• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/98

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

98 Cards in this Set

  • Front
  • Back
Which of the following network segments is located outside the firewall?
A. SPAP
B. VPN
C. DMZ
D. PPTP
DMZ

Explanation:
Your best option would be to identify DMZ. The demilitarized zone is a small network between the
internal network and the Internet that offers a layer of security and privacy. DMZ is thus a method
for placing web and other servers that serve the general public outside the firewall isolating them
from the internal network access.
Incorrect Answers:
A: PAP is one of the simplest forms of authentication. Authentication is accomplished by sending
usernames and passwords to the server where it is verified. The passwords are sent as clear text.
You can easily detect if it is intercepted.
B: A Virtual Private Network (VPN) makes use of the public Internet as a backbone for a private
interconnection between locations. This technology supports reasonably secure, logical, private network links and insecure public network infrastructure. It reduces the Public Switched Telephone
Network (PSTN) costs. VPNs are more secure that the traditional remote access as it can be
encrypted.
D: Point-to-Point Tunne
To support roaming across a wireless 802.11g network, each access point should be configured to
use which of the following?
A. The same channel
B. The same frequency
C. The same SSID
D. CSMA/CD
The same SSID


Explanation:
In the scenario you should remember that configuring a unique SSID name is the very least that
you should do to secure a wireless network. You should also be aware that each wireless network
node and access point needs to be configured with the same unique SSID name. The SSID name
is then included in the header of every data packet broadcast in the wireless network's coverage
area. You should also note that the Data packets that lack the correct SSID name in the header
are rejected.
Incorrect Answers:
A: In the scenario you should remember that a wireless access point(WAP) allows mobile users to
connect to a wired network wirelessly via radio frequency technologies. You should additionally
note that WAPs also allow wired networks to connect to each other via wireless technologies.
B: In the scenario you should remember that a wireless access point(WAP) allows mobile users to
connect to a wired network wirelessly via radio frequency technologies. You should additionally
note that
Which of the following would a technician use a punch down tool on?
A. RJ45
connector
B. ST connector
C. 110 block
D. Smart jack
110 block

Explanation:
Your best option in this scenario would be to make use of a 100 block. A 100 block is known as a
punchdown block due to its method of installation.
Incorrect Answers:
B: An RJ-45 is found in network connections. It is also a connector for eight-wire UTP.
D: An ST connector is used for networking applications. It makes use of a twist-lock coupling with
a 2.5 mm keyed ferrule. You can make use of this connector for short as well as long
distances
Two small companies sharing a switch would MOST likely benefit from which of the following
advanced switch features?
A. Spanning tree
B. Trunking
C. PoE
D. VLAN
VLAN
Which of the following is the maximum speed available from a full T1 line?
A. 1.544Mbps
B. 5.23Mbps
C. 765Kpbs
D. 10.73Mbps
1.544Mbps
A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on
the same campus. Primary objectives are to create a secure link that that is capable of
transmitting at 1Gbps. Which of the following would be the BEST way to connect these two
buildings?
A. Fiber optic cable
B. Pointtopoint
wireless link
C. CAT6 cable
D. RG58
cable
Fiber optic cable


Explanation:
The best option will be Fiber optic cabling. With Gigabit Ethernet applications, it will run up to
1Gbps. The CAT6 cabling can reach speeds up to 10 gigabits per second; however it is limited up
to 100 meters
An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of
the following Ethernet media types should be used to avoid interference?
A. 10Base5
B. 100BaseT
C. 10Base2
D. 100BaseFX
100BaseFX


Explanation:
In order to avoid interference when an Ethernet LAN with several trunks links passes heavy
machinery resulting in EMI you need to make use of 100Base-FX. 100Base-FX is an Ethernet
LAN that is designed to run on fibre optic cable.
Incorrect Answers:
A: 10Base2 Ethernet and 10Base5 Ethernet media types defines the details of the physical layer
of the earlier Ethernet networks.
B: The 100BaseT
Ethernet media type is the generic term for an Ethernet cabling system. This
system is designed to run at 100 megabits per second on UTP cabling and makes use of
baseband cabling.References:Wendell Odom, CCNA INTRO Exam Certification Guide, Cisco
Press, Indianapolis, IN, 2004, pp. 53Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam
SKO-002), QUE Publishing, Indianapolis, IN, 2006, pp. 270-273
C: 10Base2 Ethernet and 10Base5 Ethernet media types defines the details of the physical layer
of the earlier Ethernet networks.
Which of the following software types would BEST be used for identifying an attack?
A. IDS
B. IPS
C. Packet sniffer
D. Port scanner
IDS
A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to
server B. Which of the following packets should be sent from server B in response?
A. SYNNAK
B. SYNACK
C. ACK
D. NAK
SYN-ACK
Which of the following Ethernet technologies has the shortest transmission distance?
A. 10BaseT
B. 10GBaseT
C. 100BaseT
D. 10GBaseSR
10GBaseT

Explanation:
The 10Base-2 media type has a transmission distance of 185 meters. The 10Base T media type
has a transmission distance of 100 meters. The 10GBase-SR has a transmission distance of 300
meters
A network technician is implementing new wireless access points in an existing wireless
infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may
not be compatible with the previously installed access points?
A. TKIP
B. 3DES
C. AES
D. CHAP
AES
In a Class C subnet, a network ID may occupy a maximum of:
A. 24bits.
B. 16bits.
C. 31bits.
D. 32bits.
24bits.
A 100 pair cable is typically used to connect:
A. telephony distribution.
B. computer labs with more than 20 computers.
C. security cameras.
D. businesses with more than 75 computers.
telephony distribution.
Which of the following utilities will produce the results printed below?
TCP Certs03:1072 172.31.0.78:3389 Established
A. netstat
B. arp
C. ping
D. tracert
netstat
A technician is asked to place wireless Internet access in an open warehouse environment. After
installing the equipment the technician notices varying signal strengths at different locations.
Which of the following should the technician consider to increase the consistency of the signal
strength?
A. Enable traffic shaping.
B. Change the antenna placement.
C. Change the encryption method.
D. Broadcast the SSID.
Change the antenna placement

Explanation:
Traffic shaping delays the excess packets by holding them in buffers and releasing it at
preconfigured
Which of the following actions should the administrator do FIRST to help access a gigabit
connection?
A. Change the CAT5 cable to a CAT3 cable.
B. Change the CAT3 cable to RG58
cable
C. Change the CAT5 cable to a CAT6 cable.
D. Change the CAT5 cable to a CAT5 Crossover cable.
Change the CAT5 cable to a CAT6 cable.

Explanation:
You should change to the CAT5e cable or a CAT6 cable connection to be able to handle or to
access a gigabit connection. The CAT5e can operate up to a gigabyte per second and the CAT6
operate up to a 10 gigabyte per second.
A company would like to configure newsfeeds on the network for employees to be aware of
internal company information. Which of the following ports would be used to allow newsfeeds to
passthrough?
A. 25
B. 22
C. 119
D. 143
Explanation:
In the scenario you should consider making use of port 119 because port 119 is used by the
NNTP protocol for communication.
Incorrect Answers:
A: You should not consider making use of port 25 in the scenario because port 25 is used by the
SMTP protocol for communication.
B: You should not consider making use of port 22 in the scenario because port 22 is used by the
SSH protocol for communication.
D: You should not consider making use of port 143 in the scenario because port 143 is used by
the IMAP4 protocol for communication
A technician needs to change locations of a telephone between 66 blocks. Which of the following
tools would be used in locating the positions in the cross connections?
A. Butt set
B. Cable tester
C. Toner probe
D. Voltage meter
Toner probe
Which of the following commands would allow the technician to identify the currently assigned
DNS server?
A. nbtstat
B. netstat
C. dig
D. nslookup
nslookup


Explanation:
Your best option would be to make use of the nslookup command. nslookup displays information
about a particular domain name, the name servers that serve it, and how they are configured.
Incorrect Answers:
B: The dig utility permits you to lookup DNS resolution information.
C: netstat is used to display the inbound and outbound TCP/IP connections on a local computer. It
provides packet statistics, such as the number of packets that have been sent and received, the
number of errors, etc.
Two ports on switch A are connected to switch B. The advanced switch feature that allows these
ports to be combined and managed as a single entity is called:
A. port mirroring.
B. trunking.
C. VLAN.
D. spanning tree
trunking

Explanation:
This is a method to support multiple VLAN's that have members on more than one switch.
Incorrect Answers:
C: VLAN's assists you in isolating network traffic. It is software technology that permits for the
grouping of network nodes that is connected to one or more network switches into a single logical
network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer
simplified user management and network resource access controls for switched network.
D: The spanning-tree algorithm places every bridge or switch port into either a forwarding state or
a blocking state. It ensures that only one path is active between two network stations. It also
permits redundant paths that are automatically activated when the active path experiences
problems
Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?
A. 802.11g
B. 802.11a
C. 802.11b
D. 802.11
802.11a
A user calls saying they are having issues connecting to the Internet, but they are able to connect
to the email server. Which of the following commands would the user type in at the command
prompt to display the MAC address?
A. ipconfig
B. arp -s
C. arp -a
D. nbtstat R
arp -a


Explanation:
The Address Resolution Protocol, or ARP, is part of the Transmission Control Protocol/Internet
Protocol (TCP/IP) protocol stack; it is used to translate TCP/IP addresses to MAC (media access
control) addresses using broadcasts. When a machine running TCP/IP wants to know which
machine on an Ethernet network uses a particular IP address, it will send an ARP broadcast that
says, in effect, "Hey! Who is IP address xxx.xxx.xxx.xxx ?" The machine that owns the specific
address will respond with its own MAC address. The machine that made the inquiry then adds that
information to its own ARP table. In addition to the normal usage, the ARP designation refers to a
utility in Windows that you can use to manipulate and view the local workstation's ARP table. To
display the entire current ARP table, use the
Arp command with the -a switch, like this:
arp -a
Incorrect Answers:
A: You should not consider making use of the ipconfig utility because the ipconfig utility cannot be
used to solve the proble
Which of the following is a utility that translates the physical network address to its IP address?
A. nslookup
B. ping
C. rarp
D. netstat
rarp


Explanation:
Reverse ARP (RARP) is nothing more than ARP packets with different codes in the header,
indicating to devices receiving RARP packets that these are requests by the source device for its
own IP configuration, meaning RARP replies should be handled by a RARP server and that any
device not fulfilling this role need not process these requests any further. If, however, the receiving
device is a RARP server, it is incumbent upon that device to find the requesting device's MAC
address in a configured list (RARP is an older, manual process, unlike DHCP). The server sends
the IP address it finds associated with the requesting MAC address back to the requesting device.
RARP was adequate for diskless workstation initial IP configuration but fell short as a be-all, endall
supplier of detailed IP-related information, which is why DHCP has supplanted RARP for
supplying network-based IP configuration in most modern networks.
Incorrect Answers:
A: You should not consider making use of the nslookup utilit
Which of the following cable standards has the highest effective range at a greater expense?
A. 1000BaseT
B. 1000BaseLX
C. 1000BaseCX
D. 1000BaseSX
1000BaseLX


Explanation:
The 1000Base-LX has the highest efficiency range. In multi-mode, it has a range of 550 meters.
In single-mode, it has a range of 2000 meters.
Incorrect Answers:
A: The 1000Base-T has a range of 100 meters.
C: The 1000Base-CX has a range of 25 meters.
D: The 1000Base-SX has a range of 550 meters
Which of the following technologies is BEST suited for a pointtopoint
circuit that is 6 kilometers
(3.7 miles) in distance?
A. 10GBaseT
B. 10GBaseER
C. 10GBaseSR
D. 10GBaseLR
10GBaseLR
Which of the following frequency ranges does 802.11a operate at?
A. 4.9GHz
B. 5GHz
C. 54GHz
D. 2.4GHz
5GHz
Which of the following protocols provides the actual encryption used over VPN?
A. PPP
B. HTTPS
C. PPTP
D. SSH
PPTP


Explanation:
Point-to-Point Tunneling Protocol You can access a private network through the Internet or other
public network by using a virtual private network (VPN) connection with the Point-to-Point
Tunneling Protocol (PPTP). Developed as an extension of the Point-to-Point Protocol (PPP),
PPTP tunnels and/or encapsulates IP, IPX, or NetBEUI protocols inside of PPP datagram's. PPTP
does not require a dial-up connection. It does, however, require IP connectivity between your
computer and the server. Not B: L2TP is an industry-standard Internet tunneling protocol with
roughly the same functionality as the Point-to-Point Tunneling Protocol (PPTP). Like PPTP, L2TP
encapsulates Point-to-Point Protocol (PPP) frames, which in turn encapsulate IP, IPX, or NetBEUI
protocol.
Incorrect Answers:
A: PPP is capable of passing multiple LAN protocols across the wire. PPP is able to encapsulate
different network protocols such as NetBEUI, IPX/SPX, and TCP/IP. The Point-to-Point Protocol
(PPP) is a full duplex line pr
Which of the following features of a switch will allow two switches to pass network information?
A. Disabling the routing protocols
B. Port speeds
C. Trunking
D. PoE
Trunking
Which of the following tools can send a signal down a cable and measure how long it takes to
comeback?
A. Multimeter
B. Voltage event recorder
C. TDR
D. Toner probe
TDR
A technician needs to connect a laptop via the small office, home office (SOHO)wireless access
point.
When the technician does a site survey using the laptop the wireless network is not discovered.
Computers previously on the wireless network were connected, and the wireless card appears to
be working. Which of the following could be causing the issue?
A. The SSID is set to not broadcast.
B. The wireless router does not have adequate AC power.
C. The WEP key is not correct.
D. The laptop is running on Windows Service Pack 1.
The SSID is set to not broadcast.
A technician has determined that a single computer has suddenly lost network connectivity. Which
of the following should be the next troubleshooting step the technician should take?
A. Determine if escalation is necessary.
B. Determine if anything has changed.
C. Identify the affected areas of the network.
D. Establish the most probable cause
Determine if anything has changed
A company has installed a new 802.11g pointtopoint
connection between two buildings and is
experiencing low throughput across the link. The current setup involves a wireless bridge on the
roof with an omnidirectional
antenna. Which of the following would BEST improve the linkperformance?
A. Replace the omnidirectional
antennas with Yagi antennas.
B. Configure channel hopping on both wireless bridges.
C. Replace the wireless bridges with wireless access points.
D. Install bidirectional
amplifiers at both sites.
Replace the omnidirectional
antennas with Yagi antennas.

Explanation:
In the scenario you should remember that Wireless antennas act as both transmitters and
receivers. You should additionally note that there are two broad classes of antennas on the
market, omni directional (Omni, or point-to-multipoint) and directional (Yagi or point-topoint).
A users workstation is able to resolve IP addresses of any host, and can ping other workstations
on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the
MOST likely cause of the problem?
A. The workstation is configured with an incorrect subnet mask.
B. The workstation is configured with the incorrect default gateway.
C. The workstations NICis configured for a different port speed than the switch.
D. The workstation is assigned to the incorrect VLAN.
The workstation is configured with the incorrect default gateway.


Explanation:
It is likely in this scenario that the error was caused by a default gateway. The default gateway in a
TCP/IP network is the nearest router to a certain host. The IP address of the router will be part of
the necessary TCP/IP configuration when you communicate with numerous networks by making
use of IP.
The 66 block termination point is:
A. CAT3 compliant.
B. coaxial compliant.
C. CAT6 compliant.
D. IEEE 1394 compliant.
CAT3 compliant.

Explanation:
The 66 block termination point is CAT 3 complaint. The CAT 3 cabling is used for telephone
systems. The 66 block is a punch-down block used to connect wiring for telephone systems.
Furthermore, it is used to force solid wire into metal slots.
A network using RIP has taken several minutes to begin routing traffic around a failed piece of
equipment. Which of the following could be implemented to improve convergence time?
A. Replace RIP with adistancevector
routing protocol such as RIP version 2.
B. Replace RIP with an exterior gateway protocol such as BGP.
C. Replace RIP with static routes so dynamic updates are not sent.
D. Replace RIP with alinkstate
routing protocol such as OSPF.
Replace RIP with alinkstate
routing protocol such as OSPF.


Explanation:
In the scenario you should remember that OSPF is a link state protocol as OSPF is the most
popular link-state IP routing protocol in use today and will be popular for some time since OSPF is
widely deployed and includes a wide variety of features that have been added over the years to
accommodate new requirements.
Incorrect Answers:
A: In the scenario you should not consider making use of RIPv2 as RIP-2 makes use of distance
vector logic; uses hop count for the metric whilst sending full, periodic updates; and still converges
relatively slowly. You should additionally remember that RIP-2 does add support for VLSM, as
compared with RIP-1, making it a classless routing protocol.
B: In the scenario you should not consider BGP as the Border Gateway Protocol (BGP) is
designed specifically for use between two different organizations. You should additionally
remember that BGP distributes routing information between ISPs worldwide today and be
Which of the following devices is used to connect a WAN to a LAN?
A. Basic router
B. Repeater
C. Bridge
D. Basic switch
Basic router
Routing convergence time is which of the following?
A. Time required for an IDS to detect suspicious software
B. Time required by switch ports to update their link status and transition to the forwarding state
C. Time required for a VPN connection to occur
D. Time required by protocols to update their forwarding tables after changes have occurred
Time required by protocols to update their forwarding tables after changes have occurred
A new business with five computers moves into an office where coaxial cable exists. In order to
use the existing infrastructure, which of the following topologies would be used?
A. Spanning Tree
B. Star
C. Mesh
D. Bus
Bus

Explanation:
With the bus topology you will use fewer cables. The bus topology consists of a single cable that
connects the network nodes. It uses less then thee other topologies. In the star topology, each
node is connected to a central hub or switch. This involves more cabling than in the bus topology.
In the mesh topology, each node is connected to at least three other nodes. This requires more
cabling than in a bus topology
A company is in the process of upgrading their network infrastructure to support new VoIP
telephony equipment. Which of the following is a primary feature to consider when selecting a new
switch to support the phones?

A. Port mirroring
B. PoE
C. VPN capability
D. Modular chassis
PoE
Which of the following protocols are used to transfer files between two systems?(Select TWO).
A. RIP
B. SCP
C. FTP
D. NTP
E. SNMP
B. SCP
C. FTP
Which of the following network devices would a network administrator use to create a DMZ?
A. Hostbased
firewall
B. File server
C. Networkbased
firewall
D. WINS server
Networkbased
firewall
Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).
A. Snips
B. Cable crimper
C. TDR
D. Multimeter
E. OTDR
A. Snips
B. Cable crimper
A technician received a call from a remote user who is having issues connecting to a new VPN.
Which
of the following is the FIRST step the technician should take?
A. Document the solution and process
B. Identify the symptoms and potential causes
C. Establish what haschanged
D. Implement an action plan
Identify the symptoms and potential causes
Explanation:
In this scenario the technician needs to identify the symptoms as well as the potential cause. The
first step you need to do in troubleshooting is to determine what symptoms are being displayed. In
this scenario the remote users are unable to connect to the new VPN.
A technician installed a new wireless router. The customer is now having a problem playing online
games, but they can connect to websites. Which of the following should the technician configure to
resolve this problem?
A. Port forwarding
B. SSID
C. MAC filtering
D. Antenna placement
Port forwarding
Which of the following is an advantage of 100BaseT
over 100BaseFX?
A. Uses a more flexible cable
B. Faster transmission speeds
C. Longer cable runs
D. Can be used in a topology
Uses a more flexible cable

Explanation:
100baseFX has a range of 2000 meters. 100baseT only 100 meters.
Which of the following cable types are the MOST widely used in a corporate gigabit network
scheme?
A. CAT5
B. CAT1
C. CAT3
D. CAT6
CAT6

Explanation:
The cable type that was used was the CAT6 cable type. CAT6 can operate up to 10 gigabits per
second.
Incorrect Answers:
A: The CAT5 cable operates up to 100 megabits per second.
B: The CAT1 cable is only allows voice data.
C: The CAT3 cable operates up to 20 megabits per second.
Which of the following LAN types would utilize CAT5 UTP?
A. 100BaseTX
B. 1000BaseT
C. 100BaseFX
D. 10GBaseSR
100BaseTX

Explanation:
The 100Base-TX uses CAT5-UTP. It has a speed of 100 Mbps.
A network administrator configured several network devices earlier today, but now the Internet is
no longer available to several users. Which of the following logs should the network administrator
reference to help identify the problem?
A. Phone logs
B. Event logs
C. History logs
D. Application logs
History logs

Explanation:Your best option in this scenario would be to make use of the History logs. The History logs will list
all the events that are associated with the system, hardware and installed applications in the event
that the administrator need to troubleshoot the server. The history logs will encompass information
regarding the resource usage, application errors, system errors, audited events, security events as
well as the actions that was taken on the server.
Incorrect Answers:
B: The events log is a set of three logs that is maintained by the Windows Server. The logs include
the application logs, Security logs and the system logs. The operating system and many
applications write software events to the Event Log.References:Charles J. Brooks, Server+
Certification Exam Cram 2 (Exam SKO-002), QUE Publishing, Indianapolis, IN, 2006, pp. 326-327
D: The application log tracks events for network services and applications. It makes use of the
same event types as that of the System log.
Which of the following devices would be used to connect different broadcast domains in order to
allow them to communicate with each other?
A. Bridge
B. Layer 2 switch
C. Hub
D. Multilayer switch
Multilayer switch

Explanation:
In this scenario you need to make use of a multilayer switch. The multilayer switch is used to
concurrently execute switching that is based on multiple layers.
Enabling MAC address filtering on a switch can be used to mitigate which of the following security
threats?
A. Rogue access points
B. Viruses
C. Social engineering
D. Worms
Rogue access points
Which of the following mechanisms is used to calculate backoff
time on an Ethernet link after a
collision?
A. CSMA/CD
B. CSMA/CA
C. Spanning Tree
D. Weighted Random Early Detect (WRED)
CSMA/CD
Which of the following is an advantage of 100BaseFX
over 100BaseTX?
A. Faster transmission speeds
B. Longer cable runs
C. Uses a more durable cable
D. Ease of installation
Longer cable runs
At which of the following layers of the OSI model would a repeater operate?
A. Layer 7
B. Layer 5
C. Layer 3
D. Layer 1
Layer 1
Which of the following documentations would a network technician find ports that a company has
blocked?
A. Policies, procedures and configurations
B. Baseline reports
C. Network wiring schematics
D. RFC
Policies, procedures and configurations
A technician is troubleshooting a printer problem in a SOHO environment. The printer is connected
to the network and the computers can print using TCP/IP directly. The computers were able to
print the day before, but now they cannot. Which of the following setups would aid in preventing
this problem?
A. Set up the printer on a public IP address.
B. Configure the printer to use an APIPA.
C. Change the printer setting to use multicast.
D. Place the printer on a static IP address.
Place the printer on a static IP address.
Which of the following systems detects and reports attempts of unauthorized access to the
network?
A. Hostbased
firewall
B. Basic firewall
C. IDS
D. IPS
IDS
Which of the following software types would BEST be used at identifying and reacting to an attack
by shutting down a port or dropping certain types of packets?
A. Port scanner
B. IPS
C. Packet sniffer
D. IDS
IPS
A user reports that the wireless network is slow and is able to see and access shared folders that
are unknown to the user. Which of the following is the cause of the problem?
A. The wireless NIC is defective.
B. Wireless router is improperly configured.
C. The user is connecting to the wrong SSID.
D. The SSID broadcast is disabled
The user is connecting to the wrong SSID.
Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?
A. SONET
B. E3
C. T3
D. OC12
T3
A new virus was just released and has infected several workstations. A technician receives a
newly released patch. Which of the following troubleshooting steps should the technician take
FIRST?
A. Implement an action plan
B. Document the solution
C. Apply the patch as quickly as possible
D. Wait for the virus definitions to be updated
Implement an action plan
The network administrator needs to use an IP addressing method that will not require manual
updating. Which of the following should be used?
A. Static
B. Dynamic
C. TCP
D. Multiple
Dynamic
Which of the following logical topologies uses centralized authentication?
A. Peertopeer
B. Client/server
C. VPN
D. VLAN
Client/server
Which of the following command and switch combination would provide the following output?
Interface: 172.30.0.102 0x2
Internet Address Physical Address
Type 172.30.0.5
00304882728c
dynamic
A. arp -s
B. netstat -a
C. arp -a
D. netstat -s
arp -a

Explanation:
The Address Resolution Protocol, or ARP, is part of the Transmission Control Protocol/Internet
Protocol (TCP/IP) protocol stack; it is used to translate TCP/IP addresses to MAC (media access
control) addresses using broadcasts. When a machine running TCP/IP wants to know which
machine on an Ethernet network uses a particular IP address, it will send an ARP broadcast that
says, in effect, "Hey! Who is IP address xxx.xxx.xxx.xxx ?" The machine that owns the specific
address will respond with its own MAC address. The machine that made the inquiry then adds that
information to its own ARP table. In addition to the normal usage, the ARP designation refers to a
utility in Windows that you can use to manipulate and view the local workstation's ARP table. To
display the entire current ARP table, use the Arp command with the -a switch, like this:

Incorrect Answers:
B: You should not consider using the netstat utility because using netstat is a great way to see the
TCP/IP connections (both inboun
A second network card in a server that activates if the primary card fails is an example of which of
the following network performance optimization?
A. Fault tolerance
B. High availability
C. QoS
D. Load balancing
Fault tolerance

Explanation:
The best option would be to have two cards installed in the event that the primary card fails. This
is clearly an example of Fault Tolerance. Fault tolerance deals with the ability to withstand failure
without losing information. Multiple NIC's will provide you with fault tolerance for the network
connection.
A user is reporting that their inquiries to the database server keep timing out. Which of the
following tools would be BEST suited to troubleshoot the issue?
A. Cable tester
B. Packet analyzer
C. Tone probe
D. Butt set
Packet analyzer
Which of the following connector types would a technician utilize with fiber lines by pushing it
directly into the port without twisting?
A. RJ45
B. ST
C. SC
D. BNC
SC
A client is using a device that allows them to synchronize their wireless device to their computer,
but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Whichof the following BEST describes the type of wireless device being used?
A. WiFi
B. Bluetooth
C. Serial
D. Infrared
Infrared
A technician is building a new network. Which of the following components would be the FIRST
installed for the network?
A. MDF
B. VPN
C. EMI
D. IDF
MDF
After a technician came out and installed a new wireless router, one of the wired workstations
began having problems connecting to the file server. This is only an intermittent problem. Which of
the following actions will the technician MOST likely perform to resolve this problem?
A. Move the router's location.
B. Check the cable ends.
C. Check user permissions.
D. Change the router's SSID.
Check the cable ends.
A network device that is used to connect multiple devices without segmenting a network is a:
A. router.
B. bridge.
C. hub.
D. switch.
hub.

Explanation:
In order to connect to multiple devices without segmenting a network you have to make use of a
hub. A hub is an electronic device that sits at the center of a star topology network. It provides a
common point for the connection of network devices. The hubs repeat all data out to the ports.
A mail server was recently placed in the network. The users report email is slow. Upon closer
inspection a technician notices that error counters on the interface are incrementing. Which of the
following could be causing the problem?
A. Wrong subnet mask
B. Duplex mismatch
C. Port speed mismatch
D. Switch loop
Duplex mismatch
A technician has just finished implementing a solution for a network issue. Which of the following
steps in troubleshooting should the technician do NEXT?
A. Document the issue and the solution that was implemented.
B. Escalate the issue to another technician.
C. Test if the solution works and identify other effects it may have.
D. Gather information about the issue.
Test if the solution works and identify other effects it may have.
A technician notices that when trying to ping a workstation by network name the workstation does
not reply back over the network. The workstation is part of the domain and is able to get to the
Internet. Which of the following is the cause of the problem?
A. Faulty cable on the workstation
B. Wrong host name on the workstation
C. Wrong WINS on the workstation
D. Incorrect IP address assigned to the workstation
Wrong host name on the workstation
Which of the following network performance optimization methods slows or restricts traffic to
increase the performance of other types of traffic? (Select TWO).
A. Load balancing
B. Traffic shaping
C. High availability
D. Caching engines
E. QoS
Traffic shaping and QoS
A user has plugged a computer into a switch port and now is unable to access any server
resources on the network.Which of the following are the MOST likely reasons for the access
problem? (Select TWO).
A. The spanning tree protocol has locked down the port.
B. The computer is connected to a port in the wrong VLAN.
C. The appropriate credentials have not been supplied for network access.
D. A port mirroring session was started and is interfering with the connection.
E. The computer is connected to an incorrect PoE port.
B. The computer is connected to a port in the wrong VLAN.
C. The appropriate credentials have not been supplied for network access.
A company has just added a new conference room. The network administrator has decided to add
six new data ports to this room. The administrator has verified that all the cabling is terminated and
functioning correctly. Which of the following should the administrator do next?
A. Update the network baseline.
B. Update the wiring diagrams.
C. Move some data across each port.
D. Check all of the cables with the OTDR.
Update the wiring diagrams.
A network technician wants to add fault tolerance to a file server. Which of the following should the
technician do?
A. Install the latest NIC driver
B. Add an additional DNS server and modify the MX record
C. Upgrade the NIC to a one Gigabit card
D. Add an additional NIC and setup network teaming
Add an additional NIC and setup network teaming
Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the
data level?
A. SLIP
B. PPPoE
C. PPTP
D. RAS
PPTP
Which of the following network devices would an administrator have to configure channels on?
A. Hub
B. Unmanaged switch
C. Firewall
D. Wireless access point
Wireless access point
A network technician is installing a series of three access points to cover the entire wing of a
building. Only one access point has a wired connection. 802.11g is being used for the wireless
transmission. Which of the following channels should be used for the access points?
A. Channels 1-3-5
B. Channels 6-6-6
C. Channels 7-11-1
D. Channels 5-5-5
Channels 6-6-6
Which of the following outlines the purpose of using a proxy server in an enterprise environment?
A. Allows the administrator to block malicious attacks on the network
B. Allows the user to access hard to find websites
C. Allows the client to get a fixed IP address when added to the network
D. Allows granular control over the traffic between the local LAN and the Internet
Allows granular control over the traffic between the local LAN and the Internet
An administrator is using a packet analyzer across a single switch but is only receiving partial
packet information. Which of the following would need to be implemented on the switch for the
administrator?
A. Port authentication
B. Port mirroring
C. Spanning tree
D. VLAN
Port mirroring
Which of the following cable types is typically used to connect a hub to a hub that does not support
MDIX?
A. Straight
B. Loopback
C. Crossover
D. Rollover
Crossover
Which of the following features from the switch eliminates a delay in acquiring an IP address?
A. Update the SNMP strings.
B. Change the duplex mode tohalfduplex.
C. Enable spanning tree on the interface.
D. Enable trunking
Enable spanning tree on the interface.

Explanation:
Your best option in this scenario would be to enable spanning tree on the interface. The spanningtree
algorithm places every bridge or switch port into either a forwarding state or a blocking state.
It ensures that only one path is active between two network stations. It also permits redundant
paths that are automatically activated when the active path experiences problems.
Which of the following is the component in a wiring system designed to support legacy phone
systems?
A. Fiber conduit
B. 66 block
C. 110 block
D. Patch panels
66 block

Explanation:
Currently, 66 blocks are considered legacy devices. They are large, compared to more
contemporary wire terminating devices, and, due to their maximum 16 MHz Category 3 signaling
compatibility, are all suited for high speed data circuits greater than 10Base-T.
Which of the following protocols allows usernames and passwords to be transmitted as cleartext?
A. PAP
B. RADIUS
C. CHAP
D. SSH
PAP

Explanation:
Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is
arguably the simplest. In PAP, pairs of usernames and passwords are used. When a client wants
to authentication to a server, for example, the client will send the username and password to the
server over the network. The username and password are sent in clear text, that is to say,
unencrypted. The server receives the username and password and compares them to an
encrypted, locally stored table of username-password pairs. If the username and password is a
match, the client is authenticated.
Which of the following will allow certain ports to be part of the same group while other ports within
that switch are part of a different group?
A. Trunking
B. Port authentication
C. Enabling VLANs
D. Enabling VTP
Enabling VLANs
When preparing to place a RJ45
connector on a CAT5 cable, which of the following tools would
BEST be used to prepare the cable?
A. Polishing kit
B. Pliers
C. Razor knife
D. Snips
Snips
Which of the following authentication protocols uses certificates to negotiate access to the
network?
A. EAPTLS
B. PAP
C. CHAP
D. Kerberos
EAPTLS

Incorrect Answers:
B: You should not consider making use of the PAP protocol because PAP pairs the usernames
and passwords which are used. You should also remember when a client wants to authentication
to a server the client will send the username and password to the server over the network.
C: You should not consider making use of the Challenge Handshake Authentication Protocol
(CHAP) because the protocol requires having both the client and server configured with the same
text phrase or known as a shared secret. The server would then compare the hash received from
the client with the hash value it calculated when a match is verified the client is authenticated.
D: You should not consider making use of the Kerberos protocol as is not just a protocol but an
entire security system. Kerberos is used to establish a user's identity when they log on to a system
that uses Kerberos. Kerberos then has that identity and its security credentials are then used
throughout an entire logon session. Kerberos additio
Which of the following components allows a technician to use short Ethernet cables to connect
cable drops to other devices?
A. EDF
B. MDF
C. Demarc extension
D. Patch panel
Patch panel
Which of the following is the strongest type of wireless encryption?
A. AES
B. RADIUS
C. WEP
D. TKIP
AES
Which of the following wireless communication standards allows for communication at both
2.4GHz and 5GHz frequencies?
A. 802.11b
B. 802.11a
C. 802.11n
D. 802.11g
802.11n
Which of the following network security devices prevents users from propagating viruses?
A. IPS
B. Firewall
C. IDS
D. Content engine
IPS
A network administrator of a company has many branch locations each using a subnet mask of
255.255.255.224. Which of the following dynamic routing protocols should be used?
A. RIPv2
B. IGRP
C. ISIS
D. BGP
RIPv2

Explanation:
In the scenario you should consider making use of RIPv2 as RIP-2 makes use of distance vector
logic; uses hop count for the metric whilst sending full, periodic updates; and still converges
relatively slowly. You should additionally remember that RIP-2 does add support for VLSM, as
compared with RIP-1, making it a classless routing protocol.
Which of the following network devices operates on Layer 1 of the OSI model?
A. Bridge
B. Switch
C. Hub
D. Router
Hub

Explanation:
A hub is an electronic device that sits at the center of a star topology network. It provides a
common point for the connection of network devices. The hubs repeat all data out to the ports.
The hub functions in the Physical layer of the OSI model.
After reconfiguring
a server to facilitate DNS requests, which of the following would help provide
the highest level of fault tolerance?
A. Adding a Kerberos server
B. Configuring traffic shaping
C. Configuring WEP
D. Adding a second NIC
Adding a second NIC
Which of the following devices controls traffic on a LAN?
A. Switch
B. Hub
C. Repeater
D. Bridge
Switch
Which of the following network media has the longest maximum segment length?
A. CAT6
B. Single Mode Fiber
C. Coaxial cable
D. Multimode Fiber
Single Mode Fiber