• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

The IEEE standard 802.3af states the specifications for which of the following?



a) Quality of Service
b) VLANs
c) Routing tables
d) Power over Ethernet

d) Power over Ethernet


A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user further discovers that the distant end still has access to them. Which of the following is a possible cause?



a) SNMP strings need to be added
b) Firewall rules need to be configured
c) Port bonding on the interface needs to be enabled
d) The switch has lost power

b) Firewall rules need to be configured

Which of the following is a network device that allows remote users access to a network?



a) DNS server
b) Content filter
c) Load balancer
d) VPN concentrator

d) VPN concentrator


A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem?



a) Syslog
b) SNMP
c) Network sniffer
d) Environmental monitor

c) Network sniffer

A user reports a network connectivity problem. Which of the following steps should the technician perform FIRST?



a) Determine a probable cause
b) Implement the solution of the cause
c) Test the theory of the cause
d) Identify the problem

d) Identify the problem


Which of the following protocols is used by a web browser to display a web page?



a) SMTP
b) FTP
c) HTTP
d) IMAP4

c) HTTP

Which of the following record types is required for every server in a DNS environment?



a) AAA
b) MX
c) SFP
d) A

d) A


The frequency of the 802.11b and 802.11g is which of the following?



a) 2.4GHz
b) 900MHz
c) 5GHz
d) 1800MHz

a) 2.4GHz

Which of the following uses port 22 by default?



a) TELNET
b) SSH
c) FTP
d) DNS

b) SSH

A user is unable to connect to a network with encryption. The user is able to see the network and has the correct passphrase. Which of the following is MOST likely the problem?



a) Encryption type
b) SSID mismatch
c) Standard mismatch
d) Signal strength

a) Encryption type

A technician is troubleshooting a UTP cable that has been suspected of having problems due to EMI. Which of the following cables should the technician use without adding new equipment to the network?



a) Singlemode fiber
b) STP
c) Plenum
d) Multimode fiber

b) STP

Which of the following network topologies describes a network where packets of data are transmitted from one computer to another in a circular fashion?



a) Ring
b) Mesh
c) Bus
d) Star

a) Ring

Which of the following defines the length of time a device retains its IP address for?



a) Scope
b) Reservation
c) Subnet
d) Lease

d) Lease


Which of the following virtual devices is the BEST to use to host a company's website?



a) PBX
b) Server
c) Switch
d) Desktop

b) Server

A cable standard that includes a fire-retardant jacket is:



a) coaxial cable
b) fiber cable
c) plenum cable
d) UTP cable

c) plenum cable

A new drop is active according to the network administrator. A technician takes a laptop to the new drop to test connectivity and gets an intermittent signal. Which of the following tools could the technician use to test the line?



a) Environmental monitor
b) Toner probe
c) Protocol analyzer
d) Cable tester

d) Cable tester


An administrator works for a law firm in an office building in a major city. After installing a new wireless access point, the administrator secures the device using WPA and then connects to it using a laptop. Which of the following would be the logical NEXT step in securing the device?



a) Add a second SSID broadcast to the access point and name it the same as a neighboring company
b) Change the wireless encryption type to WEP
c) Remove the antennas
d) Check neighboring offices for connectivity and reduce the signal strength appropriately

d) Check neighboring offices for connectivity and reduce the signal strength appropriately


An administrator is asked to set up a home office for a user who would like to connect to the Internet and share files with all six computers in the home. Which of the following are the MINIMUM requirements if the user refuses to install wireless devices and all computers contain working network cards?



a) Hub, Cables, Firewall
b) Firewall, Router, Cables
c) Switch, Firewall, Cables
d) Router, Switch, Cables

d) Router, Switch, Cables


The command netstat –n will display which of the following?



a) Ethernet statistics
b) IP address
c) Address and port numbers in numerical form
d) Protocol statistics

c) Address and port numbers in numerical form

A business has expanded to additional floors in the building. The expansion only calls for switches and patch panels to be installed. Which of the following would the network manager need to locate?



a) MDF
b) Demarc
c) Smart jack
d) IDF

d) IDF


A network administrator needs to implement a new wireless network for a coffee shop. The shop wants to allow users wireless access from anywhere in the shop, but not outside. Which of the following should be the GREATEST concern for the administrator?



a) Channel
b) Compatibility
c) WAP placement
d) Interference

c) WAP placement

A user receives an information message on their computer stating a duplicate address exists. A technician would discover that which of the following is true?



a) Wrong gateway
b) Evil twin
c) IP address conflict
d) Wrong subnet mask

c) IP address conflict

Which of the following layers is the presentation layer?



a) Layer 3
b) Layer 5
c) Layer 6
d) Layer 7

c) Layer 6

When differentiating hubs from switches, which of the following is FALSE?



a) Hubs have multiple collision domains.
b) Switches have multiple collision domains.
c) Switches have a single broadcast domain.
d) Hubs have a single broadcast domain.

a) Hubs have multiple collision domains.

Which of the following connector types are MOST commonly associated with phone jacks?



a) RJ-11
b) ST
c) RJ-45
d) SC

a) RJ-11

Which of the following 802.11 channels operates above 5GHz?



a) a
b) b
c) g
d) i

a) a

Which of the following allows the LONGEST distance using single-mode fiber?



a) 10GBaseSR
b) 10GBaseER
c) 10GBaseSW
d) 10GBaseLW

b) 10GBaseER

A switch can separate different subnets by configuring:



a) VTP on each switch
b) trunking on all ports
c) VLANs throughout the ports
d) STP on the main ports

c) VLANs throughout the ports

At which of the following layers does the HTTP protocol operate?



a) Layer 1
b) Layer 4
c) Layer 5
d) Layer 7

d) Layer 7


Which of the following WAN technology types provides the FASTEST speeds?



a) OC3
b) SDSL
c) ADSL
d) T3

a) OC3