Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
98 Cards in this Set
- Front
- Back
Which of the following network segments is located outside the firewall?
A. SPAP B. VPN C. DMZ D. PPTP |
DMZ
Explanation: Your best option would be to identify DMZ. The demilitarized zone is a small network between the internal network and the Internet that offers a layer of security and privacy. DMZ is thus a method for placing web and other servers that serve the general public outside the firewall isolating them from the internal network access. Incorrect Answers: A: PAP is one of the simplest forms of authentication. Authentication is accomplished by sending usernames and passwords to the server where it is verified. The passwords are sent as clear text. You can easily detect if it is intercepted. B: A Virtual Private Network (VPN) makes use of the public Internet as a backbone for a private interconnection between locations. This technology supports reasonably secure, logical, private network links and insecure public network infrastructure. It reduces the Public Switched Telephone Network (PSTN) costs. VPNs are more secure that the traditional remote access as it can be encrypted. D: Point-to-Point Tunne |
|
To support roaming across a wireless 802.11g network, each access point should be configured to
use which of the following? A. The same channel B. The same frequency C. The same SSID D. CSMA/CD |
The same SSID
Explanation: In the scenario you should remember that configuring a unique SSID name is the very least that you should do to secure a wireless network. You should also be aware that each wireless network node and access point needs to be configured with the same unique SSID name. The SSID name is then included in the header of every data packet broadcast in the wireless network's coverage area. You should also note that the Data packets that lack the correct SSID name in the header are rejected. Incorrect Answers: A: In the scenario you should remember that a wireless access point(WAP) allows mobile users to connect to a wired network wirelessly via radio frequency technologies. You should additionally note that WAPs also allow wired networks to connect to each other via wireless technologies. B: In the scenario you should remember that a wireless access point(WAP) allows mobile users to connect to a wired network wirelessly via radio frequency technologies. You should additionally note that |
|
Which of the following would a technician use a punch down tool on?
A. RJ45 connector B. ST connector C. 110 block D. Smart jack |
110 block
Explanation: Your best option in this scenario would be to make use of a 100 block. A 100 block is known as a punchdown block due to its method of installation. Incorrect Answers: B: An RJ-45 is found in network connections. It is also a connector for eight-wire UTP. D: An ST connector is used for networking applications. It makes use of a twist-lock coupling with a 2.5 mm keyed ferrule. You can make use of this connector for short as well as long distances |
|
Two small companies sharing a switch would MOST likely benefit from which of the following
advanced switch features? A. Spanning tree B. Trunking C. PoE D. VLAN |
VLAN
|
|
Which of the following is the maximum speed available from a full T1 line?
A. 1.544Mbps B. 5.23Mbps C. 765Kpbs D. 10.73Mbps |
1.544Mbps
|
|
A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on
the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings? A. Fiber optic cable B. Pointtopoint wireless link C. CAT6 cable D. RG58 cable |
Fiber optic cable
Explanation: The best option will be Fiber optic cabling. With Gigabit Ethernet applications, it will run up to 1Gbps. The CAT6 cabling can reach speeds up to 10 gigabits per second; however it is limited up to 100 meters |
|
An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of
the following Ethernet media types should be used to avoid interference? A. 10Base5 B. 100BaseT C. 10Base2 D. 100BaseFX |
100BaseFX
Explanation: In order to avoid interference when an Ethernet LAN with several trunks links passes heavy machinery resulting in EMI you need to make use of 100Base-FX. 100Base-FX is an Ethernet LAN that is designed to run on fibre optic cable. Incorrect Answers: A: 10Base2 Ethernet and 10Base5 Ethernet media types defines the details of the physical layer of the earlier Ethernet networks. B: The 100BaseT Ethernet media type is the generic term for an Ethernet cabling system. This system is designed to run at 100 megabits per second on UTP cabling and makes use of baseband cabling.References:Wendell Odom, CCNA INTRO Exam Certification Guide, Cisco Press, Indianapolis, IN, 2004, pp. 53Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam SKO-002), QUE Publishing, Indianapolis, IN, 2006, pp. 270-273 C: 10Base2 Ethernet and 10Base5 Ethernet media types defines the details of the physical layer of the earlier Ethernet networks. |
|
Which of the following software types would BEST be used for identifying an attack?
A. IDS B. IPS C. Packet sniffer D. Port scanner |
IDS
|
|
A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to
server B. Which of the following packets should be sent from server B in response? A. SYNNAK B. SYNACK C. ACK D. NAK |
SYN-ACK
|
|
Which of the following Ethernet technologies has the shortest transmission distance?
A. 10BaseT B. 10GBaseT C. 100BaseT D. 10GBaseSR |
10GBaseT
Explanation: The 10Base-2 media type has a transmission distance of 185 meters. The 10Base T media type has a transmission distance of 100 meters. The 10GBase-SR has a transmission distance of 300 meters |
|
A network technician is implementing new wireless access points in an existing wireless
infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points? A. TKIP B. 3DES C. AES D. CHAP |
AES
|
|
In a Class C subnet, a network ID may occupy a maximum of:
A. 24bits. B. 16bits. C. 31bits. D. 32bits. |
24bits.
|
|
A 100 pair cable is typically used to connect:
A. telephony distribution. B. computer labs with more than 20 computers. C. security cameras. D. businesses with more than 75 computers. |
telephony distribution.
|
|
Which of the following utilities will produce the results printed below?
TCP Certs03:1072 172.31.0.78:3389 Established A. netstat B. arp C. ping D. tracert |
netstat
|
|
A technician is asked to place wireless Internet access in an open warehouse environment. After
installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength? A. Enable traffic shaping. B. Change the antenna placement. C. Change the encryption method. D. Broadcast the SSID. |
Change the antenna placement
Explanation: Traffic shaping delays the excess packets by holding them in buffers and releasing it at preconfigured |
|
Which of the following actions should the administrator do FIRST to help access a gigabit
connection? A. Change the CAT5 cable to a CAT3 cable. B. Change the CAT3 cable to RG58 cable C. Change the CAT5 cable to a CAT6 cable. D. Change the CAT5 cable to a CAT5 Crossover cable. |
Change the CAT5 cable to a CAT6 cable.
Explanation: You should change to the CAT5e cable or a CAT6 cable connection to be able to handle or to access a gigabit connection. The CAT5e can operate up to a gigabyte per second and the CAT6 operate up to a 10 gigabyte per second. |
|
A company would like to configure newsfeeds on the network for employees to be aware of
internal company information. Which of the following ports would be used to allow newsfeeds to passthrough? A. 25 B. 22 C. 119 D. 143 |
Explanation:
In the scenario you should consider making use of port 119 because port 119 is used by the NNTP protocol for communication. Incorrect Answers: A: You should not consider making use of port 25 in the scenario because port 25 is used by the SMTP protocol for communication. B: You should not consider making use of port 22 in the scenario because port 22 is used by the SSH protocol for communication. D: You should not consider making use of port 143 in the scenario because port 143 is used by the IMAP4 protocol for communication |
|
A technician needs to change locations of a telephone between 66 blocks. Which of the following
tools would be used in locating the positions in the cross connections? A. Butt set B. Cable tester C. Toner probe D. Voltage meter |
Toner probe
|
|
Which of the following commands would allow the technician to identify the currently assigned
DNS server? A. nbtstat B. netstat C. dig D. nslookup |
nslookup
Explanation: Your best option would be to make use of the nslookup command. nslookup displays information about a particular domain name, the name servers that serve it, and how they are configured. Incorrect Answers: B: The dig utility permits you to lookup DNS resolution information. C: netstat is used to display the inbound and outbound TCP/IP connections on a local computer. It provides packet statistics, such as the number of packets that have been sent and received, the number of errors, etc. |
|
Two ports on switch A are connected to switch B. The advanced switch feature that allows these
ports to be combined and managed as a single entity is called: A. port mirroring. B. trunking. C. VLAN. D. spanning tree |
trunking
Explanation: This is a method to support multiple VLAN's that have members on more than one switch. Incorrect Answers: C: VLAN's assists you in isolating network traffic. It is software technology that permits for the grouping of network nodes that is connected to one or more network switches into a single logical network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network. D: The spanning-tree algorithm places every bridge or switch port into either a forwarding state or a blocking state. It ensures that only one path is active between two network stations. It also permits redundant paths that are automatically activated when the active path experiences problems |
|
Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?
A. 802.11g B. 802.11a C. 802.11b D. 802.11 |
802.11a
|
|
A user calls saying they are having issues connecting to the Internet, but they are able to connect
to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address? A. ipconfig B. arp -s C. arp -a D. nbtstat R |
arp -a
Explanation: The Address Resolution Protocol, or ARP, is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack; it is used to translate TCP/IP addresses to MAC (media access control) addresses using broadcasts. When a machine running TCP/IP wants to know which machine on an Ethernet network uses a particular IP address, it will send an ARP broadcast that says, in effect, "Hey! Who is IP address xxx.xxx.xxx.xxx ?" The machine that owns the specific address will respond with its own MAC address. The machine that made the inquiry then adds that information to its own ARP table. In addition to the normal usage, the ARP designation refers to a utility in Windows that you can use to manipulate and view the local workstation's ARP table. To display the entire current ARP table, use the Arp command with the -a switch, like this: arp -a Incorrect Answers: A: You should not consider making use of the ipconfig utility because the ipconfig utility cannot be used to solve the proble |
|
Which of the following is a utility that translates the physical network address to its IP address?
A. nslookup B. ping C. rarp D. netstat |
rarp
Explanation: Reverse ARP (RARP) is nothing more than ARP packets with different codes in the header, indicating to devices receiving RARP packets that these are requests by the source device for its own IP configuration, meaning RARP replies should be handled by a RARP server and that any device not fulfilling this role need not process these requests any further. If, however, the receiving device is a RARP server, it is incumbent upon that device to find the requesting device's MAC address in a configured list (RARP is an older, manual process, unlike DHCP). The server sends the IP address it finds associated with the requesting MAC address back to the requesting device. RARP was adequate for diskless workstation initial IP configuration but fell short as a be-all, endall supplier of detailed IP-related information, which is why DHCP has supplanted RARP for supplying network-based IP configuration in most modern networks. Incorrect Answers: A: You should not consider making use of the nslookup utilit |
|
Which of the following cable standards has the highest effective range at a greater expense?
A. 1000BaseT B. 1000BaseLX C. 1000BaseCX D. 1000BaseSX |
1000BaseLX
Explanation: The 1000Base-LX has the highest efficiency range. In multi-mode, it has a range of 550 meters. In single-mode, it has a range of 2000 meters. Incorrect Answers: A: The 1000Base-T has a range of 100 meters. C: The 1000Base-CX has a range of 25 meters. D: The 1000Base-SX has a range of 550 meters |
|
Which of the following technologies is BEST suited for a pointtopoint
circuit that is 6 kilometers (3.7 miles) in distance? A. 10GBaseT B. 10GBaseER C. 10GBaseSR D. 10GBaseLR |
10GBaseLR
|
|
Which of the following frequency ranges does 802.11a operate at?
A. 4.9GHz B. 5GHz C. 54GHz D. 2.4GHz |
5GHz
|
|
Which of the following protocols provides the actual encryption used over VPN?
A. PPP B. HTTPS C. PPTP D. SSH |
PPTP
Explanation: Point-to-Point Tunneling Protocol You can access a private network through the Internet or other public network by using a virtual private network (VPN) connection with the Point-to-Point Tunneling Protocol (PPTP). Developed as an extension of the Point-to-Point Protocol (PPP), PPTP tunnels and/or encapsulates IP, IPX, or NetBEUI protocols inside of PPP datagram's. PPTP does not require a dial-up connection. It does, however, require IP connectivity between your computer and the server. Not B: L2TP is an industry-standard Internet tunneling protocol with roughly the same functionality as the Point-to-Point Tunneling Protocol (PPTP). Like PPTP, L2TP encapsulates Point-to-Point Protocol (PPP) frames, which in turn encapsulate IP, IPX, or NetBEUI protocol. Incorrect Answers: A: PPP is capable of passing multiple LAN protocols across the wire. PPP is able to encapsulate different network protocols such as NetBEUI, IPX/SPX, and TCP/IP. The Point-to-Point Protocol (PPP) is a full duplex line pr |
|
Which of the following features of a switch will allow two switches to pass network information?
A. Disabling the routing protocols B. Port speeds C. Trunking D. PoE |
Trunking
|
|
Which of the following tools can send a signal down a cable and measure how long it takes to
comeback? A. Multimeter B. Voltage event recorder C. TDR D. Toner probe |
TDR
|
|
A technician needs to connect a laptop via the small office, home office (SOHO)wireless access
point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue? A. The SSID is set to not broadcast. B. The wireless router does not have adequate AC power. C. The WEP key is not correct. D. The laptop is running on Windows Service Pack 1. |
The SSID is set to not broadcast.
|
|
A technician has determined that a single computer has suddenly lost network connectivity. Which
of the following should be the next troubleshooting step the technician should take? A. Determine if escalation is necessary. B. Determine if anything has changed. C. Identify the affected areas of the network. D. Establish the most probable cause |
Determine if anything has changed
|
|
A company has installed a new 802.11g pointtopoint
connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omnidirectional antenna. Which of the following would BEST improve the linkperformance? A. Replace the omnidirectional antennas with Yagi antennas. B. Configure channel hopping on both wireless bridges. C. Replace the wireless bridges with wireless access points. D. Install bidirectional amplifiers at both sites. |
Replace the omnidirectional
antennas with Yagi antennas. Explanation: In the scenario you should remember that Wireless antennas act as both transmitters and receivers. You should additionally note that there are two broad classes of antennas on the market, omni directional (Omni, or point-to-multipoint) and directional (Yagi or point-topoint). |
|
A users workstation is able to resolve IP addresses of any host, and can ping other workstations
on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem? A. The workstation is configured with an incorrect subnet mask. B. The workstation is configured with the incorrect default gateway. C. The workstations NICis configured for a different port speed than the switch. D. The workstation is assigned to the incorrect VLAN. |
The workstation is configured with the incorrect default gateway.
Explanation: It is likely in this scenario that the error was caused by a default gateway. The default gateway in a TCP/IP network is the nearest router to a certain host. The IP address of the router will be part of the necessary TCP/IP configuration when you communicate with numerous networks by making use of IP. |
|
The 66 block termination point is:
A. CAT3 compliant. B. coaxial compliant. C. CAT6 compliant. D. IEEE 1394 compliant. |
CAT3 compliant.
Explanation: The 66 block termination point is CAT 3 complaint. The CAT 3 cabling is used for telephone systems. The 66 block is a punch-down block used to connect wiring for telephone systems. Furthermore, it is used to force solid wire into metal slots. |
|
A network using RIP has taken several minutes to begin routing traffic around a failed piece of
equipment. Which of the following could be implemented to improve convergence time? A. Replace RIP with adistancevector routing protocol such as RIP version 2. B. Replace RIP with an exterior gateway protocol such as BGP. C. Replace RIP with static routes so dynamic updates are not sent. D. Replace RIP with alinkstate routing protocol such as OSPF. |
Replace RIP with alinkstate
routing protocol such as OSPF. Explanation: In the scenario you should remember that OSPF is a link state protocol as OSPF is the most popular link-state IP routing protocol in use today and will be popular for some time since OSPF is widely deployed and includes a wide variety of features that have been added over the years to accommodate new requirements. Incorrect Answers: A: In the scenario you should not consider making use of RIPv2 as RIP-2 makes use of distance vector logic; uses hop count for the metric whilst sending full, periodic updates; and still converges relatively slowly. You should additionally remember that RIP-2 does add support for VLSM, as compared with RIP-1, making it a classless routing protocol. B: In the scenario you should not consider BGP as the Border Gateway Protocol (BGP) is designed specifically for use between two different organizations. You should additionally remember that BGP distributes routing information between ISPs worldwide today and be |
|
Which of the following devices is used to connect a WAN to a LAN?
A. Basic router B. Repeater C. Bridge D. Basic switch |
Basic router
|
|
Routing convergence time is which of the following?
A. Time required for an IDS to detect suspicious software B. Time required by switch ports to update their link status and transition to the forwarding state C. Time required for a VPN connection to occur D. Time required by protocols to update their forwarding tables after changes have occurred |
Time required by protocols to update their forwarding tables after changes have occurred
|
|
A new business with five computers moves into an office where coaxial cable exists. In order to
use the existing infrastructure, which of the following topologies would be used? A. Spanning Tree B. Star C. Mesh D. Bus |
Bus
Explanation: With the bus topology you will use fewer cables. The bus topology consists of a single cable that connects the network nodes. It uses less then thee other topologies. In the star topology, each node is connected to a central hub or switch. This involves more cabling than in the bus topology. In the mesh topology, each node is connected to at least three other nodes. This requires more cabling than in a bus topology |
|
A company is in the process of upgrading their network infrastructure to support new VoIP
telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones? A. Port mirroring B. PoE C. VPN capability D. Modular chassis |
PoE
|
|
Which of the following protocols are used to transfer files between two systems?(Select TWO).
A. RIP B. SCP C. FTP D. NTP E. SNMP |
B. SCP
C. FTP |
|
Which of the following network devices would a network administrator use to create a DMZ?
A. Hostbased firewall B. File server C. Networkbased firewall D. WINS server |
Networkbased
firewall |
|
Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).
A. Snips B. Cable crimper C. TDR D. Multimeter E. OTDR |
A. Snips
B. Cable crimper |
|
A technician received a call from a remote user who is having issues connecting to a new VPN.
Which of the following is the FIRST step the technician should take? A. Document the solution and process B. Identify the symptoms and potential causes C. Establish what haschanged D. Implement an action plan |
Identify the symptoms and potential causes
Explanation: In this scenario the technician needs to identify the symptoms as well as the potential cause. The first step you need to do in troubleshooting is to determine what symptoms are being displayed. In this scenario the remote users are unable to connect to the new VPN. |
|
A technician installed a new wireless router. The customer is now having a problem playing online
games, but they can connect to websites. Which of the following should the technician configure to resolve this problem? A. Port forwarding B. SSID C. MAC filtering D. Antenna placement |
Port forwarding
|
|
Which of the following is an advantage of 100BaseT
over 100BaseFX? A. Uses a more flexible cable B. Faster transmission speeds C. Longer cable runs D. Can be used in a topology |
Uses a more flexible cable
Explanation: 100baseFX has a range of 2000 meters. 100baseT only 100 meters. |
|
Which of the following cable types are the MOST widely used in a corporate gigabit network
scheme? A. CAT5 B. CAT1 C. CAT3 D. CAT6 |
CAT6
Explanation: The cable type that was used was the CAT6 cable type. CAT6 can operate up to 10 gigabits per second. Incorrect Answers: A: The CAT5 cable operates up to 100 megabits per second. B: The CAT1 cable is only allows voice data. C: The CAT3 cable operates up to 20 megabits per second. |
|
Which of the following LAN types would utilize CAT5 UTP?
A. 100BaseTX B. 1000BaseT C. 100BaseFX D. 10GBaseSR |
100BaseTX
Explanation: The 100Base-TX uses CAT5-UTP. It has a speed of 100 Mbps. |
|
A network administrator configured several network devices earlier today, but now the Internet is
no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem? A. Phone logs B. Event logs C. History logs D. Application logs |
History logs
Explanation:Your best option in this scenario would be to make use of the History logs. The History logs will list all the events that are associated with the system, hardware and installed applications in the event that the administrator need to troubleshoot the server. The history logs will encompass information regarding the resource usage, application errors, system errors, audited events, security events as well as the actions that was taken on the server. Incorrect Answers: B: The events log is a set of three logs that is maintained by the Windows Server. The logs include the application logs, Security logs and the system logs. The operating system and many applications write software events to the Event Log.References:Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam SKO-002), QUE Publishing, Indianapolis, IN, 2006, pp. 326-327 D: The application log tracks events for network services and applications. It makes use of the same event types as that of the System log. |
|
Which of the following devices would be used to connect different broadcast domains in order to
allow them to communicate with each other? A. Bridge B. Layer 2 switch C. Hub D. Multilayer switch |
Multilayer switch
Explanation: In this scenario you need to make use of a multilayer switch. The multilayer switch is used to concurrently execute switching that is based on multiple layers. |
|
Enabling MAC address filtering on a switch can be used to mitigate which of the following security
threats? A. Rogue access points B. Viruses C. Social engineering D. Worms |
Rogue access points
|
|
Which of the following mechanisms is used to calculate backoff
time on an Ethernet link after a collision? A. CSMA/CD B. CSMA/CA C. Spanning Tree D. Weighted Random Early Detect (WRED) |
CSMA/CD
|
|
Which of the following is an advantage of 100BaseFX
over 100BaseTX? A. Faster transmission speeds B. Longer cable runs C. Uses a more durable cable D. Ease of installation |
Longer cable runs
|
|
At which of the following layers of the OSI model would a repeater operate?
A. Layer 7 B. Layer 5 C. Layer 3 D. Layer 1 |
Layer 1
|
|
Which of the following documentations would a network technician find ports that a company has
blocked? A. Policies, procedures and configurations B. Baseline reports C. Network wiring schematics D. RFC |
Policies, procedures and configurations
|
|
A technician is troubleshooting a printer problem in a SOHO environment. The printer is connected
to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem? A. Set up the printer on a public IP address. B. Configure the printer to use an APIPA. C. Change the printer setting to use multicast. D. Place the printer on a static IP address. |
Place the printer on a static IP address.
|
|
Which of the following systems detects and reports attempts of unauthorized access to the
network? A. Hostbased firewall B. Basic firewall C. IDS D. IPS |
IDS
|
|
Which of the following software types would BEST be used at identifying and reacting to an attack
by shutting down a port or dropping certain types of packets? A. Port scanner B. IPS C. Packet sniffer D. IDS |
IPS
|
|
A user reports that the wireless network is slow and is able to see and access shared folders that
are unknown to the user. Which of the following is the cause of the problem? A. The wireless NIC is defective. B. Wireless router is improperly configured. C. The user is connecting to the wrong SSID. D. The SSID broadcast is disabled |
The user is connecting to the wrong SSID.
|
|
Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?
A. SONET B. E3 C. T3 D. OC12 |
T3
|
|
A new virus was just released and has infected several workstations. A technician receives a
newly released patch. Which of the following troubleshooting steps should the technician take FIRST? A. Implement an action plan B. Document the solution C. Apply the patch as quickly as possible D. Wait for the virus definitions to be updated |
Implement an action plan
|
|
The network administrator needs to use an IP addressing method that will not require manual
updating. Which of the following should be used? A. Static B. Dynamic C. TCP D. Multiple |
Dynamic
|
|
Which of the following logical topologies uses centralized authentication?
A. Peertopeer B. Client/server C. VPN D. VLAN |
Client/server
|
|
Which of the following command and switch combination would provide the following output?
Interface: 172.30.0.102 0x2 Internet Address Physical Address Type 172.30.0.5 00304882728c dynamic A. arp -s B. netstat -a C. arp -a D. netstat -s |
arp -a
Explanation: The Address Resolution Protocol, or ARP, is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack; it is used to translate TCP/IP addresses to MAC (media access control) addresses using broadcasts. When a machine running TCP/IP wants to know which machine on an Ethernet network uses a particular IP address, it will send an ARP broadcast that says, in effect, "Hey! Who is IP address xxx.xxx.xxx.xxx ?" The machine that owns the specific address will respond with its own MAC address. The machine that made the inquiry then adds that information to its own ARP table. In addition to the normal usage, the ARP designation refers to a utility in Windows that you can use to manipulate and view the local workstation's ARP table. To display the entire current ARP table, use the Arp command with the -a switch, like this: Incorrect Answers: B: You should not consider using the netstat utility because using netstat is a great way to see the TCP/IP connections (both inboun |
|
A second network card in a server that activates if the primary card fails is an example of which of
the following network performance optimization? A. Fault tolerance B. High availability C. QoS D. Load balancing |
Fault tolerance
Explanation: The best option would be to have two cards installed in the event that the primary card fails. This is clearly an example of Fault Tolerance. Fault tolerance deals with the ability to withstand failure without losing information. Multiple NIC's will provide you with fault tolerance for the network connection. |
|
A user is reporting that their inquiries to the database server keep timing out. Which of the
following tools would be BEST suited to troubleshoot the issue? A. Cable tester B. Packet analyzer C. Tone probe D. Butt set |
Packet analyzer
|
|
Which of the following connector types would a technician utilize with fiber lines by pushing it
directly into the port without twisting? A. RJ45 B. ST C. SC D. BNC |
SC
|
|
A client is using a device that allows them to synchronize their wireless device to their computer,
but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Whichof the following BEST describes the type of wireless device being used? A. WiFi B. Bluetooth C. Serial D. Infrared |
Infrared
|
|
A technician is building a new network. Which of the following components would be the FIRST
installed for the network? A. MDF B. VPN C. EMI D. IDF |
MDF
|
|
After a technician came out and installed a new wireless router, one of the wired workstations
began having problems connecting to the file server. This is only an intermittent problem. Which of the following actions will the technician MOST likely perform to resolve this problem? A. Move the router's location. B. Check the cable ends. C. Check user permissions. D. Change the router's SSID. |
Check the cable ends.
|
|
A network device that is used to connect multiple devices without segmenting a network is a:
A. router. B. bridge. C. hub. D. switch. |
hub.
Explanation: In order to connect to multiple devices without segmenting a network you have to make use of a hub. A hub is an electronic device that sits at the center of a star topology network. It provides a common point for the connection of network devices. The hubs repeat all data out to the ports. |
|
A mail server was recently placed in the network. The users report email is slow. Upon closer
inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem? A. Wrong subnet mask B. Duplex mismatch C. Port speed mismatch D. Switch loop |
Duplex mismatch
|
|
A technician has just finished implementing a solution for a network issue. Which of the following
steps in troubleshooting should the technician do NEXT? A. Document the issue and the solution that was implemented. B. Escalate the issue to another technician. C. Test if the solution works and identify other effects it may have. D. Gather information about the issue. |
Test if the solution works and identify other effects it may have.
|
|
A technician notices that when trying to ping a workstation by network name the workstation does
not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem? A. Faulty cable on the workstation B. Wrong host name on the workstation C. Wrong WINS on the workstation D. Incorrect IP address assigned to the workstation |
Wrong host name on the workstation
|
|
Which of the following network performance optimization methods slows or restricts traffic to
increase the performance of other types of traffic? (Select TWO). A. Load balancing B. Traffic shaping C. High availability D. Caching engines E. QoS |
Traffic shaping and QoS
|
|
A user has plugged a computer into a switch port and now is unable to access any server
resources on the network.Which of the following are the MOST likely reasons for the access problem? (Select TWO). A. The spanning tree protocol has locked down the port. B. The computer is connected to a port in the wrong VLAN. C. The appropriate credentials have not been supplied for network access. D. A port mirroring session was started and is interfering with the connection. E. The computer is connected to an incorrect PoE port. |
B. The computer is connected to a port in the wrong VLAN.
C. The appropriate credentials have not been supplied for network access. |
|
A company has just added a new conference room. The network administrator has decided to add
six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administrator do next? A. Update the network baseline. B. Update the wiring diagrams. C. Move some data across each port. D. Check all of the cables with the OTDR. |
Update the wiring diagrams.
|
|
A network technician wants to add fault tolerance to a file server. Which of the following should the
technician do? A. Install the latest NIC driver B. Add an additional DNS server and modify the MX record C. Upgrade the NIC to a one Gigabit card D. Add an additional NIC and setup network teaming |
Add an additional NIC and setup network teaming
|
|
Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the
data level? A. SLIP B. PPPoE C. PPTP D. RAS |
PPTP
|
|
Which of the following network devices would an administrator have to configure channels on?
A. Hub B. Unmanaged switch C. Firewall D. Wireless access point |
Wireless access point
|
|
A network technician is installing a series of three access points to cover the entire wing of a
building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points? A. Channels 1-3-5 B. Channels 6-6-6 C. Channels 7-11-1 D. Channels 5-5-5 |
Channels 6-6-6
|
|
Which of the following outlines the purpose of using a proxy server in an enterprise environment?
A. Allows the administrator to block malicious attacks on the network B. Allows the user to access hard to find websites C. Allows the client to get a fixed IP address when added to the network D. Allows granular control over the traffic between the local LAN and the Internet |
Allows granular control over the traffic between the local LAN and the Internet
|
|
An administrator is using a packet analyzer across a single switch but is only receiving partial
packet information. Which of the following would need to be implemented on the switch for the administrator? A. Port authentication B. Port mirroring C. Spanning tree D. VLAN |
Port mirroring
|
|
Which of the following cable types is typically used to connect a hub to a hub that does not support
MDIX? A. Straight B. Loopback C. Crossover D. Rollover |
Crossover
|
|
Which of the following features from the switch eliminates a delay in acquiring an IP address?
A. Update the SNMP strings. B. Change the duplex mode tohalfduplex. C. Enable spanning tree on the interface. D. Enable trunking |
Enable spanning tree on the interface.
Explanation: Your best option in this scenario would be to enable spanning tree on the interface. The spanningtree algorithm places every bridge or switch port into either a forwarding state or a blocking state. It ensures that only one path is active between two network stations. It also permits redundant paths that are automatically activated when the active path experiences problems. |
|
Which of the following is the component in a wiring system designed to support legacy phone
systems? A. Fiber conduit B. 66 block C. 110 block D. Patch panels |
66 block
Explanation: Currently, 66 blocks are considered legacy devices. They are large, compared to more contemporary wire terminating devices, and, due to their maximum 16 MHz Category 3 signaling compatibility, are all suited for high speed data circuits greater than 10Base-T. |
|
Which of the following protocols allows usernames and passwords to be transmitted as cleartext?
A. PAP B. RADIUS C. CHAP D. SSH |
PAP
Explanation: Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is arguably the simplest. In PAP, pairs of usernames and passwords are used. When a client wants to authentication to a server, for example, the client will send the username and password to the server over the network. The username and password are sent in clear text, that is to say, unencrypted. The server receives the username and password and compares them to an encrypted, locally stored table of username-password pairs. If the username and password is a match, the client is authenticated. |
|
Which of the following will allow certain ports to be part of the same group while other ports within
that switch are part of a different group? A. Trunking B. Port authentication C. Enabling VLANs D. Enabling VTP |
Enabling VLANs
|
|
When preparing to place a RJ45
connector on a CAT5 cable, which of the following tools would BEST be used to prepare the cable? A. Polishing kit B. Pliers C. Razor knife D. Snips |
Snips
|
|
Which of the following authentication protocols uses certificates to negotiate access to the
network? A. EAPTLS B. PAP C. CHAP D. Kerberos |
EAPTLS
Incorrect Answers: B: You should not consider making use of the PAP protocol because PAP pairs the usernames and passwords which are used. You should also remember when a client wants to authentication to a server the client will send the username and password to the server over the network. C: You should not consider making use of the Challenge Handshake Authentication Protocol (CHAP) because the protocol requires having both the client and server configured with the same text phrase or known as a shared secret. The server would then compare the hash received from the client with the hash value it calculated when a match is verified the client is authenticated. D: You should not consider making use of the Kerberos protocol as is not just a protocol but an entire security system. Kerberos is used to establish a user's identity when they log on to a system that uses Kerberos. Kerberos then has that identity and its security credentials are then used throughout an entire logon session. Kerberos additio |
|
Which of the following components allows a technician to use short Ethernet cables to connect
cable drops to other devices? A. EDF B. MDF C. Demarc extension D. Patch panel |
Patch panel
|
|
Which of the following is the strongest type of wireless encryption?
A. AES B. RADIUS C. WEP D. TKIP |
AES
|
|
Which of the following wireless communication standards allows for communication at both
2.4GHz and 5GHz frequencies? A. 802.11b B. 802.11a C. 802.11n D. 802.11g |
802.11n
|
|
Which of the following network security devices prevents users from propagating viruses?
A. IPS B. Firewall C. IDS D. Content engine |
IPS
|
|
A network administrator of a company has many branch locations each using a subnet mask of
255.255.255.224. Which of the following dynamic routing protocols should be used? A. RIPv2 B. IGRP C. ISIS D. BGP |
RIPv2
Explanation: In the scenario you should consider making use of RIPv2 as RIP-2 makes use of distance vector logic; uses hop count for the metric whilst sending full, periodic updates; and still converges relatively slowly. You should additionally remember that RIP-2 does add support for VLSM, as compared with RIP-1, making it a classless routing protocol. |
|
Which of the following network devices operates on Layer 1 of the OSI model?
A. Bridge B. Switch C. Hub D. Router |
Hub
Explanation: A hub is an electronic device that sits at the center of a star topology network. It provides a common point for the connection of network devices. The hubs repeat all data out to the ports. The hub functions in the Physical layer of the OSI model. |
|
After reconfiguring
a server to facilitate DNS requests, which of the following would help provide the highest level of fault tolerance? A. Adding a Kerberos server B. Configuring traffic shaping C. Configuring WEP D. Adding a second NIC |
Adding a second NIC
|
|
Which of the following devices controls traffic on a LAN?
A. Switch B. Hub C. Repeater D. Bridge |
Switch
|
|
Which of the following network media has the longest maximum segment length?
A. CAT6 B. Single Mode Fiber C. Coaxial cable D. Multimode Fiber |
Single Mode Fiber
|