move files from one system to another, all while maintaining a strong, encrypted
connection.
QUESTION NO: 200
Implementing a set of policies and procedures that define the corporate information is confidential
and training employees on these procedures can help prevent which of the following?
A. Smurf attacks
B. Man in the middle
attacks
C. Social engineering
D. Patch management
Social engineering

Explanation:
Your best option in this scenario would be to identify social engineering. Social engineering deals
with the human aspects of gaining access and passwords. Social engineering attacks can occur
via the telephone, e-mail or a visit. The purpose of social engineering is to obtain access data like
user ID's and passwords.
QUESTION NO: 201
A network technician is asked to implement a separate network for guests that arrive onsite.
Which of the following would be the MOST cost effective solution?
A. Create a VLAN.
B. Install a firewall.
C. Install a VPN.
D. Implement trunking.
Create a VLAN
QUESTION NO: 202
A user is unable to send an email to another user at company. A network technician believes that
the issue is DNS related. After typing nslookup, which of the following commands would help
determine the IP address of company As mail server?
A. set type=mx
B. set type=ptr
C. set type=soa
D. set type=cname
set type=mx

Explanation:
The nslookup command displays information about a particular domain name, the name servers
that serve it, and how they are configured. The type-mx command sets the future query type to email
servers for that particular domain.
QUESTION NO: 203
Which of the following does a star ring topology use for data transfer?
A. CSMA/CA
B. CHAP
C. CSMA/CD
D. Token passing
Token passing

Explanation:
The token passing uses the physical star and the logical ring topology.
QUESTION NO: 204
Which of the following commands would allow a technician to see the DNS servers that a
computer is configured to use?
A. netstat
B. nbtstat
C. nslookup
D. arp
nslookup
QUESTION NO: 205
A network with multiple devices needs to have a smaller broadcast domain while working with a
small budget. Which of the following is the BEST solution?
A. Create VLANs.
B. Implement more hubs.
C. Implement more switches.
D. Assign static IPs.
Create VLANs
QUESTION NO: 206
None of the users in an office can connect to the servers using the FQDN. Which of the following
is MOST likely the cause of this issue?
A. WINS is not enabled
B. NetBIOS is not enabled
C. DNS is not enabled
D. DHCP is not enabled
DNS is not enabled

Explanation:
A Fully Qualified Domain Name (FQDN) is the type of name that you use when surfing the Web. It
consists of a top-level domain name, such as .com, for example, preceded by a second-level
domain name, such as CompTIA, preceded by a server name or subdomain string, such as www.
For FQDN-to-IP address resolution, TCP/IP uses Domain Name Service (DNS). Many operating
systems use DNS for name resolution, but Unix (whose networking is based on TCP/IP) uses
DNS almost exclusively, and today, so does Microsoft Windows .
QUESTION NO: 207
The role of intelligently forwarding frames from one broadcast domain to another would be
performed by which of the following network equipment?
A. Router
B. Hub
C. Media converter
D. Unmanaged switch
Router
QUESTION NO: 208
Which of the following protocols is used for connecting clients to a news server?
A. IMAP4
B. NCP
C. NNTP
D. SMTP
NNTP

Explanation:
The Network News Transfer Protocol (NNTP) is the TCP/IP protocol used to access Usenet news
servers. Usenet news servers contain thousands of individual message boards known as
newsgroups. Each newsgroup is about a particular subject (cars, dating, computers, etc.).
Chances are, if you have an interest, there is a newsgroup about it. The details of the NNTP
protocol are specified in RFC 977.
QUESTION NO: 209
Which of the following OSI layers handles the routing of data across segments?
A. Network
B. Transport
C. Session
D. Data Link
Network

Explanation:
The Network Layer of the OSI ensures that the data arrives at the correct destination. As such, it is
concerned with network addressing and routing. A router is responsible for routing and functions at
the Network Layer.
Which of the following wireless networks is configured without an access point?
A. Adhoc
B. Multiport repeating
C. Local
D. Extended
Adhoc

Explanation:
This type of network permits multiple devices to intercommunicate without going through an
access point.
QUESTION NO: 211
Which of the following network devices could be used to extend the range limitation of Ethernet
networks?
A. Load balancer
B. Repeater
C. IDS
D. Firewall
Repeater
QUESTION NO: 212
Using a routing table, which of the following routes will be selected MOST frequently?
A. The lowest administrative distance
B. The highest administrative distance
C. The BGP route
D. The one with the greatest number of hops
The lowest administrative distance
QUESTION NO: 213
Automatic private Internet protocol addressing (APIPA) assigns IP addresses from which of the
following ranges?
A. 10.0.x.x
B. 169.254.x.x
C. 192.168.x.x
D. 172.16.x.x
169.254.x.x
QUESTION NO: 214
How many broadcast domains are created by a 24 port switch configured with 12 VLANs with all
of the ports being actively used?
A. 2
B. 12
C. 36
D. 24
12
QUESTION NO: 215
A client wants to extend the range of their wireless network without running wires throughout the
small office. Which of the following could be implemented with the LEAST administrative effort?
A. Install a repeater at the end of the office.
B. Install an 802.11n router and change all NICS to match.
C. Install a WAP in the middle of the office.
D. Install an additional router to help with congestion.
Install a WAP in the middle of the office.
QUESTION NO: 216
Which of the following is the default port for SMTP?
A. 443
B. 21
C. 110
D. 25
25
QUESTION NO: 217
When troubleshooting a network error, a technician using a laptop as a network sniffer can see all
the communications on the network segment. Which of the following network devices is the laptop
plugged into?
A. Gateway
B. Router
C. Hub
D. Basic switch
Hub
QUESTION NO: 218
Which of the following could be installed to improve network performance when accessing Internet
websites?
A. Caching engine
B. Traffic shaping
C. Load balancing
D. Firewall
Caching engine
QUESTION NO: 219
Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?
A. PPP
B. ATM
C. MPLS
D. Framerelay
MPLS
QUESTION NO: 220
A network administrator is configuring a network with a dynamic routing protocol. Which of the
following would support equal cost load balancing and have all routers contain the same topology
view?
A. OSPF
B. IGRP
C. RIP
D. BGP
OSPF
QUESTION NO: 221
Which of the following is the maximum amount of wires that fit into a RJ11
connector?
A. 2
B. 8
C. 4
D. 6
4

Explanation:
The RJ-11 connector has four wires or 2 pairs.
QUESTION NO: 222
Which of the following components in a structured wiring system supports an Ethernet network?
A. 110 block
B. 66 block
C. 25 pair cable
D. Smart jack
110 block
QUESTION NO: 223
Which of the following is the maximum CAT3 length acceptable for a horizontal crossconnect?
A. 100 meters (328 feet)
B. 125 meters (410 feet)
C. 256 meters (840 feet)
D. 328 meters (1076 feet
100 meters (328 feet)
QUESTION NO: 224
A technician has gathered information on a network issue, and has determined the affected area.
Which of the following would be the NEXT step in resolving this issue?
A. The technician should test the best solution for the issue.
B. The technician should check to see if there have been any recent changes to this area of the
network.
C. The technician should consider any negative impacts to the network that might be caused by a
solution.
D. The technician should implement whatthe is the best solution for the issue.
The technician should check to see if there have been any recent changes to this area of the
network.
QUESTION NO: 225
A company's web server is located in a climate controlled environment, with multiple power
supplies, and a UPS to provide the maximum uptime available. Which of the following would allow
the company the BEST opportunity to increase network uptime for the web server?
A. Upgrade all switches to Gigabit speed
B. Install an additional Router
C. Upgrade the outbound NIC to a gigabit card
D. Install additional NICs
Install additional NICs
QUESTION NO: 226
Which of the following devices will segment a network and help cut down on network congestion?
A. Switch
B. Repeater
C. Gateway
D. Hub
Switch
QUESTION NO: 227
Which of the following protocols is used in a ping command?
A. IGMP
B. ICMP
C. SMTP
D. TFTP
ICMP
QUESTION NO: 228
Which of the following would allow for encrypted login credentials to be sent over the network?
A. Telnet
B. FTP
C. SSH
D. HTTP
SSH
QUESTION NO: 229
Which of the following is the maximum hop count for RIPv2?
A. 18
B. 10
C. 16
D. 17
16
QUESTION NO: 230
Which of the following is used to simplify the process of setting up a network and the
administration of the network?
A. ZEROCONF
B. SNMP
C. WINS
D. DNS
ZEROCONF
QUESTION NO: 231
When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. The
resulting cable is:
A. astraightthrough
cable.
B. nonfunctional.
C. a crossover cable.
D. capable of 10GBaseT.
a crossover cable.
QUESTION NO: 232
Which of the following is the maximum CAT5 length acceptable for a horizontal crossconnect?
A. 500 feet (152 meters)
B. 100 feet (30.5 meters)
C. 336 feet (102 meters)
D. 328 feet (100 meters)
328 feet (100 meters)
QUESTION NO: 233
Some users are unable to access the network. A technician determines that the computers that
were unable to access the network have an IP address of 169.254.0.1. Which of the following
network services should the technician check?
A. TFTP
B. DNS
C. BOOTP
D. DHCP
DHCP
QUESTION NO: 234
A technician is troubleshooting a workstation that is connected to a star network. The technician
determines that the workstation is unable to connect to the network resources. Which of the
following should be checked FIRST?
A. The link lights on the server network card
B. The link lights on the network card
C. The link lights on the switch
D. The installed network drivers
The link lights on the network card
QUESTION NO: 235
An administrator is in charge of several remote servers in Japan. Users call and report they cannot
connect to the company's resources located on those servers. Which of the following commands
would allow the administrator to verify the servers are running?
A. nbtstat
B. ping
C. telnet
D. netstat
ping
QUESTION NO: 236
Which of the following does an administrator need to be aware of when installing a wireless
network in a building with multiple floors?
A. Frequency configuration
B. SSID naming
C. Channel overlap
D. Encryption algorithm
Channel overlap
QUESTION NO: 237
A network technician is contacted about a system that is unable to connect to a file server. After
investigating the problem thoroughly the technician is able to successfully test and resolve the
issue.
Which of the following is the NEXT step the technician should take?
A. Document the solution.
B. Create an action plan.
C. Reboot the server.
D. Identify the problem
Document the solution.
QUESTION NO: 238
Which of the following is implemented on multiple switches to allow alternate paths?
A. Spanning tree
B. VLAN
C. Port authentication
D. Port mirroring
Spanning tree
QUESTION NO: 239
A small office home office (SOHO)wireless user reports their new laptop is 802.11b and 802.11g
capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of
the problem?
A. The laptop wireless card is running on a different frequency.
B. The wireless router needs a firmware update.
C. The wireless router is 802.11b only.
D. The wireless router is defective.
The wireless router is 802.11b only.
QUESTION NO: 240
An automated application capable of infecting computers without user interaction would be
described as which of the following?
A. A social engineering attack
B. A Trojan
C. A smurf attack
D. A worm
A worm
QUESTION NO: 241
Which of the following is a valid IP address in the public addressing scheme?
A. 172.20.10.1
B. 10.20.1.1
C. 168.192.10.1
D. 233.10.20.1
168.192.10.1
QUESTION NO: 242
A system administrator is troubleshooting an application that is terminating frequently. Which of
the following utilities can be used to determine the problem?
A. Port scanner
B. History log
C. DNS log
D. Application log
Application log
QUESTION NO: 243
While analyzing the contents of the IP routing table in a router, the administrator notices the
following routes in the table:
PrefixNextHop
IPInterface 192.168.1.0 /24172.16.31.1
Ethernet0 192.168.2.0 /24172.16.31.1
Ethernet0 172.16.31.0 /24
Directly Connected
Ethernet0 0.0.0.0/0172.16.31.2
Ethernet0

Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?
The packet will be forwarded to 172.16.31.2
QUESTION NO: 244
Which of the following wireless standards allows for increased bandwidth by allowing channel
bonding?
A. 802.11g
B. 802.11a
C. 802.11b
D. 802.11n
802.11n
QUESTION NO: 245
If static addressing is not configured and the DHCP server for a network is unavailable, which of
the following will a PC use to configure its IP address?
A. APIPA
B. BOOTP
C. DNS
D. TFTP
APIPA
QUESTION NO: 246
A technician is creating a crossover cable to connect two devices. Which of the following pins
would be different between connector A and connector B?
A. Pin4, Pin5, Pin7, Pin8
B. Pin6, Pin7, Pin8, Pin1
C. Pin4, Pin5, Pin1, Pin2
D. Pin1, Pin2, Pin3, Pin6
Pin1, Pin2, Pin3, Pin6
QUESTION NO: 247
A network technician is troubleshooting a network issue that has just been reported. Which of the
following troubleshooting steps should the technician take FIRST to help resolve this issue?
A. Record what steps should be taken to resolve the issue.
B. Ask the user who reported the issue what past documentation they have.
C. Ask the user who reported the issue to explain the symptoms in detail.
D. Record the solution in the appropriate logs for future use.
Ask the user who reported the issue to explain the symptoms in detail.
QUESTION NO: 248
A user has been transferred from the accounting team to the human resources team. The user
can only print to the accounting teams printer and cannot print to the human resources teams
printer. Which of the following is the cause of the problem?
A. Wrong gateway
B. Wrong DNS
C. Wrong host file
D. Wrong VLAN
Wrong VLAN
QUESTION NO: 249
Which of the following protocols allows secure access to a VPN?
A. PPP
B. SLIP
C. PPPoE
D. PPTP
PPTP
QUESTION NO: 250
Which of the following devices uses the IEEE 1394 standard?
A. FireWire
B. USB 2.0
C. iSCSI
D. Parallel
FireWire
QUESTION NO: 251
Which of the following is the maximum segment distance of a 100BaseFX
network?
A. 100 meters (328 feet)
B. 2,000 meters (6,561 feet)
C. 1,024 meters (3,359 feet)
D. 1,023 meters (3,356 feet)
2,000 meters (6,561 feet)
QUESTION NO: 252
Which of the following devices is used to extend the signal strength on a network segment?
A. Repeater
B. NIC
C. Transceiver
D. Modem
Repeater
QUESTION NO: 253
Which of the following remote access solutions allows the LEAST connection overhead?
A. L2TP VPN
B. IPSec VPN
C. SSL VPN
D. PPTP VPN
SSL VPN
QUESTION NO: 254
A technician is at a small facility that has five computers connected to a central switch and
accessing a single server for file and print sharing. One computer becomes unable to connect to
the network, while the other four are still connecting properly. Which of the following could be
causing the computer to not connect to the network?
A. The server has failed.
B. The computers OS needs to be updated.
C. The switch has failed.
D. The NIC has failed.
The NIC has failed.
QUESTION NO: 255
After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no
longer able to send packets with a size of 1501 bytes. Which of the following is the cause?
A. The WAN link does not support frames over 1500 bytes in size.
B. The branch router cannot process frames larger than 1500 bytes.
C. The router at the other end of the WAN link is configured with an MTU of 1500.
D. The frames take too long to send causing collisions with other devices attempting to send
traffic.
The router at the other end of the WAN link is configured with an MTU of 1500.
QUESTION NO: 256
Users on the network can no longer access a custom application that uses TCP 8090 hosted on
the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the
following commands would verify the server is still accepting connections on TCP 8090?
A. netstat
B. ipconfig
C. telnet
D. nslookup
netstat
QUESTION NO: 257
Which of the following is commonly used to test fiber connectivity?
A. OTDR
B. Toner probe
C. Butt set
D. Multimeter
OTDR
QUESTION NO: 258
Which of the following protocols transmits using UDP ports?
A. RIPv2
B. HTTP
C. HTTPS
D. TFTP
TFTP
QUESTION NO: 259
Which of the following routing protocols uses AS-Path as one of the methods to build the routing
table?
A. OSPF
B. ISIS
C. BGP
D. EIGRP
BGP
QUESTION NO: 260
A network technician wants a server to have fault tolerance. Which of the following would be the
MOST cost effective solution?
A. Install two NICs for teaming.
B. Install two switches.
C. Install a single fiber NIC.
D. Install a single router.
Install two NICs for teaming.
QUESTION NO: 261
An employee is having issues accessing shared resources on a file server. Which of the following
troubleshooting steps should the technician take FIRST?
A. Document the problem
B. Search the internet for the problem
C. Test the results
D. Identify the symptoms
Identify the symptoms
QUESTION NO: 262
A user states that they have decreased signal strength on their wireless connection. They have
been using the wireless network previously without problems and the network configuration has
not been changed. Which of the following is MOST likely the cause of the degraded signal?
A. Incorrect encryption
B. Standards mismatch
C. Incorrect SSID
D. Environmental factors
Environmental factors
QUESTION NO: 263
A user reports their wireless 802.11g Internet connection is intermittently disrupted. Which of the
following is the cause of the problem?
A. Infrared printer
B. Cordless phone
C. Cell phone
D. Incandescent light
Cordless phone
QUESTION NO: 264
Which of the following will list the destination MAC addresses?
A. arp
B. ping
C. dig
D. nbtstat
arp
QUESTION NO: 265
Which of the following cable types has the shortest maximum cable run length?
A. Singlemode
fiber
B. Coaxial
C. Plenum
D. CAT3
CAT3
QUESTION NO: 266
Which of the following is the MOST common pinout
configuration used when crimping RJ45
connectors?
A. UTP
B. IEEE 802.5
C. T568A/B
D. STP
T568A/B
QUESTION NO: 267
A network administrator is summarizing the following IP address ranges into a single route for
redistribution into the network core:
192.168.0.0 /24
192.168.1.0 /24
192.168.2.0 /24
192.168.3.0 /24

Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed?
A. 192.168.0.0 /21
B. 192.168.0.0 /23
C. 192.168.0.0 /16
D. 192.168.0.0 /22
192.168.0.0 /22
QUESTION NO: 268
A network technician has been asked to retrieve device statistics, information, and errors. Which
of the following tools would the technician likely use?
A. TFTP
B. Packet sniffer
C. SNMP
D. SMTP
SNMP
QUESTION NO: 269
Which of the following is found in a layer two switch?
A. SSID settings
B. Routing protocols
C. DNS zones
D. VLAN settings
VLAN settings
QUESTION NO: 270
Which of the following cable types transmits data over 100Mbps per direction?
A. 100BaseTX
B. 10BaseT
C. 100BaseT
D. 10GBaseT
10GBaseT
QUESTION NO: 271
A technician is dispatched to a remote office to install a new NIC in a client computer. After
successfully installing and configuring the operating system to recognize the device, the computer
still cannot access the network. Which of the following would MOST likely be the problem?
A. The CAT5 cable is defective
B. The NIC is disabled in BIOS
C. The NIC is disabled in Device Manager
D. The RJ11
jack is defective
The CAT5 cable is defective
QUESTION NO: 272
Which of the following is the MOST likely cause of a wireless connection dropoff
in a wireless G
network?
A. Cellular interference
B. AM Radio
C. Cordless phones
D. FM Radio
Cordless phones
QUESTION NO: 273
Which of the following tools will identify if a CAT5e cable is operating at optimal performance?
A. Toner probe
B. Multimeter
C. Certifier
D. Butt set
Certifier
QUESTION NO: 274
Which of the following is the default port for POP3?
A. 21
B. 80
C. 110
D. 25
110
QUESTION NO: 275
A user contacts a technician and states that they are unable to access the network. The technician
discovers that the IP address of the workstation is 169.123.142.34. Which of the following has
occurred?
A. The workstation has obtained a public address.
B. The workstation has obtained a multicast address.
C. The workstation has obtained a private address.
D. The workstation has obtained an APIPA address.
The workstation has obtained an APIPA address.
QUESTION NO: 276
A technician needs to trace a wire that is in the wall. Which of the following is the BEST way for
the technician to identify the wires location?
A. Media Tester
B. Continuity Tester
C. Tone Generator
D. Multimeter
Tone Generator
QUESTION NO: 277
Users are reporting that they can access Internet web pages but cannot access the internal
company website. Which of the following is the MOST likely source of the problem?
A. The intranet server is down.
B. The intranet DNS entry isnonauthoritative.
C. The DNS address handed out by DHCP is incorrect.
D. The default gateway is incorrect.
The intranet server is down.
QUESTION NO: 278
When connecting two devices for voice on a vertical connect, which of the following cables would
be used to connect the two devices?
A. Crossconnect
wire
B. 25 pair cable
C. CAT3
D. CAT5
25 pair cable
QUESTION NO: 279
Which of the following protocols allows email to be viewed while remaining on the email server?
A. SMTP
B. SSL
C. POP3
D. IMAP4
IMAP4
QUESTION NO: 280
A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in
classlessinterdomain routing notation (CIDR) as which of the following?
A. 220.100.100.100 /24
B. 220.100.100.100 /16
C. 220.100.100.100 /8
D. 220.100.100.100 /32
220.100.100.100 /24
QUESTION NO: 281
A company is getting a new sales system that must remain secure and isolated. The network
administrator needs to segregate network traffic for security reasons. Currently there is one
addressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0.Which of the following
methods would BEST help in segregating the traffic?
A. Implementing a dedicated broadcast network
B. Implementing a dedicated multicast network
C. Changing the IP scheme to class C addresses
D. Creating a new subnet for this system
Creating a new subnet for this system
QUESTION NO: 282
A network administrator has been receiving work orders about poor voice quality crossing a
branch T1.The cause is determined to be users running high bandwidth file sharing applications
across the T1 sending large packets delaying the smaller voice streams. Which of the following
would improve voice quality?
A. Install a content caching proxy at the branch to reduce inbound WAN traffic.
B. Configure traffic shaping to reduce the bandwidth available to the file sharing application.
C. Configure a separate VLAN for the IP phones.
D. Upgrade switches to provide higher bandwidth ports for workstations and IP phones.
Configure traffic shaping to reduce the bandwidth available to the file sharing application.
QUESTION NO: 283
Which of the following uses pointer records and A records?
A. NAT server
B. IPS
C. DNS server
D. IDS
DNS server
QUESTION NO: 284
DNS services are in a failed state on a network. Some users require FQDN to access specific
services. A temporary solution would be to:
A. create a local host file on the PC.
B. release and renew DHCP.
C. change the IP address of the specific services needed.
D. change all domain relationships to WINS.
create a local host file on the PC
QUESTION NO: 285
A user has a small network of four computers that they want to connect to a single cable modem.
Which of the following devices would allow the user to do this?
A. Four port wireless router
B. Four port switch
C. Four port hub
D. Four port WAP
Four port wireless router
QUESTION NO: 286
Which of the following devices allows segregation of collision domains but not broadcasting
domains?
A. NIC
B. Switch
C. Hub
D. Router
Switch
QUESTION NO: 287
A user reports that when the phone rings in their house the wireless on their laptops becomes
disconnected. Which of the following BEST describes the issue?
A. The cordless phones are2.4Ghz which interferes with wireless
B. The cordless phones are plugged into the RJ11
jack
C. The cordless phones are5.8Ghz which interferes with wireless
D. The cordless phones are plugged into same outlet as the router
The cordless phones are2.4Ghz which interferes with wireless
QUESTION NO: 288
Which of the following documentation would a network administrator need to update if they have
just finished upgrading the firmware on all the switches within the LAN?
A. Wiring schematics
B. Logical network diagram
C. Physical network diagram
D. Baseline and configuration documentation
Baseline and configuration documentation
After deploying three large additional servers in a rack there are reports of network instability and
other issues across all servers in the rack. It has been verified that there is sufficient power
resources and network bandwidth. Which of the following should the technician check NEXT?
A. Cable tester
B. Certifier
C. Temperature monitor
D. Multimeter
Temperature monitor
QUESTION NO: 290
A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The
network administrator for the branch has three separate VLANs for voice, workstations, and
servers. There are approximately 50 end user workstations, 50 IP phones that require addressing,
and a dozen servers. How should the network administrator use the block allocated to the branch?
A. Subnet the block into /26s and assign one to each VLAN.b
B. Do not subnet the block?use the /24 for all VLANs.
C. The administrator must request more networks and use the networks given so far for the
servers and workstation VLANs.
D. Subnet the block into /25s and assign one to each voice and workstation VLANs.
Subnet the block into /26s and assign one to each VLAN.b
QUESTION NO: 291
Which of the following is the standard data transmission rate for an OC3
line?
A. 51.84Mbps
B. 44.74Mbps
C. 622.08Mbps
D. 155.52Mbps
155.52Mbps
QUESTION NO: 292
A router receives a packet with a destination address 72.44.69.254?however, no entry in the
routing table exists for the network. Which of the following actions will the router take?
A. The packet will be queued while the router queries for an acceptable path to the destination.
B. The packet will be dropped as nonroutable.
C. The packet will be forwarded out until another router forwards the packet.
D. The packet will be forwarded to the next hop address of the default route.
The packet will be forwarded to the next hop address of the default route.
QUESTION NO: 293
A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of the
following is the NEXT step after verifying that one of the NICs has no LEDs flashing?
A. Reinstall
application.
B. Check for hardware conflicts or disabled devices.
C. Reinstall
drivers.
D. Check system properties for correct caching settings.
Check for hardware conflicts or disabled devices.
QUESTION NO: 294
Which of the following WAN technologies uses thirty 64Kbps channels?
A. ATM
B. T1
C. E1
D. MPLS
E1
QUESTION NO: 295
Which of the following is considered a connection oriented
protocol?
A. UDP
B. SPX
C. TCP
D. IP
TCP
QUESTION NO: 296
A technician wants to remotely log into an office computer using remote desktop. The technician
needs to do this in a secure manner. Which of the following would accomplish this?
A. VPN
B. Telnet
C. VLAN
D. Tagged packets
VPN
QUESTION NO: 297
A user is trying to establish an FTP connection to a computer at home. The home computer is
turned on and has Internet connectivity? however, they are unable to connect from the PC at work.
The IP address that the user is trying to connect to is 192.168.1.125.Which of the following is the
MOST likely problem?
A. The firewall at the office is blocking the outgoing connection.
B. FTP client is not installed in the work computer.
C. FTP server is not installed on the home computer.
D. The IP address of the home computer is not routable across the Internet
The IP address of the home computer is not routable across the Internet.
QUESTION NO: 298
A company requires a hub and spoke WAN solution. Which of the following are BEST suited to
meet this need? (Select THREE).
A. ISDN
B. MPLS
C. ADSL
D. SONET
E. Framerelay
F. ATM
G. DOCSIS
MPLS, Frame relay, ATM
QUESTION NO: 299
Which of the following tools enables the technician to trace cables in multiple pair wiring?
A. Cable tester
B. Multimeter
C. Butt set
D. Toner probe
Toner probe
QUESTION NO: 300
Which of the following is a routable public class A address?
A. 10.0.0.255
B. 19.16.18.255
C. 10.0.0.10
D. 19.16.18.1
19.16.18.1