• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back
1. Which of the OSI model layers is also referred to as Transport layer?
A. Layer 7
B. Layer 2
C. Layer 5
D. Layer 4
D. Layer 4
2. Remote Desktop Protocol (RDP) runs by default on TCP port:
A. 3389
B. 67
C. 443
D. 25
A. Port 3389
3. Examples of connectionless protocols include: (Select three answers)
A. SSH
B. SNMP
C. SMTP
D. FTP
E. TFTP
F. DHCP
B, E, and F. SNMP, TFTP, and DHCP
4. Once a plan of action to resolve a problem has been established, the next step in the network
troubleshooting methodology is to:
A. Test the theory to determine cause
B. Question users
C. Implement the solution
D. Establish a theory of probable cause
C. Implement the solution
5. Which of the following commands can be used to display a routing table? (Select two answers)
A. traceroute
B. route print
C. netstat -r
D. ipconfig /all
E. print route
B and C. route print and netstat -r
6. Switches and MAC addresses are defined at which of the OSI layers?
A. Data link layer
B. Layer 4
C. Application layer
D. Layer 1
A. Data link layer (Layer 2)
7. Media Access Control (MAC) address consists of:
A. 8 bits
B. 16 bits
C. 32 bits
D. 48 bits
D. 48 bits
8. Password combined with PIN used as an authentication requirement is an example of:
A. Multi-factor authentication
B. Single sign-on
C. Two-factor authentication
D. Something that the user knows
D. Something that the user knows
9. The practice of marking symbols in public places that indicate the presence of an unsecured wireless
connection is also referred to as:
A. War chalking
B. SSID discovery
C. War driving
D. Port scanning
A. War chalking
10. What is PoE?
A. Media converter
B. Another term for Wireless Access Point (WAP)
C. Technology that allows for supplying electrical power over Ethernet cable
D. Another term for Private Branch Exchange (PBX) system
C. Technology that allows for supplying electrical power over Ethernet cable
11. Which of the following is used to prevent switching loops?
A. UDP
B. STP
C. FTP
D. UTP
B. STP - Spanning Tree Protocol
12. Disabling SSID:
A. Is one of the measures used for securing networks
B. Makes a WLAN harder to discover
C. Blocks access to a Wireless Access Point (WAP)
D. Prevents wireless clients from accessing the network
B. Makes a WLAN harder to discover
13. VLAN membership can be configured through: (Select two answers)
A. Switch ports
B. VLAN multiplexing
C. IP-address-to-VLAN mapping
D. TCP and UDP port numbers
E. MAC-address-to-VLAN mapping
A and E. Switch ports and MAC-address-to-VLAN mapping
14. Data from multiple VLANs on a single switch is carried through a single network link between
switches. This is often referred to as: (Select two answers)
A. Routing
B. Trunking
C. VLAN multiplexing
D. Tunneling
E. Load balancing
B and C. VLAN multiplexing and Trunking
15. Communication that takes place in two directions simultaneously is also referred to as:
A. Full duplex
B. Point-to-multipoint
C. Simplex
D. Half duplex
A. Full duplex
16. Network access control method based on the physical address (MAC address) of the Network
Interface Card (NIC) is called:
A. HIDS
B. Accounting
C. MAC filtering
D. Quality of Service (QoS)
C. MAC filtering
17. Which of the following connectors is used with copper cabling?
A. ST
B. MTRJ
C. BNC
D. LC
C. BNC
18. Which of the following connectors is used with fiber-optic cabling?
A. RJ-45
B. DB-9
C. SC
D. F-connector
C. SC
19. Which of the following technologies uses multiple antennas in order to increase performance and
range?
A. MIMO
B. Ethernet
C. SONET
D. Coax
A. MIMO
20. Which of the following allows multiple hosts on a network to share an IP address?
A. APIPA
B. CARP
C. DNS
D. RARP
B. CARP
21. File Transfer Protocol (FTP) runs by default on TCP ports: (Select two answers)
A. 25
B. 23
C. 20
D. 21
E. 22
C and D. 20 and 21
22. An IPv6 address consists of:
A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits
D. 128 bits
23. Network access control method based on the physical address (MAC address) of the Network
Interface Card (NIC) is called:
A. HIDS
B. Accounting
C. MAC filtering
D. Quality of Service (QoS)
C. MAC filtering
24. Which of the following is the default port number used by Kerberos authentication system?
A. 88
B. 443
C. 80
D. 3389
A. 88
25. While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's
port can be tested with the use of:
A. Loopback plug
B. Punch down tool
C. Pliers
D. Molex connector
A. Loopback plug
26. Which of the following tools would be the best for attaching RJ-45 connector to the end of a twistedpair
Ethernet cable?
A. Punch down tool
B. Crimp tool
C. Cable certifier
D. Needle-nose pliers
B. Crimp tool
27. Hubs operate at which level of the OSI model?
A. Layer 1
B. Data link layer
C. Layer 3
D. Transport layer
A. Layer 1 (physical layer)
28. The term war driving refers to:
A. Penetration testing
B. Scanning for unsecured wireless networks while driving in a car
C. Setting up a rogue access point
D. Marking unsecured wireless networks
B. Scanning for unsecured wireless networks while driving in a car
29. In computer security, the practice of obtaining confidential information by manipulating people is
also known as:
A. Vulnerability
B. Hacking
C. Mantrap
D. Social engineering
D. Social engineering
30. Which of the following attacks uses multiple compromised computer systems against its target?
A. Logic bomb
B. Botnet
C. DDoS
D. DoS
C. DDoS
31. What is the name of a Windows command-line utility that displays TCP/IP configuration settings?
A. ifconfig
B. dxdiag
C. ipconfig
D. msconfig
C. ipconfig
32. Which of the following tools would be the best for attaching wires to a patch panel?
A. Punch down tool
B. Crimp tool
C. Cable certifier
D. Needle-nose pliers
A. Punch down tool
33. Windows command-line utility for displaying intermediary points on the packet route is called:
A. ping
B. netstat
C. ipconfig
D. tracert
D. tracert
34. Which of the following is an example of a multi-factor authentication?
A. Password and biometric scan
B. User name and PIN
C. Smart card and identification badge
D. Iris and fingerprint scan
A. Password and biometric scan
35. Which of the following terms refers to a rogue access point?
A. Computer worm
B. Backdoor
C. Evil twin
D. Trojan horse
C. Evil twin
36. A lightly protected subnet placed on the outside of the company's firewall consisting of publicly
available servers is also referred to as:
A. VPN
B. Access Point (AP)
C. VLAN
D. DMZ
D. DMZ
37. T1 lines support data transfer rates of up to:
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 44.736 Mbps
A. 1.544 Mbps
38. Which of the following servers dynamically assigned IP addresses?
A. DHCP
B. DNS
C. WINS
D. SMTP
A. DHCP
39. An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type
of service?
A. DNS
B. SNMP
C. SMTP
D. DHCP
D. DHCP
40. What is the speed of an E3 line?
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 44.736 Mbps
C. 34.368 Mbps
41. In routing metrics, the number of routers a packet needs to traverse before reaching its destination
is known as:
A. Switching loop
B. Hop count
C. Route counter
D. Latency
B. Hop count
42. The largest data unit expressed in bytes which may be sent over a network link is also referred to as:
A. QoS
B. MX
C. Hop count
D. MTU
D. MTU - Maximum Transmission Unite
43. Which of the following command-line tools is used to display protocol statistics and active TCP/IP
network connections?
A. ipconfig
B. netstat
C. dig
D. tracert
B. netstat
44. T3 lines support data transfers rates of up to:
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 44.736 Mbps
D. 44.736 Mbps
45. Which of the following allows an administrator to inspect the traffic passing through a network
switch?
A. Port mirroring
B. Fault-tolerant mode
C. Authentication
D. VLAN tagging
A. Port mirroring
46. Which of the following should be the first step when troubleshooting networking problems?
A. Establishing a theory of probable cause
B. Implementing the solution
C. Identifying the problem
D. Establishing a plan of action to resolve the problem
C. Identifying the problem
47. Which type of cabling provides protection against EMI? (Select all that apply)
A. UTP
B. Coaxial
C. Fiber-optic
D. STP
B, C, and D. Coaxial, Fiber-optic, and STP
48. Which of the following cabling types are used with RJ-45 connectors? (Select all that apply)
A. STP
B. fiber-optic
C. twisted pair
D. UTP
A, C and D. STP, twisted pair, and UTP
49. E1 lines support data transfer rates of up to:
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 44.736 Mbps
B. 2.048 Mbps
50. Which of the following tools would be used for locating a break in a cable?
A. FDDI
B. TDR
C. EGP
D. OSPF
B. TDR - Time-Domain Reflectometer
51. Network cabling, hubs, and repeaters can be found at which OSI layer?
A. Physical layer
B. Layer 3
C. Session layer
D. Application layer
A. Physical layer (layer 1)
52. Which of the following hides the internal IP addresses by modifying IP address information in IP
packet headers while in transit across a traffic routing device?
A. NAC
B. QoS
C. NAT
D. DMZ
C. NAT
53. Which type of policy allows for controlling network resources and assigning priority to different
types of traffic?
A. QoS
B. Implicit deny
C. IDS
D. Privacy policy
A. QoS
54. 802.11 is a set of standards for implementing:
A. Token ring
B. SONET
C. Ethernet
D. WLANs
D. WLANs
55. Coding errors and security vulnerabilities in software that has already been released can be rectified
through:
A. User training
B. Application hardening
C. Patch management
D. Incident response
C. Patch management
56. Cabling with a fire-retardant jacket placed in the space between dropped ceiling and structural
ceiling is called:
A. HVAC
B. Plenum
C. EMI
D. Non-plenum
B. Plenum
57. What is the name of a command-line utility used for checking the reachability of a remote host?
A. dxdiag
B. ping
C. cmd
D. regedit
B. ping
58. A monitored host or network specifically designed to detect unauthorized access attempts is also
known as:
A. Botnet
B. Rogue access point
C. Honeypot
D. Flood guard
C. Honeypot
59. What type of filtering allows for restricting the access of specific Internet services?
A. IP
B. URL
C. Port
D. MAC
C. Port
60. An authentication subsystem that enables a user to access multiple, connected system components
(such as separate hosts on a network) after a single login at only one of the components is also referred
to as:
A. Single sign-on
B. Multi-factor authentication
C. Peer-to-peer (P2P)
D. Network Access Control (NAC)
A. Single sign-on
61. What kind of termination would be used to create a crossover cable?
A. BNC connector
B. T568A on both ends
C. T568A and T568B
D. T568B on both ends
C. T568A and T568B
62. What type of filtering allows for blocking or allowing access to specific Internet domains?
A. Port
B. IP
C. MAC
D. URL
D. URL
63. Which of the following are tunneling protocols? (Select two answers)
A. SMTP
B. PPTP
C. TFTP
D. L2TP
E. SNMP
B and D. PPTP and L2TP
64. IPsec encrypts an entire packet in what kind of mode?
A. Secure
B. Transport
C. Default
D. Tunnel
D. Tunnel
65. What kind of termination would be used to create a straight-through cable? (Select two answers)
A. T568A on both ends
B. Rollover / Yost
C. T568A and T568B
D. T568B on both ends
A and D. T568A on both ends and T568B on both ends
66. Which of the following tools would be used for locating a cable in a cabling bundle?
A. Punch down tool
B. Protocol analyzer
C. Toner and probe kit
D. Multimeter
C. Toner and probe kit
67. Which of the following wireless encryption schemes offers the highest level of protection?
A. WEP
B. WPA2
C. SSID
D. WPA
B. WPA2
68. Which type of IDS relies on known attack patterns in order to detect an intrusion?
A. Behavior-based
B. Signature-based
C. Port mirroring
D. AD-IDS
B. Signature-based
69. Which of the following protocols are used for implementing Voice over IP (VoIP)? (Select all that
apply)
A. SIP
B. IMAP
C. RTP
D. SNMP
A and C. SIP and RTP
70. Address Resolution Protocol (ARP) provides what kind of resolution?
A. IPv6 to IPv4
B. MAC to IP
C. Domain name to IP
D. IP to MAC
D. IP to MAC
71. Which of the following tools allow for obtaining domain name to IP address mapping? (Select two
answers)
A. nslookup
B. tracert
C. pathping
D. netstat
E. dig
A and E. nslookup and dig
72. Which of the following protocols is used in network management systems to monitor networkattached
devices?
A. RTP
B. SNMP
C. IMAP4
D. SMTP
B. SNMP
73. Which of the following protocols transmit data in an unencrypted form? (Select all that apply)
A. SCP
B. IPsec
C. SNMPv1
D. FTP
E. Telnet
F. SFTP
C, D, and E. SNMPv1, FTP, and Telnet
74. Network switch with configuration features that can be changed through a user interface is called:
A. Unmanaged switch
B. Layer 1 switch
C. Managed switch
D. Plug and play
C. Managed switch
75. An IP address in the range 172.16.0.0 – 172.31.255.255 is an example of what kind of address?
A. Routable
B. Loopback
C. IPv6
D. Non-routable
D. Non-routable
76. In half-duplex communication transmission takes place:
A. In two directions simultaneously
B. Only in one direction at a time
C. In one direction only
D. In one direction at half the speed
B. Only in one direction at a time
77. Which of the following are loopback addresses? (Select two answers)
A. MAC address
B. 127.0.0.1
C. Link-local
D. ::1
E. Multicast
Answers: B and D. 127.0.0.1 and ::1
78. Frequency ranges used in 802.11 networks include: (Select two answers)
A. 2.4 GHz
B. 54 Mbps
C. 11 GHz
D. 2.4 MHz
E. 5.0 GHz
Answers: A and E. 2.4 GHz and 5.0 GHz
79. Which of the following devices can cause disruptions in wireless network connectivity? (Select all
that apply)
A. Cordless phone
B. Baby monitor
C. Microwave oven
D. Ethernet switch
79. Answers: A, B, and C. Cordless phone, Baby monitor, and Microwave oven
80. The period of time during which a networked host can use an IP address assigned by a DHCP server
is called:
A. Scope
B. DNS record
C. Latency
D. Lease
D. Lease
81. Which of the following devices allows for connecting copper and fiber-optic cabling?
A. Multilayer switch
B. 56k modem
C. Media converter
D. TDR
C. Media converter
82. 255.255.255.248 subnet allows for how many hosts?
A. 2
B. 6
C. 14
D. 30
B. 6
83. Which type of cabling provides protection against EMI? (Select all that apply)
A. UTP
B. Coaxial
C. STP
D. Fiber-optic
B, C, and D. Coaxial, STP, and Fiber-optic
84. In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each
other in order to reduce:
A. Cross-talk
B. Eavesdropping
C. Collisions
D. Cable clutter
A. Cross-talk
85. OC-3 line supports transmission rates of up to:
A. 1.544 Mbps
B. 51.84 Mbps
C. 44.736 Mbps
D. 155.52 Mbps
D. 155.52 Mbps
86. Which of the following are the characteristics of the 802.11b wireless standard? (Select two
answers)
A. 5.0 frequency range
B. 54 Mbps
C. 2.4 GHz frequency range
D. OFDM
E. 11 Mbps
C and E. 2.4 GHz frequency range and 11 Mbps
87. The maximum cable segment length for CAT 5e cable is:
A. 25 meters
B. 50 meters
C. 100 meters
D. 250 meters
Answer: C. 100 meters
88. Which of the following tools would be used for locating faults and breaks in fiber-optic cabling?
A. Crimping tool
B. Toner and probe kit
C. OTDR
D. Channel bonding
C. OTDR
89. OSPF and IS-IS are:
A. Authentication schemes
B. DNS records
C. Encryption standards
D. Routing protocols
D. Routing protocols
90. DNS database AAAA record identifies:
A. Mail server
B. IPv4 address
C. Canonical name
D. IPv6 address
D. IPv6 address
91. Convergence state in routing refers to a situation where:
A. A server receives the final ACK packet
B. All routers have finished updating their routing tables
C. Some of the WAPs have duplicate IP addresses
D. Rogue access points are configured with legitimate SSIDs
B. All routers have finished updating their routing tables
92. Which of the following tools would be used to check the contents of an IP packet?
A. Protocol analyzer
B. Secure Shell (SSH)
C. SNMP agent
D. Port scanner
A. Protocol analyzer
93. IEEE 802.11g standard is backwards compatible with:
A. 802.11n
B. WiMAX
C. 802.11a
D. 802.11b
D. 802.11b
94. 802.3 is the IEEE standard for implementing of what kind of networks?
A. WLANs
B. Token ring
C. Ethernet
D. WiMAX
C. Ethernet
95. Which of the following are the characteristics of 10GBaseT Ethernet? (Select all that apply)
A. CAT 6a cabling
B. RJ-45 connectors
C. Multimode fiber
D. CAT 5e cabling
E. 802.3an
A, B, and E. CAT 6a cabling, RJ-45 connectors, and 802.3an
96. What is the most common type of a DSL Internet access?
A. VDSL
B. ADSL
C. SDSL
D. UDSL
B. ADSL
97. Which of the following TCP ports is used by Simple Mail transfer Protocol (SMTP)?
A. 25
B. 53
C. 80
D. 23
A. 25
98. Routers operate at which of the OSI layers?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
C. Network layer
99. Which of the following switches puts the ping command in a loop?
A. -a
B. -l
C. -n
D. -t
D. -t
100. Which of the following can stop attacks on the network?
A. HIPS
B. HIDS
C. NIPS
D. NIDS
C. NIPS