• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/688

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

688 Cards in this Set

  • Front
  • Back
An administrator has determined that auto-negotiation has failed on a connection. Which of the following are the MOST important settings that should be matched on each side of the connection?
A. Port speed, port duplex, flow control
B. VLAN assignment, port authentication, flow control
C. IP address, OSPF area, route propagation
D. Port enable, port mirroring, link aggregation
A. Port speed, port duplex, flow control
Which of the following command line tools can be used to display listening sockets and established connections on the local computer?
A. ipconfig
B. nbtstat
C. nslookup
D. netstat
D. netstat
Which of the following network cable types is LEAST susceptible to EMI?
A. UTP CAT5
B. UTP CAT3
C. Plenum STP CAT5
D. Coaxial
D. Coaxial
Which of the following network devices would MOST likely be installed to extend the wireless coverage range in an office space and help strengthen the signal of the network?
A. Switch
B. Firewall
C. Repeater
D. Hub
C. Repeater
Windows users are reporting that they cannot connect to legacy file servers. Ping attempts to the file server and WINS server were successful. Which of the following tools should be used NEXT?
A. TRACERT
B. IPCONFIG
C. NSLOOKUP
D. NBTSTAT
D. NBTSTAT
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use?
A. Security policy
B. Baseline configurations
C. CAT5 wiring schematices
D. Physical network diagram
D. Physical network diagram
Which of the following configuration management documentation types would an administrator use to know how and when to properly install new network devices on the LAN?
A. Network policy
B. Baseline configuration
C. Logical network diagram
D. Wiring schematic
A. Network policy
OSPF is an example of which of the following routing protocol types?
A. Link-state IGP
B. Distance-vector EGP
C. Link-state EGP
D. Distance-vector IGP
A. Link-state IGP
Which of the following tools is designed to send a signal through one end of a cable, so that it can be found at the other end of the cable?
A. Toner probe
B. Multimeter
C. Voltage event recorder
D. Cable tester
C. Voltage event recorder
An administrator believes a workstation is not able to access resources because the wrong DNS server is configured on the workstation. Which of the following commands would MOST likely be used to determing the current configured DNS server?
A. ipconfig
B. arp
C. ping
D. traceroute
A. ipconfig
Which of the following is typically used in an LAN environment?
A. 10GBaseLW
B. 10GBaseEW
C. 10GBaseSW
D. 10GBaseSR
D. 10GBaseSR
The 1000 in 1000BaseT cabling represent which of the following?
A. The theoretical port limit of the cable.
B. The quality level of the copper wiring used.
C. The theoretical maximum bandwidth.
D. The theoretical maximum cable length.
C. The theoretical maximum bandwidth
Which of the following connector types is used to connect to a dial-up modem?
A. RJ-11
B. RJ-45
C. ST
D. BNC
A. RJ-11
An administrator wants to monitor live traffic on a switch to determine if a malicious source is broadcasting ARP traffic. Which of the following utilities would BEST accomplish this?
A. Switchport mapper
B. Network mapper
C. Packet sniffer
D. Packet injector
C. Packet sniffer
Which of the following connector types is used to make a CAT5e patch cable?
A. RJ-45
B. SC
C. ST
D. DB-9
A. RJ-45
Users report an intermittent degradation of sound on their IP phones. Which of the following would a network administrator do to alleviate the problem?
A. Configure QoS
B. Configure VLAN trunking on the switch
C. Use plenum cables
D. Provide fault tolerance for the switch.
A. Configure QoS
Which of the following tools would an administrator use to terminate cabling to a 110 block?
A. Certifier
B. Cable crimper
C. Punch down
D. Toner probe
C. Punch down
According to best practices, which of the following would be used to get a dial-tone off a 66 block?
A. Vampire tap
B. Two pair tri-star connector
C. Butt set
D. Four pair tri-star connector
C. Butt set
Which of the following would BEST describe security devices used to provide
content filtering?
A. Proxy server
B. VPN concentrator
C. Port scanners
D. DHCP server
A. Proxy server
Which of the following tools is used to create a patch cable?
A. Toner probe
B. Cable tester
C. RJ-45 crimper
D. Punch down tool
C. RJ-45 crimper
Which of the following is the maximum distance that CAT5 cable can run
before experience db loss?
A. 100 feet (30.5 meters)
B. 328 feet (100 meters)
C. 358 feet (109.12 meters)
D. 207 feet (63.1 meters)
B. 328 feet (100 meters)
The administrator's ISP indicates that they will need an autonomous system
number to begin routing external network traffic. Which of the following
protocols should the ISP plan to use?
A. BGP
B. OSPF
C. RIPv2
D. IS-IS
A. BGP
An administrator is unsure of how to turn off spanning tree protocol on a
switch. Which of the following documents should the administrator consult
to determine the proper settings?
A. Wiring schematic
B. Event logs
C. Logical network diagram
D. Product manual
C. Logical network diagram
Which of the following can be used to help verify that a remote web server
is not blocked by a firewall?
A. Toner probe
B. Protocol analyzer
C. Port scanner
D. Packet injector
C. Port scanner
An administrator wants to connect a laptop directly to a printer's network
port. Which of the following cable types should the administrator use to
guarantee communication with the printer?
A. Serial cable
B. Cross-over cable
C. Rollover cable
D. Straight-through cable
B. Cross-over cable
Plenum cable should be used to:
A. protect against ESD.
B. decrease cost.
C. comply with fire codes.
D. increase reliability.
C. comply with fire codes.
Which of the following is the DOS command to find out the IP address of a
host device?
A. netstat
B. ipconfig
C. ifconfig
D. tracrt
B. ipconfig
Which of the following is an acceptable method for deciding placement of
wireless access points?
A. A site survey
B. Where there are electrical service and network connections available
C. Every 300 feet (91 meters)
D. In the middle of each room
A. A site survey
Which of the following MOST likely needs to be implemented to provide
central authentication for network equipment?
A. SSH
B. PKI
C. RADIUS
D. SSL VPN
C. RADIUS
Which of the following logical network topologies would a technician MOST
likely find in a person's home?
A. WAN
B. Domain
C. P2P
D. Client/server
C. P2P
Which of the following is required if ports from VLANs on two separate
switches need to broadcast to each other?
A. VPN
B. Trunking
C. Port authentication
D. Port mirroring
B. Trunking
An administrator wishes to determine if there is a service listening on
port 1433 on a server. Which of the following tools would the
administrator use to determine this?
A. route
B. net start
C. netstat
D. ipconfig
C. netstat
Which of the following will allow data and power over the same connection?
A. Trunking
B. Mirroring
C. Spanning tree
D. PoE
D. PoE
Which of the following WAN protocols uses fiber-optic media?
A. SONET
B. Frame Relay
C. ISDN
D. POTS
A. SONET
Which of the following tools is used to connect analog telephony wire pairs
to a block, such as a 110 or 66 block?
A. Butt set
B. Toner probe
C. Punch down tool
D. Protocol analyzer
D. Punch down tool
A user reports an inability to access a certain website, but is able to
access all other sites. Which of the following tools would the
administrator MOST likely use to see where the problem is occurring?
A. netstat
B. traceroute
C. hostname
D. ipconfig
B. traceroute
When installing an access point, which of the following encryption schemes
should be implemented to BEST secure the network?
A. WEP
B. WPA
C. WPA with PSK
D. WPA2 with PSK
D. WPA2 with PSK
When installing a new secure wireless network the administrator should turn
on:
A. WPA and turn off SSID broadcast
B. WPA and turn on SSID broadcast
C. WEP and turn off SSID broadcast
D. WEP and turn on SSID broadcast
A. WPA and turn off SSID broadcast
An administrator needs to identify the DNS servers that a computer is
using. Which of the following commands would MOST likely be used?
A. ping
B. nslookup
C. ipconfig
D. traceroute
B. nslookup
Which of the following ports would be commonly used for email traffic?
A. 20
B. 443
C. 80
D. 110
D. 110
Which of the following can allow or deny network access based on a physical
hardware address?
A. IP filtering
B. IDS
C. MAC filtering
D. IPS
C. MAC filtering
An end user is able to connect to a wireless network and is able to browse
the internet, yet is unable to access network servers. Which of the
following is the MOST likely cause of the problem?
A. There is a problem with the DNS server.
B. The network card is malfunctioning.
C. The end user is connected to the incorrect wireless network.
D. The device is configured with an incorrect subnet mask.
C. The end user is connected to the incorrect wireless network.
Which of the following protocols uses port 20, by default?
A. FTP
B. SSH
C. HTTPS
D. DNS
A. FTP
Which of the following is true about an IP address if the first three bits
are all one and the fourth bit is a zero?
A. The address is a Class D address.
B. The address is a Class A address.
C. The address is a Class B address.
D. The address is a Class C address.
A. The address is a Class D address.
An administrator needs to check the number of active connections on their
computer. Which of the following should the administrator use?
A. dig
B. ping
C. netstat
D. ipconfig
C. netstat
Which of the following protocols are commonly used for VoIP? (Select TWO)
A. NNTP
B. SIP
C. HSRP
D. NPP
E. RTP
B. SIP
E. RTP
Which of the following is a common type of copper-based Ethernet?
A. 1000BaseFX
B. 100BaseFX
C. 1000BaseSX
D. 1000BaseT
D. 1000BaseT
Refer to the attached Exhibit. In the diagram, which of the following
would be a single point of failure with the highest impact to systems?
A. Switch A failing
B. Connection between switch A and switch B failing
C. Router failing
D. Connection between the router and switch A failing
A. Switch A failing
Which of the following would be sent to an SNMP network management system
in the event that a failure or predefined threshold was crossed?
A. SNMP trap
B. History log
C. System log
D. SNMP agent
A. SNMP trap
Which of the following ports would be commonly used for HTTP?
A. 23
B. 80
C. 443
D. 20
B. 80
An administrator suspects that packets to an IP address are being dropped
over the internet. Which of the following tools would be the BEST to
determine the hop that is dropping the packets?
A. netstat
B. traceroute
C. nslookup
D. ping
B. traceroute
Which of the following monitors a server to see which protocols might be in
use?
A. Ping sweep
B. Wireless packet sniffer
C. Port scanner
D. Intrusion detection software
C. Port scanner
11g wireless signals operating at 2.4GHz has a maximum line of sight range
of which of the following?
A. 460 feet (140 meters)
B. 560 feet (171 meters)
C. 840 feet (256 meters)
D. 540 feet (165 meters)
A. 460 feet (140 meters)
Which of the following would be MOST important in achieving fault tolerance
on a network that hosts a distributed application?
A. Redundant servers with failover
B. High-capacity disk caching
C. Hypervisor and virtual hosts
D. Unattended reboot of servers
A. Redundant servers with failover
A technician needs to manage a switch by using the management port on the
back of the switch. Which of the following cables would the technician
use?
A. Loopback
B. Straight
C. Console
D. Crossover
C. Console
While installing a WAP a technician sees an option labeled 'SSID
broadcast'. Which of the following would be the result of disabling that
feature?
A. The WAP will not broadcast a wireless signal.
B. The wireless network will not be auto detected by wireless clients.
C. The SSID name will be encrypted.
D. The clients will not function until that setting has been changed on
them.
B. The wireless network will not be auto detected by wireless clients.
Which of the following network access security methods involves the
analysis of a physical hardware addresses?
A. MAC filtering
B. L2TP
C. RAS
D. IP filtering
A. MAC filtering
Which of the following wiring standards would MOST likely be used to
connect a single network node to a switch?
A. Loopback
B. Straight
C. Crossover
D. Rollover
B. Straight
Which of the following protocols ensures message integrity when
transferring data from the server to the client?
A. RSH
B. SNMPv3
C. FTP
D. SNMPv2
B. SNMPv3
Information gathering and diagnostics indicate that a worm has infected the
local database server and its clients, and is saturating local network
traffic. Which of the following is the NEXT step for a technician?
A. Run a virus scan on all local workstations
B. Shutdown the database server
C. Contact the DBA to consider escalation
D. Scan the database server log for remote connections
B. Shutdown the database server
Which of the following processes translates a private IP address for a
public IP address?
A. DNS
B. PAT
C. NAT
D. DHCP
C. NAT
An administrator suspects an IP conflict on the local LAN. Which of the
following is BEST used to troubleshoot this problem?
A. hostname
B. ifconfig
C. traceroute
D. nslookup
B. ifconfig
Which of the following is a purpose of using a port scanner?
A. To determine VLAN port configuration on the network.
B. To determine services running on a server
C. To detect DoS attacks on the network
D. To analyze network traffic at the packet level
B. To determine services running on a server
Refer to the attached Exhibit. IN the environment represented by the
diagram, a technician is asked to temporarily connect three printers to the
network. they are to be placed physically next to the existing network
printer. The technician needs to install a new switch to connect these
printers because all ports are taken on the network. Which of the
following locations on the network would be the BEST place for the
additional switch to be placed?
A. Between the existing printer and switch A.
B. Between switch A and switch B
C. Between the DHCP and switch A
D. Between switch A and switch C
A. Between the existing printer and switch A
A company's internal email system is an example of which of the following
logical network topologies?
A. WAN
B. VLAN
C. Peer to Peer
D. Client/server
D. Client/server
A user submits and online transaction to purchase 10 items. The following
day, the same user notices that the transaction receipt shows 100 items
being purchased instead of 10. Which of the following MOST likely
occurred?
A. Man-in-the-middle attack
B. DoS attack
C. Botnet attack
D. DDoS attack
A. Man-in-the-middle attack
An administrator would like to segment traffic into two logical networks on
a single switch. Which of the following technologies should be
implemented?
A. VPN
B. LAN
C. VLAN
D. VDSL
C. VLAN
Which of the following will MOST likely occur when a technician uses a CAT5
UTP cable longer than the maximum length per segment?
A. Duplex mismatch
B. Speed mismatch
C. Attenuation
D. Load balancing
C. Attenuation
An administrator indicates that the T1 line at a remote site can plug
directly into the new router, eliminating the need for a secondary device.
Which of the following external devices is no longer needed?
A. CSU/DSU
B. VLAN
C. MDF
D. ATM
A. CSU/DSU
Which of the following terms BEST describes the time required for routers
to exchange new routes and update their routing tables with information
from other network routers?
A. Propagation
B. Convergence
C. Crosstalk
D. Attenuation
B. Convergence
Which of the following would an administrator use to standardize all cross
connects on a RJ-45 jack?
A. Smart jack
B. 110 block
C. 66 block
D. Patch panel
D. Patch panel
Which of the following networking protocols is used to give the remote
computer secure command line access to the server?
A. ICMP
B. RTP
C. SSH
D. Telnet
C. SSH
A small company needs to be temporarily extend its call center by ten
employees. The company decides to rent office space on the opposite side
of the building; the two spaces are 400 feet (122 meters) apart. Which of
the following is the MOST cost effective solution?
A. Install gigabit switches and run Ethernet.
B. Install a new T1 line for that office.
C. Use a wireless repeater and a WAP.
D. Connect the two offices with fiber.
C. Use a wireless repeater and a WAP.
A client wants to improve the wireless coverage on the third floor of their
house. The wireless router is located in the basement and there is no easy
way to run a cable to the third floor. Which of the following devices
should be installed to extend the wireless coverage to cover the entire
third floor without running cables?
A. Switch
B. Bridge
C. Router
D. Repeater
D. Repeater
Which of the following devices can be installed on individual computers
throughout the network?
A. VPN concentrator
B. Host-based firewall
C. NIPS
D. Network-based firewall
B. Host-based firewall
A company network is experience a man-in-the-middle attack, where a
malicious user is impersonating the default gateway IP address of
192.168.1.1. Give that the default gateway MAC address is 00-11-22-33-44-
55, which of the following commands can the administrator run on the
affected hosts to resolve the issue?
A. arp -a 192.168.1.1
B. arp -a 00-11-22-33-44-55
C. arp -s 192.168.1.1 00-11-22-33-44-55
D. arp -s 00-11-22-33-44-55 192.168.1.1
C. arp -s 192.168.1.1 00-11-22-33-44-55
Which of the following methods is used in creating an ACL?
A. IP filtering
B. VPNs
C. Content filtering
D. PPPs
A. IP filtering
Which of the following protocols is used during boot-up of diskless hosts?
A. TFTP
B. IGMP
C. SNMP
D. TLS
A. TFTP
Which of the following is the maximum number of available segments on a
10Base-T network?
A. 1,024
B. 2
C. 512
D. 1,256
B. 2
Which of the following is the MOST likely reason that two computers in
different VLANs, on the same Layer 2 switch, are unable to communicate with
each other?
A. IGMP snooping should be enabled on the switch
B. A router is needed to route traffic between the VLANs
C. The computers do not support ARP proxy.
D. Spanning trees between the VLANs need to be converged.
B. A router is needed to route traffic between the VLANs.
A crossover cable is not needed when the switch supports which of the
following?
A. MDIX
B. LACP
C. XDSL
D. IGRP
A. MDIX
Which of the following WAN technologies provides the highest maximum
bandwidth?
A. ADSL
B. SONET
C. T1
D. E3
B. SONET
Which of the following technologies is the MOST cost-effective when
protecting a large number of networked workstations from external attacks?
A. External scanning service
B. Host-based IDS
C. Network-based IPS
D. Network-based firewall
D. Network-based firewall
Which of the following is true about an IP address if the first four bits
are all a one?
A. The address is a Class C address.
B. The address is a Class E address.
C. The address is a Class D address.
D. The address is a Class A address.
B. The address is a Class E address.
Which of the following provides the GREATEST level of protection against
someone attempting to capture a router password traversing the network?
A. SCP
B. AH
C. ACL
D. SSH
D. SSH
A loopback plug is useful for which of the following?
A. NIC diagnostics
B. Toning
C. Throughput testing
D. Punchdown blocks
A. NIC diagnostics
Which of the following network types is suitable for a 10 gigabyte core
network using 10 meter (33 feet) fiber runs?
A. 10GBase-ER
B. 10GBase-SR
C. 10GBase-SW
D. 100Base-FX
B. 10GBase-SR
Which of the following is the BEST tool to use when terminating a network
jack?
A. Snips
B. Toner probe
C. Punch down
D. Cable stripper
C. Punch down
Which of the following WAN technologies uses 53 byte fixed-length cells?
A. Frame relay
B. FDDI
C. ATM
D. SONET
C. ATM
A company finished upgrading the wireless encryption to WPA2 Enterprise.
The administrator receives a call from a user who is unable to connect to
the company wireless. Which of the following is MOST likely causing the
connection problem?
A. The laptop is missing the software supplicant.
B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption.
D. The access point is on the wrong channel.
A. The laptop is missing the software supplicant.
A wireless access point supports up to 20 clients. Which of the following
describes this wireless network?
A. Point to point
B. Ring
C. Mesh
D. Point to multipoint
D. Point to multipoint
An administrator needs to update a router configuration for a router that
does not support SSH. Which of the following can be used to securely
update the router configuration
A. HTTPS
B. FTP
C. TFTP
D. SNMPv2
A. HTTPS
Routers operate predominantly at which of the following layers of the OSI
model?
A. 1
B. 3
C. 4
D. 2
B. 3
Which of the following routing protocols are unable to advertise CIDR
networks? (Select TWO)
A. OSPF
B. RIPv2
C. RIP
D. IGRP
E. EIGRP
C. RIP
D. IGRP
Which of the following connectors can be used for serial connections?
A. SC
B. RS-232
C. BNC
D. ST
B. RS-232
Which of the following components is used to terminate a T1 connection?
A. Smart jack
B. Patch panel
C. 66 block
D. 110 block
A. Smart jack
An administrator would like to evaluate network traffic. Which of the
following tools should the administrator use?
A. OTDR
B. Certifier
C. Toner probe
D. Protocol analyzer
D. Protocol analyzer
Which of the following networks are reserved for private IP addresses?
A. 172.16.128.0/15
B. 162.129.0.0/24
C. 168.129.0.0/24
D. 192.168.0.0/16
D. 192.168.0.0/16
Which of the following technologies allows an administrator to submit
traffic to and IDS for review?
A. Port mirroring
B. VLAN
C. Spanning tree
D. PoE
A. Port mirroring
Which of the following protocols is commonly associated with VoIP?
A. POP3
B. NTP
C. SIP
D. IGMP
C. SIP
An administrator's is at a client's site to figure out an intermittent
network problem. The technician has already asked if anything has changed
on the network. Which of the following is the NEXT step in the
troubleshooting methodology?
A. Identify the results and effects of the solution.
B. Identify the affected areas of the network.
C. Establish the most probably cause
D. Implement and test the solution
B. Identify the affected areas of the network.
Which of the following mitigation techniques is MOST effective against a
man-in-the-middle attack?
A. Encryption
B. Popup blocker
C. Authentication
D. ACL
C. Authentication
An administrator has just completed creating a new subnet. Users on the
new subnet are unable to access the network. Which documentation will BEST
provide information to help identify the issue?
A. Logical network diagram
B. Physical network diagram
C. Policies
D. Procedures
A. Logical network diagram
Which of the following switch features allows power and data from a single
connection?
A. VLAN
B. Spanning tree
C. PoE
D. Trunking
C. PoE
Which of the following protocols allows dynamic addresses to be assigned to
devices?
A. SNMP
B. ARP
C. SMTP
D. DHCP
D. DHCP
Which of the following describes an area where communications equipment is
stored?
A. HVAC
B. Demarc
C. MDF
D. 110 block
C. MDF
Which of the following controls are MOST effective when a route only
supports remote configuration via Telnet? (Select TWO)
A. Vulnerability scanner
B. Strong passwords
C. Port scanner
D. Two factor authentication
E. IP ACLs
D. Two factor authentication
E. IP ACLs
An administrator wants to prevent users from plugging in their personal
laptops and accessing the Internet without a member of the IT staff
configuring the machine first. Which of the following would MOST likely be
installed?
A. IDS
B. CSU
C. Proxy server
D. Multilayer switch
C. Proxy server
increasing which of the following?
A. Domain kiting
B. Broadcast domains
C. Collision domains
D. Frequency domains
C. Collision domains
Which of the following devices will measure the amount of EMI that a
network cable emits?
A. Protocol analyzer
B. OTDR
C. Cable tester
D. TDR
D. TDR
An administrator is adding a new router in order to connect to a new remote
location. After verifying that all the wiring and IP information is
accurate, the administrator is still unable to connect to the remote
router. Which of the following is the MOST probably cause?
A. Console access is denied
B. Password is not set correctly
C. Clock speed is not configured
D. Duplex mismatch
C. Clock speed is not configured
The plans for a new office require 300 network connections. Which of the
following network sizes should be allocated to the new office?
A. /23
B. /25
C. /24
D. /30
A. /23
Which of the following software security devices can be implemented on
individual servers in order to solely identify abnormal behavior?
A. DNS
B. HIDS
C. HIPS
D. Network-based firewall
B. HIDS
A technician is at a client's site to figure out an intermittent network
problem. The technician has implemented the solution. Which of the
following is the NEXT step in the troubleshooting methodology?
A. Determine if escalation is necessary.
B. Create an action plan and identify potential effects.
C. Document the solution and the entire process.
D. Determine if anything has changed.
C. Document the solution and the entire process.
Which of the following ports would be commonly used for FTP traffic?
A. 23
B. 25
C. 22
D. 20
D. 20
As an added level of security a network administrator can configure which
of the following on a firewall?
A. Port blocking
B. Port forwarding
C. Port mirroring
D. VPN pass-through
A. Port blocking
A computer is unable to access the corporate web server, which has an IP
address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is
run on the computer. Based on the output below, which of the following is
the MOST likely cause of this problem?
Internet Address Physical Address Type
172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic

A. Static ARP entries
B. Revers ARP failure
C. IP address conflict
D. MAC spoofing
D. MAC spoofing
run on the computer. Based on the output below, which of the following is
the MOST likely cause of this problem?
Internet Address Physical Address Type
172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic
A. Static ARP entries
B. Revers ARP failure
C. IP address conflict
D. MAC spoofing
D. MAC spoofing
A user is having problems accessing the wireless network with a gaming
device. Which of the following is the MOST likely cause of the problem?
A. The device does not support 802.1 p.
B. WPA2 is not supported by the device.
C. Broadcast prevention is enabled on the switch.
D. PoE is not enabled over wireless.
B. WPA2 is not supported by the device.
Which of the following connection methods is considered secure and is
normally used to connect to web resources such as online banking and
ecommerce sites?
A. SSH
B. HTTPS
C. SFTP
D. HTTP
B. HTTPS
Which of the following is a secure method of remote access via command
line?
A. Telnet
B. RSH
C. SSH
D. RCP
C. SSH
Which of the following cables would be used with a RJ-45 connector?
A. UTP
B. Serial
C. Coaxial
D. Fiber
A. UTP
Which of the following LAN technologies is considered fast Ethernet and
uses two pairs of cabling, one pair for sending and the other pair for
receiving?
A. 100BaseX
B. 100BaseT4
C. 100BaseTX
D. 100BaseFX
C. 100BaseTX
A solution provided less than ideal results, and the technician is forced
to go back and devise a new solution. Which of the following would be done
NEXT, assuming probable cause is established and escalation is not
necessary?
A. Create an action plan and accompanying solution.
B. Document the solution and steps taken during the process.
C. Gather information about the problem.
D. Determine if anything has changed.
A. Create an action plan and accompanying solution.
Which of the following is MOST likely used to transfer files to a web
server?
A. FTP
B. DNS
C. POP3
D. IMAP4
A. FTP
SONET is normally associated with which of the following?
A. Point to multipoint
B. Bus
C. Point to point
D. Ring
D. Ring
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
A. 100BaseFX
B. 10GBaseSW
C. 1000BaseT
D. 100BaseTX
B. 10GBaseSW
An IDS device needs to be plugged into a port that can see all traffic on a
network switch. Which of the following features of the switch should be
used?
A. Port security
B. Port trunking
C. Port mirroring
D. Port spanning
C. Port mirroring
Link aggregation is also known as port:
A. mirroring.
B. spanning.
C. distribution.
D. trunking.
D. trunking.
An administrator is looking to install new WAPs into remote locations for
increased network capacity. Which of the following technologies would the
equipment need to support if accessible power outlets were at a minimum?
A. MAC filtering
B. PoE
C. WPA
D. VLAN
B. PoE
Which of the following is a reason why satellite Internet should be
avoided, if VoIP is being used?
A. One-way communication
B. Latency
C. Low bandwidth
D. Availability
B. Latency
Which of the following ports allows telnet traffic to be secure?
A. 25
B. 22
C. 23
D. 21
B. 22
After crimping a new RJ-45 plug in an unmarked cable, the network tester
tool gives the message "Warning! Voltage on line!". Which of the following
is the MOST likely cause of this message?
A. The cable is a T1 connection.
B. The cable is being used on the phone network.
C. Fluorescent lights are causing interference on the cable.
D. There is a short in the cable.
B. The cable is being used on the phone network.
Which of the following network monitoring tools would be used to identify
the maximum available bandwidth on a network?
A. Protocol analyzers
B. Port scanners
C. Throughput testers
D. History logs
C. Throughput testers
Which of the following authenticates a web server to the remote client in
PKI?
A. DNS name
B. Public key
C. Private key
D. FQDN
B. Public key
Which of the following commands provides similar information about the
current configuration of active local Ethernet adapters? (Select TWO)
A. route
B. hostname
C. ifconfig
D. traceroute
E. ipconfig
C. ifconfig
E. ipconfig
After accepting a request packet on port 80, the firewall automatically
allows the reply packet to pass Which of the following terms BEST
describes this firewall behavior?
A. Stateful inspection
B. Intrusion detection
C. Passive fingerprinting
D. Content filtering
A. Stateful inspection
Which of the following is MOST likely to affect IP based surveillance
systems?
A. Social engineering
B. Mantrap
C. Man-in-the-middle
D. Vishing
C. Man-in-the-middle
Which of the following devices should be used to segment two networks?
A. Media converter
B. Hub
C. Bridge
D. Repeater
A. Media converter
Which of the following should be modified after a new network device is
added to the network?
A. Intrusion detection software
B. Router configuration setting
C. Physical and logical diagrams
D. System logs
C. Physical and logical diagrams
When implementing a basic wireless home network, which of the following
should be taken into consideration when configuring the wireless router so
it does not conflict with other home electronics?
A. Beacon
B. Appropriate encryption
C. Frequency
D. ESSID
C. Frequency
Which of the following is a secure method of copying information over a
public network?
A. TFTP
B. SCP
C. SNMP
D. SMTP
B. SCP
A user in the accounting department reports that their office is able to
connect to the network, but they are unable to connect to the Internet.
Which of the following documentation would be the MOST useful to the
administrator in diagnosing this issue?
A. Physical network diagram
B. Acceptable use policy
C. Job log
D. Baseline documentation
E. Wiring schematic
A. Physical network diagram
E. Wiring schematic
Which of the following protocols would an administrator use to backup files
from a router to a local server?
A. DHCP
B. SMTP
C. NTP
D. TFTP
D. TFTP
Which of the following technologies verifies that keys have not been
tampered with and integrity is maintained?
A. IPSec AH
B. TKIP
C. Pre-shared key
D. WEP
A. IPSec AH
Which of the following can be used to set options such as TFTP server
addresses, DNS search lists, and broadcast addresses on network clients and
workstations?
A. DHCP server
B. Smart jack
C. Network bridge
D. Layer 2 switch
A. DHCP server
Which of the following commands would be used to display the IP address on
a UNIX/Linux computer?
A. ifconfig
B. netstat
C. dig
D. ipconfig
A. ifconfig
The technician notices that one of the wires in a CAT5 cable is cut in
half. Which of the following connectivity issues did the technician
discover?
A. Attenuation
B. Open pairs
C. Interference
D. Crosstalk
B. Open pairs
A company recently installed a new VoIP phone system that runs over their
existing T3 Internet connection. Which of the following network
technologies would BEST handle voice traffic prioritization above all other
data?
A. IPSec
B. Load balancing
C. QoS
D. PoE
C. QoS
Which of the following is an invalid subnet mask?
A. 255.255.255.255
B. 255.255.0.0
C. 255.256.255.0
D. 255.0.0.0
C. 255.256.255.0
Which of the following tools logs electrical surges?
A. Cable tester
B. Toner probe
C. Voltage event recorder
D. Protocol analyzer
C. Voltage event recorder
Which of the following network devices would MOST likely be installed to
allow a fiber optic cable to be plugged into a network device with only RJ-
45 connections?
A. Hub
B. Media Converter
C. Basic switch
D. WAP
B. Media Converter
Users are reporting that they are still experiencing network issues even
though a fix was recently applied. Which of the following troubleshooting
methodology steps is the administrator using?
A. Continuing to gather information about the same symptoms
B. Documenting the solution and the entire process
C. Testing the solution and identifying the effects
D. Escalating the problem
C. Testing the solution and identifying the effects
For the BEST performance, wireless signals should use
A. overlapping channels.
B. non-overlapping channels.
C. redundant channels.
D. different encryption types.
B. non-overlapping channels.
Which of the following devices enables a router to communicate with a T1
line?
A. IPS
B. Layer 3 switch
C. CSU/DSU
D. Firewall
C. CSU/DSU
Which of the following devices separates a LAN segment into two collision
domains, without affecting the broadcast domain?
A. Firewall
B. Bridge
C. Repeater
D. Router
B. Bridge
CAT5, CAT5e, and CAT6 cabling all consist of:
A. 8 separate strands, all split into individual leads with no
intertwining.
B. 8 separate strands split into 4 pairs of 2 intertwined leads.
C. 8 separate strands split into 2 pairs of 4 intertwined leads.
D. 4 separate strands split into 2 pairs of 2 intertwined leads.
B. 8 separate strands split into 4 pairs of 2 intertwined leads.
A laptop cannot connect to a wireless network. The laptop is configured to
use WPA2 with PSK and TKIP. An administrator determines the laptop should
be set to use AES. This is an example of which of the following?
A. Incorrect frequency band usage
B. Faulty wireless antenna
C. Environmental interference
D. Incorrect encryption settings
D. Incorrect encryption settings
Which of the following network topologies is used within a token based
network?
A. Point to multipoint
B. Mesh
C. Ring
D. Point to point
C. Ring
Which of the following LAN technologies has the SHORTEST maximum length for
each cable run without the use of a repeater?
A. 10GBaseT
B. 10GBaseLW
C. 10GBaseX
D. 10BaseT
D. 10BaseT
An administrator needs to test connectivity to a particular website without
launching a browser session. Which of the following commands would MOST
likely be used to test this connection?
A. ipconfig
B. ping
C. traceroute
D. nslookup
B. ping
Which of the following protocols is used to transmit emails?
A. SNMP
B. POP3
C. SMTP
D. IMAP4
C. SMTP
Which of the following would be used to locate a cable that is in a bundle
located in a distant telecommunications closet?
A. Toner probe
B. Butt set
C. Voltage meter
D. Voltage event recorder
A. Toner probe
A technician wishes to implement network authentication at the switch port
level. Which of the following standards is designed to accomplish this?
A. TKIP
B. WPA2
C. 802.1ad
D. 802.1x
D. 802.1x
Which of the following features will allow for redundancy of a data port?
A. Aggregation
B. PoE
C. VLAN
D. Spanning tree
A. Aggregation
How many potential MAC address schemes are possible?
A. 2^48
B. 2^64
C. 2^46
D. 2^32
A. 2^48
Two autonomous networks who wish to exchange routing data should use which
of the following protocols?
A. EIGRP
B. OSPF
C. IS-IS
D. BGP
D. BGP
Which of the following is the MOST appropriate policy for updating physical
network diagrams?
A. Update before regularly scheduled network audits.
B. Update whenever a connection is changed.
C. Update after weekly network support team review.
D. Update after new personnel are hired.
B. Update whenever a connection is changed.
Which of the following are usually needed during manual configuration of a
client on an 802.11g network segment using DHCP and WEP? (Select TWO)
A. Name servers
B. Subnet mask
C. SSID
D. Shared key
E. IP address
C. SSID
D. Shared key
Which of the following standards uses 5GHz frequency for network
communications?
A. 802.11g
B. 802.11b
C. 802.3
D. 802.11a
D. 802.11a
Which of the following has the STRONGEST encryption?
A. WPA2
B. L2TP
C. WPA
D. WEP
A. WPA2
The MAIN difference between a MAC and an IP ACL is
A. IP ACLs work at Layer 3 while MAC ACLs do not
B. IP ACLs are supported by Layer 2 switches while MAC ACLs are not
C. MAC ACLs are more secure than IP ACLs
D. MAC addresses cannot be spoofed while IP addresses can
A. IP ACLs work at Layer 3 while MAC ACLs do not
A user contacts a technician and states, "The network is down." After
further investigation the user is unable to get to a file share on the LAN.
Which of the following is the NEXT step the technician should take to help
determine the root cause of the problem?
A. Unplug and then plug the network cable back in.
B. Reboot the core router.
C. Have the user run netstat.
D. Have the user ping the default gateway.
C. Have the user run netstat.
Given a typical 802.11 a/g/n wireless router, which of the following
frequencies would the unit operate at, by default? (Select TWO)
A. 2.4GHz
B. 900MHz
C. 2.1GHz
D. 5GHz
E. 1.8GHz
A. 2.4GHz
D. 5GHz
New service from the telephone company is delivered over fiber, but the
technician does not have a fiber module for the router. Which of the
following would remedy this issue?
A. CSU/DSU
B. Media converter
C. Fiber repeater
D. OTDR
B. Media converter
Allowing two ports to function as one is considered to be which of the
following features?
A. Etherchanneling on same switch
B. Port authentication
C. Port trunking on different switches
D. Port mirroring
A. Etherchanneling on same switch
A technician needs to install additional access points for a new high speed
connection being added in the new office space. Which of the following
will MOST likely be installed to allow additional CAT5 cable connections?
A. Smart Jack
B. 110 Block
C. Demarc
D. 66 Block
B. 110 Block
A company has recently deployed 100 servers to provide online financial
transactions. Which of the following technologies is a technician MOST
likely to deploy to ensure that each server is processing no more than 1000
Internet requests every second and that each request has an average
processing time of five seconds?
A. Load balancer
B. Bandwidth shaper
C. Proxy server
D. Multilayer switch
A. Load balancer
Which of the following protocols operate at layer 4 or the OSI model?
(Select TWO)
A. HTTP
B. FTP
C. UDP
D. TCP
E. ICMP
C. UDP
D. TCP
Which of the following is the difference between FTP and SFTP?
A. SFTP is tunneled over IPSec.
B. SFTP runs in passive mode.
C. SFTP protocol is tunneled over SSL.
D. SFTP is run over SHH.
D. SFTP is run over SSH.
A port scanner is used by network administrator for which of the following?
A. To determine open ports on network hosts
B. To secure switches and routers
C. To make a physical network diagram
D. To find routers with weak passwords
A. To determine open ports on network hosts
An administrator notices that collisions are repeatedly occurring on a hub.
Which of the following would be the BEST way to help reduce these
collisions?
A. Replace the hub with a switch.
B. Install a bridge on the network.
C. Setup VLANs on the hub..
D. Use a static IP address on the network.
A. Replace the hub with a switch.
A host on subnet 10.1.1.0/24 is sending packets with a source address of
169.254.0.100. Which of the following is the MOST likely explanation?
A. The border router is unreachable.
B. The default gateway is unreachable.
C. The DHCP server is unreachable.
D. The primary DNS server is unreachable.
C. The DHCP server is unreachable.
An administrator has added four switches to a campus network. The switch
in wiring closet is connected to the switch in wiring closet and the switch
in wiring closet. The switch in wiring closet is connected to the switch
in wiring closet and the switch in wiring closet. Which of the following
topologies is represented in this design?
A. Ring
B. Bus
C. Mesh
D. Star
A. Ring
Delaying low-priority packets is a common technique for achieving which of
the following?
A. QoS
B. Fault tolerance
C. Load balancing
D. Dynamic routing
A. QoS
A workstation is having connectivity issues when being added to the domain.
Which of the following commands would allow the administrator to see the
DNS and WINS servers that are currently configured for the workstation?
A. nslookup
B. netstat
C. nbtstat
D. ipconfig
D. ipconfig
A network administrator needs to add an out-of-band IDS to monitor all
traffic traversing the switch. Which of the following features would need
to be specifically configured in order to achieve this?
A. Spanning tree protocol
B. Port authentication
C. Port mirroring
D. VLAN trunking
C. Port mirroring
Which of the following connection methods or protocols is considered
unsecure and by default uses port 80?
A. HTTP
B. HTTPS
C. TELNET
D. RCP
A. HTTP
An administrator is implementing a wireless network. Which of the
following encryption technologies is the MOST secure method and will
authenticate devices to the network?
A. WEP
B. VPN
C. SSH
D. WPA
D. WPA
Which of the following topologies is the MOST fault tolerant?
A. Mesh
B. Bus
C. Star
D. Ring
A. Mesh
Which of the following is the maximum distance for CAT5 cable?
A. 1058 feet (323 meters)
B. 328 feet (100 meters)
C. 100 feet (30.5 meters)
D. 50 feet (15.2 meters)
B. 328 feet (100 meters)
Two clients are directly connected via RJ-45 and CAT5e cables and
communicating with IP. The first client sends data out of its RJ-45 on
pins 1 and 2. On which of the following pins will the client expect to
receive a response?
A. 2 and 3
B. 1 and 2
C. 5 and 6
D. 3 and 6
D. 3 and 6
Which of the following should be configured to provide a priority to voice
traffic?
A. Port mirroring
B. QoS
C. DMZ
D. Trunking
B. QoS
Which of the following is a method of connecting devices wirelessly?
A. PPP
B. Bluetooth
C. RDP
D. VNC
B. Bluetooth
Which of the following terms describes the process of routers accepting the
same routing topology in their route tables?
A. Resemblance
B. Convergence
C. Consolidation
D. Aggregation
B. Convergence
Which of the following is the correct format for an IPv4 IP address?
A. XXXX.XXXX.XXXX
B. XX:XX:XX:XX:XX:XX
C. XX-XX-XX-XX-XX-XX
D. XXX.XXX.XXX.XXX
D. XXX.XXX.XXX.XXX
A company needs to perform stateful packet filtering on the core network.
Which of the following devices would BEST be suited to match this
equipment?
A. DHCP server
B. Router ACLs
C. Proxy
D. Firewall
D. Firewall
At which of the following OSI model layers is HTTPS encryption performed?
A. Layer 3
B. Layer 7
C. Layer 5
D. Layer 6
D. Layer 6
A network administrator suspects that two computers on the same subnet have
the same IP address. Which of the following utilities could be used to
determine which physical device the workstation is sending traffic?
A. ARP
B. NSLOOKUP
C. DIG
D. NETSTAT
A. ARP
The 802.11n protocol operates at which of the following layers of the OSI
model? (Select TWO).
A. Layer 2
B. Layer 1
C. Layer 4
D. Layer 5
E. Layer 3
A. Layer 2
A technician at a company providing online, real-time media streaming to
the Internet needs a network technology that will reduce bandwidth while
delivering high throughput. Which of the following can the technician
implement to fit these requirements?
A. Multicast
B. Subnetting
C. Broadcast
D. Unicast
A. Multicast
Which of the following network protocols is used for sending outbound email
from a host?
A. POP
B. RTP
C. IMAP
D. SMTP
D. SMTP
An administrator discovers that a compromised system on the network is
injecting incorrect routes in an attempt to intercept network traffic.
Which of the following protocols is MOST likely being used?
A. BGP
B. RIP
C. EIGRP
D. OSPF
A. BGP
A Linux user is reporting intermittent issues connecting to several
websites. Which of the following commands would the administrator MOST
likely use to see where the traffic is dropping off at and the connections
statistics to each device along the way?
A. mtr
B. ifconfig
C. ping
D. traceroute
A. mtr
Which of the following tools can be used to test if a new DNS server is
resolving addresses correctly?
A. nbtstat
B. netstat
C. traceroute
D. nslookup
D. nslookup
The primary goal of implementing network QoS features is
A. Provide fault tolerance to the network design.
B. Increase network throughput.
C. Prevent undesirable network traffic from entering the network.
D. Provide predictable network performance.
D. Provide predictable network performance.
A user reports that the entire corporate network is down. Which of the
following should the technician do FIRST?
A. Identify if there are any other symptoms.
B. Create an action plan and identify its effects.
C. Escalate to a senior engineer.
D. Implement a solution and test the results.
A. Identify if there are any other symptoms.
An administrator would like to troubleshoot email issues and verify that
the mail service on server1.comptiA.org is available and accepting mail.
Which of the following commands would BEST accomplish this?
A. dig @server1.comptiA.org -t MX
B. telnet server1.comptiA.org 25
C. ping -l 110 server1.comptiA.org -t
D. nmap server1.comptiA.org -p0
B. telnet server1.comptiA.org 25
Which of the following represents a private IP address?
A. 140.90.90.90
B. 172.16.24.9
C. 139.93.23.22
D. 23.34.98.222
B. 172.16.24.9
Which of the following wireless standards has a MAXIMUM throughput, by
default, of 54Mbps and operates at the 5Ghz range?
A. 802.11b
B. 802.11n
C. 802.11g
D. 802.11a
D. 802.11a
Which of the following pairs should be crossed to create a crossover cable?
A. 5,6 and 7,8
B. 1,2 and 3,6
C. 4,5 and 6,7
D. 1,2 and 3,4
B. 1,2 and 3,6
Which of the following features of a network switch eliminates the need for
cross-over cables?
A. 802.1x
B. Auto-MDIX
C. IGMP snooping
D. VLANs
B. Auto-MDIX
A user calls network support and reports that email is not working. Which
of the following should the technician do FIRST?
A. Determine which mail hub the user was connected to and perform a
graceful restart.
B. Ask the user what operation was performed, what the expected result was,
and what the actual result was.
C. Scan a list of open ports on the mail hub to scan for excessive traffic
and escalate to network administrator if needed.
D. Attempt to send a test email message to a known account at a remote
facility and scan logs to see if it is sent.
B. Ask the user what operation was performed, what the expected result was,
and what the actual result was.
Which of the following features is essential in a firewall if it is to
support RTP sessions?
A. Remote console
B. Zones
C. Statefulness
D. Address translation
C. Statefulness
Which of the following is the MAXIMUM segment distance for 100BaseTX?
A. 100 meters (328 feet)
B. 30 meters (100 feet)
C. 1000 meters (3281 feet)
D. 305 meters (1000 feet)
A. 100 meters (328 feet)
Which of the following Internet connections is traditionally carried over
an existing coax backbone?
A. ADSL
B. Fiber
C. Cable
D. SDSL
C. Cable
Which of the following is the MOST accurate description of spanning tree
protocol?
A. Protocol that detects routing loops and then adjusts priorities
accordingly
B. Algorithm to span the switch ports in order to create a tree-based
hierarchical layout
C. Algorithm that detects cabling loops and then disables an affected port
to remove loops
D. Port spanning technique used to provide network fault tolerance
C. Algorithm that detects cabling loops and then disables an affected port
to remove loops
After reports of network performance problems, the technician determines
that the switch firmware should be updated. Which of the following should
the technician do NEXT?
A. Identify the results and effects of the solution
B. Create an action plan and identify potential effects
C. Identify the affected areas of the network
D. Document the solution and the entire process
B. Create an action plan and identify potential effects
Which of the following encryption technologies would be the WEAKEST method
to use when securing a new SOHO wireless network?
A. WEP64
B. WPA
C. WEP128
D. WPA2
A. WEP64
Which of the following components would a technician check to see if a
phone outage is an internal or external problem?
A. 110 block
B. Demarc
C. 66 block
D. Patch panel
B. Demarc
A network administrator would MOST likely use a port scanner to do which of
the following?
A. Trace a physical network port through a building.
B. Capture incoming network packets to port 80 on a workstation.
C. Report the link speed and duplex of all ports on a switch.
D. Remotely test a firewall configuration on a server.
D. Remotely test a firewall configuration on a server.
Which of the following uses 802.1q?
A. 802.1x
B. Port mirroring
C. VLAN
D. QoS
C. VLAN
Which of the following technologies transfers data over an analog signal?
A. ADSL
B. ISDN
C. POTS
D. DOCSIS
C. POTS
Which of the following allows a WAP to be installed in a location where
there are no power outlets available?
A. PoE
B. Port authentication
C. PPTP
D. Trunking
A. PoE
Which of the following devices transmits timed broadcasts onto an active
network?
A. Bridge
B. Unmanaged switch
C. DHCP client
D. Firewall
C. DHCP client
A firewall is set to block inbound connections on port 25. Which of the
following protocols would enable the administrator to retrieve email
without reconfiguring the firewall?
A. FTP
B. SNMP
C. POP3
D. SMTP
C. POP3
When ordering switches for a new building, which of the following is the
BEST way for the technician to determine the number of switches to put in
each network closet?
A. Count the number of phone ports and configure two network ports for each
phone port.
B. Review the architectural plans to see how many drops go to each closet
C. Count the number of rooms near each closet and standardize eight drops
per room.
D. Wireless is the new standard and no network switches will be needed in
the building.
B. Review the architectural plans to see how many drops go to each closet.
Which of the following LAN technologies has a length segmentation of limit
of 2 kilometers (1.2 miles)?
A. 1000BaseT
B. 100BaseFX
C. 10BaseF
D. 100BaseTX
C. 10BaseF
Which of the following should be used to ensure that all packets are
received by every connected device?
A. Switch
B. Firewall
C. Hub
D. Router
C. Hub
Which of the following tools allows an administrator to verify the network
configuration of a system?
A. route
B. ifconfig
C. traceroute
D. ping
B. ifconfig
Which of the following WAN types requires the use of a telephone line?
A. POTS
B. Wireless
C. Satellite
D. ATM
A. POTS
A technician is troubleshooting a network connectivity issue with a user's
desktop configured to use a static IP address. The technician notes the
following configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1
Which of the following changes will allow the desktop to communicate
properly with remote networks?
A. Changing the DNS to 172.16.1.100
B. Changing the WINS server to 172.17.4.136
C. Changing the netmask to 255.255.255.0
D. Changing the default gateway to 172.16.3.1
D. Changing the default gateway to 172.16.3.1
Which of the following tools can be used to identify the location of a
network outage?
A. ping
B. traceroute
C. netstat
D. nslookup
B. traceroute
A reserved set of IP addresses in a DHCP scope is commonly assigned to
which of the following network devices? (Select TWO)
A. Workstation
B. Server
C. Laptop
D. Hub
E. Printer
B. Server
E. Printer
Which of the following protocols is the MOST secure for transferring
network device configurations?
A. TFTP
B. SCP
C. RCP
D. FTP
B. SCP
When PKI is used for mutual authentication:
A. the public key is installed on the client and the private key on the
server.
B. both the private and the public key are installed on the server.
C. the private key is installed on the client and the public key on the
server.
D. both the private and the public key are installed on the client.
C. the private key is installed on the client and the public key on the
server.
Which of the following devices contains an earpiece dialing interface and
speaker, and is used to test local loop telephony lines and connections?
A. Butt set
B. Protocol analyzer
C. Punch down tool
D. Toner probe
D. Toner probe
Administrators are performing a war drive around their company's complex.
Which of the following are they attempting to detect?
A. Bluesnarfing attacks
B. DDoS attacks
C. Worms
D. Rogue access points
D. Rogue access points
An administrator is provisioning a 10GBaseSR Ethernet connection between
two core switches. Which of the following cable types should the
administrator plan to use?
A. CAT6 copper
B. RG-6 copper
C. Multimode fiber
D. Single-mode fiber
C. Multimode fiber
An administrator is troubleshooting a device that will not power on. Which
of the following tools should the administrator use to check the wall
outlet?
A. Multimeter
B. Toner probe
C. Cable tester
D. OTDR
A. Multimeter
Which of the following is strictly used to convert analog to digital
signals?
A. Modem
B. Hub
C. NIC
D. Repeater
A. Modem
A device that can detect and disrupt network-based attacks is a(n):
A. IPS
B. DNS
C. DSU
D. IDS
A. IPS
Which of the following network cable types requires grounding?
A. Fiber
B. STP
C. Serial
D. UTP
B. STP
Which of the following commands is MOST appropriate to determine whether a
network interface is up or down?
A. ISAKMPD
B. IFCONFIG
C. ARP
D. SNORT
B. IFCONFIG
VoIP and data traffic are carried on different subnets in an enterprise.
Which of the following techniques can be used to provide both services to
hosts on the same UTP cable?
A. Use SSH tunneling for data connections.
B. Put voice and data on separate VLANs.
C. Upgrade terminations from TIA-568A to TIA-568B.
D. Enable time-division multiplexing on local switches.
B. Put voice and data on separate VLANs.
A technician wants to use an existing DHCP server for three additional
VLANs. Which of the following features needs to be configured to allow for
this addition?
A. DHCP relay
B. Proxy server
C. DHCP server
D. Repeater
A. DHCP relay
Which of the following tools will an administrator need to terminate the
network cabling to the patch panel?
A. Multimeter
B. Toner probe
C. Punch down
D. Certifiers
C. Punch down
When installing two 802.11g access points in the same building, which of
the following channels will MOST likely be used to minimize interference?
A. 5 and 6
B. 1 and 6
C. 6 and 10
D. 2 and 6
B. 1 and 6
Which of the following terminations would be used on a UTP cable connecting
a workstation to a switch?
A. TIA-568A on one end, TIA-568B on the other end
B. TIA-568A on one end, TIA-568A with pairs reversed on the other end
C. TIA-568B on one end, TIA-568B on the other end
D. TIA-568B on one end, TIA-568B with pairs reversed on the other end
C. TIA-568B on one end, TIA-568B on the other end.
A user is reporting issues connecting to the corporate web server. When
analyzing the output from a packet sniffer an administrator sees:
Client->Server SYN
Server->Client ACK
Client->Server RST
Which of the following is the user experiencing?
A. The server is failing to properly respond.
B. The 3-way handshake is complete but the browser is unresponsive.
C. The client is prematurely closing the connection.
D. The server is prematurely closing the connection.
C. The client is prematurely closing the connection.
Which of the following should be used to transfer data between two
computers via their NICs?
A. RG-6 cable
B. Crossover cable
C. Loopback cable
D. Rollover cable
B. Crossover cable
An E1 connection contains how many lines?
A. 22
B. 24
C. 16
D. 32
D. 32
A mobile user reports that after receiving a new patch cable for their
laptop, the laptop is unable to connect to the network. An administrator
verifies that the port is configured correctly and the LAN drop is active.
Which of the following is the MOST likely cause?
A. Crosstalk on the cable
B. Speed mismatch
C. Duplex mismatch
D. Open pairs are present
C. Duplex mismatch
Using network monitoring tools would allow and administrator to do which of
the following?
A. Configure offline devices
B. Examine performance issues
C. View syslog events
D. Install additional software and updates
B. Examine performance issues
Which of the following routing algorithms would provide the fastest
convergence time?
A. A distance-vector algorithm
B. A path-vector algorithm
C. A link-state algorithm
D. A static algorithm
C. A link-state algorithm
Internet-working devices operate at OSI layer:
A. 5
B. 2
C. 4
D. 3
D. 3
A server has an IP address of 192.168.50.12 and a subnet mask of
255.255.255.0. A client on the same network has an IP address of
192.168.50.112 and a subnet mask of 255.255.255.128. Which of the
following BEST describes the result when the client sends a ping to the
server?
A. The packet is received by the server and it replies successfully.
B. The packet is received by the server, but the reply is sent to its
default gateway.
C. The packet is sent directly to the client's default gateway.
D. The packet is dropped by the server because it did not come from its
default gateway.
A. The packet is received by the server and it replies successfully.
Which of the following wireless connections has the SHORTEST maximum
operating distance?
A. 802.11g
B. Bluetooth
C. 802.11b
D. 802.11a
B. Bluetooth
Which of the following describes an email that is sent to users with web
links that direct them to malicious websites?
A. Rogue access points
B. Man-in-the-middle
C. Phishing
D. Viruses
C. Phishing
Which of the following is used to serve as an emergency backup line to
troubleshoot a broadband connection on many routers?
A. VDSL
B. DSL
C. POTS
D. Smart jack
C. POTS
Which of the following network services replies to requests to port 67?
A. DNS
B. DHCP
C. SNMP
D. IMAP
B. DHCP
A technician is working on a SOHO wireless network and notices that the
wireless adapter in the laptop shows excellent connection at 11Mbps. The
technician has a wireless N adapter. Which of the following would BEST
describe this connection speed?
A. The laptop is too far away from the WAP.
B. The WAP is using 802.11a frequencies.
C. The laptop is only set to allow 802.11n connections.
D. The technician is on an 802.11b network.
D. The technician is on an 802.11b network.
An administrator is attempting to verify if a newly installed workstation
is connected to the network. Which of the following commands can be used
to verify basic connectivity?
A. ping
B. hostname
C. route
D. dig
A. ping
Two business partners have recently been connected via a dedicated
extranet. It has been discovered that each of the companies are using the
same private IP address space. Which of the following will help to resolve
potential routing issues?
A. CIDR
B. NAT
C. Multicast
D. PAT
B. NAT
Which of the following devices limits the possibility of third-party
sniffing of traffic between hosts on a local network?
A. Bridge
B. Packet filter
C. Layer 2 switch
D. Protocol analyzer
C. Layer 2 switch
A network technician has discovered from a bandwidth monitoring tool that
nearly 100% of a serial WAN link is being utilized. Which of the following
would the technician MOST likely use in determining the type of traffic
that is causing the excess traffic on the WAN link?
A. Throughput tester
B. Load tester
C. TFTP
D. Packet sniffer
D. Packet sniffer
Which of the following protocols uses port 143 by default?
A. IMAP4
B. NTP
C. SSH
D. SNMP
A. IMAP4
Which of the following protocols is used by a WAP to authenticate its
identity with a server on the domain?
A. TKIP
B. RADIUS
C. CHAP
D. MS-CHAP
B. RADIUS
All of the following features require the need for a nearby power outlet
EXCEPT:
A. port mirroring
B. PPPoE
C. PoE
D. port trunking
C. PoE
Which of the following features would BEST be used to optimize real-time
voice and video chat? (Select TWO).
A. QoS
B. Fault tolerance systems
C. Caching engines
D. Traffic shaping
E. Load balancing
A. QoS
D. Traffic shaping
Which of the following troubleshooting steps should be performed NEXT after
a core router has been reported down?
A. Test a solution
B. Implement a solution.
C. Identify all affected areas.
D. Establish the outage cause.
C. Identify all affected areas.
Which of the following connectors is MOST commonly associated with a
physical bus topology?
A. RJ-45
B. SC
C. RJ-11
D. BNC
D. BNC
Which of the following devices is used to extend network coverage by
helping to maintain the signal quality of the original transmission?
A. Switch
B. Hub
C. Repeater
D. Modem
C. Repeater
A technician needs to extend the telephone company's original point of
entry into the companies Telco closet. Which of the following will need to
be extended?
A. Smart jack
B. 66 Block
C. 110 Block
D. Demarc
D. Demarc
Which of the following statements is TRUE regarding static routing tables?
A. They are harder to maintain.
B. They are used in large and complex networks.
C. The update certain aspects automatically.
D. They are easy to configure and maintain.
A. They are harder to maintain.
A media converter is also known as a:
A. transceiver
B. hub.
C. modem.
D. repeater.
A. transceiver
Which of the following authenticates a person by a particular key pair?
A. EAP
B. PKI
C. RADIUS
D. CHAP
B. PKI
Which of the following OSI layers does a Layer 3 switch operate at? (Select
TWO).
A. Presentation
B. Network
C. Transport
D. Data link
E. Session
B. Network
D. Data link?
Which of the following functions at Layer one of the OSI model?
A. Repeater
B. Switch
C. DHCP
D. Load balancer
A. Repeater
An administrator needs to view the routing table on a UNIX system. Which
of the following tools should be used?
A. ifconfig
B. traceroute
C. netstat
D. nslookup
C. netstat
If cable is rated for 10GBaseT, how much theoretical bandwidth can this
cable provide in megabits per second (Mbps)?
A. 100Mbps
B. 10Mbps
C. 10000Mbps
D. 1000Mbps
C. 10000Mbps
Which of the following is a device that sits inline on the network and
stops network attacks in real-time?
A. PKI
B. IDS
C. VPN
D. IPS
D. IPS
FTP is commonly used to do which of the following?
A. Transfer files to a network drive
B. Redirect URLs of a network device
C. Send and receive emails
D. Remotely manage servers
A. Transfer files to a network drive
A software vendor wants to distribute free updates for clients via the web.
Which of the following protocols would be the MOST efficient to distribute
the updates?
A. SSH
B. FTP
C. DNS
D. TLS
B. FTP
A technician would use a logical network diagram to determine the number
of:
A. Cables in the network.
B. Users on the network.
C. Broadcast domains on the network.
D. Switches on the network.
B. Broadcast domains on the network.
Which of the following commands would test the loopback adapter of an
internal NIC?
A. ping 127.127.0.0
B. ping 127.0.0.1
C. ping 127.1.1.1
D. ping 127.127.1.0
B. ping 127.0.0.1
A technician moves a VOIP phone to a new location, but discovers the phone
does not start up when plugged into the network. Which of the following
explains this situation?
A. The switch does not support PoE.
B. The phone needs a fiber port.
C. QoS is not enabled on the switch.
D. The jack needs to be rewired using the 568B standard.
A. The switch does not support PoE.
An administrator wants to connect users at three branch offices to the main
office through the internet. Which of the following devices should the
administrator install at the main office to BEST accomplish this goal?
A. IPS sensor
B. Proxy server
C. VPN concentrator
D. Layer 2 switch
C. VPN concentrator
Which of the following mitigation techniques is the MOST effective to
defend against social engineering?
A. Antivirus scanner
B. User training
C. Patch management solution
D. Security and network policy revision
B. User training
Which of the following is the default DNS port?
A. 143
B. 53
C. 23
D. 443
B. 53
Which of the following commands would MOST likely be used to list the
status of all established TCP connections on port 80?
A. netstat -r
B. netstat -v
C. netstat -aupn
D. netstat -at
E. netstat -p tcp
E. netstat -p tcp
An administrator replaced a router with a switch. End users are able to
access network shares but are not able to access the Internet. Which of
the following is the BEST explanation why the users are unable to access
the Internet?
A. Router routes traffic between different networks and a switch does not.
B. The switch needs to be setup to forward data traffic to the Internet.
C. The firewall needs to be setup to allow traffic to reach the Internet.
D. The new switch is faulty and needs to be replaced and configured
correctly.
A. Router routes traffic between different networks and a switch does not.
filtering?
A. Presentation
B. Application
C. Session
D. Network
B. Application
Which of the following is the term used to describe the aggregation of
multiple components to form one logical component?
A. Bonding
B. CSMA/CD
C. Circuit switching
D. Channelization
A. Bonding
Which of the following uses a certificate for a tunneling connection?
A. PPTP
B. SSL VPN
C. VNC
D. RDP
B. SSL VPN
Frames are found within which of the following layers of the OSI model?
A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 5
C. Layer 2
Which of the following ports is associated with FTP?
A. 20
B. 53
C. 3389
D. 23
A. 20
Which of the following tools would an administrator use to record and
display data passing through the network?
A. Event recorder
B. Toner probe
C. TDR
D. Protocol analyzer
D. Protocol analyzer
A network engineer is creating a way to access several servers through the
Internet. Which of the following will accomplish this?
A. Configure dynamic private IP addressing for each server.
B. Assign a static private IP address to each server.
C. Assign a static public IP address to each server.
D. Configure dynamic public IP addressing for each server.
C. Assign a static public IP address to each server.
Which of the following replaces the destination IP address of a packet?
A. SNAT
B. NAT
C. DNS
D. DHCP
A. SNAT
Which of the following describes a routing table that needs to be
maintained manually?
A. Static
B. Link-state
C. Dynamic
D. Hop count based
A. Static
A user receives an email that asks for a username and password and appears
to be from a bank. Which of the following attacks may be occurring?
A. Man in the middle
B. Phishing
C. Worm
D. ARP spoofing
B. Phishing
A technician is troubleshooting a network connectivity issue. Given the
following abbreviated traceroute output:
1 192.168.1.1
2 172.16.40.1
3 10.4.0.1
4 172.16.40.1
Which of the following is MOST likely occuring?
A. IP conflict
B. Broadcast storm
C. Switching loop
D. Routing loop
D. Routing loop
Which of the following logical network topologies is MOST likely to use the
IPSec protocol?
A. VLAN
B. VPN
C. Peer-to-peer network
D. VTP domain
B. VPN
Which of the following allows and administrator to view malicious activity
after it has taken place?
A. IDS
B. IPS
C. Packet sniffer
D. Port scanner
A. IDS
A user reports being occasionally disconnected from the server. Which of
the following tools could the technician use to determine if it is the
client or the server that is dropping the connection?
A. Packet sniffer
B. Throughput tester
C. Load balancer
D. Multimeter
A. Packet sniffer
An administrator is planning a new wireless network by using only channels
1, 6, and 11. This is to minimize which of the following?
A. Attenuation
B. Interference
C. Reflection
D. Broadcast storms
B. Interference
Which of the following protocols is used to establish multicast groups?
A. OSPF
B. DHCP
C. RIP
D. IGMP
D. IGMP
Which of the following is intended to be used over existing SONET
equipment?
A. 10GBaseLR
B. 10GBaseEW
C. 10GBaseER
D. 1000BaseT
B. 10GBaseEW
Which of the following is the MOST common collision detection technique
used by an Ethernet switch?
A. CSMA/CA
B. 802.11a RTS
C. Bonding
D. CSMA/CD
D. CSMA/CD
Which of the following networks would MOST likely require EGP routing?
A. Networks with classless Internet domain routing
B. Networks that use OSPF in addition to static rotues
C. Networks that use encryption
D. Networks with multiple ISPs
D. Networks with multiple ISPs
Which of the following cables would a technician use to connect two
switches together?
A. Crossover
B. 568B
C. Loopback
D. 568A
A. Crossover
Which of the following protocols can be found at the application layer?
A. Telnet
B. UDP
C. TCP
D. SNMP
A. Telnet
Which of the following describes 1Gigabit Ethernet?
A. 10Base2
B. 10GBaseER
C. 100Base5
D. 1000BaseT
D. 1000BaseT
Which of the following is a dynamic routing protocol?
A. CIDR
B. SNAT
C. OSPF
D. SCTP
C. OSPF
Which of the following could be used to check network connectivity on a
workstation?
A. Toner probe
B. Temperature monitor
C. Cable tester
D. Voltage meter
C. Cable tester
Which of the following would be used to capture data moving across the
network?
A. Throughput tester
B. Spanning tree
C. Packet sniffer
D. Load balancer
C. Packet sniffer
An administrator needs to diagnose problems with a WINS server. Which of
the following tools should be used?
A. nslookup
B. netstat
C. nbtstat
D. dig
C. nbtstat
Which of the following would an administrator MOST likely require in order
to connect a client to a WPA encrypted network?
A. Pre-shared key
B. SSID
C. DSA public key
D. Gateway address
E. PIN
A. Pre-shared key
A network engineer is logged onto a router and attempts to ping a host from
the router. The first set of ping packets has a 25% success rate. Several
subsequent ping attempts all have a 100% success rate. Which of the
following describes the MOST likely reason?
A. Intermittent issues are present caused by faulty network cabling
B. Network denial of service attack is present
C. Router was still attempting to learn ARP address
D. Firewall was initially blocking the ping attempts.
C. Router was still attempting to learn ARP address
Which of the following protocols uses a three-way handshake process before
establishing a connection?
A. DNS
B. TFTP
C. UDP
D. TCP
D. TCP
A network has four switches; each switch has a physical link to all other
switches. Which of the following topologies is being used?
A. Star
B. Mesh
C. Point-to-multipoint
D. Ring
B. Mesh
Which of the following is a VLAN trunking protocol standard?
A. 802.1x
B. 802.3
C. 802.1q
D. 802.11
C. 802.1q
Which of the following would be used to identify the hot zone in a server
room?
A. Cable stripper
B. Temperature monitor
C. OTDR
D. Voltage event monitor
B. Temperature monitor
Which of the following will separate broadcast domains by default?
A. Layer 2 switch
B. Repeater
C. Router
D. Hub
C. Router
A link light on a switch is an example of which of the following Ethernet
properties?
A. Collision detection
B. Collision avoidance
C. Multiple access points
D. Carrier sense
D. Carrier sense
A technician arrives at a site and is troubleshooting an unfamiliar
network. Which of the following steps should be done FIRST to diagnose the
problem?
A. Compare wiring schematics to industry standards.
B. Escalate the problem to administrative technician.
C. Identify symptoms and draw a network diagram.
D. Use a port analyzer to determine network topology.
C. Identify symptoms and draw a network diagram.
In order for computers with private IP addresses to access the public
Internet, which of the following must the router perform?
A. DHCP
B. APIPA
C. BGP
D. NAT
D. NAT
An administrator would like to monitor the network to evaluate which
employees are using an excessive amount of bandwidth on peer to peer
sharing services. Which of the following monitoring techniques would BEST
be used?
A. Throughput testing
B. Stateful packet inspection
C. Load balancing
D. Packet sniffing
D. Packet sniffing
A company has recently received a new ADSL backup Internet connection.
Which of the following will MOST likely be used between the modem and the
ISP?
A. RAS
B. MSCHAP
C. PPPoE
D. IPSec
C. PPPoE
Which of the following technologies was designed to provide the FASTEST
data rates over analog phone lines?
A. MPLS
B. RADSL
C. SONET
D. ADSL
D. ADSL
An administrator is configuring IP 10.178.1.5 on a legacy device that will
only accept a classful address. Which of the following is the address that
can be used in this scenario?
A. 10.178.1.5/30
B. 10.178.1.5/16
C. 10.178.1.5/1
D. 10.178.1.5/8
D. 10.178.1.5/8
Which of the following is true of an ACL when a packet matching an ACE is
found?
A. The matching ACE is processed and then the last ACE is examined.
B. The matching ACE is processed and then the next ACE is examined.
C. The matching ACE is processed and the next packet is examined.
D. the matching ACE is skipped to allow all other ACEs to be examined.
C. The matching ACE is processed and the next packet is examined.
Which of the following is the MOST accurate description of a L2/L3 switch?
A. A switch that directly connects to a router
B. A router that directly connects to a switch
C. A multi-purpose switch fabric used in full mesh environments
D. Performs switching and routing duties
D. Performs switching and routing duties
Which of the following features enables a firewall to inspect a packet
based on connection status?
A. Signature identification
B. Stateless inspection
C. Port forwarding
D. Stateful inspection
D. Stateful inspection
Which of the following would contain information regarding network device
alerts using SNMP?
A. Audit log
B. Syslog
C. Ping sweep reports
D. History log
B. Syslog
Which of the following describes how original network diagrams contained
in the documentation should be maintained?
A. Used as a point-in-time reference but never relied upon
B. Used only to satisfy a network upgrade checklist requirement
C. Regular audits to ensure that diagrams remain accurate
D. Considered to be the only source-of-truth of the network state
C. Regular audits to ensure that diagrams remain accurate
A technician has been monitoring network performance of the distribution
hubs. It appears that many collisions are occurring during working hours.
Which of the following is the BEST approach to resolve these collisions?
A. Replace hubs with switches
B. Replace hubs with repeaters
C. Upgrade the hubs to 10GB
D. Implement time of day restrictions
A. Replace hubs with switches
Which of the following describes the location where an administrator would
terminate a bundle of CAT5e cables?
A. Smart jack
B. Patch panel
C. Switch
D. Router
B. Patch panel
Which of the following technologies has the LARGEST bandwidth capacity?
A. SDSL
B. ADSL
C. OC3
D. OC12
D. OC12
Which of the following ports are associated with email protocols by
default? (Select TWO)
A. 123
B. 22
C. 25
D. 110
E. 161
C. 25
D. 110
Which of the following devices only monitors traffic being sent to a host?
A. IPS
B. Firewall
C. IDS
D. Proxy server
C. IDS
When pinging the default gateway there is a 40% packet loss. Which of the
following MOST likely explains this situation?
A. Pins 1 and 3 are open
B. Incorrect subnet mask
C. Duplex mismatch
D. Incorrect VLAN
C. Duplex mismatch
Which of the following wiring distribution components uses a bridge clip to
connect both sides of the block?
A. Smart jack
B. Demarc
C. 66 block
D. 110 block
C. 66 block
After receiving network problem reports from users, the technician notices
that the router is rebooting itself several times a day. Which of the
following would the technician do NEXT to further diagnose this problem?
A. Replace the router's memory and CPU.
B. Test the router's connection with a throughput tester.
C. Review the router's event logs
D. Install redundant network connections to the router
C. Review the router's event logs
An administrator can ping a server, but is unable to SSH to it. Which of
the following is the MOST likely cause of this?
A. The default gateway on the server is incorrect.
B. An IDS device prevents SSH connections.
C. The subnet mask on the client is incorrect.
D. A host-based firewall prevents SSH connections.
D. A host-based firewall prevents SSH connections.
Which of the following is a secure replacement for telnet console
connections?
A. TLS
B. SSH
C. HTTPS
D. SIP
B. SSH
Which of the following cable types is MOST likely to have LC connectors?
A. Category 6 cable
B. Shielded twisted pair
C. RG-6
D. Multimode fiber
D. Multimode fiber
Which of the following allows a technician to mask a private network of IP
addresses behind one public IP address?
A. DHCP
B. DNS
C. Subnetting
D. NAT
D. NAT
Which of the following is used to terminate CAT5e cable on the 110 block?
A. Punch down tool
B. Cable stripper
C. Cable tester
D. Snips
A. Punch down tool
An administrator has replaced a faulty 1000BaseT NIC on the server switch
with a new 1000BaseFX. Which of the following should the administrator do
NEXT?
A. Update the wiring schematics
B. Update the switch configuration logs
C. Reboot the switch to enable the new connection
D. Update the logical network diagram
A. Update the wiring schematics
In which of the following would a technician need to use a punch down tool
in order to end a cable?
A. to terminate a fiber connection in an IDF
B. To connect a patch cable to a wall jack
C. To terminate a rollover cable to a network device
D. To terminate cable into a patch panel
B. To connect a patch cable to a wall jack
Which of the following BEST describes a beacon in a wireless network?
A. A type of web cookie that manages session.
B. A token ring frame indicating a serious network problem.
C. A device that amplifies a signal to broadcast SSIDs.
D. A frame that contains AP parameters, such as SSID and rates.
D. A frame that contains AP parameters, such as SSID and rates.
A new LAN switch is installed with on fiber ports. Which of the following
would a technician need on the new switch to allow compatibility to the
existing fiber network?
A. Repeater
B. Router
C. Hub
D. Media converter
D. Media converter
VLANs occur at which of the following layers of the OSI model?
A. 2
B. 3
C. 4
D. 1
A. 2
Which of the following commands is used to track the path a packet takes to get to its destination?
A. nbtstat
B. traceroute
C. ifconfig
D. nslookup
B. traceroute
Which of the following is the MAIN disadvantage of using the spanning tree protocol?
A. It only runs at Layer 3
B. Convergence takes too long.
C. The root port must have gigabit speeds.
D. It is a vendor specific protocol.
B. Convergence takes too long.
Which of the following features of a switch allows all VLANs to pass through the same port?
A. Port mirroring
B. Trunking
C. PoE
D. Spanning tree
B. Trunking
Which of the following protocols could be used in a peer-to-peer topology?
A. RADIUS
B. NetBIOS
C. IGMP
D. TACACS+
C. IGMP
The primary purpose of an IPS is which of the following?
A. Stop or log intrusions
B. Relay wireless traffic
C. Detect or route packets
D. Route internal network traffic
A. Stop or log intrusions
Which of the following Internet connection types uses a POTS line?
A. Cable
B. Dial-up
C. Fiber
D. Satellite
B. Dial-up
Interior gateway protocols are used for resolving routes:
A. within networks.
B. between WAPs.
C. between networks.
D. within routers.
A. within networks.
Which of the following can be used to record and save VoIP conversations?
A. Port scanner
B. Packet sniffer
C. IDS
D. Banner grabber
B. Packet sniffer
Which of the following cables can be a UTP cable?
A. Fiber
B. RG-6
C. CAT6
D. RG-59
C. CAT6
Where does the responsibility for maintenance and support shift from the telecommunication company
to the customer?
A. Demarc
B. Where the telecommunication lines enter the building
C. Central office
D. Smart jack
A. Demarc
Which of the following would a technician set up for a building within a campus?
A. MDF
B. EMI
C. IDF
D. ESD
C. IDF
After adding a new cable segment to the network, the technician should:
A. Update the wiring schematics.
B. Create a new baseline document.
C. Document the changes in the business continuity plan.
D. Update the disaster recovery plan.
A. Update the wiring schematics.
Where would a technician MOST likely place the company MX and A records?
A. Firewall
B. Proxy server
C. DNS server
D. Load balancer
C. DNS server
Which of the following would MOST likely contain information about unlabeled datacenter
connections?
A. Emergency call list
B. Procedures manual
C. Logical network diagram
D. Wiring schematic
D. Wiring schematic
When no specific route to a destination exists, a router will fallback to its
A. BGP peer.
B. default gateway.
C. source host.
D. shortest path.
B. default gateway.
Web users are reporting issues downloading various types of media. Which of the following should the
administrator do FIRST?
A. Continue to gather information and see what other problems may exist.
B. Create an action plan and solution identifying potential effects.
C. Determine the most probable cause.
D. Find out what has recently changed on the network.
A. Continue to gather information and see what other problems may exist.
Which of the following protocols functions at the transport layer of the OSI model?
A. RTP
B. SIP
C. UDP
D. TCP
C. UDP
D. TCP
Which of the following ports will allow a technician to transfer configuration data to a network switch?
A. 3359
B. 110
C. 389
D. 69
D. 69
Which of the following is encrypted when IPSec operates in tunnel mode? (Select TWO)
A. Source MAC address
B. IP address of the tunnel termination points
C. Destination MAC address
D. Payload information
E. Header information
D. Payload information
E. Header information
A new company has been given one public IP address. The company employs 200 users requiring
Internet access from the headquarters. Which of the following can be implemented to provide Internet
access for all the employees?
A. Proxy server
B. NAT
C. Multicasting
D. Subnetting
B. NAT
Which of the following protocols has similar functionality to Telnet but operates more securely than
Telnet?
A. RSH
B. SNAT
C. SSH
D. TFTP
C. SSH
Which of the following requires the pin-outs to be the same on both ends of a cable?
A. Straight
B. Rollover
C. Loopback
D. Crossover
A. Straight
When a device wants to send a packet over the network, the process of listening to the network media
to see whether any other packets are sent is called:
A. multiple access points.
B. carrier sense.
C. media access control.
D. collision avoidance.
B. carrier sense.
Which of the following network devices commonly uses OSPF?
A. Layer 2 switch
B. Firewall
C. Repeater
D. Router
D. Router
Which of the following commands is used to display other computers running on the network?
A. net view
B. ipconfig
C. nslookup
D. hostname
A. net view
Which of the following would MOST likely be used with multimode fiber?
A. 10GBaseT
B. 10GBaseSR
C. 10GBaseER
D. 10GBaseLR
B. 10GBaseSR
A company finished deploying an 802.11g wireless mesh. The administrator receives a call from a user
who is unable to connect to the company wireless, though all network configurations are centrally
managed. Which of the following is MOST likely causing the connection problem?
A. The end user is using an 802.11b/g wireless card.
B. The end user is using an 802.11a wireless card.
C. The access point has omni-directional antennas.
D. The access point is not broadcasting the SSID.
B. The end user is using an 802.11a wireless card.
Which of the following is the purpose of QoS?
A. Load balance traffic across multiple LAN and WAN links.
B. Classify, mark and prioritize traffic on WAN and LAN links.
C. Guarantee traffic delivery.
D. Increase speed of network traffic.
B. Classify, mark and prioritize traffic on WAN and LAN links.
A technician replaces a hub with a network switch. Multiple users notice that traffic congestion has
lessened substantially. Which of the following was MOST likely causing the network congestion?
A. Crosstalk
B. Attenuation
C. Signal bleed
D. Collisions
D. Collisions
Which of the following describes the ICMP protocol?
A. Layer 4 protocol
B. TCP protocol
C. Layer 3 protocol
D. UDP protocol
C. Layer 3 protocol
If the goal is to minimize the amount of time it takes for other routers in the network to learn about a
routing change, the network administrator should choose a routing protocol that has the shortest:
A. convergence.
B. link state.
C. path.
D. multipath.
A. convergence.
Which of the following DNS record types is used for IPv6 host address mappings?
A. CNAME
B. AAAA
C. SRV
D. PRT
B. AAAA
Users from different locations are reporting issues with various intranet sites. After identifying all the
affected areas, which of the following should a technician do NEXT?
A. Determine what has recently changed.
B. Establish the most probably cause.
C. Create an action plan and solution identifying potential effects.
D. Continue to identify new symptoms and problems elsewhere.
A. Determine what has recently changed.
Which of the following OSI model layers is the session layer?
A. Layer 5
B. Layer 1
C. Layer 6
D. Layer 7
A. Layer 5
All of the following are valid subnet masks EXCEPT:
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.240.0
D. 255.255.253.0
D. 255.255.253.0
In which of the following components will POTS lines MOST likely be terminated?
A. Hub
B. Switch
C. Patch panel
D. 110 block
D. 110 block
Which of the following can be configured on a WAP to authenticate users and place them onto the right
VLAN?
A. Trunking
B. 802.1q
C. 802.1x
D. AAA
C. 802.1x
Which of the following cable types have a maximum recommended cable length of 100 meters (328
feet)?
A. Fiber
B. Coaxial
C. Ethernet
D. Serial
C. Ethernet
A user has reported slow network response in a large training room; the class requires many students to
access the same website each day. Which of the following would BEST remedy this problem?
A. Firewall
B. Caching engine
C. Jitter correction
D. Fault tolerance
B. Caching engine
Which of the following Internet technologies would provide the GREATEST bandwidth?
A. T3
B. OC3
C. Cable
D. T1
B. OC3
Which of the following would MOST likely be used to punch down LAN cables before connecting
them to the main switch?
A. 110 block
B. MDF
C. 66 block
D. IDF
A. 110 block
Which of the following helps network traffic optimization by remembering where each computer is
connected?
A. Firewall
B. VLAN
C. Switch
D. Network analyzer
C. Switch
An application layer firewall is MOST beneficial when used with which of the following protocols?
A. GRE
B. VoIP
C. HTTP
D. SNMP
D. SNMP
Which of the following would an administrator MOST likely use to forward inbound packets on port
80 to port 8080 on a local server?
A. Repeater
B. Firewall
C. Packet shaper
D. Bridge
B. Firewall
Multiple uses call from the same location saying that they have no network connectivity. The
administrator is unable to ping the main switch at that IDF. Which of the following configuration
management documents would the adminsitrator MOST likely consult to troubleshoot the issue?
A. Physical network diagram
B. Baseline configuration
C. Performance and transaction logs
D. Security policy
A. Physical network diagram
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a
technician do NEXT?
A. Determine if anything else has changed.
B. Identify the affected areas.
C. Escalate part of the solution to the appropriate section.
D. Create an action plan.
B. Identify the affected areas.
Which of the following LAN technologies has the GREATEST length segmentation limit?
A. 100BaseFX
B. 1000BaseT
C. 10BaseF
D. 100BaseTX
C. 10BaseF
Users are reporting problems connecting to servers in the remote company.com domain. The
administrator suspects this to be a DNS problem. Which of the following commands would the
administrator run to identify the DNS server of the remote company.com?
A. dig company.com mx
B. ifconfig -a
C. dig company.com ns
D. ipconfig /all
C. dig company.com ns
A NIC capable of utilizing 'auto-sense' for a given connection is actually configuring which settings
dynamically on its own? (Select TWO)
A. Link latency
B. Cable type
C. MAC address
D. Link speed
E. Link duplex
D. Link speed
E. Link duplex
Which of the following devices can be configured to block ports?
A. DHCP server
B. Basic firewall
C. Content filter
D. Hub
B. Basic firewall
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty
NIC. Which of the following diagrams would assist the technician in finding the machine that is
causing the problem?
A. Physical and logical network
B. Physical network
C. DHCP tables and DNS records
D. Logical network
A. Physical and logical network
Using 802.1x on a switch accomplishes which of the following?
A. Port trunking
B. Port mirroring
C. Port spanning
D. Port authentication
D. Port authentication
Which of the following does not affect security on a wireless access point?
A. SSID
B. DHCP
C. Encryption
D. Password
B. DHCP
A technician is installing new LAN lines into a company's new office space. Which of the following is
the termination point for each new run?
A. Patch panel
B. Demarc
C. 66 Block
D. Smart Jack
A. Patch panel
A private AS number is useful in which of the following situations?
A. Enterprise network without redundant links
B. Isolated network at a single site
C. Internet multihoming with all ISPs in same BGP area
D. Internet multihoming with multiple carriers
C. Internet multihoming with all ISPs in same BGP area
Which of the following is an example of an IPv4 address?
A. 1A-23-F9-CD-06-9B
B. 10:0:10:1
C. 10.0.10.1
D. 100.101.100
C. 10.0.10.1
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected
computer is on the network and checks if a node is saturating the network. Which of the following
tools should be utilized in this situation?
A. Multimeter
B. IGMP
C. Port scanner
D. Protocol analyzer
D. Protocol analyzer
Which of the following can be used by web developers to remotely and securely update content on a
website?
A. SNMP
B. SFTP
C. FTP
D. RCP
B. SFTP
To ensure that VoIP phones are provided with power without using independent power supplies,
switches on the network must have which of the following features?
A. Spanning tree
B. VLAN tagging
C. PoE
D. PPPoE
C. PoE
Which of the following is the BEST device to use in order to implement a VLAN on the network?
A. Proxy server
B. VPN
C. VNC
D. Switch
D. Switch
Which of the following specialized network devices is used to authenticate users to the web and blocks
certain websites from being accessed?
A. DNS server
B. Proxy server
C. CSU/DSU
D. IDS
B. Proxy server
In which of the following topologies could the failure of one machine cause the entire network to stop
functioning?
A. Token ring
B. Star
C. Mesh
D. Spanning tree
A. Token ring
Which of the following technologies can prevent a department's network broadcast from propagating to
another department's network if they are located on the same switch?
A. A VLAN
B. A hub
C. A trunk
D. A firewall
A. A VLAN
An administrator wants to provide redundant paths to network resources in case a link fails. Which of
the following switch features would the administrator need to use to accomplish this task?
A. Trunking
B. Spanning tree
C. VLAN
D. PoE
B. Spanning tree
Which of the following is the BEST reason for implementing QoS?
A. To implement a network security policy
B. To minimize network delays for real-time traffic
C. To prevent peer to peer network traffic from being delivered
D. To provide fault tolerance by using load balancing
B. To minimize network delays for real-time traffic
Which of the following describes an attack where all TCP flags are enabled on a packet?
A. DDos
B. Xmas attack
C. Smurf attack
D. DoS
B. Xmas attack
A technician is using a packet sniffer to identify a server. The technician observes the following
network traffic:
HOST-A TCP 80 -> HOST-B TCP 1328 PUSH
HOST-B TCP 1328 -> HOST-A TCP 80 PUSH ACK
HOST-A UDP 69 -> HOST C UDP 1235
HOST-C ICMP -> HOST-D ICMP
Which of the following is MOST likely to be the server?
A. HOST-C
B. HOST-A
C. HOST-B
D. HOST-D
B. HOST-A
Which of the following would be used to determine if near end crosstalk occurs?
A. Cable tester
B. Toner probe
C. Protocol analyzer
D. Multimeter
A. Cable tester
Which of the following network protocols can be used to keep the network device clocks
synchronized?
A. RTP
B. SMTP
C. NTP
D. SNMP
C. NTP
A technician would like to separate the HR department's workstations from the other workstations at
the company. Which of the following network topologies should be used?
A. VPN
B. VLAN
C. Subnetting
D. Peer to peer
B. VLAN
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a
cable to plug their laptop into the router in order to be able to console into it. Which of the following
would the administrator need to make this connection?
A. Loopback
B. 568B
C. Crossover
D. Rollover
D. Rollover
Which of the following is a best practice when implementing a basic wireless network?
A. Configuring encryption with a WEP key and labeling the key on the WAP
B. Not configuring the ESSID point
C. Disabling ESSID broadcast
D. Adding two access points per area of service
C. Disabling ESSID broadcast
Which of the following commands can be used to add a default gateway to a host?
A. traceroute - d 192.168.1.1
B. ping -s 192.168.1.1
C. ifconfig eth0 192.168.1.1 255.255.255.0
D. route add 0.0.0.0 gw 192.168.1.1
D. route add 0.0.0.0 gw 192.168.1.1
Which of the following protocols is responsible for the delivery of email from server to server?
A. IMAP
B. SNMP
C. POP3
D. SMTP
D. SMTP
Which of the following protocols is typically used for VoIP solutions?
A. SSH
B. RTP
C. TLS
D. IGMP
B. RTP
Which of the following provides encrypted KVM console access to remote computers?
A. RAS
B. PPP
C. RDP
D. VPN
C. RDP
After troubleshooting a network problem, a technician determines that the problem is not on the local
network but exists on the ISP network. Which of the following should the technician do NEXT?
A. Escalate the problem to the ISP for resolution
B. Report the ISP to the IANA.
C. Visit the ISP data center and reboot the router.
D. Switch the Internet connection to a new ISP.
A. Escalate the problem to the ISP for resolution.
Which of the following activities will not be possible if the gateway IP address is set incorrectly on a
client's machines?
A. Pinging a remote computer
B. Printing over a local network
C. Sharing local network files
D Sniffing the network traffic
A. Pinging a remote computer
Which of the following is a direct advantage of having wireless standards?
A. Increased number of protocols can be used
B. Greater device security
C. Increased use of wireless spectrum
D. Interoperability between devices
D. Interoperability between devices
CAT5e cable running to a network closet should always be
A. punched down on a 66 block
B. placed in a separate VLAN.
C. spliced into a 100-pair cable.
D. terminated in a patch panel.
D. terminated in a patch panel.
Which of the following would be used when designing a climate controlled room?
A. Voltage event recorder
B. Temperature monitor
C. Multimeter
D. HVAC
B. Temperature monitor
Which of the following can be configured to logically group ports into different subnets on a switch?
A. VTP
B. VLAN
C. VTY
D. VPN
B. VLAN
Which of the following is inversely proportional to a wireless client connection speed?
A. Frequency of the access point
B. ESSID length on the access point
C. Encryption of the connection
D. Distance from the access point
D. Distance from the access point
A technician needs ton ensure that the IP of the DHCP enabled workstation will never change. Which
of the following can be implemented on the DHCP server to accomplish this requirement?
A. Reservation
B. Request
C. Option
D. Offer
A. Reservation
An administrator needs to extend the wireless coverage inside of the company's office space. Which of
the following devices would MOST likely be installed to allow this extension?
A. Repeater
B. Firewall
C. Switch
D. Router
A. Repeater
Which of the following documents should always be kept up-to-date after any major changes are made
to a network backbone?
A. Network diagram
B. Network security procedure
C. Company policy
D. Performance baseline
A. Network diagram
Which of the following are commonly used FTP ports? (Select TWO)
A. 22
B. 23
C. 20
D. 21
E. 25
C. 20
D. 21
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant.
B. autonomous.
C. converged.
D. vectored.
C. converged.
Which of the following is the MOST widely used VoIP protocol?
A. SIP
B. IAX
C. SCTP
D. H.264
A. SIP
Which of the following connector types is commonly identified by two rows of pins with four in one
row and five in the other?
A. SC
B. DB-9
C. RJ-45
D. BNC
B. DB-9
Which of the following address formats uses 32-bit addressing?
A. IPv6
B. IPv4
C. Host address
D. MAC address
B. IPv4
Which of the following is the MOST important factor to ensure wireless connectivity?
A. Centralized device management
B. Installing WPA
C. AP placement
D. Wireless encryption
C. AP placement
An administrator monitors the performance of a network and router and wants to determine if the
traffic load is greater than normal. Which of the following should the administrator do to discover this?
A. Clear the interface buffers and reset packet counts.
B. Compare current information with the router baseline.
C. Review the logical network diagram for default connection speeds.
D. Perform interface stress tests to see if performance is degraded.
B. Compare current information with the router baseline.
Which of the following is the MOST appropriate tool for detecting the enabled network services in the
default install of an operating system?
A. Intrusion detection software
B. Honeypot
C. Port scanner
D. Packet sniffer
C. Port scanner
A network sniffer has been set up on a switch port in an attempt to monitor traffic from another switch
port. Which of the following technologies would allow this to work in a switched network?
A. VLANs
B. Port mirroring
C. Port trunking
D. Spanning tree
B. Port mirroring
A user's web browser begins displaying SSL certificates mismatch warnings. Which of the following
attacks may be occurring?
A. Man in the middle
B. Smurf
C. Denial of service
D. Password hijacking
A. Man in the middle
Which of the following routing protocols runs over UDP and determines path based upon distance
vectors?
A. RIP
B. BGP
C. OSPF
D. IS-IS
A. RIP
An administrator wants to be alerted when a network-based attack is underway, but the company policy
prohibits blocking or dropping network connections. Which of the following MUST be deployed?
A. Firewall
B. IPS
C. Managed PKI
D. IDS
D. IDS
Which of the following is a secure method for administering a network device?
A. FTP
B. TFTP
C. SIP
D. SNMPv3
D. SNMPv3
A long fiber optic segment has failed. A network technician suspects a broken cable. Which of the
following tools can be utilized to help determine where the cable break has occurred?
A. TDR
B. Toner probe
C. Multimeter
D. OTDR
D. OTDR
An administrator is at a client's site to figure out an intermittent network problem. Which of the
following is the FIRST step in the troubleshooting methodology that should be performed?
A. Create and action plan and solution identifying potential effects.
B. Identify the affected areas of the network.
C. Gather information.
D. Implement and test the solution.
C. Gather information.
Which of the following cables would be used to transfer data from one computer to another if both
computers are directly connected to each other?
A. Crossover
B. Patch
C. Loopback
D. Rollover
A. Crossover
An administrator has added four switches to a campus network. Each switch is connected to all other
switches. Which of the following topologies is represented in this design?
A. Star
B. Mesh
C. Ring
D. Bus
B. Mesh
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
A. 802.11n
B. 802.11a
C. 802.11b
D. 802.11g
A. 802.11n
Which of the following BEST describes a late collision?
A. It does not have as much affect on the network as does a regular collision.
B. It occurs when the speeds are mismatched.
C. It occurs after the first 64 bytes of the frame are transmitted.
D. It can only occur after a regular collision has occurred.
C. It occurs after the first 64 bytes of the frame are transmitted.
An administrator reports to work in the morning to find that all of the company's computers have not
received the nightly updates. Which of the following should the administrator check FIRST to
determine the issue?
A. Wiring schematic
B. Acceptable use policy
C. Error logs
D. Session logs
C. Error logs
Which of the following is a secure way to transfer files from one device to another?
A. TFTP
B. SFTP
C. SNMPv3
D. FTP
B. SFTP
Which of the following cabling types should be used with 100BaseTX?
A. Coaxial
B. Fiber
C. Token ring
D. UTP
D. UTP
A Linux user is reporting trouble accessing the Internet. After verifying that the workstation is
authenticated to the domain, which of the following should the administrator perform FIRST on the
Linux workstation?
A. nslookup
B. ifconfig
C. ipconfig
D. dig
D. dig
An administrator has configured two hosts as follows:
HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
HOST B
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
Which of the following MUST be changed in order to allow HOST A to talk to HOST B?
A. HOST A netmask to 255.255.255.0
B. HOST B netmask to 255.255.252.0
C. HOST B IP address to 192.168.2.200
D. HOST A IP address to 192.168.2.100
C. HOST B IP address to 192.168.2.200
Which of the following allows TCP/IP packets to be analyzed for possible threats?
A. IDS
B. DNS server
C. Proxy server
D. CSU
A. IDS
Which of the following exchanges routing information between two autonomous systems?
A. OSPF
B. IGP
C. EIGRP
D. EGP
D. EGP
Which of the following would hep a new administrator quickly determine if a network had a DMZ for
its publicly accessible servers?
A. Wiring schematics
B. Baselines
C. Regulations
D. Logical network diagrams
D. Logical network diagrams
An administrator is troubleshooting a communication issue between two computers on the same Layer
2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?
A. Setup an ACL that allows and logs all IP traffic between the two computers
B. Setup a span port on the switch to watch for CRC errors
C. Configure a spanning tree to check for a loop
D. Connect both computers using a crossover cable
D. Connect both computers using a crossover cable
Which of the following WAN types uses a ring topology? (Select TWO)
A. Efl`1
B. Frame relay
C. FDDI
D. ATM
E. SONET
C. FDDI
E. SONET
Which of the following IP addresses is a private IP address?
A. 11.100.101.1
B. 192.166.100.1
C. 192.186.200.221
D. 172.22.254.254
D. 172.22.254.254
An administrator receives a contract for a server install at a new building. Which of the following
should be completed after installing the server?
A. Review the evacuation procedures
B. Test the air temperature
C. Log the administrator password used
D. Update the network diagram
D. Update the network diagram
Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic?
A. Hub
B. Repeater
C. Switch
D. Modem
A. Hub
The technician needs to add a third device to an existing /30 network. Which of the following explains
how this can be achieved?
A. The network should be subnetted to a /29.
B. The third device can use the broadcast address.
C. Configure ARP spoofing on the third device.
D. A repeater should be installed for the third device.
A. The network should be subnetted to a /29.
When working on a router problem, the technician learns that this problem has been reoccurring.
Which of the following should the technician consult to identify the past technicians that worked on the
problem?
A. Network policy
B. ACL
C. Baseline configuration
D. Job logs
D. Job logs
An Ethernet hub and an Ethernet switch both operate at which of the following layers of the OSI
model?
A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 7
C. Layer 2
A newly created patch cable is not working. The technical notices that the cable has two wires that are
crossed, which of the following connectivity issues is occuring?
A. Collision
B. Attenuation
C. Open pairs
D. A short
D. A short
Which of the following is a correct IP ACL? (Select TWO)
A. DROP 00-12-34-56-78-9A
B. PERMIT 192.168.1.100 80
C. PERMIT 192.268.20.1
D. DENY ANY ANY
E. DENY 0:::0:::0:::3
B. PERMIT 192.168.1.100 80
D. DENY ANY ANY
A LAN support team is installing new cables when all networked applications slow and then stop
working. Switches in the server room show all connected ports at 100% activity. Which of the
following has MOST likely occured?
A. Cable run has a break
B. Switching loop
C. New switch port is in wrong VLAN.
D. Cable run has a short
B. Switching loop
The IP address 10.4.5.12 is on the same subnet as 10.4.7.192. Which of the following is MOST likely
the network address and subnet mask?
A. 10.4.5.0/25
B. 10.4.7.0/32
C. 10.4.4.0/22
D. 10.4.5.0/23
C. 10.4.4.0/22
Which of the following configuration management documents would an administrator use to configure
a new router's ACL for a new network?
A. Logical network diagram
B. Router history and log information
C. Wiring schematics
D. Network procedures and configurations
D. Network procedures and configurations
An administrator has just completed installing a virtual proxy server. Which of the following
documentation needs to be updated?
A. Wiring schematic
B. Physical network diagram
C. Job log
D. Logical network diagram
D. Logical network diagram
Which of the following would be used to optimize network performance and increase bandwidth
availability?
A. Packet analysis
B. Fault tolerance
C. QoS
D. Traffic shaping
D. Traffic shaping
A workstation has an IP address of 169.254.128.1. Which of the following IP address types is this?
A. RFC1918 private IP address
B. Public Internet address
C. DHCP lease
D. APIPA
D. APIPA
Which of the following protects individual computers from malicious software?
A. NIPS
B. Network based firewalls
C. Host based firewalls
D. HIDS
C. Host based firewalls
Which of the following is used to convert a FQDN to an IP address?
A. Layer two switch
B. Proxy server
C. DNS server
D. DHCP server
C. DNS server
The IP address block 172.31.146.128/25 represents which of the following?
A. Classful address
B. Public address
C. Private address
D. APIPA address
C. Private address
An individual wearing an A/C technician uniform asks to enter the data center to service the air
conditioning unit. When asked for identification, the individual quickly leaves. Which of the
following was avoided?
A. Identity fraud
B. Social engineering
C. Social media
D. Phishing
B. Social engineering
An administrator has found interference on a network. Which of the following is the cable MOST
likely composed of?
A. STP
B. UTP
C. Fiber
D. RG-6
B. UTP
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
A. Butt set
B. Stripper
C. Punch down tool
D. Snips
B. Stripper
Which of the following technologies has the same uplink and downlink speed standards?
A. SDSL
B. ADSL
C. OC12
D. OC3
A. SDSL
C. OC12
D. OC3
Which of the following has a maximum data rate of 11Mbps?
A. 802.11a
B. 802.11g
C. 802.11n
D. 802.11b
D. 802.11b
Which of the following network devices is used to segment multiple networks?
A. Modem
B. Hub
C. Router
D. Layer 2 switch
C. Router
Which of the following OSI model layers is the transport layer?
A. Layer 6
B. Layer 4
C. Layer 7
D. Layer 1
B. Layer 4
Which of the following is an IPv6 address for localhost?
A. FFFF:127.0.0.1
B. 127::
C. FF::0
D. ::1
D. ::1
A technician would like to connect two computer directly via their respective network cards, and no
intermediary devices. Which of the following cable types would allow this?
A. Crossover
B. Serial
C. RG-6
D. Loopback
A. Crossover
Which of the following network protocols assigns a device's IP address?
A. SMTP
B. TFTP
C. HTTPS
D. DHCP
D. DHCP
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL
B. ATM
C. SDSL
D. OC3
B. ATM
The address 0:0:0:0:0:0:0:1 is also know as the
A. IPv4 localhost address.
B. IPv4 loopback address.
C. IPv6 loopback address.
D. IPv6 default DNS address.
C. IPv6 loopback address.
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL
B. ATM
C. SDSL
D. OC3
B. ATM
The address 0:0:0:0:0:0:0:1 is also know as the
A. IPv4 localhost address.
B. IPv4 loopback address.
C. IPv6 loopback address.
D. IPv6 default DNS address.
C. IPv6 loopback address.
Which of the following is the MOST secure method to enable remote users to access a company's
internal network resources?
A. DMZ
B. Network-based firewall
C. Stateful firewall
D. VPN concentrator
D. VPN concentrator
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the
following device types is being installed?
A. Intrusion detection
B. Proxy server
C. Bandwidth shaper
D. Load balancer
C. Bandwidth shaper
Which of the following authentication mechanisms on a wireless network uses a separate network
authentication server?
A. TKIP
B. Kerberos
C. WEP
D. RADIUS
D. RADIUS
Which of the following methods is used to provide access to a VPN?
A. RAS
B. IGP
C. PPTP
D. PPP
C. PPTP
Which of the following devices can be affected by a microwave?
A. 110 block
B. Router
C. Wireless repeater
D. Firewall
C. Wireless repeater
An administrator would like to test the firewall rules on a corporate network. Which of the following
tools would MOST likely by used?
A. Port scanner
B. Packet sniffer
C. Traffic shaper
D. Ping sweep
A. Port scanner
A network with twenty clients needs to view a video file. Which of the following should be configured
on the client's computers to reduce network traffic?
A. Class C addresses
B. Class A addresses
C. Multicast
D. Broadcast
C. Multicast
Which of the following can be used to find the location of a cable short?
A. Multimeter
B. TDR
C. Protocol analyzer
D. CSU/DSU
B. TDR
Which of the following is an example of a private IP address?
A. 11.0.0.8
B. 172.17.22.201
C. 192.165.107.29
D. 64.64.105.22
B. 172.17.22.201
Which of the following provides internal network access to the Internet via one public IP address?
A. DNAT
B. Broadcast
C. PAT
D. Multicast
C. PAT
An administrator adds a second network connection between two devices to increase network
bandwidth. Which of the following features should be used to accomplish the increase?
A. VLANs
B. CSMA/CD
C. Bonding
D. Port mirroring
C. Bonding
A digital phone line will MOST likely have which of the following connectors?
A. BNC
B. RJ-11
C. DB-25
D. DB-9
B. RJ-11
Which of the following LAN technologies has the GREATEST throughput speed?
A. 10BaseF
B. 10BaseTX
C. 10BaseFX
D. 10BaseT
A. 10BaseF
Which of the following technologies allows a company to install IP cameras and IP phones without
having to connect them to a separate power source?
A. STP
B. VTP
C. QoS
D. PoE
D. PoE
Users in a conference room report issues controlling the multimedia equipment in the conference room
via the wireless panel. The projector and audio in the room also are sporadically turning on and off.
Which of the following is the MOST likely cause of this issue?
A. Frequency
B. Encryption
C. Interference
D. Channel
C. Interference
An administrator needs to remove sleeves on a CAT6 cable. Which of the following tools will work
BEST?
A. Punch down
B. Cable tester
C. Cable stripper
D. Cable certifier
C. Cable stripper
At which of the following layers of the OSI model does a router reside?
A. Layer 1
B. Layer 5
C. Layer 7
D. Layer 3
D. Layer 3
IGP differs from EGP because IGP is designed for use in which of the following?
A. Communication between networks
B. Communication between WANs
C. Single non-autonomous network
D. Single autonomous network
D. Single autonomous network
An administrator is unable to ping a workstation. Which of the following tools would BEST help to
resolve the issue?
A. Cable tester
B. Multimeter
C. Protocol analyzer
D. Toner probe
A. Cable tester
Session affinity is a feature of which of the following devices?
A. IPS
B. Load balancer
C. DNS server
D. DHCP server
B. Load balancer
An administrator would like to turn off web-based administration access to critical network routers and
switches. Which of the following ports should be blocked? (Select TWO)
A. 21
B. 80
C. 23
D. 110
E. 443
B. 80
E. 443
Which of the following network devices is used by a laptop to connect via WPA2?
A. Secure firewall
B. Network repeater
C. Hub
D. Wireless router
D. Wireless router
Which of the following is true of IPSec when operating in transport mode?
A. Both the header and the payload are encrypted
B. Only the header is encrypted
C. Neither the header nor the payload are encrypted
D. Only the payload is encrypted
D. Only the payload is encrypted
A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which
of the following actions should the technician do FIRST?
A. Check their local Internet connection
B. Verify the IP information of the server
C. Call their local ISP
D. Verify the hostname of the server
A. Check their local Internet connection
Which of the following capabilities is essential in a firewall when securing VoIP traffic between remote
hosts?
A. Multipath for media streams
B. Application layer filtering
C. Filtering by zones
D. Source routing rules
B. Application layer filtering
Which of the following can be used to block a guest's laptop access to DHCP services?
A. Configure DNS servers statically on workstations.
B. Use IPSec on all remote connections.
C. Reserve leases to known MAC addresses.
D. Disable TFTP on local servers.
C. Reserve leases to known MAC addresses.
Which of the following BEST explains the function of OSI layer 4?
A. Connecting hosts on the same segment
B. Routing packets across segments
C. Reliable delivery of packets
D. Specifying signal timing and amplitude
C. Reliable delivery of packets
Which of the following would an administrator use to locate where to extend a new wireless network at
a new location?
A. Baseline configuration
B. Security policy
C. Logical network map
D. Wiring schematic
C. Logical network map
Which of the following will MOST likely use an ISDN PRI circuit?
A. Analog phone system
B. Fax machine
C. Cable modem
D. Digital phone system
D. Digital phone system
A user receives an email asking them to update their password for a remote service using a URL
provided in the email. Which of the following is MOST likely occurring?
A. Smurf
B. Denial of service
C. Phishing
D. Man in the middle
C. Phishing
An administrator needs to authenticate users to the network, authorize network activities, and account
for activities done. Which of the following are service that will BEST meet these goals? (Select TWO).
A. Kerberos
B. TACACS+
C. 802.1x
D. RADIUS
E. RRAS
B. TACACS+
D. RADIUS
On which of the following cables would a technician find a BNC connector installed?
A. CAT3
B. RG-6
C. CAT6
D. Fiber
B. RG-6
If an IPSec session is not working correctly, which of the following would a technician do FIRST?
A. Check that IGMP is enabled on the network switch
B. Verify that IPSec service is running on the DNS server
C. Verify that the correct SNMP strings are setup on each system
D. Check whether their system is set to the correct IPSec setting
D. Check whether their system is set to the correct IPSec setting
Which of the following commands is useful to find out the nodes that are active on an Ethernet
segment?
A. ARP
B. NSLOOKUP
C. VMSTAT
D. TRACEROUTE
A. ARP
Which of the following is the MOST likely authentication scheme used in 802.1x?
A. RADIUS
B. CHAP
C. Kerberos
D. TACACS+
A. RADIUS
Two network switches need to be cabled together via copper cabling. These switches do not support
MDI-X. Which of the following cabling will need to be used?
A. Crossover
B. Loopback
C. Straight
D. Rollover
A. Crossover
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a
cubicle corresponds to a given RJ-45 jack in a patch panel?
A. Spectrum analyzer
B. Multimeter
C. Punch-down tool
D. Toner probe
B. Multimeter
Which of the following protocols can lead to user credential disclosure when a network analyzer is
used? (Select TWO)
A. TFTP
B. SNMPv3
C. Telnet
D. RSH
E. FTP
C. Telnet
E. FTP
Which of the following is the name of the routing update process involved when a change occurs in the
routing environment?
A. Supernetting
B. Subnetting
C. Convergence
D. Dynamic
C. Convergence
A technician has deployed multiple temperature monitoring devices with IP addresses in the
10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server every
five minutes. Which of the following destination IP addresses must the technician configure on the
server to send keep-alive packets to all the devices?
A. 10.137.24.0
B. 10.137.24.127
C. 10.137.24.128
D. 10.127.24.1
B. 10.137.24.127
Which of the following network services can be used to provide wireless network authentication?
A. DHCP
B. RADIUS
C. TACACS
D. DNS
B. RADIUS
A port that can use 10/100/1000 speeds MOST commonly uses which the following physical media?
A. Coax
B. Copper
C. Fiber
D. Wireless
B. Copper
A client attempts to connect to a network resource and is given an error message about their access
being restricted. Which of the following BEST describes the reason for denial?
A. The user's account is disabled.
B. The network resource is unavailable.
C. The user is not connected to the network.
D. The user's account failed to authenticate with correct permissions.
D. The user's account failed to authenticate with correct permissions.
Which of the following BEST describes a device that helps resolve IP addresses into FQDNs?
A. DHCP server
B. DNS server
C. Firewall
D. Content switch
B. DNS server
Which of the following classes is the address 208.177.23.1?
A. Class A
B. Class B
C. Class D
D. Class C
D. Class C
Which of the following protocols resolves MAC addresses from IP addresses?
A. RTP
B. ARP
C. DHCP
D. DNS
B. ARP
Which of the following would need to be implemented on a wireless router to allow network access
based on a passphrase that the administrator would supply?
A. MAC filtering
B. SSID broadcast
C. WPA-PSK encryption
D. Port forwarding
C. WPA-PSK encryption
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same
subnet?
A. 255.255.255.240
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.240.0
D. 255.255.240.0
As the number of networks and routers has grown, the technician finds that entering the routing
information for all customers in each router has become a time consuming and error prone process.
Which of the following should the technician do?
A. Keep routing assignments in an exportable spreadsheet.
B. Stop routing and bridge all connections.
C. Switch to a dynamic routing protocol.
D. Hire another technician to maintain routing assignments.
C. Switch to a dynamic routing protocol.
A user transferring files via FTP discovers that the username and password has been compromised.
Which of the following may have been used to intercept the login credentials?
A. SNMPv2
B. A network sniffer
C. A telnet session
D. Secure FTP
B. A network sniffer
An administrator is troubleshooting network connectivity and would like to view the path that packets
are taking from workstation A to server 1. Which of the following command line tools is MOST
appropriate to use?
A. traceroute
B. ping
C. nslookup
D. route
A. traceroute
In order for two machines on different VLANs to communicate with one another, which of the
following must be properly set?
A. Load balancing
B. Subnet mask
C. DNS
D. Default gateway
D. Default gateway
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the
following could be used to accomplish this connection?
A. Token ring
B. Optical media
C. Smart jack
D. Media converter
D. Media converter
An administrator is troubleshooting crosstalk issues. Which of the following should the administrator
check FIRST?
A. Proxy settings
B. WLAN channels
C. Patch cables
D. Port duplex
C. Patch cables
Which of the following connection methods is considered unsecure and allows a connection to a
machine in terminal emulation mode?
A. TELNET
B. HTTPS
C. RCP
D. HTTP
A. TELNET
Which of the following BEST describes ISDN?
A. Coaxial cable, token passing, local area network
B. Carrier sense, multiple access points, collision detection on multiple workstations
C. Circuit switching, digital signaling, interfaces carry multiple channels
D. Cell switching, 53-byte cells, uniform handling of voice and data
C. Circuit switching, digital signaling, interfaces carry multiple channels
Which of the following cable coverings is MOST likely to reduce toxic gases during a fire?
A. Polyvinyl chloride
B. Multimode
C. Plenum
D. Polystyrene
C. Plenum
An administrator suspects there is an issue on the network with DHCP, and wants to monitor the entire
request and response process for giving out leases. Which of the following tools should the
administrator use to BEST monitor these transactions?
A. Protocol bus analyzer
B. Intrusion detection system
C. Protocol analyzer
D. Port scanner
C. Protocol analyzer
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the
internet. Other hosts on the same network can connect to the internet. Which of the following should
the technician check?
A. The hosts file
B. The default gateway
C. The DNS server entries
D. The network card
B. The default gateway
Which of the following WAN technology types does not use an Ethernet cable as a medium for
communication and is used for long distances?
A. DSL
B. E3/T3
C. ATM
D. WiMAX
D. WiMAX
A user reports that their laptop does not have network connectivity, but was working fine last week.
The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1
address. This address is not part of the company's subnet. Which of the following MOST likely
identifies this address type?
A. Multicast
B. APIPA
C. Broadcast
D. DHCP
B. APIPA
Firewalls can be used for which of the following?
A. Protocol analysis
B. Port scanning
C. Packet sniffing
D. Content filtering
D. Content filtering
A technician needs to install phones that will only require one cable for both data and power to be
supplied. Which of the following features MUST the switch support?
A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN
B. PoE
Which of the following devices is MOST likely to have a bridge built-in?
A. NIC
B. Media converter
C. Hub
D. WAP
D. WAP
Which of the following protocols controls the set up, tear down, and accounting of voice over IP based
communication?
A. TLS
B. RTP
C. SIP
D. IGMP
C. SIP
Which of the following provides VPN services at the HIGHEST OSI level?
A. IPSec
B. PPPoE
C. L2TP
D. SSL
D. SSL
Which of the following threats is MOST likely to result in a service disruption for all customers
accessing www.company.com?
A. DoS
B. Port scan
C. War driving
D. Blue snarfing
A. DoS
Which of the following port combinations need to be opened over a firewall for Internet browsing?
A. 80 and 443
B. 443 and 143
C. 80 and 110
D. 80 and 25
A. 80 and 443
Which of the following devices can be used to breakup a broadcast domain?
A. Router
B. Bridge
C. DHCP server
D. Unmanaged switch
A. Router
A technician needs to install a VoIP system in the building but some locations do not have electrical
outlets available. Which of the following features of a switch would need to be available?
A. Port authentication
B. VLAN
C. Trunking
D. PoE
D. PoE
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer
successfully get their network configuration via DHPC, but the user reports that their laptop has no web
access, but can print. Which of the following MOST likelyl occurred?
A. The laptop and the switch duplex setting do not match.
B. The printer has the wrong DNS configuration.
C. The laptop is in the wrong VLAN.
D. the laptop and the switch port speed do not match.
C. The laptop is in the wrong VLAN.
Which of the following is the 802.1x standard an example of?
A. NAT
B. PAT
C. NAC
D. SNAT
C. NAC
An administrator has a networking closet on the first floor of a building with all of the network and
communication equipment. However, the telephony provider installed the communications line in the
basement. Which of the following needs to be extended to connect the line to the networking closet?
A. Demarcation point
B. Router
C. Smart jack
D. Patch panel
D. Patch panel
An administrator is setting up a security camera that will send the same feed to twelve of the twenty
workstations on the network. Which of the following addressing schemes was designed for this
scenario?
A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer
A. Multicast
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the
patch panel?
A. Multimeter
B. Cable crimper
C. Toner probe
D. Punch down tool
B. Cable crimper
Which of the following tools is used to find the MAC address of a workstation?
A. ipconfig
B. route
C. traceroute
D. netstat
A. ipconfig
Which of the following is the MOST cost effective solution to extend the distance of one Ethernet cable
run?
A. Repeater
B. Hub
C. Switch
D. Router
A. Repeater
Mobile users are connecting from sites that have strong security policies and filter most traffic except
HTTPS. Which of the following would be the BEST solution to allow them access to the corporate
network?
A. RDP access
B. Dial-in access
C. IPSec VPN
D. SSL VPN
D. SSL VPN
An administrator is setting up a network and would like to prevent users from having the ability to plug
their PC into the network to receive an IP address. Which of the following addressing schemes should
the technician use?
A. Dynamic
B. NAT
C. Static
D. Subnetting
C. Static
Computers on a small network recently started receiving APIPA addresses for their NICs. Which of the
following is MOST likely the cause of such a scenario?
A. The hardware firewall is down.
B. The DHCP server is down.
C. The DNS server is down.
D. The email server is down.
B. The DHCP server is down.
A user is reporting that their Internet connection is intermittent. Upon further investigation, an
administrator verifies that the cause is not a physical connection issue with the cable. Which of the
following issues is MOST likely the cause?
A. Port duplex mismatch
B. Port is error disabled
C. DNS settings are incorrect on the machine
D. Port is shutdown on the switch
A. Port duplex mismatch
Which of the following should be installed in a server room?
A. Protocol analyzer
B. Certifiers
C. Temperature monitor
D. OTDR
C. Temperature monitor
Packet sniffing at an Internet interface on a border host reveals outbound packets with a source address
of 10.254.0.5. Which of the following is a likely explanation?
A. A user is accessing an Internet search engine.
B. Enterprise database server has been compromised by Internet worm.
C. There is a missing or incorrect rule in the routing policy.
D. Time-to-live setting is not high enough for multicast service.
C. There is a missing or incorrect rule in the routing policy.
Which of the following connection types are typically found in SOHO networks? (Select TWO)
A. ATM
B. ADSL
C. Frame relay
D. T3
E. Cable modem
B. ADSL
E. Cable modem
Which of the following is the rate in bits per second of a bearer channel in a PRI circuit?
A. 16 Kbps
B. 1.5 Mbps
C. 1 Mbps
D. 64 Kbps
D. 64 Kbps
Which of the following cable types has a MAXIMUM transmission rate of 1Gbps?
A. Fiber
B. Serial
C. CAT7
D. CAT5e
D. CAT5e
Which of the following cable types has the reception and transmission leads flipped on opposing ends
of the media?
A. Rollover
B. Serial
C. Crossover
D. Patch
C. Crossover
Which of the following is an example of a MAC address?
A. 1A-23-F9-CD-06-9B-23-5C
B. 10.0.10.1
C. 1A-23-F9-CD-06-9L
D. 1A-23-F9-CD-06-9B
D. 1A-23-F9-CD-06-9B
Which of the following encryption protocols is MOST secure when installing a wireless access point?
A. AES
B. MD5
C. WEP
D. WPA2
D. WPA2
Which of the following is a commonly used protocol for VoIP network communication?
A. SNMP
B. DNS
C. SSH
D. RTP
D. RTP
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company
web address. Which of the following command sequences will test DNS functionality?
A. nslookup
server ns.company.com
www.company.com
B. nslookup
settype=mx
www.company.com
C. nslookup
Set type=ns
@ns.company.com www
D. nslookup
domain ns.company.com
lookup www
A. nslookup
server ns.company.com
www.company.com
Which of the following is an example of CIDR notation?
A. ::1
B. 10.10.10.0/30
C. 10.192.30.5:22
D. 255.255.255.0
B. 10.10.10.0/30
Which of the following transport protocols should be used to avoid retransmitting lost packets?
A. TCP
B. IGMP
C. ARP
D. UDP
D. UDP
An administrator needs to test connectivity between two devices located on the same internal network.
Which of the following commands would MOST likely be used?
A. nslookup
B. traceroute
C. ping
D. ipconfig
C. ping
A wireless access point needs to be installed in a conference room for presentations. The access point
comes with an omni-directional antenna. Where is the BEST location for this access point so that it
provides full room wireless coverage?
A. Centered in the room
B. Adjacent to the table top projector
C. In the equipment room
D. On the back wall
A. Centered in the room
An L2 switch has two VLANs. The first computer connects to the switch on VLAN 5, and the second
computer connects to the switch on VLAN 10. Which of the following devices is needed to allow the
first and second computer to communicate?
A. Media converter that connects to the switch.
B. Router that connects to the switch.
C. Proxy server that connects to the switch.
D. Bridge that connects to the switch.
B. Router that connects to the switch.
A technician needs to configure a machine to automatically request an IP address upon boot. Which of
the following BEST describes this type of addressing?
A. Static
B. Routed
C. Dynamic
D. Convergence
C. Dynamic
Which of the following analyzes the entire subnet to identify all hosts that are active?
A. Packet sniffer
B. Ping sweep
C. Traceroute
D. Port scanner
B. Ping sweep
Which of the following technologies attempts to avoid loops at Layer 2 of the OSI model?
A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN
C. Spanning tree
Which of the following commands will display the routing table one a UNIX/Linux computer?
A. mtr
B. netstat
C. route
D. ipconfig
C. route
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
A. Duplex
B. Collisions
C. Latency
D. Cable length
C. Latency
Which of the following cable types is intended to be used on short distances and is immune to any type
of interference?
A. Singlemode fiber
B. Multimode fiber
C. Unshielded twisted pair
D. Shielded twisted pair
B. Multimode fiber
Which of the following SNMP versions allows for authorization and encryption when connecting?
A. 2c
B. 3
C. 3c
D. 2
B. 3
The presence of a trusted third party is essential to which of the following authentication methods?
A. Public key infrastructure
B. Advanced encryption standard
C. 3DES password hashing
D. Symmetric key encryption
A. Public key infrastructure
Which of the following defines the required distance between each LAN drop that will be installed
within a building?
A. Acceptance use policy
B. Wiring schematics
C. Company regulations
D. Logical network diagrams
B. Wiring schematics
A network CAT6 cable of 600 feet (183 meters) needs to be installed. Which of the following devices
can be installed at the halfway point to help ensure cabling speeds are not reduced?
A. Modem
B. Repeater
C. Media converter
D. Router
B. Repeater
Malicious traffic has been detected terminating at HOST a on TCP port 4444. Which of the following
commands can be run on HOST A to determine the process attached to TCP port 4444?
A. netstat -nap
B. netstat -nav
C. ifconfig -a
D. ipconfig /all
B. netstat -nav
Which of the following would allow an administrator to share Internet connectivity while only
publishing one public IP address?
A. VLAN
B. CIDR
C. NAT
D. DHCP
C. NAT
Which of the following components is typically used for voice transmissions and has a 10Mbps
maximum transfer speed?
A. Patch panel
B. 66 block
C. 110 block
D. Vertical cross connect
B. 66 block
Which of the following WAN technologies allows for the fastest connection?
A. T1
B. SONET
C. OC-12
D. ADSL
B. SONET
Which of the following statements is the MOST accurate description of PoE?
A. Provider edge technology used in MPLS core networks
B. 802.3af or 802.3at standard to deliver DC power over CAT5 cables
C. Standard that allows hubs and switches to work together without separate power cables
D. 802.3az energy-efficient Ethernet standard endorsed by IEEE
B. 802.3af or 802.3at standard to deliver DC power over CAT5 cables
Which of the following is the default NTP port?
A. 161
B. 143
C. 110
D. 123
D. 123
An administrator just installed a new DS3 WAN circuit providing 45Mbps. However, multiple users at
the site report slowness when accessing remote resources. Which of the following tools should the
administrator use to diagnose the issue?
A. Content filter
B. Throughput tester
C. Crossover cable
D. Loopback plug
B. Throughput tester
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this?
A. Port mirroring
B. Spanning tree
C. PoE
D. VLAN
D. VLAN
Which of the following connectors is used to terminate fiber?
A. ST
B. RJ-45
C. RJ-11
D. BNC
A. ST
The helpdesk is receiving calls about the corporate web server being down. Which of the following
should be taken NEXT after verifying that the server is unreachable?
A. Continuously ping the server until a ping response is obtained.
B. Implement and test a solution.
C. Escalate the call to a technician.
D. Document any changes in the web server configuration.
C. Escalate the call to a technician.
Which of the following does the AP use to broadcast the SSID of the wireless network to allow clients
to find and connect to the network?
A. Association
B. Beacon
C. Probe
D. WPA
B. Beacon
Which of the following physical connections allows for the BEST performance when connecting to a
VPN server for a remote user?
A. Baseband
B. POTS
C. Broadband
D. Satellite
C. Broadband
Which of the following is true about an IP address if the first two bits are both one and the third bit is a
zero?
A. The address is a Class B address.
B. The address is a Class C address.
C. The address is a Class A address.
D. The address is a Class D address.
B. The address is a Class C address.
Which of the following protocols provides secure communication over the Internet?
A. RSH
B. SNMP
C. VNC
D. SSH
D. SSH
Which of the following describes what happens when a technician pings the broadcast address?
A. An ICMP loop floods the network
B. All clients on the subnet respond
C. All clients in the multicast group respond
D. The broadcast server responds
B. All clients on the subnet respond
An administrator installs a new web server and wishes to restrict traffic to it. However, the
administrator would like to keep the web server less restricted than the internal network. In which of
the following firewall zones would the administrator place the web server?
A. Demilitarized
B. Internal
C. Trusted
D. Internet
A. Demilitarized
Which of the following standards provides port authentication?
A. 802.1x
B. 802.1q
C. 802.11
D. 802.2
A. 802.1x
Which of the following is a distance vector routing protocol?
A. OSPF
B. EIGRP
C. IS-IS
D. RIP
D. RIP
Which of the following can be used to mitigate network congestion from users streaming media?
A. Protocol analyzer
B. Caching gateway
C. Broadcast traffic optimization
D. Traffic shaping
D. Traffic shaping
A particular route's destination address is referred to as the:
A. link state.
B. next hop.
C. shot vector.
D. RIP peer.
B. next hop.
A network administrator is documenting all devices on the network. This type of documentation is
known as which of the following?
A. Network guidelines
B. Network procedures
C. Network baseline
D. Network diagram
D. Network diagram
A user has logged into a company laptop while at a conference. The user is unable to log directly into
the conference facility’s wireless network, but is able to connect to another user's laptop and thereby
access the conference materials. This is an example of:
A. client/server.
B. shoulder surfing.
C. peer to peer.
D. VPN tunneling.
C. peer to peer.
An administrator is deploying three B/G wireless access points in a new office location. Which of the
following channels eliminates interference?
A. 1, 6, and 11
B. 11, 16, and 20
C. 3, 6, and 9
D. 36, 40, and 44
A. 1, 6, and 11
Which of the following is true of stateless inspection?
A. It is able to detect packets from established connections only.
B. it is not able to determine which ports to block.
C. It is able to determine the connection state of all packets going through the firewall.
D. It is not able to determine if a packet is related to an established connection.
D. It is not able to determine if a packet is related to an established connection.
A. CAT5e
B. CAT3
C. CAT5
D. CAT6
B. CAT3
Which of the following describes what the number two represents in 100Base2 cabling?
A. Coaxial cable
B. Fiber
C. UTP
D. Twisted pair
A. Coaxial cable
Multiple users on the same floor cannot access the network. Upon investigation, an administrator sees
that the switch has power and all of the active ports are blinking almost non-stop. Which of the
following is MOST likely causing this to occur?
A. DHCP snooping
B. Routing loop
C. Broadcast storm
D. Speed/duplex mismatch
C. Broadcast storm
Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33
feet)?
A. X-10
B. 802.11a
C. Bluetooth
D. 802.11b
C. Bluetooth
A link light on a network card refers to which of the following?
A. Auto duplex
B. Collision detection
C. Carrier sense
D. Multiple access points
C. Carrier sense
Which of the following devices will allow a technician to measure the amount of data that is capable of
traversing the network?
A. Throughput tester
B. Event logs
C. Packet sniffers
D. OTDR
A. Throughput tester
Which of the following tools can be used to determine the MAC address of a machine on the local
subnet?
A. dig
B. ping
C. arp
D. host
C. arp
Which of the following technologies facilitates the conversion of internal private IP addressing to
external public IP addressing?
A. NAT
B. SNMP
C. DHCP
D. TCP/IP
A. NAT
Which of the following protocols would MOST likely be used to provide for the simple movement of
files across two machines over the Internet?
A. NTP
B. SMTP
C. FTP
D. POP3
C. FTP
Which of the following can be an STP cable?
A. CAT5e
B. RG-59
C. Fiber
D. RG-6
A. CAT5e
Which of the following commands can be used to find the MAC address of a connecting router?
A. traceroute
B. arp
C. ping
D. ping sweep
B. arp
Which of the following connection methods is considered secure?
A. HTTPS
B. TELNET
C. RCP
D. HTTP
A. HTTPS
In a new wireless network installation, the administrator has successfully installed and tested the
equipment. The NEXT step after turning wireless access on would be to:
A. Perform a war drive to test for vulnerabilities.
B. Configure the DHCP server.
C. Document the physical layout.
D. Configure wireless adapters.
C. Document the physical layout.
Refer to the attached Exhibit. According to the diagram, which of the following is the correct path for
PC7 to print a document?
Exhibit: image001.jpg
A. Switch C to switch A to the router
B. Switch C to switch A
C. Switch C to switch A to switch B
D. Switch B to the router
B. Switch C to switch A
In which of the following networking types can a computer be a client to other computers and act as a
server as well?
A. Peer to peer
B. Bus
C. Ring
D. VPN
A. Peer to peer
BGP is an example of which of the following routing protocol types?
A. Link-state IGP
B. Link-state EGP
C. Distance-vector EGP
D. Distance-vector IGP
C. Distance-vector EGP
Which of the following is the MOST common WAN technology type used in residential homes?
A. Frame relay
B. MPLS
C. Cable modem
D. ATM
C. Cable modem
How much theoretical bandwidth is available to three wireless access points that share the same 80
meter radius, if channel six is used on all three access points?
A. 162Mbps
B. 54Mbps
C. 100Mbps
D. 22Mbps
B. 54Mbps
Which of the following is used by a company's ISP to troubleshoot network issues?
A. 110 Block
B. 66 Block
C. Smart Jack
D. Demarc
C. Smart Jack
Which of the following WAN technologies requires fiber optics?
A. PSTN
B. POTS
C. SONET
D. ADSL
C. SONET
Which of the following is a secure method of transferring a file?
A. FTP
B. RCP
C. SCP
D. SSH
C. SCP
Which of the following documentation would be the BEST to use when determining the location of the
wiring closets?
A. Event logs
B. Logical network diagram
C. Physical network diagram
D. Job logs
C. Physical network diagram
Which of the following utilities would MOST likely be used to query the locally cached list of IP
addresses and their corresponding names as resolved through NetBIOS over TCP/IP?
A. DIG
B. NBSTAT
C. NSLOOKUP
D. NSCD
B. NBSTAT
An administrator would like to determine which wire pair on a 100 block connects a jack in the next
room. Which of the following utilities would MOST likely be used to determine this?
A. Port scanner
B. Multimeter
C. Protocol analyzer
D. Toner probe
B. Multimeter
The helpdesk has been informed that the company's ISP is experiencing network outages. Which of the
following commands can an administrator run to quickly locate and determine the TTL of the further
reachable node?
A. route
B. ping
C. arp
D. traceroute
D. traceroute
Which of the following cable types has immunity from EMI?
A. STP
B. Plenum
C. Fiber
D. UTP
C. Fiber
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
A. 10GBaseSW
B. 10GBaseEW
C. 10GBaseER
D. 10GBaseLW
D. 10GBaseLW
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO)
A. SNTP
B. HTTP
C. SFTP
D. RCP
E. SCP
C. SFTP
D. SCP
An administrator is reviewing helpdesk tickets and discovers multiple tickets for 'unable to print' and
'no Internet connectivity'. Which of the following documents would BEST provide information to help
diagnose the issue?
A. Policies
B. Baseline
C. Wiring schematic
D. Logical network diagram
D. Logical network diagram
Multiple users are reporting network issues. Before taking any course of action, which of the following
is the FIRST step a technician should take?
A. Create a plan of action and a final solution for the issues.
B. Document the solution and update all logical/physical network diagrams.
C. Gather information about the problems/symptoms.
D. Establish the probable cause behind the network issues.
C. Gather information about the problems/symptoms.
Which of the following tools would be used to determine the quality of the network infrastructure?
A. OTDR
B. Certifier
C. Voltage event recorder
D. Multimeter
B. Certifier
Which of the following is MOST likely to be used for telephone wires connected to the plain old
telephone service (POTS)?
A. CAT6 patch panels
B. 66 block
C. Smart jacks
D. 110 block
B. 66 block
Which of the following commands is MOST likely to allow an administrator to update a router
configuration without being prompted for user credentials? (Select TWO).
A. RCP
B. SSH
C. SCP
D. HTTPS
E. TFTP
A. RCP
E. TFTP
Which of the following connectivity issues is the MOST likely to result from bundling network cables
tightly together?
A. Open circuit
B. Attenuation
C. Collision
D. Crosstalk
D. Crosstalk
The MAIN difference between an IDS and an IPS is the:
A. IDS blocks malicious activity while the IPS only alerts about malicious activity.
B. IDS is an inline system while the IPS is placed on a span port and has no IP address.
C. IPS blocks malicious activity while the IDS only alerts about malicious activity.
D. IDS uses a deterministic engine while the IPS uses probabilistic engine.
C. IPS blocks malicious activity while the IDS only alerts about malicious activity.
When configured, MPLS can increase routing redundancy by providing which of the following
network topology types?
A. Bus
B. Mesh
C. Ring
D. Multipath
B. Mesh
Which of the following is updated dynamically on all routers in an OSPF configured network, after a
change has occurred on the network?
A. Hop count
B. Access control list
C. Bandwidth availability
D. Routing table
D. Routing table
Which of the following device can connect multiple workstations, support VLANs, and function as a
router?
A. Hub
B. Multilayer switch
C. Switch
D. Repeater
B. Multilayer switch
Which of the following protocols is used by the ping command to troubleshoot problems between two
devices?
A. ARP
B. SIP
C. IMAP4
D. ICMP
D. ICMP
Which of the following ports does IPSec use, by default?
A. 500
B. 8080
C. 3389
D. 53
A. 500
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After
consolidating the office's networks, they have run out of IP addresses. Which of the following is the
MOST cost-effective solution?
A. Switch to static IP addressing.
B. Add a router to connect both networks.
C. Change the subnet mask to 255.255.254.0.
D. Request another class C IP score from the ISP.
C. Change the subnet mask to 255.255.254.0.
Which of the following is MOST likely used to identify broadcast storms?
A. Cable tester
B. Voltage event recorder
C. Port scanner
D. Protocol analyzer
D. Protocol analyzer
Which of the following devices allows users to connect to company resources by providing them with a
valid internal IP address?
A. Firewall
B. DHCP server
C. Switch
D. Hub
B. DHCP server
Which of the following devices is used to connect to a network by converting analog signals to digital
signals?
A. Hub
B. Modem
C. Switch
D. Repeater
B. Modem
At which of the following OSI layers does the ARP protocol operate?
A. Layer 7
B. Layer 3
C. Layer 2
D. Layer 1
C. Layer 2
Which of the following is the metric used for OSPF?
A. Next hop
B. Bandwidth
C. Latency
D. Cost
B. Bandwidth
Which of the following would be used to lock all of the primary communications equipment of a
building, including its demarcation point?
A. MTF
B. MDF
C. IDF
D. Smart jack
B. MDF
TCP occurs at which layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 3
C. Layer 4
Which of the following connectors would be on a fiber cable?
A. DB-25
B. LC
C. BNC
D. DB-9
B. LC
Which of the following is the correct number of pins in a RJ-111 connector?
A. 4
B. 3
C. 6
D. 8
A. 4
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?
A. Crosstalk
B. Data collision
C. Signal bleed
D. Signal loss
D. Signal loss
The SSL protocol is MOST commonly associated with which of the following ports?
A. 443
B. 143
C. 22
D. 80
A. 443
A technician is setting up a new wireless network in an office where there are existing APs
broadcasting on channels 6 and 11. Which of the following would be the BEST channel to use for the
new network to keep interference to a minimum?
A. 22
B. 3
C. 10
D. 1
D. 1
A company has both a private network for employees and an Internet access only network for guests on
the same switch. Which of the following advanced features is being used?
A. PoE
B. VLAN
C. Port authentication
D. Port mirroring
B. VLAN
Which of the following is installed to reduce broadcast packets and collisions?
A. Firewall
B. Switch
C. Repeater
D. Hub
B. Switch
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity issues.
Which of the following is MOST likely causing the new issues?
A. Signal bounce
B. Antenna distance
C. Environment factors
D. Antenna placement
C. Environment factors
Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO)
A. 802.11g
B. 802.11a
C. 802.11b
D. 802.1x
E. 802.11n
B. 802.11a
E. 802.11n
Which of the following is a correct Ethernet MAC address?
A. 16-15-4D-31-59-5J
B. 11:34:7A:88:0C:DB
C. 12:7H:45:89:9F:65
D. 12-88-FF-9X-58-9E
B. 11:34:7A:88:0C:DB
Which of the following is the process of the amount of time that passes for routing updates in the
environment to reach a steady state?
A. Dynamic
B. Supernetting
C. Convergence
D. Subnetting
C. Convergence
Which of the following devices does not limit network broadcast traffic and does not increase
performance?
A. Switch
B. Brouter
C. Hub
D. Router
C. Hub
Which of the following devices is MOST commonly used to create a DMZ?
A. Bastion host
B. Firewall
C. Honeypot
D. Repeater
B. Firewall