• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/81

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

81 Cards in this Set

  • Front
  • Back
Which of the following protocols is used for connecting clients to a news server?
A. IMAP4
B. NCP
C. NNTP
D. SMTP
C. NNTP
Which of the following protocols allows usernames and passwords to be transmitted as
clear-text?
A. PAP
B. RADIUS
C. CHAP
D. SSH
A. PAP
Password Authentication Protocol (PAP)
Which of the following protocols are used for email traffic? (Select THREE).
A. SNMP
B. NTP
C. POP3
D. TFTP
E. IMAP4
F. SSH
G. SMTP
C. POP3
E. IMAP4
G. SMTP
Which of the following protocols is used by several different operating systems to
authenticate resources such as computers, users and printers?
A. LDAP
B. SMTP
C. TCP
D. UDP
A. LDAP
Lightweight Directory Access Protocol
Which of the following authentication protocols uses plain text to transmit passwords
over the internet?
A. RADIUS
B. PAP
C. CHAP
D. Kerberos
B. PAP
Password Authentication Protocol (PAP)
Which of the following is considered a connection-oriented protocol?
A. UDP
B. SPX
C. TCP
D. IP
C. TCP
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know which network protocol has the ability to
recover from lost/corrupted network packets during transmission.
What would your reply be?
A. You should inform the trainee that the Internet Protocol Security (IPSec) protocol has
the ability.
B. You should inform the trainee that the Internetwork Packet Exchange (IPX) protocol
has the ability.
C. You should inform the trainee that the Kerberos protocol has the ability.
D. You should inform the trainee that the Transmission Control Protocol (TCP) protocol
has the ability.
D. You should inform the trainee that the Transmission Control Protocol (TCP) protocol
has the ability.
A user is trying to establish an FTP connection to a computer at home. The home
computer is turned on and has Internet connectivity? however, they are unable to connect
from the PC at work. The IP address that the user is trying to connect to is
192.168.1.125.Which of the following is the MOST likely problem?
A. The firewall at the office is blocking the outgoing connection.
B. FTP client is not installed in the work computer.
C. FTP server is not installed on the home computer.
D. The IP address of the home computer is not routable across the Internet.
D. The IP address of the home computer is not routable across the Internet.
Which of the following would occur at the application layer of the OSI model?
A. UDP
B. FTP
C. TCP
D. SPX
B. FTP
Which of the following protocols is used to access files on a remote server?
A. ARP
B. SIP
C. FTP
D. NTP
C. FTP
Which of the following statements is TRUE regarding the network protocol which
makes use of the File Transfer Protocol (FTP) protocol?
A. The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of
the protocol.
B. You should know that the IPSec protocol would make use of the File Transfer Protocol
(TTP) protocol.
C. You should know that the Kerberos protocol also make use of the FTP protocol.
D. You should know that the Network Basic Extended User Interface (NetBEUI)
A. The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol.
Which of the following protocols operates at the transport layer of the OSI model and has
BEST effort delivery method?
A. UDP
B. HTTP
C. TCP
D. FTP
A. UDP

User Datagram Protocol
Which of the following protocols describes a connectionless state and does not use
acknowledgements?
A. POP3
B. UDP
C. NTP
D. TCP
B. UDP

User Datagram Protocol
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know which transfer methods transfer files with the
use of User Datagram Protocol (UDP).
What would your reply be?
A. You should know that the IPSec protocol would use the UDP protocol.
B. You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP
protocol.
C. You should know that the Kerberos protocol would make use of the UDP protocol.
D. You should know that the File Transfer Protocol (FTP) protocol would use the UDP
protocol.
B. You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP
protocol.
Which of the following is part of the TCP/IP protocol suite?
A. UDP
B. IPX
C. NetBEUI
D. SPX
A. UDP

User Datagram Protocol
A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver,
error code 2.Which of the following would resolve this?
A. Flush the DNS Cache.
B. Install NetBEUI.
C. Release the IP Address.
D. Install the TCP/IP protocol.
D. Install the TCP/IP protocol.

Transmission Control Protocol / Internet Protocol
Which of the following statements describes the TCP/IP configuration of a Windows
XP Professional computer that has a TCP/IP address of 169.254.1.37?
A. The computer has been configured with a static address of 169.254.1.37.
B. The computer is set for DHCP, but no DHCP server is available on the network.
C. The computer received the address from a DHCP server on the network.
D. The computer received the address from a BootP server on the network.
Answer: B
IP address 169.254.1.37 is a self-assigned Automatic Private IP Addressing (APIPA)
address. It is automatically assigned to a Windows-based DHCP client that fails to obtain
a valid lease from a DHCP server.
A technician is installing a basic router for a SOHO network. After installing the router
the PCs connected to it are not able to acquire an IP address. Which of the following did
the technician fail to configure correctly?
A. NAT
B. DHCP
C. WINS
D. DNS
B. DHCP
Which of the following can be used to automatically assign IP (Internet Protocol)
configuration to host computers?
A. DNS (Domain Name Service)
B. SNMP (Simple Network Management Protocol)
C. SMTP (Simple Mail Transfer Protocol)
D. DHCP (Dynamic Host Configuration Protocol)
Answer: D
DHCP is used to automate the assignment of IP configurations to host computers which
are then called DHCP clients.
Which of the following statements is TRUE regarding a small remote office network
unable to access the home office network which requires the clients to obtain IP
addresses by selecting the protocol which should be enabled?
A. You should have the Simple Mail Transfer Protocol (SMTP) protocol enabled.
B. You should have the Trivial File Transfer Protocol (TFTP) protocol enabled.
C. You should have the Dynamic Host Configuration Protocol (DHCP) enabled.
D. You should have the Secure Socket Layer (SSL) extensions enabled.
C. You should have the Dynamic Host Configuration Protocol (DHCP) enabled.
Which of the following protocols transmits using UDP ports?
A. RIPv2
B. HTTP
C. HTTPS
D. TFTP
D. TFTP

Trivial File Transfer Protocol
You work as a network technician at TestKing.com. The TestKing.com user wants
to know which protocol/protocols has the fastest file transfers.
What would your reply be?
A. The Simple Mail Transfer Protocol (SMTP) protocol has the fastest file transfers.
B. The Password Authentication Protocol (PAP) protocol has the fastest file transfers.
C. The Secure File Transfer Protocol (SFTP) protocol has the fastest file transfers.
D. The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.
D. The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.
You have a network that is connected to the Internet for only maintenance
purposes. You place a firewall between your network and the Internet. You
configure the firewall to permit only UDP traffic. Which network file transfer
protocol will be able to pass through the firewall?
A. NNTP
B. IRTF
C. SNMP
D. TFTP
D. TFTP

The Trivial File Transfer Protocol transfers files and use UDP
None of the users in an office can connect to the servers using the FQDN. Which of the
following is MOST likely the cause of this issue?
A. WINS is not enabled
B. NetBIOS is not enabled
C. DNS is not enabled
D. DHCP is not enabled
C. DNS is not enabled
Which of the following network protocols is needed to ensure that users can type in a
FQDN instead of the IP address?
A. DNS
B. WINS
C. IMAP4
D. FTP
A. DNS
A technician is not able to ping a server by the FQDN but can by the IP. Which of the
following should the technician check?
A. Ensure that WINS is configured
B. Ensure that the DNS is configured
C. Ensure the MAC address is correct
D. Ensure that the IP address is correct
B. Ensure that the DNS is configured
A technician can successfully remote into the company's server? however, the technician
cannot connect to any of the other servers directories from the server itself, but can ping
them via an IP address.
Which of the following could be the problem?
A. The server is on a different physical network.
B. DNS is not correctly configured.
C. The server is on a different VLAN.
D. DHCP is not correctly configured.
B. DNS is not correctly configured.
After re-configuring a server to facilitate DNS requests, which of the following would
help provide the highest level of fault tolerance?
A. Adding a Kerberos server
B. Configuring traffic shaping
C. Configuring WEP
D. Adding a second NIC
D. Adding a second NIC
Which of the following network services is responsible for mapping names to IP
addresses?
A. IMAP4
B. DHCP
C. DNS
D. Telnet
C. DNS
Which of the following statements is TRUE regarding the protocol which makes use
of Domain Name Resolution (DNS) to find addresses?
A. The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to
find addresses.
B. The Trivial File Transfer Protocol (TFTP) protocol makes use of DNS to find
addresses.
C. The Kerberos protocol makes use of DNS to find addresses.
D. The Internetwork Packet Exchange / Sequence Packet Exchange (IPX/SPX) protocol
makes use of DNS to find addresses.
A. The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to
find addresses.
You cannot reach a web site on a host computer but you can ping the host name and
Telnet to the host name. What is the source of the problem?
A. The host does not have a DNS entry.
B. The host HTTP is down.
C. The host does not have a WINS entry.
D. The host is down.
B. The host HTTP is down.
Which of the following statements is TRUE regarding network users who are
unable to access a web site on a host computer but are capable of pinging the
hostname and Telnet to the host name?
A. You should check if the computer has a DHCP leased IP address.
B. You should check if the host Hyper Text Transfer Protocol (HTTP) protocol is down.
C. You should check if the local DNS server is properly configured.
D. You should ensure that the host computer is down.
B. You should check if the host Hyper Text Transfer Protocol (HTTP) protocol is down.
Which of the following will list the destination MAC addresses?
A. arp
B. ping
C. dig
D. nbtstat
A. arp
Which of the following is a utility that translates the IP address to its physical network
address?
A. netstat
B. arp
C. rarp
D. nslookup
B. arp
A user calls saying they are having issues connecting to the Internet, but they are able to
connect to the email server. Which of the following commands would the user type in at
the command prompt to display the MAC address?
A. ipconfig
B. arp-s
C. arp-a
D. nbtstat -R
C. arp-a
Which of the following is a utility that translates the physical network address to its IP
address?
A. nslookup
B. ping
C. rarp
D. netstat
C. rarp
Which of the following command and switch combination would provide the following
output?
Interface: 172.30.0.102 ---
0x2 Internet Address Physical Address
Type 172.30.0.5
00-30-48-82-72-8c dynamic
A. arp-s
B. netstat -a
C. arp-a
D. netstat -s
C. arp-a
Which of the following protocols maps an IP address to a MAC address?
A. RARP
B. DHCP
C. NTP
D. ARP
D. ARP
Which of the following utilities shows the relationship between a MAC address and the
corresponding IP address?
A. arp
B. nslookup
C. ipconfig
D. tracert
A. arp
Which of the following command line utilities is used to display the IP to Physical
address table?
A. netstat
B. arp
C. nbtstat
D. ping
B. arp
An administrator needs to find out a specific NICs MAC address, the IP address of the
NIC is known. Which of the following network utilities would enable the administrator to
discover the MAC address without physically going to the computer?
A. ping
B. netstat
C. nbtstat
D. arp
D. arp
The below output is from which of the following utilities?
Interface: 172.30.0.104 --- 0x2 Internet Address
Physical AddressType 172.30.0.500-30-48-82-72-8c
dynamic 172.30.0.25400-30-48-82-65-0e
dynamic
A. ping
B. arp
C. nbtstat
D. netstat
B. arp
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know which command line utility displays the arp
table.
What would your reply be?
A. The command used is arp
B. The command used is arp f_addr
C. The command used is arp -d
D. The command used is arp -s
A. The command used is arp
You work as a network administrator at TestKing.com. You notice suspicious IP
traffic on the local subnet. After successfully pinging the source, which utility can
you use to find the associated MAC address?
A. ipconfig
B. nbtstat
C. arp
D. tracert
Answer: C
arp translates IP addresses to MAC addresses. It displays a list of IP addresses and their
corresponding MAC addresses.
Which of the following commands can be used to check for duplicate IP address on
a network?
A. ping
B. traceroute
C. find
D. arp
Answer: D
arp translates IP addresses to MAC addresses. It is primarily used for resolving duplicate
IP addresses.
Which of the following statements is TRUE regarding the command which should
be used when booting a computer and receiving an error message stating a duplicate
IP address is in use on the network?
A. You should consider making use of the mode command line utility.
B. You should consider making use of the traceroute command line utility.
C. You should consider making use of the attrib command line utility.
D. You should consider making use of the arp command line utility.
D. You should consider making use of the arp command line utility.
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know when discovering suspicious IP activity and
pinging the source which utility should be used to find the associated Media Access
Control (MAC) address.
What would your reply be?
A. You should consider making use of the nslookup command line utility.
B. You should consider making use of the attrib command line utility
C. You should consider making use of the arp command line utility.
D. You should consider making use of the mode command line utility.
C. You should consider making use of the arp command line utility.
Which of the following statements is TRUE regarding the command line utility used
for producing the output: TestKing.com (192.168.12.22) at 08:00:20:0b:4a:71
us.TestKing.com (192.168.12.32) at 08:00:20:0e:aa:40 uk.TestKing.com
(192.168.12.42) at 00:00:93:e0:80:b1?
A. The command line utility mode was used.
B. The command line utility attrib was used.
C. The command line utility nslookup was used.
D. The command line utility arp was used.
D. The command line utility arp was used.
Identify the utility being used given the output:
Interface: 206.212.36.18 on Interface 1
Internet Address Physical Address Type
206.212.36.9 00-00-21-64-91-12 Dynamic
206.212.36.12 00-00-21-1b-4a-a7 Dynamic
A. netstat
B. arp
C. nbtstat
D. tracert/traceroute
Answer: B
arp translates IP addresses to MAC addresses. It is primarily used for resolving duplicate
IP addresses and displays a list of IP addresses and their corresponding MAC addresses as
shown in the output above.
Given the following output, which utility was used?
Interface 10.10.10.1 on Interface 0x1000004
Internet Address Physical Address Type
10.10.10.5 00-e0-29-62-0d-de dynamic
10.10.10.11 00-00-08-fd-97-fa static
A. arp
B. traceroute
C. ping
D. ipconfig
Answer: A
arp translates IP addresses to MAC addresses. It is primarily used for resolving duplicate
IP addresses and displays a list of IP addresses and their corresponding MAC addresses as
shown in the output above
Internet Address Physical Address Type
10.36.14.92 00-60-08-75-43-d7 static
197.45.367.42 20-53-32-45-00-00 dynamic
123.34.34.34 20-53-54-67-00-00 dynamic
A. NETSTAT
B. NBTSTAT
C. ARP
D. Ipconfig
Answer: ARP
Explanation: The exhibit displays entries that contains both IP address and MAC
address (Physical Address). These entries are contained in the ARP cache and could
be displayed with the "arp -a" command.
Which of the following would allow for encrypted login credentials to be sent over the
network?
A. Telnet
B. FTP
C. SSH
D. HTTP
C. SSH
Which of the following protocols provides a secure method to remotely administer a
server?
A. HTTP
B. SFTP
C. SSH
D. Telnet
C. SSH
Which of the following TCP/IP protocols can be used by your e-mail client to
download mail from the server?
A. FTP
B. POP3
C. SMTP
D. SNMP
Answer: B
Explanation: POP3 is the most recent version of a standard protocol for receiving
e-mail. POP3 is a client/server protocol in which e-mail is received and held for
users by their e-mail server.
Note: POP stands for Post Office Protocol.
Which of the following network protocols is used to ensure consistent time across
network devices on the domain?
A. FTP
B. IGMP
C. NTP
D. RTP
C. NTP
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know which authentication protocol requires you to
use the Network Time Protocols (NTP) server to synchronize the workstations date
and time with the server.
What would your reply be?
A. You should inform the trainee that the Kerberos protocol would require the use of the
Network Time Protocol (NTP).
B. You should inform the trainee that the Remote Authentication Dial-In User Service
(RADIUS) would require the use of the Network Time Protocol (NTP).
C. You should inform the trainee that the Internet Protocol Security (IPSec) would require
the use of the Network Time Protocol (NTP).
D. You should inform the trainee that the Protected Extensible Authentication Protocol
(PEAP) would require the use of the Network Time Protocol (NTP).
A. You should inform the trainee that the Kerberos protocol would require the use of the
Network Time Protocol (NTP).
Which of the following authentication protocols requires the use of an NTP server to
synchronize the workstations date and time with the server?
A. Kerberos
B. RADIUS
C. PAP
D. MS-CHAP
Answer: A
NTP is required for Kerberos.

Note: You could argue for B as well.
Which of the protocols mentioned below is used across the Internet for time
synchronization purposes?
A. NTP
B. NCP
C. NTFS
D. NNTP
A. NTP

Explanation: Network Time Protocol (NTP) is an Internet standard protocol which
enables client computers to maintain system time synchronization
Which of the following protocols allows email to be viewed while remaining on the email
server?
A. SMTP
B. SSL
C. POP3
D. IMAP4
D. IMAP4
Which of the following can you use to connect with a Unix server using terminal
emulation software?
A. FTP
B. Telnet
C. Netscape
D. Internet Explorer
B. Telnet
Explanation: Telnet is used for remote login using terminal emulation.
AT TestKing.com Inc. you have an email server that makes use of SMTP. What can you
use to check that it is accepting requests on port 25?
A. Ping the email server
B. Telnet
C. NETSTAT
D. NBTSTAT
B. Telnet

Explanation: We can use telnet to test if a particular port is open.
Your HTTP server has experienced problems. What utility can you use to
troubleshoot the HTTP server?
A. TDR
B. PING
C. Telnet
D. NBTSTAT
C. Telnet

Explanation: Telnet can be used to connect to a HTTP server. With telnet you can
issue local commands on the HTTP server which could aid you in troubleshooting.
Which of the following protocols is used for transmitting email?
A. SCP
B. SFTP
C. SMTP
D. SNMP
C. SMTP
You work as a network administrator at TestKing.com. You are configuring a
Microsoft Exchange server for e-mail services. The Exchange server needs to send
e-mail to a partner company that uses a Novell GroupWise e-mail server. What
protocol is needed to send e-mail between the two servers?
A. CSNW (Client Service for NetWare)
B. SMTP (Simple Mail Transfer Protocol)
C. IPX/SPX (Internet Packet Exchange/Sequence Packet Exchange)
D. POP3 (Post Office Protocol version 3)
B. SMTP (Simple Mail Transfer Protocol)
Which of the following statements is TRUE regarding the protocol which should be
used when setting up an e-mail server to exchange e-mails with other servers over
the Internet?
A. You should make use of the SMTP (Simple Mail Transfer Protocol)
B. You should make use of the IMAP4 (Internet Message Access Protocol version 4)
C. You should make use of the Kerberos protocol.
D. You should make use of the Trivial File Transfer Protocol (TFTP) protocol.
A. You should make use of the SMTP (Simple Mail Transfer Protocol)
The following options represent TCP/IP protocols. Which one will be used by a UNIX
server to send e-mail to another UNIX server?
A. POP3
B. SNMP
C. SMTP
D. FTP
C. SMTP

Explanation: Simple Mail Transport Protocol (SMTP) is the protocol that e-mail
servers use to transmit messages to each other across the Internet.
You are a network administrator at your company. Your company has a firewall
that blocks all communication. You, however, want to allow users to send e-mail
messages. What protocol should you allow through the firewall so that users can
send e-mail messages?
A. FTP
B. TFTP
C. POP3
D. SMTP
E. SNMP
D. SMTP

The Simple Mail Transfer Protocol (SMTP) in most e-mail programs to send e-mail
messages. POP3 is used to receive e-mail messages.
Which of the following protocols enables administrators to control network devices like
routers and switches?
A. NAT
B. SNMP
C. DNS
D. NFS
B. SNMP
A network technician has been asked to retrieve device statistics, information, and errors.
Which of the following tools would the technician likely use?
A. TFTP
B. Packet sniffer
C. SNMP
D. SMTP
C. SNMP
Which of the following protocols permits secure polling of network devices?
A. SNMPv2
B. SCP
C. SNMPv3
D. SSH
C. SNMPv3
Internet connectivity for a company is mission critical. The technician must be notified if
the Internet router has failed. Which of the following is the BEST method to monitor this
device?
A. SLIP
B. SFTP
C. SMTP
D. SNMP
D. SNMP
Which of the following is part of the IP protocol suite and is used to monitor network
managed devices?
A. LDAP
B. SMTP
C. SNMP
D. SMB
C. SNMP
Which of the following network protocols allows for automated alerts and reports on
network devices?
A. SMTP
B. SNMP
C. IGMP
D. TLS
B. SNMP
Which of the following protocols is used in a ping command?
A. IGMP
B. ICMP
C. SMTP
D. TFTP
B. ICMP
Which protocol is used for error reporting in IP?
A. SMTP
B. ICMP
C. IGMP
D. SNMP
B. ICMP

ICMP (Internet Control Message Protocol) is used for network management and control.
It provides error testing and reporting for TCP/IP.
Which of the following statements is TRUE regarding the protocol which is used for
reporting errors in concerned with Internet Protocol (IP)?
A. The Network Time Protocol (NTP) protocol is used for reporting errors in concerned
with Internet Protocol (IP).
B. The Internet Control Message Protocol (ICMP) protocol is used for reporting errors in
concerned with Internet Protocol (IP).
C. The Internetwork Packet Exchange / Sequence Packet Exchange (IPX/SPX) protocol is
used for reporting errors in concerned with Internet Protocol (IP)
D. The Simple Network Management Protocol (SNMP) protocol is used for reporting
errors in concerned with Internet Protocol (IP).
B. The Internet Control Message Protocol (ICMP) protocol is used for reporting errors in
concerned with Internet Protocol (IP).
You work as a network technician at TestKing.com. The newly appointed
TestKing.com trainee wants to know which protocol should be allowed when not
able to ping a remote device residing behind a firewall.
What would your reply be?
A. You should inform the trainee to allow the File Transfer Protocol (FTP) protocol.
B. You should inform the trainee to allow the Kerberos protocol.
C. You should inform the trainee to allow the Internet Control Message Protocol (ICMP)
protocol.
D. You should inform the trainee to allow Trivial File Transfer Protocol (TFTP) protocol.
C. You should inform the trainee to allow the Internet Control Message Protocol (ICMP)
protocol.
You are troubleshooting an IP network. Which protocol can you use for error
reporting on the network?
A. SMTP
B. ICMP
C. NNTP
D. SNMP
B. ICMP

The Internet Control Message Protocol (ICMP) is used for IP error reporting and IP
maintenance traffic.
Which of the following protocols will help reduce multicast flooding on a layer 2 switch?
A. IGMP
B. ARP
C. SNMP
D. ICMP
A. IGMP

Internet Group Management Protocol
Ensuring that data is transmitted securely over an IP network is the main purpose of:
A. FTP.
B. TLS.
C. Telnet.
D. SIP.
B. TLS.
Which of the following authentication protocols uses certificates to negotiate access to
the network?
A. EAP-TLS
B. PAP
C. CHAP
D. Kerberos
A. EAP-TLS

Extensible Authentication Protocol - Transport Layer Security