• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/67

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

67 Cards in this Set

  • Front
  • Back
Which of the following is used by a company's ISP to troubleshoot network issues?
A. Demarc
B. 66 Block
C. Smart Jack
D. 110 Block
C. Smart Jack- Type of NUI that enables ISP's or telephone companies to test for faults in a network, such as disconnections and loopbacks
IGP differs from EGP because IGP is designed for use in which of the following?
A. Communication between WAN's
B. Communication between networks
C. SIngle autonomous network
D. Single non-autonomous network
C. Single autonomous network
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?
A. 255.255.240.0
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.255.240
A. 255.255.240.0
Malicious traffic has been deteced terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444?
A. ipconfig /all
B. ifconfig -a
C. netstat -nav
D. netstat -nap
C. netstat -nav
Which of the following network cable types is LEAST susceptible to EMI?
A. Plenum STP CAT5
B. UTP CAT5
C. UTP CAT3
D. Coaxial
D. Coaxial
A user has reported slow network reposnse in a large training room; the class requires many students to access the same website each day. Which of the following would BEST remedy this problem?
A. Caching Engine
B. Jitter Correction
C. Firewall
D. Fault Tolerance
A. Caching Engine
Which of the following pairsshould be crossed to create a crossover cable?
A. 1,2 and 3,4
B. 1,2 and 3,6
C. 5,6 and 7,8
D. 4,5 and 6,7
B 1,2 and 3,6
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX. Which of the following should the administrator do NEXT?
A. Reboot the switch to enable the new connection
B. Update the logical network diagram
C. Update the switch configuration logs
D. Update the wiring schematics
D. Update the wiring schematics
A tech moves a VoIP phone to a new location, but discovers the phone does not start up when plugged into the network. Which of the following explains this situation?
A. The switch does not support PoE
B. The jack needs to be rewired using the 568B standard
C. QoS is not enabled on the switch
D. The phone needs a fiber port
A. The switch does not support PoE
A port scanner is used by network admins for which of the following?
A. To find routers with weak passwords
B. To determine open ports on network hosts
C. To secure switches and routers
D. to make a physical network diagram
B. To determine open ports on network hosts.
Which of the following can be used to help verify that a remote web server is not blacked by a firewall?
A. Packet injector
B. Toner Probe
C. Protocol analyzer
D. Port scanner
D. Port Scanner
SONET is normally associated with which of the following?
A. Point to point
B. point to multipoint
C. Ring
D. Bus
C. Ring
An administrator wants to provde redunant paths to network resources in case a link fails. WHich of the following switch features would the admin need to use to accomplish this task?
A. PoE
B. VLAN
C. Trunking
D. Spanning Tree
D. Spanning Tree
TCP occurs at which layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
D. Layer 4
Which of the following would an admin MOLST likely require in order to connect a client to a WPA encrypted network?
A. Pre-shared key
B. Gateway address
C. PIN
D. DSA public key
E. SSID
A Pre-shared key
Which of the following technologies is MOST cost-effective when protecting a large number of networked workstations from external attacks?
A. Host-based IDS
B. External scanning service
C. Network- based firewall
D. Networl-based IPS
C. Network-based firewall
Which of the following transport protocols should be used to avoid retransmitting lost packets?
A. UDP
B. TCP
C. ARP
D. IGMP
A. UDP
A firewall is set to block inbound connections on port 25. Which of the following protocols would enable the admin to retreive email without reconfiguring the firewall?
A. SNMP
B. SMTP
C. POP3
D. FTP
C. POP3
When installing an access point, which of the following encryption schemes should be implemented to BEST secure the network?
A. WPA
B. WEP
C. WPA with PSK
D. WPA2 with PSK
D. WPA2 with PSK
Which of the following networking protocols is used to give the remote computer secure command line access to the server?
A. SSH
B. Telnet
C. ICMP
D. RTP
A. SSH
Which of the following defines the required distance between each LAN drop that will be installed within a building?
A. Acceptance use policy
B. Wiring Schematics
C. Logical network diagrams
D. Company regulations
B. Wiring Schematics
Plenum cable should be used to:
A. Protect against ESD
B. Increase Reliability
C. Decrease Cost
D. Comply with fire codes
D. Comply with Fire Codes
Which of the following describes what happens when a tech pings the broadcast address?
A. All clients on the subnet respond
B. The broadcast server responds
C. An ICMP loop floods the network
D. All clients in the multicast group respond
A. All clients on the subnet respond
Which of the following describes a routing table that needs to be maintained manually?
A. Hop count based
B. Link-State
C. Static
D. Dynamic
C. Static
Which of the following protocols resolves MAC addresses to IP addresses?
A. RTP
B. DHCP
C. DNS
D. ARP
D. ARP
Which of the following is strictly used to convert analog to digital signals?
A. NIC
B. Modem
C. Repeater
D. Hub
C. Repeater
In a new wireless network installation, the admin has successfully installed and tested the equipment. The NEXT step after turning wireless access on would be to:
A. Document the physical layout
B. Configure the DHCP server
C. Configure wireless adapters
D. Perform a war drive to test for vulnerabilities
A. Document the physical layout
The MAIN difference between an IDS and an IPS is the:
A. IPS block malicious activity while the IDS only alerts about malicious activity
B. IDS blocks malicious activity while IPS only alerts about malicious acitivty
C. IDS uses a deterministic engine while IPS ises a probabilistic angine
D. IDS is an inline system while the IPS is placed on a span port and has no IP address
A. IPS blocks malicious activity while IDS only alerts about malicious activity
An admin would like to determine which wire pair on a 100 block connects to a jack in the next room. Which of the following utilities would MOST likely be used to determine this?
A. Port Scanner
B. Toner Probe
C. Multimeter
D. Protocol analyzer
C. Multimeter
Which of the following commands would test the loop back adapter of an internal NIC?
A. ping 127.127.0.0
B. ping 127.127.1.0
C. ping 127.0.0.1
D. ping 127.1.1.1
C. ping 127.0.0.1
Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses CAT5e cable?
A. 1000BaseX
B. 100BaseFX
C. 1000BaseTX
D. 100BaseT
D. 100BaseT
A tech mst enable which of the following services to prevent broadcast storms?
A. DHCP
B. Port mirroring
C. Spanning tree
D. Bonding
C. Spanning tree
One end of a CAT5 cable is punched down following the 568B standard. The other end should be terminated using which standard to make a straight through cable?
A. 568B
B. RJ45
C. 568A
D. RJ11
A. 568B
Which of the following IPv4 address pairs would be able to share files on a noetwork using a hub?
A. 10.192.2.220/16 and 10.254.2.222/16
B. 10.254.2.220/16 and 10.254.2.222/24
C. 10.192.2.220/16 and 10.254.2.222/16
D. 10.254.2.220/16 and 10.254.2.222/16
D. 10.254.2.220/16 and 10.254.2.222/16
Which of the following networks has the LEAST likelihood of collisions?
A. Ring
B. Mesh
C. Star
D. Bus
A. Ring
A tech is configuring a router for a SOHO network. The tech has changed the IP address scheme on the router and disabled DHCP service nbefore the wireless is configured. After the router updates the information, the PC can nolonger connect to the router. Which of the following would be the BEST solution to reestablish the connection while maintaining the routers current confgiuration state?
A. Restart the PC so it obtains a new IP address form the router
B. Restart the router so that the PC obtains a new IP address
C. Assign a static IP address on the PC that matches the router
D. Use APIPA to connect the PC to the router
C. Assign a static IP address to the PC that matches the router
Which of the following is the number of bits used for IPv6?
A. 128
B. 32
C. 64
D. 256
A. 128
Which of the following network components would be used to creat VLANs?
A. Routers
B. Gateways
C. Switches
D. Bridges
C. Switches
Which of the following protocols is the MOST suseptible to a packet sniffer?
A. SFTP
B. SSH
C. HTTPS
D. SNMPv2
D. SNMPv2
Which of the following WAN technologies uses fiber as a transmission medium?
A. T1
B. ADSL
C. E1
D. SONET
D. SONET
Which of the following would be a correct statement about VLANs?
A. VLANs help isloate nework traffic
B. VLAN broadcasts are limited to the switch
C. VLANs create physical segments
D. VLANs help prevent overlapping
A. VLANs help isloate network traffic
When configuring a wireless access point, which of the following principles should be used to select a channel to operate on?
A. Select the same channel as that configured on the neighboring access points
B. Select the channel closest to that configured on neighboring access points
C. Select the channel with the frequency range laest used in the given area
D. Select the channel furthest from that configured on neighboring access points.
C. Select the channel with the frequency range least used in the given area
Which of the following protocols enables admins to control network devices like routers and switches?
A. NATG
B. SNMP
C. DNS
D. NFS
B. SNMP
A tech needs to connect a laptop via a SOHO wireless acccess point. When the tech does a site survey using the laptop the wireless network is not discovered. Computeres previously on the wireless network were connected, and the wireless carrd appears to be working. Which of the following could be causing the issue?
A. The SSId is set to not broadcast
B. The wireless router does not have adequate AC power
C. The WEP key is not correct
D. The laptop is running on Windows Service Pack 1
A. The SSID is set to not broadcast
A cmpany ha sinstalled a new 802.11G point to point connection between two biuldings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omnidirectional antenna. Which of the following would BEST improve the link performance?
A. Replace the omnidirectional antenna with Yagi antenna
B. Configure channel hopping on both wireless bridges
C. Replace the wireless bridges with wireless access points
D. Install bidirectional amplifiers at both sites
A. Replace the omnidirectional antennas with Yagi antennas
A tech installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the tech configure to resolve this problem?
A. Port forwarding
B. SSID
C. MAC filtering
D. Antenna placement
A. Port Forwarding
A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
A. The wireless NIC is defective
B. Wireless router is improperly configured
C. The user is connecting to the wrong SSID
D. The SSID broadcast is disabled
C. The user is connecting to the wrong SSID
A client is using a device that allows them to synchonize their wireless device to their computer, but the device must be within 3 feet in order for the synchonization to complete. Which of the following BEST describes the type of wireless device being used?
A. WiFi
B. Bluetooth
C. Serial
D. Infrared
D. Infrared
After a tech came out and installed a new wireless router, one of the weird workstations began having problems connecting to the file server. This is only and intermittent problem. Which of the following actions will the tech MOST likely perform to resolve this problem?
A. Move the router's location
B. Check the cable ends
C. Check user permissions
D. Change the routers SSID
B. Check the cable ends
A network tech is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11G is being used for the wireless transmission. Which of the following channels shol dbe used for the access points?
A. Channels 1 3 5
B. Channels 6 6 6
C. Channels 7 1 1
D. Channels 5 5 5
B. Channels 6 6 6
Which of the following is the strongest type of wireless encryption?
A. AES
B. RADIUS
C. WEP
D. TKIP
A. AES
Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHZ frequencies/
A. 802.11B
B. 802.11A
C. 802.11N
D. 802.11G
C. 802.11N
A wireless network is created for six computers. Five connect correctly, one machine sees the wireless network but will not connect. Which of the following should the tech do?
A. Ensure the failed computer has a correct WEP key
B. Restart the wireless router
C. Remove the WEP key from the router
D. Change the WEP key on the router
A. Ensure the failed computer has the correct WEP key
Which of the following authentication methods allows for domain level authentication on a wireless network?
A. WAP
B. TKIP
C. RADIUS
D. WEP
C. RADIUS
A new laptop has been purchased with a 802.11N wireless card. The laptop will not connect to their existing 802.11A network. Which of the following is MOST likely the reason the laptop will not connect?
A. The laptop is too far from the existing network
B. Interfernce
C. Wrong SSID is being used
D. Standard mismatch
D. Standard mismatch
A tech is setting up a wireless network using WEP and DHCP. The tech has set the channel and SSID on the client workstation. Which of the follwoing is the remaining step to complete the configuration?
A. Enter the username and password
B. Change the SSID
C. Enter the IP address for the client
D. Enter the encryption key
D. Enter the encryption key
Convert the following binary strin to its dotted decimal address:
11000000.10101000.001100011.00011010
A. 192.168.99.26
B. 192.168.101.26
C. 192.168.99.34
D. 192.168.101.34
A. 192.168.99.26
There are two networks sharing the same office space. One network already has an 802.11G access point. The second network acquires on as well. If known, which of the following would help keep the two networks from interfering with each other?
A. Encryption type
B. Preshared key
C. Channel
D. WEP key
C. Channel
Which of the following is the MOST secure wireless encryption?
A. EESID
B. WPA
C. WPA2
D. WEP
C WPA2
A network tech is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with the encrypted usernames and passwords?
A. WPA TLS
B. 64bit WEP
C. 128bit WEP
D. WPA PEAP
D. WPA PEAP
A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between hops?
A. tracert
B. nbstat
C. nslookup
D. ping
A. tracert
In a Class A subnet, a Host ID may occupy a maximum of:
A. 32bits
B. 31bits
C. 24bits
D. 16bits
C. 24bits
Which of the following netwoprk hardware allows the MOST network traffic collisons?
A. Hub
B. WAP
C. Router
D. Switch
A. Hub
Which of the following advanced features prevents switching loops by using a preferred path?
A. Spanning Tree
B. VLAN
C. Port bonding
D. Port authentication
A. Spanning tree
A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?
A. Bluetooth
B. WiFi
C. IEEE 1394
D. 802.11A
A. Bluetooth
On a wireless network, a user is able to connect to local resources, but not to the internet. Which of the following is MOST l ikely the cause?
A. The wireless network card is not working
B. The wireless router does not have DHCP enabled
C. The wireless network card is out of range
D. The gateway is not configured on the router
D. The gateway is not configured on the router
Which of the following network devices routes packets over a wireless network?
A. NIC
B. WAP
C. WEP
D. CSU/DSU
B. WAP