• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back
1. You are wanting to make a short straight-through cable to connect a router to a switch in your MDF. Your company uses the 568B wire pattern. Which color pairs will be crimped down on the outer pins of the RJ-45 connector (Select Two)

A. White/orange, orange
B. White/brown, brown
C. White / green, green
D. White / blue, blue
E. White / green, blue
F. White / orange, blue

Chapter 4
1.

B. White/brown, brown
C. White / green, green

Chapter 4
2. Jim is about to install a wireless network. A fellow network administrator warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers?

A. WAP placement
B. MAC address filtering
C. authentication method
D. Encryption type

Chapter 16
2.

A. WAP placement


Chapter 16
3. Your company has purchased 800 new PCs for a roll out you about to make. Of the fellowing choice , which should you update according?

A. Asset management
B. Change management
C. Baseline
D. Wire schemes

Chapter 18
3.

A. Asset management


Chapter 18
4. A user is concerned that a password is being sent in clear text when he connect to the RADIUS server using PAP. which of the following is true about security using RADIUS?

A. It uses a public key to encrypt messages between the client and server.
B. It uses a private key to encrypt messages between the client and server
C. It uses a shared secret to encrypt messages between the client and server
D. It uses a CSU/DSU to encrypt the data between the client and server.

Chapter 11
4.

C. It uses a shared secret to encrypt messages between the client and server


Chapter 11
5. You have just installed an auto- sensing NIC on your computer. When a NIC has auto sensing capabilities, what does that mean? ( select two)

A. It will determine the link duplex
B. It will receive a new Mac address
C. It will choose its cable type for transmission
D. It will determine its link speed to bandwidth
E. It will determine its link latency with the switch

Chapter 5
5.


A. It will determine the link duplex
D. It will determine its link speed to bandwidth


Chapter 5
6. When a system needs to send a packet to another system, what TCP/IP protocol does it use to find the destination systems Macs address when did Only Knows IP address?

A. Telnet
B. Netstat
C. Tracert
D. Ping
E. ARP

Chapter 7
6.

A. DHCP broadcasts
B. NetBIOS broadcast



Chapter 7
7. Which of the following types of requests are always stop by the router? (Select Two)

A. DHCP broadcasts
B. NetBIOS broadcast
C. WINS requests
D. DHCP lease renewals
Chapter 8
A. DHCP broadcasts
B. NetBIOS broadcast
8. Emma is setting up a wireless network for her company. She wants to use in authenauthentication message with a user must connect to a separate authentication server to gain access to the network. Which method would work best

A. WEP2
B. RADIUS
C. Kerberou
D. AES
Chapter 15
8.

B. RADIUS

Chapter 15
9. John is talking to his cable installer about running new UTP CAT 5e cable to two new office space being set up in his building. These are the last available space in his building in no more 10. office lots will ever be made here. The cable installers says that the cable runs for those location will b 92 meters, the wall outlets will just make it into the office what is the most cost efficient suggestion the installer can make?

A. Go ahead, just keep the combined length of patch panel under 8 meters
B. Run backbone cable into a closer location and setup a new equipment room
C. Keep the horizantal cabling at 90 meters,
just make longer patch cables to the PC
D. Use CAT3 cabling for the run instead of CAT5

Chapter 6
9.



Chapter 6
10. office lots will ever be made here. The cable installers says that the cable runs for those location will b 92 meters, the wall outlets will just make it into the office what is the most cost efficient suggestion the installer can make?

A. Go ahead, just keep the combined length of patch panel under 8 meters
B. Run backbone cable into a closer location and setup a new equipment room
C. Keep the horizantal cabling at 90 meters,
just make longer patch cables to the PC
D. Use CAT3 cabling for the run instead of CAT5

Chapter 6
10.

A. Go ahead, just keep the combined length of patch panel under 8 meters

Chapter 6
11. Which of the following networking topology requires less Hardware in cable and then the others?

A. Bus
B. Ring
C. Star
D. Mesh

Chapter 3
11.

A. Bus

Chapter 3
12. Just arrived at work and found that the user are having issues connecting to the web server. Last night, another network technician made an upgrade to the web server, which document might help you in resolving the problem?

A. Change management
B. Cable management
C. Network Maps
D. Wire schemes

Chapter 18
12.

A. Change management

Chapter 18
13. Hey small bookstore in a handcrafted jewelry company share the same building. To save cause on the infrastructure, they want to use a single advance switch , but still retain two separate network. What features would a accomplish that gold?

A. bandwidth shaping
B. Load balancing
C. Trunking
D. VLAN

Chapter 12
13.

D. VLAN

Chapter 12
14. Which networking technology is best defined as fast Ethernet?

A. 10BaseFL
B. 100BaseT
C. 1000BaseSX
D. 1000BaseT

Chapter 5
14

B. 100BaseT

Chapter 5
15. which routing metric will tell you the number of connections between your PC and www.google.com?

A. Hop count
B. latency
C. Bandwidth
D. Cost

Chapter 8
15.

A. Hop count

Chapter 8
16. You have a network with 25 user. All the uses of complaining about the network moving too slowly, even when only one person is accesing the server. which of the following tools could you use to troubleshoot the bottleneck?

A. Network analyzer
B. Loopback device
C. Packet sniffer
D. protocol analyzer
E. TDR

Chapter 20
16

A. Network analyzer
C. Packet sniffer
D. protocol analyzer

Chapter 20
17. A _____________________ enable the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently. because the information can be downloaded once for use by multiple hosts?

A. STMP server
B. Proxy server
C. NAT server
D. DNS server

Chapter 12
17.

B. Proxy server

Chapter 12
18. Look at the following graphic. It shows that the command netstat-n has been run. What is the port number for the Foreign IP Address 207.46. 144.86?

A. Port 80
B. Port 110
C. Port 1707
D. Port 1741

Chapter 9
18.

A. Port 80

Chapter 9
19. Sam is troubleshooting a network issue abd has established hos plan of action to fix it. which of the following will be Next step to resolve the problem?

A. implement the plan of action and contact management if necessary
B. Ensure that the network is functioning correctly.
C. Document the outcomes of the plan
D. Determine if anything has changed on the network

Chapter 20
19.


A. implement the plan of action and contact management if necessary

Chapter 20
20. You are wanting to use FTP to transfer files in the internet at your office, but your network administrator says that it not a good idea and that they have blocked FTP access using the firewall. What could the network admin's reason be for blocking FTP?

A. FTP is unable to transfer encrypted files
B. FTP can't be tunneled using VPN connection
C. FTP is a legacy protocol and can't be used on modem networks
D. FTP transmits all passwords in plan text
Chapter 11
20.

D. FTP transmits all passwords in plan text

Chapter 11
21. What are available options for transporting data through a VPN?

A. SSL
B. PPTP
C. IPSec
D. RDP
E. RAS
F. VLAN

Chapter 12
21.

A. SSL
B. PPTP
C. IPSec



Chapter 12
22. How should you configure multiple 802.11g wireless access points to create a single network that enables user to roam freely?

A. Configure all the WAPs to use the same SSID
B. Configure all the WAPs to use the same frequency.
C. Configure all the WAPs to use the same channel
D. Configure each WAP to use an unique security setting

Chapter 15
22.


A. Configure all the WAPs to use the same SSID



Chapter 15
23. Firewall can be used for which of the following?

A. Protocol analysis, packets filtering, and content filtering
B. Packet sniffing, protocol analysis, and content filtering
C. Content filtering, packet filtering, and port filtering
D. Port scanning, packet sniffing, and packet filtering

Chapter 16
23.

C. Content filtering, packet filtering, and port filtering


Chapter 16
24. A user calls from accounting department complaining that he only sees the server used by distribution, not the accounting server. A check of his IP address shows that he indeed got the IP address from the DHCP server what could be the problem?

A. Wrong gateway
B. Port duplex mismatch
C. Incorrect VLAN
D. Wrong subnet mask
24.

C. Incorrect VLAN
25. I can't see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following command might I try to test my connection with your machine?

A. Ping Woobie
B. Netstat Woobie
C. NBstat Woobie
D. STMP Woobie
25.


A. Ping Woobie
26. You are using HTTPS to make some online purchases. At which ISI layer does the encryption and decryption take place?

A. Layer 4
B. Layer 5
C. Layer 6
D. Layer 7

Chapter 6
26,

C. Layer 6

Chapter 6
27. Which type of cable do you need to connect a client a 100Base TX network?

A. STP
B. RG-58
C. Category 3 UTP
D. Category 5 UTP

Chapter 5
27.


D. Category 5 UTP

Chapter 5
28. Your Windows 7 system suddenly can't reach the internet. You know that your DHCP server has been intermittently malfunctioning. What command can you type to see if it give you an IP address, default gateway, and other necessary IP configuration before it crashed?

A. Ifconfig
B. Ipconfig
C. Nslookup
D. Route print

Chapter 20
28.


B. Ipconfig

Chapter 20
29. Using Gigabit Ethernet for the backbone of your LAN. Which of the following access method goes Gigabit Ethernet use?

A. CSMA/CD
B. Bonding
C. Broadcast
D. CSMA/CA

Chapter 5
29.

A. CSMA/CD

Chapter 5
30. What is the loopback address for your IPv6?

A. 127.0.0.1
B. 0:0:0:0:0:0:0:0
C. 1
D. 0:0:0:0:0:0:0:1

Chapter 13
30.


A. 02:45:A2:96:DF: 45
B. FFFF.FFFF.FFFF


Chapter 13
31. Of the following choices. Which a legitimate MAC address? (Select Two)

A. 02:45:A2:96:DF: 45
B. FFFF.FFFF.FFFF
C. 00-2C-37-4A-C3-29-17
D. 00-49-3B-5B-D5-84-11
E. 0211 3H5B 64D5
Chapter 2
31.

A. 02:45:A2:96:DF: 45
B. FFFF.FFFF.FFFF

Chapter 2
32. Of the following network access security missed it, Which involves checking the physical address?

A. IP filtering
B. MAC filtering
C. RTP
D. RADUS

Chapter 16
32.

B. MAC filtering


Chapter 16
33. Marsha wants to play certain restriction on communication between client computer is in the main file server. Which of the following will enable her to accomplish her goal

A. ACL
B. DHCP
C. DNS
D. NAT

Chapter 11
33.

A. ACL


Chapter 11
34. A protocol that uses three-way handshake operates at which layer of the OSI model?

A. Data link
B. Network
C. Transport
D. Session

Chapter 9
34.

C. Transport


Chapter 9
35. You noticed at your service in the MDF uh we starting at random times during the work day. What would help you diagnose the issue?

A. Multimeter
B. Environmental monitor
C. TDR
D. Cable centifier

Chapter
35



Chapter
36. A NIC creates________________ in the data link layer.

A. Segment
B. Packets
C. Frames
D. Layers

Chapter 2
36.

C. Frames

Chapter 2
37. You about to install 802.11n APs in relatively close proximity of one another. Which channels would you configure them to work the best?

A. 6&11
B. 3&6
C. 1&5
D. 6&10

Chapter 15
37.


A. 6&11


Chapter 15
38. Which network topology uses a central hub?

A. Star
B. Bus
C. Ring
D. Mesh

Chapter 3
38.

A. Star

Chapter 3
39. Employees have been bringing a WAPs in connecting them to your network to enable wireless access with their laptops. Which authentication message should be used to prevent this from happening?

A. 802.3ad
B. TKIP
C. WPA2
D. 802.1x

Chapter 11
39.

D. 802.1x

Chapter 11
40. Which type of internet connection would not be recommended if you want to talk to your friends using VOIP?

A. ISDN
B. DSL
C. T1
D. Satelite

Chapter 14
40.


D. Satelite

Chapter 14
41. Which of the following describes a proxy server function?

A. It protects the internet from internal network traffic
B. It converts external IP address to private IP address for client on the internal
network so that applications running on does client do not have to be configured for proxy server
C. It act as an intermediary that includes all incoming and outgoing data packets
D. It had to turn on network IP address from computers on the Internet

Chapter 12
41.

D. It had to turn on network IP address from computers on the Internet

Chapter 12
42. Which cable type has a maximum length of 300 meters

A. 10GBaseSW
B. 100BaseFX
C. 100BaseT
D. 10BaseT
Chapter 5
42.

A. 10GBaseSW

Chapter 5
43. Of the following OS I layer which one converts the ones in zeros to electrical signal in place the signal on the cable?

A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
E. Session layer
F. Presentation layer

Chapter 2
43.


A. Physical layer


Chapter 2
44. You are about to install a switch in the communication closet when a fellow technician notice you using a crossover cable to hook the switch to the existing switch in the closet. He says you don't need the crossover cable why is that?

A. The Switch has an MDIX port
B. The switch is has STP enabled
C. The switch uses CSMA/CD
D. The switch needs a plenum-grade cable

Chapter 4
44.


A. The Switch has an MDIX port


Chapter 4
45. Hey fellow network technician is all doing the vantage of using EIGRP on his network. You want to show off your skills as competent technician by listing the disadvantage. What might you says?

A. It doesn't skills very well with larger network
B. It is the slowest to courage all of the routing protocols
C. It is a proprietary protocol
D. It is a link state protocol

Chapter 8
45.

C. It is a proprietary protocol

Chapter 8
46. You have just installed a new device that performs stay full package filtering on your company's network. Which of the following describes this device?

A. Proxy server
B. Firewall
C. DNS server
D. IDS

Chapter 16
46.

B. Firewall

Chapter 16
47. What layer of the OSL a model make sure that the data is in a readable format for the application layer?

A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
E. Network layer
F. Data link layer
Chapter 2
B. Presentation layer



Chapter 2
48. Which of the following methods of authentication will also provide AAA and uses TCP?

A. TACACS+
B. RADIUS
C. IPSec
D. NTP

Chapter 11
48.

B. RADIUS

Chapter 11
49. You are a network administrator attempting to troubleshoot a WINS server. Which tool would you most likely used to diagnose just?

A. Nbstat
B. Netstat
C. Nslookup
D. Dig

Chapter 10
49.


A. Nbstat

Chapter 10
50. Call is complaining that his internet connection is moving at a snails pace. Which command line utility could you use to find out why?

A. Tracert
B. Ping
C. Netstat
D. Nbstat

Chapter 20
50.

A. Tracert

Chapter 20
51. You are setting up a static IP on a workstation on your network. Which of the following are valid numbers you can use for the subnet mask?

A. 0
B. 1
C. 254
D. 255
E. 256
F. 253

Chapter 7
51.

A. 0
C. 254
D. 255


Chapter 7
52. John, the network administrator for the ACME building, needs to set up network for two different groups. what features would he need to use on his switch to enable both groups to use the same switch yet remain separate?

A. Enable trucking
B. Enable VLANs
C. Enable port mirroring
D. It can't be done. He needs two switches

Chapter 12
52.

B. Enable VLANs

Chapter 12
53. Which network topology connects nodes with a central ring of cable?

A. Star
B. Bus
C. Ring
D. Mesh

Chapter 3
53.

C. Ring


Chapter 3
54. You are tasked with setting up a WiFi network for a client. They already ready have to access point setup in broadcasting on channel 1 and 6. Which of the following would be the best to use in order to keep down interference?

A. 11
B. 3.
C. 9
D. 10

Chapter 15
54.

A. 11

Chapter 15
55. Which of the following type of protocol might lead to a user's credential's being disclosed to possible attacker if a protocol analyzer is used?

A. TFTP
B. Telnet
C. FTP
D. SCP
E. SNMPv3

Chapter 20
55.

B. Telnet
C. FTP


Chapter 20
56. A BRI ISDN circuit transmit data at what rate?

A. 28.8 Kbps
B. 33.6 Kbps
C. 56 Kbps
D. 126 Kbps

Chapter 14
56.

D. 126 Kbps

Chapter 14
57. You are attempting to troubleshoot in issue between 2 computers that are both connected to a layer 2 unmanaged switch. Of the following, which is the best way to find out if the switch is the problem?

A. Access the switch configuration screen and setup a log files
B. Check to make sure that 802.1 D is enable on the switch
C. Attach a loopback plug to the switch in monitor the traffic
D. Connect both of the PCs together with a crossover cable

Chapter 4
57.

D. Connect both of the PCs together with a crossover cable

Chapter 4
58. How many pairs of wire are used in a 1000BasedT CAT 5 e cable

A. 1
B. 2
C. 4
D. Not enough information

Chapter 5
58.

C. 4

Chapter 5
59. Kim's network has to network server. Each server is running the DHCP service. They each have a DHCP scope passing out 192.168 .4 .100 to 192.168.4.199 IP addresses. They are, on average, about 75-80 DHCP clients. How can Kim re configure the network so that these 2 DHCP service will not passed out conflicting IP addresses while still providing tolerance for DHCP?

A. Remove one of the DHCP servers
B. Change half of the client to use static IP addresses
C. Split the rain is so 1 DHCP server passes out 192.168 .4 .100 to 192.168 .4 .150 in the other passes out 192.168 .4 .151 to 192.168 .4 .199
D. Make one of the DHCP server is a DHCP relay

Chapter 7
59.

C. Split the rain is so 1 DHCP server passes out 192.168 .4 .100 to 192.168 .4 .150 in the other passes out 192.168 .4 .151 to 192.168 .4 .199

Chapter 7
60. Which networking technology used in LANs is described as fast internet and uses two pair of cabling for transmitting in receiving?

A. 100BaseT4
B. 100BaseTX
C. 100BaseFX
D. 1000BaseT

Chapter 5
60.

B. 100BaseTX

Chapter 5
61. You are concerned about malicious attack on your network. Which of the following would you get in order to screen in prevent these attacks?

A. IDS
B. VLAN
C. NIPS
D. HIDS

Chapter 12
61.

C. NIPS

Chapter 12
62. Which layer of the OS I model includes HTTP?

A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
E. Network layer
F. Data link layer

Chapter 2
62.

A. Application layer

Chapter 2
63. Your company wants to test out the security of your network by allowing a text to hit a fake network that you created. Which technology would you need to use?

A. Honeynet
B. Honeypot
C. NDS
D. NMAP

Chapter 16
63.

A. Honeynet

Chapter 16
64. This server access as a go- between on Rocky's network, enabling the client on his network to connect through it to access web pages instead of connecting to website directly

A. SMTP server
B. WINS server
C. Proxy server
D. DNS server

Chapter 12
64.

C. Proxy server

Chapter 12
65. Which file transfer protocol uses UDP?

A. HTTP
B. FTP
C. SNMP
D. TFTP

Chapter 9
65.

D. TFTP

Chapter 9
66. Fred has just purchase a new home router for his SOHO internet connection. He cannot get on the internet. He opens the web browser interface for the router and determine that his WAN address is 0.0 .0. 0. Which of the following is the best way to resolve this?

A. Run IPconfig/renew on his PC
B. Do a DHCP via the is the router's. Web browser interface
C. Restart his PC
D. Verify the router us configure for static WAN IP address

Chapter 19
66.

B. Do a DHCP via the is the router's. Web browser interface

Chapter 19
67. Fox and Hound is a brand name for what device?

A. Multimeter
B. Crimper
C. Toner
D. Hub

Chapter 6
67.


C. Toner

Chapter 6
68. Which networking topology connects computer is using a central hub?

A. Bus
B. Ring
C. Star
D. Mesh

Chapter 3
68.

C. Star

Chapter 3
69. What technology enabled VLANs span multiple switches?

A. Spanning tree protocol
B. Trucking
C. 802.1x
D. Bonding

Chapter 12
69.

B. Trucking

Chapter 12
70. Sally has a wireless network and has noticed significant slow downs at random times during the day. She believes her neighbors may be connecting to her wireless network. Of the following choices, which could be used to limit access to her network?

A. WPA2 encryption
B. Switching the channels
C. MAC filtering
D. Changing from 802.11g to 802.11n
E. Disabling the SSID

Chapter 15
70.

C. MAC filtering

Chapter 15
71. What might help to increase the signal strength of a wifi router in a large , open room? Testing reveals that signal strength is weaker in some spots and strong and others.

A. Change the SSID
B. Change the encryption method
C. Change the antenna placement
D. Enable traffic shaping

Chapter 15
71.

C. Change the antenna placement

Chapter 15
72. Bullwinkle is trying to cut down on the town of Webb traffic going between his network and Internet, while still allowing all uses to obtain the information they need. What might he use to accomplish this?

A. Gateway
B. Bridge
C. Router
D. Proxy server

Chapter 12
72.

D. Proxy server

Chapter 12
73. Because of security, you want to install a Microsoft Exchange server, Apache web server, in Microsoft Active Directory on three different servers. Which of the following technology would help you do this while reducing your hardware costs?

A. Virtual servers
B. WPA encryption
C. A VPN connection
D. 802.1x

Chapter 17
73.

A. Virtual servers

Chapter 17
74. Which of the following has the greatest bandwidth?

A. T3
B. ADSL
C. SDSL
D. OC-3

Chapter 14
74.

D. OC-3

Chapter 14
75. Which 2 of the following upcoming types of fiber connectors? (Select two)

A. ST
B. BNC
C. LC
D. DB-9
E. F- connector

Chapter 3
75.

A. ST
C. LC

Chapter 3
76. This graphic display the result of an Ipconfig /all. What is the DHCP server's address?

A. 192.168.4.15
B. 00-80-AD-7B-48-39
C. 192.168.4.152
D. 192.168.4.150
E. 255.255.255.0

Chapter 20
76.

D. 192.168.4.150


Chapter 20
77. Everyday at the office, we play counter strike source over the Internet (only during lunch hour of course). Today, however, there is a lot of lag in the action---our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring?

A. Tracert
B. Traceroute
C. Ping
D. Arp

Chapter 20
77.


A. Tracert


Chapter 20
78. You up planning to implant a network with 400 hosts. Which subnet mask would accommodate for that many devices?

A. /23
B. /24
C. /25
D. /26

Chapter 7
78

A. /23

Chapter 7
79. Which of the following is not an aspect of straight through cable? (Select two)

A. 568B on one and 568A on the other
B. 568A on one end and 568B on the ends
C. 568B kn both ends
D. 568A on both ends

Chapter 4
79.

A. 568B on one and 568A on the other
B. 568A on one end and 568B on the ends


Chapter 4
80. Your company has just experience an attack that cause the website www.yourwebsite.com to go down. What term best describes this?

A. Man in the middle
B. War driving
C. DoS attack
D. Bluesnarfing

Chapter 16
80.


A. Man in the middle

Chapter 16
81. You have just been given an IP address for your small company. You must use this IP address to get your company's web server access to the public internet, but at the same time, you want the server hidden behind your private network. Which of the following would be used to used to implement this?

A. SNAT
B. DNAT
C. BGP
D. RIP

Chapter 8
81.


A. SNAT

Chapter 8
82. Which of the following networking technology have the shortest maximum length?

A. 10BaseFL
B. 10BaseT
C. 10Base2
D. 10Base5

Chapter 4
82.

B. 10BaseT

Chapter 4
83. You are waiting to make a short crossover cable to connect two switches in your IDF. You have just finished cramping down one end of the cable using the 568 B wire pattern Which color pairs will be cramped down on the outer pins of the RJ 45 connector on the other end of the cable?

A. White/orange, orange
B. White/brown, brown
C. White/green, green
D. White/blue, blue
E. White/green, blue
F. White/ orange, blue

Chapter 4
83.

B. White/brown, brown
C. White/green, green

Chapter 4
84. Tracy is a network administrator for a company. She has a set up VOIP in data traffic on a different subnet. Which of the following strategies could she used to provide both services to the hose on the same you TP cable?

A. Change the RJ-45 connectors from 568A to 568B
B. Enable STP on the switches
C. Use PPP
D. Implement separate VLANs

Chapter 12
84.

D. Implement separate VLANs

Chapter 12
85. Your company requires the use of a smart card, biometric device in a password to log into your system. What kind of authentication are they using?

A. Change the RJ-45 connectors from 568A to 568B
B. Enable STP on the switches
C. Use PPP
D. Implement separate VLANs

Chapter 12
85,

Chapter 12
86. A 10BaseT must be within how many meters of its hub?

A. 100 meters
B. 185 meters
C. 200 meters
D. 2000 meters

Chapter 4
86.


A. 100 meters

Chapter 4
87. You have a segment of computers with a network ID of 172.2 .0 .2/16. How to enable the segment to access the public Internet which of the following must the road to perform?

A. NAT
B. RIP
C. DHCP
D. APIPA

Chapter 8
87.

A. NAT

Chapter 8
88. Henry is setting up an email account for his user. Which TCP/IP protocol does he use to download message from the mail server?

A. SMTP
B. SNMP
C. HTTP
D. POP3

Chapter 9
88.

D. POP3

Chapter 9
89. Which of the following is the most reliable transport layer protocol in the TCP/IP protocol suite?

A. ARP
B. UDP
C. TCP
D. FTP

Chapter 9
89.

C. TCP

Chapter 9
90. You are getting some pressure from upper management about saving energy. The company is wanting to reduce power consumption on a wide scale. Which technology would help in accomplish this?
A. Managed switches
B. Load balancing
C. Virtual servers
D. Power over Ethernet

Chapter 17
90.

C. Virtual servers

Chapter 17
91. What is the default VLAN that is right out the box?
A. 0
B. 1
C. 100
D. 1O24

Chapter 12
91.

B. 1

Chapter 12
92. Of the following WAN technologies. which would MOST likely be used in a SOHO?
A. Cable modem
B. OC3
C. E1
D. MPLS

Chapter 19
92.

A. Cable modem

Chapter 19
93. A network IPS will give your network which of the following capabilities?
A. Packet-based detection and prevention of network attack
B. Enable IPSec for all workstations on your local network
C. Uninterruptible power for the network devices on the LAN
D. Bandwidth shaping for all packets entering the private, internal network

Chapter 12
93.

A. Packet-based detection and prevention of network attack

Chapter 12
94. You need to connect to your company's VPN. What protocol will you most likely use?
A. PPTP
B. RAS
C. AAAA
D. RIP

Chapter 13
94.

A. PPTP

Chapter 13
95. You are toubleshooting and repairing a network by implementing a new IPS. After installing the new device and configuring it for the network, what should you do next?
A. Verity network functionality
B. Identify the problem
C. Document your installation and the results
D. Contact your network admistator for further instructions

Chapter 20
95.

A. Verity network functionality

Chapter 20
96. Which of the following utilites can you use to confirm connectivity to another TCP/IP hosts?
A. ARP
B. Ping
C. Nbstat
D. Netstat

Chapter 20
96.

B. Ping

Chapter 20
97. You have recently made changes to your network by separating the printr into the own network in order to increase security. An employee begins the day at work by moving they work station and printer to a new desk. They hookup equipment and connect both device to the network using a nearby wall jack. Both device attain an IP address from the DHCP server. The use calls you complaining because they no longer can access the internet from the PC. You have them check to see if they can print it, and it works just fine. What has happened?
A. The laptop connects to a switch that is having a duplex mismatch
B. The laptop has a 100BaseTX NIC, while switch is 1000BaseT
C. The Printer isn't configured correctly
D. The laptop is in the wrong VLAN.

Chapter 12
97.

D. The laptop is in the wrong VLAN.

Chapter 12
98. You are looking into setting up a VPN connection at your office and you want the VPN to operate at the highest layer of OSI model. Which protocol would allowe this?
A. PPTP
B. IPSec
C. L2TP
D. SSL

Chapter 12
98.

D. SSL

Chapter 12
99. Which of the following network protocol does not function at the transport layer os the OSI seven layer model?
A. ICMP
B. TCP
C. UDP
D. IP

Chapter 2
99.

D. IP

Chapter 2
100. You are working with a certified cable installer to troubleshoot the DSL line coming to your office. He thinks that DSL signal is coming the wrong POTS line. Which tool would be use to troubleshoot the issue?
A. Multimeter
B. Toner Probe
C. Butt set
D. TDR
100.


C. Butt set