Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/200

Click to flip

200 Cards in this Set

  • Front
  • Back
1Which of the following is used to determine whether or not a user's account is authorized to access a server remotely?A. VPNB. RDPC. LDAPD. Encryption

c

A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?A. Signature based IDSB. Behavior based IPSC. Host based IPSD. Network based IDS

b

Which of the following technologies prevents network collisions to maximize safe delivery of network data?A. CSMA/CA B. DWDMC. RADIUS D. SONET
a

4Which of the following are authentication methods that can use AAA authentication? (Select TWO).A. Kerberos B. PKIC. TKIP/AES D. MS-CHAP E. RADIUS F. TACACS+

e f

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?A. Premise routerB. ISP routerC. Smart jackD. CSU/DSU

c

Which of the following are considered AAA authentication methods? (Select TWO).A. Kerberos B. RadiusC. MS-CHAP D. TACACS+ E. 802.1X

b d

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed onthis device. The technician suspects a possible power issue. Which of the following should be used to test the theory?A. Toner probeB. Loopback plugC. Protocol analyzerD. Multimeter

d

A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?A. ISAKMPB. Port forwardingC. Port securityD. Port mirroring
d

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?A. Layer 1B. Layer 3C. Layer 5D. Layer 7

a

The address :6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following?A. APIPA B. MAC C. IPv4D. IPv6

d

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?A. Ring B. Star C. Bus D. Mesh
c

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?A. HoneypotB. Butt setC. SpywareD. Blue jacking

b

Which of the following is used to explain guidelines for users while using network resources?A. Network cut sheetB. BaselinesC. Acceptable use policyD. Regulations
c

Standards such as JPEG and ASCII operate at which of the following OSI model layers?A. PresentationB. Data linkC. SessionD. Application
a

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?A. STPB. RG-6 C. Fiber D. RG-59
c

16Which of the following is true of a client/server topology?A. Virtual servers are used to stream data to other remote serversB. Servers are used to connect to centralized clientsC. Remote clients connect to a centralized serverD. Remote clients connect to each other via a virtual server
c

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).A. TFTP B. SNMP C. POP3 D. IMAP4 E. SFTP
c d

Which of the following is a common connector used on a coaxial cable?A. RJ-45 B. DB-25 C. BNC D. LC
c

Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?A. routeB. netstatC. tracerouteD. ping 127.0.0.1

c

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?A. Content filterB. Packet filterC. IPSD. IDS
a

21Which of the following differentiates a layer 3 switch from a layer 2 switch?A. Routing B. Bridging C. Switching D. Repeating
a

A multi-layer switch operates at which of the following OSI layers?A. Layers 1 and 5B. Layers 2 and 3C. Layers 4 and 5D. Layers 5 and 6
b

Which of the following is a link state routing protocol?A. RIPv2 B. BGP C. IS-IS D. RIP
c

A technician needs to make a web server with a private IP address reachable from the Internet. Which of the following should the technician implement on the company firewall?A. DOCSIS B. NATC. CIDRD. VPN

b

Which of the following defines an IP address that is NOT routed on the Internet?A. Multicast B. Public C. PrivateD. Classful
c

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?A. /26 B. /27 C. /28 D. /29
b

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?A. Change managementB. Asset managementC. Access logD. Baselines
a

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?A. SNMPv3 B. VTPC. CDPD. IPSec
a

Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps?A. DS3 B. E3 C. OC3 D. T3
c

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?A. Packet filteringB. Hardware firewallsC. Port securityD. Stateful inspection

c

Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?A. QoSB. Fault toleranceC. Load balancingD. Traffic shaping

d

7Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?A. Environmental monitorB. OTDRC. Cable testerD. Punch down tool

a

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?A. MDF B. VPN C. RDP D. IDF

d

MIMO technology in the 802.11n standard provides for which of the following benefits?A. Channel expansionB. Gigabit wireless bandwidthC. Multipath supportD. Channel bonding

c

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?A. DipoleB. ParabolicC. DirectionalD. Omni-directional

c

11If a technician does not assign an IP address to a device, the DHCP server will assign the deviceA. static IP address.B. reservation.C. dynamic IP address.D. MAC address.
c

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?A. CrosstalkB. Bad connectorsC. Wrong DNSD. Duplicate IP address

a

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?A. QoSB. CARPC. VLAND. DHCP server

b

Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?A. DNS serverB. Content filterC. Proxy serverD. Load balancer

d

All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue?A. STP convergenceB. Power failureC. Excessive bandwidth usageD. Broadcast storm

d

16Which of the following STP states indicates an inactivated port due to a loop?A. Disabled B. Learning C. Blocking D. Forwarding

c

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?A. T1 crossoverB. Singlemode fiberC. CAT6aD. Coaxial

c

A number of remote users have reported being unable to securely log on to the company's network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?A. Plan to reboot the concentrator as the potential solutionB. Escalate the problem to managementC. Continue to speak to users, questioning if changes have been madeD. Test access to the concentrator to confirm the status

d

19In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types?A. Peer-to-peerB. Point-to-multipoint C. HybridD. Point-to-point

b

20A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below? Querying active state...TCP Global Parameters--------------------------Receive-Side Scaling State : enabled Chimney Offload State : disabledReceive Window Auto-Tuning Level : normal Add-On Congestion Control Provider : ctcp ECN Capability : disabledRFC 1323 Timestamps : disabledA. netB. netstat C. nbtstat D. netsh
d

Which of the following can use a third party back-end LDAP user database for authentication?A. ISAKMP B. TACACS+ C. PKID. CHAP
b

A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users' PCs with issues all have IP addresses that start with 169.254.x.x. The technician completes the replacement and powers on the new DHCP server. Which of the following is the BEST way to provide the PCs with issues a new IP address?A. Statically assign a legitimate IP address, and then set the PCs' NICs to DHCPB. Inform each user to replace 169.254 with 192.168C. Wait five minutes until the PC resends a DHCP requestD. Run netstat on each PC and then reboot into safe mode
c

23A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?A. HoneynetB. Signature based IPSC. Behavior based IPSD. Host based IPS

c

Which of the following network topologies is ONLY possible between two users?A. StarB. Client-server C. HybridD. Peer-to-peer

d

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann's problem?Computer_ASwitch_AIP: 10.0.0.60Int VLAN10SM: 255.255.255.0IP address 10.0.0.1/28 GW: 10.0.0.1Speed 100 Duplex FullA. Change the duplex on the switch interface to halfB. Change the speed on the switch interface to 10MbpsC. Change the subnet mask of the computer to 255.255.255.240D. Change the IP address of the computer to 10.0.0.12

d

A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician useto complete this objective QUICKEST?A. Traffic analyzerB. Network snifferC. SNMPv3D. System logs

a

Users report that they are unable to access the production server with IP address 192.168.30.17. These users need to be provided access without changing any subnet to VLAN information. The VLANs configured on the network are listed below:DepartmentVLAN #Subnet usedMarketing20192.168.20.0/28Customer Service25192.168.20.64/28Finance30192.168.30.0/28WHSE35192.168.30.16/28Sales40192.168.3.16/28The users experiencing this issue need to be added to which of the following VLANs?A. 25 B. 30 C. 35 D. 40

c

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly butthinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?A. 802.11a B. 802.11b C. 802.11g D. 802.11n

b

Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?A. Deny any source host on source port 23 to destination anyB. Deny any source network 1.1.1.0/24 to destination any on port 23C. Deny source host 1.1.12 on source port 23 to destination anyD. Deny any source network 1.1.1.0/24 with source port 23 to destination any

b

Which of the following addresses is a class B private address?A. 132.216.14.184 B. 152.119.25.213 C. 162.17.43.22 D. 172.23.226.34
d

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default,the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?A. Configure the main network to Class CB. Allow for duplicate IP addressesC. Allow the main network to handle DHCPD. Create a spanning tree to prevent switching loops

c

32Which of the following configurations of a wireless network would be considered MOST secure?A. WEP using MAC FilteringB. WEP and hiding the SSIDC. WPA2D. WPA TKIP and hiding the SSID

c

Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet?A. /19 B. /21 C. /22 D. /24

b

DHCP uses which of the following ports by default?A. 21 B. 23 C. 68 D. 443

c

35Which of the following describes a manually entered route?A. StaticB. Dynamic C. Multicast D. Unicast

a

Which of the following is the unit used to transfer information at Layer 2 of the OSI model?A. Packet B. Socket C. Session D. Frame
d

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?A. Virtual switchB. Virtual serverC. Virtual desktopD. Virtual PBX

d

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client's wireless network to help ensure that interference from other wireless networks is at a minimum?A. WPA encryption key selectionB. Channel selectionC. Antenna typesD. Disable SSID

b

A MAC address is a part of which of the following OSI model layers?A. NetworkB. Data LinkC. PhysicalD. Transport

b

Which of the following is the reason why a company's network may contain a DHCP server?A. To assign IP addresses to devices on the networkB. To convert IP addresses to fully qualified domain namesC. To provide POP3 and IMAP email functionalityD. To allow secure remote access
a

41A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?A. dB lossB. DistanceC. Incorrect connector typeD. EMIE. Crosstalk
d

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?A. Cable testerB. Punch down toolC. CrimperD. Multimeter

a

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using?A. Telnet B. RADIUS C. SSHD. SNMP
d

44Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?A. MIMO technologyB. Channel bondingC. Encryption typeD. Frequency
b

The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this?A. Allow VLAN routingB. Enable packet filtering on the switchC. Allow remote administration of the switchD. Enable MAC filtering on the switch

c

46Ann, a technician, installs a wireless router in a network closet in a large office. She then configures all workstations in various offices on that floor to use the wireless connection. Maximum connection speed at each workstation is 54 Mbps. Some users complain that their network connection is very slow. Which of the following is MOST likely the problem?A. Workstations were configured with the wrong connection speed on the wireless adapter.B. Users with a slow connection are too far away from the wireless router.C. Users that cannot connect are configured on the wrong channel.D. Wireless network SSID is incorrect.

b
Which of the following dynamic routing protocols selects routing paths based upon hop count?A. BGP B. RIP C. OSPF D. IGRP

b

48A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?A. Determine if anything has changedB. Once a theory is confirmed determine the next step is to resolve the problemC. Implement the solution or escalate as necessaryD. Question the obvious

a

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?A. Use two combined Internet/router/wireless devices, one in each house.B. Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.C. Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.D. Use a single combined Internet/router/wireless device at the guest house.

c

Which of the following cable types is MOST commonly used with POTS?A. CAT3B. MultimodeC. CAT6 D. Coaxial
a

1A user is trying to connect to the wireless network in the office but is unable to establish aconsistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?A. Adjust the signal strength of the access points with minimal coverage overlap.B. Increase the pool in each of the access points to avoid running out of IPs.C. Configure each access point to use a different method of encryption than the others.D. Reconfigure each of the access points so that they broadcast different SSIDs.

a

dWhich of the following wireless standards is the only one capable of operating in either of the 802.11 wireless spectrums?A C. G D. N D

d
Which of the following WAN technologies has the highest latency?A. POTS B. Cable C. Satellite D. DSL
c

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?A. FTP and basic Internet trafficB. HTTPS and IMAP trafficC. DNS and TELNET trafficD. VPN and RDP traffic

a

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?A. Closing off port 25 on the firewallB. Closing off port 53 on the firewallC. Turning off the SMTP service on the email serverD. Turning off the IMAP service on the email server

a

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?A. Content filterB. VPN concentratorC. Load balancerD. Proxy server

a

7The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?A. Configure Wi-Fi Multimedia supportB. Use only 20 MHz channel bandwidthC. Enable band steering to use 802.11nD. Configure Quality of Service

b

The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?A. Cable testerB. ButtsetC. Toner probeD. Cable certifier
b

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?A. Kerberos B. TACACS+ C. RADIUS D. 802.1x

c

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).A. SSLB. IPSecC. Kerberos D. RDPE. L2TPF. PPTP

e b

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?A. An IP filtering ACLB. A MAC filtering ACLC. A port filtering ACLD. A class matching ACL

c

A user has three different subnets in an office. Which of the following can be configured to allow two of the subnets to communicate directly with each other at the switch level?A. 802.1af B. 802.1q C. 802.1x D. 802.2

b

A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason?A. Channels below 9 overlap each otherB. Channel width is set to 40MHzC. Channels are in the 5GHz range by mistakeD. Channel 1 should have been set to 11 to avoid an overlap

c

14A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?A. MultimeterB. Cable testerC. Lineman's handsetD. Toner probe

c

Which of the following uses types and codes rather than ports?A. EIGRP B. ICMP C. UDP D. IPv6

b

A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?A. arpB. nslookup C. ipconfig D. netstat

b

A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?A. nslookup B. netstatC. traceroute D. nbtstat

a

Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of thefollowing could be the cause of this failure?A. Duplicate IP addressB. Incorrect subnet maskC. Incorrect gatewayD. Wrong DNS

a

Which of the following protocols are used to provide accurate time to network devices?A. SMTPB. FTP C. TLS D. NTP

d

Which of the following provides the STRONGEST security for a tunneled connection over the Internet?A. RDP B. SMTP C. RAS D. IPSec

d

21After deploying a network switch, the network administrator is unable to remotely administer thedevice. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue?Management LAN: 192.168.10.0/24Management interfacE. 192.168.10.2 255.255.255.0 Default gateway: 192.168.11.1STP is enabledA. VLAN assignmentB. Wrong subnet maskC. Switching loopD. Wrong gateway

d

Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?A. Proxy serverB. Content filterC. Load balancerD. VPN concentrator

d

23Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this?A. Reconfigure the access points from 802.11b to 802.11g.B. Establish procedures which limit user connections during peak hours.C. Configure the access points so that they all use different SSIDs.D. Move one or more access points, minimizing signal overlap.

d

A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?A. Two-factor authenticationB. Biometric securityC. Multi-factor authenticationD. Single factor authentication

a

A technician has set up a wired network IP scheme with the following specifications: DHCP: 192.168.1.100-150Gateway: 192.168.1.1DNS: 192.168.1.1Which of the following is represented by this addressing scheme?A. StaticB. QoSC. DynamicD. Dynamic with static reservation

c

26A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?A. Single sign-onB. Network access controlC. PKI authenticationD. Two-factor authentication

d

27A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?A. Two-factor authenticationB. Network access controlC. Multifactor authenticationD. Single sign-on

d

A company has a server with redundant power supplies. Which of the following is this an example of?A. Traffic shapingB. Caching enginesC. Fault toleranceD. Load balancing

c

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?A. PoE B. STP C. NAT D. VTP

a

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?A. Broadcast stormB. TX/RX cables reversedC. Mismatched MTUD. Incorrect routing table

b

Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?A. SCPB. SNMPv3 C. SSLD. SSH

d

32A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?A. AP isolationB. DDoSC. Evil twinD. Rogue AP

d

33A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?A. Escalate to the management teamB. Change the IP address back to its previous stateC. Test the theory by analyzing logsD. Create a plan of action to present to management
c

34Which of the following are standard fiber cable connector types? (Select TWO).A. RJ-11B. F-connectorC. MTRJD. DB-9E. ST

c e

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?A. CrossoverB. RolloverC. LoopbackD. Straight cable

a

Hubs are differentiated from switches in that between the two, only hubs have:A. a single collision domain.B. a single broadcast domain.C. multiple collision domains.D. multiple broadcast domains
a

The phone company has provided a channelized T1 line. Which of the following should this line be connected to?A. SwitchB. CSU/DSU C. IDFD. MDF
b

38Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?A. BNC connectionB. 110 blockC. PlenumD. LC connector
b

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?A. Man-in-the-middle B. DDoSC. Evil twinD. War driving C

c

40An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?A. Baseline analyzerB. PingC. Protocol analyzerD. Nessus

d

A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following?A. Strong RC4 encryptionB. Shared secret keysC. AES encryptionD. Key rotation

d

A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?A. Social engineeringB. Packet sniffingC. Rogue access point D. Man-in-the-middle

b

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?A. Signal strengthB. SSID nameC. WPA2 encryptionD. WEP encryption

a

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?A. NIC bondingB. Proxy serverC. Firewall ACLsD. VLANs
a

Which of the following assists a network administrator in reverse engineering malware and viruses?A. Virtual switchesB. Virtual machinesC. VLANsD. IDS
b

46A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?A. Identify the problemB. Question the userC. Establish a plan of actionD. Establish a theory of probable cause

c

47Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).A. ApplicationB. PhysicalC. PresentationD. TransportE. Data LinkF. Network
b e

At which layer of the OSI model do MAC addresses operate?A. Data LinkB. NetworkC. ApplicationD. Physical
a

A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot accessother network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments?A. The newly installed switch is defective and must be returned.B. The newly installed switch is using a different MAC address than the previous switch.C. The technician forgot to change the VTP mode on the new switch to server.D. The technician did not use the correct cable when trunking the new switch.
d

50A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host?A. The network administrator should install and configure a traffic analysis server.B. The network administrator should install and configure a DMZ server.C. The network administrator should install and configure a syslog server.D. The network administrator should install and configure a network sniffer.
c

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?A. The spanning tree protocol is preventing the traffic.B. Port Mirroring is set up incorrectly.C. The switch needs to be a layer 3 switch.D. The traffic is in a classless IP range and not classful IP range.

b

2An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?A. Run netstatB. Run digC. Run nbtstatD. Run tracert
a

The TCP/IP application layer contains which of the following OSI layers?A. Layers 1,5,6,7B. Layers 4,7C. Layers 5,6,7D. Layer 7
c

Which of the following is MOST commonly implemented for remote access to UNIX systems?A. SSL B. RSH C. SSH D. RDP
c

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?A. Managed B. Software C. Hardware D. Wireless

b

6A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?A. Data linkB. NetworkC. SessionD. Physical

b

Which wireless standard works at a MAXIMUM data rate of up to 11Mbps?A. 802.11a B. 802.11b C. 802.11g D. 802.1q

b

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?A. 2.0 GHz at 33 MbpsB. 2.4 GHz at 54 MbpsC. 2.4 GHz at 128 MbpsD. 5.0 GHz at 54 Mbps

b

The unit responsible for the successful shaping and transmission of a digital signal is called:A. demarc.B. T1 hub.C. smart jack.D. CSU/DSU.

d

Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports?A. Switch B. HubC. Router D. Repeater
a

A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?A. Disable the SSID.B. Change the broadcast channel.C. Lower the signal strength.D. Change the antennas.

d

Which of the following records allows for reverse DNS lookups?A. AAAA B. AC. PTRD. CNAME

c

13An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?A. Packet filteringB. Spam filteringC. MAC filteringD. CSU
a

In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings?A. CAT6aB. Plenum C. Crossover D. STP
b

15Users trying to access a website using HTTPS are being blocked by the firewall. Which of the following ports needs to be allowed?A. 80 B. 143 C. 443 D. 3389

c

The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model?A. Layer 2B. Layer 5C. Layer 6D. Layer 7

d

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?A. 1000BaseB. 100BaseFX C. 1000BaseSX D. 1000BaseT
c

A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?A. Signal strength latencyB. Bouncing signalC. InterferenceD. Crosstalk
c

Which of the following is a fiber connector type?A. F-connector B. RJ-11C. RS-232D. MTRJ
d

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).A. 802.1qB. MAC address filteringC. WPA2 PersonalD. WPA EnterpriseE. 802.1x

d e

Which of the following is MOST likely used with RG-6 media?A. MTRJB. RJ-11C. RJ-45D. F-connector
d

A small company has a single multi-layer switch. The company currently has all network devices on the same subnet but would like to switch the servers to another subnet for security reasons. The company cannot budget any more money to purchase additional hardware. Which of the following features should be used to achieve the new company requirements?A. PAT B. PoE C. VLAN D. QoS

c

23Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?A. Reservations B. SuffixesC. LeasesD. Gateways

a

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?A. Network mapsB. Traffic analysisC. SyslogD. ICMP

b

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).A. Cable certifierB. Ping commandC. Punch down toolD. CrimperE. Toner probe

c a

A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem?A. LatencyB. Incorrect encryption typeC. EUI-64D. Incompatible hardware
d

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?A. Escalate the problemB. Identify potential effectsC. Test the theory to determine causeD. Establish a plan of action to resolve the problem

a

Which of the following should be installed to prevent inappropriate websites from being viewed?A. Load balancerB. VPN concentratorC. Content filterD. Proxy server
c

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?A. Toner probeB. Cable testerC. Punch downD. Crimper
c

A technician can increase the bandwidth of an 802.11n cell by:A. doubling the channel width.B. enabling diversity.C. disabling MIMO.D. adding a second access point.
a

Which of the following is a requirement for bridging with 802.11a?A. WPA encryptionB. Governmental licensesC. High gain yagi antennasD. Clear line of sight
d

32Which of the following technologies can change channel widths?A. 802.11a B. 802.11b C. 802.11n D. Bluetooth
c

Which of the following is a common LAN protocol used for a SOHO?A. ATMB. DSLC. Ethernet D. HDLC

c

Which of the following tools could attempt to detect operating system vulnerabilities?A. nslookup B. honeynet C. netstat D. nessus
d

A company has one public IP address, and only one device needs to be able to connect to the Internet at a time. Which of the following is the BEST option for connectivity?A. VLSM B. CIDRC. NAT D. PAT
c

36An IP address assigned from a DHCP server is said to be which of the following?A. Hybrid B. Dynamic C. Secure D. Static

b

A technician needs to setup an Internet connection for a small office. There are five users that need the ability to use email and do online research. The office manager wants the connection to be always on and be as inexpensive as possible. Which of the following would BEST fit the needs of this office?A. Broadband B. T1C. Frame Relay D. Satellite

a

The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?A. Singlemode B. Multimode C. Crossover D. F-Connector

b

Which of the following protocols does DNS utilize on port 53?A. TCPB. FTP C. RTP D. ICMP

a

40At which of the following layers do IP addresses exist?A. TCP/IP model Internet layerB. OSI model Data Link layerC. TCP/IP model Transport layerD. OSI model Physical layer

a

A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select?A. WPA enterpriseB. TKIPC. WPA2 CCMPD. WEP 128-bit

a

42Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).A. HubB. SwitchC. MAC address D. IP addressE. Router

d e

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?A. Allow ANY to 192.168.0.15 port 21B. Allow ANY to 192.168.0.15 port 22C. Allow ANY to 192.168.0.15 port 80D. Allow ANY to ANY port ANY

b

Which of the following should be mitigated by employing proper coding techniques when developing software?A. Distributed denial of service attacksB. Buffer overflowsC. War drivingD. Packet sniffing
b

Which two layers of the OSI model make up the TCP/IP model Network Interface layer?A. Application and TransportB. Transport and SessionC. Physical and Data LinkD. Session and Presentation

c

Which of the following types of connectors is used with a CAT6 Ethernet cable?A. RJ-45 B. BNC C. RJ-11 D. DB-9

a

Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?A. ipconfig B. pingC. sniffer D. route
c

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?A. A 12 port unmanaged switch.B. A wired router with an 8 port switch and a WAN port.C. A wireless router with an 8 port switch, and a WAN port.D. A 8 port firewall with one console port.
a

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?A. 80 B. 445 C. 3000 D. 3389

c

A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause?A. The workstation has been removed from the domain and needs to be re-added in directory services.B. The workstation is configured to use the IPv4 protocol instead of IPv6.C. The workstation is configured with an incorrect IP address of the DNS server.D. The workstation's DHCP IP address has expired and has assigned itself an APIPA address.
c

Which of the following has the LEAST amount of collisions in a domain?A. BridgeB. HubC. Repeater D. Switch

d

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?A. SubnetB. IANA prefixC. EUI-64D. Site-local
c


Which of the following would be used to place extranet servers in a separate subnet for security purposes?A. VPN B. NAT C. DMZ D. IDS

c

Which of the following WAN technologies has synchronous up/down speeds?A. T1B. ADSLC. SatelliteD. Cable broadband

a

5Which of the following protocols uses port 3389 by default?A. RDP B. TFTP C. IMAP D. DNS

a

Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?A. 802.11a B. 802.11b C. 802.11gD. 802.11n

d

Which of the following standards can operate at 40MHz channel spacing?A. 802.11a B. 802.11b C. 802.11g D. 802.11n
d

The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue?A. nslookup B. ipconfig C. pingD. nbtstat

a

Which of the following would a network administrator use to scan a network for vulnerabilities?A. ICMPB. NMAPC. ACLD. TCPDUMP

b

Which of the following attack types is being used if the originating IP address has been spoofed?A. Ping floodB. TrojanC. SmurfD. Worm

c

11The BEST way to determine the next hop of a packet is to check the:A. link state.B. routing table.C. routing metrics.D. convergence.

b

12Which of the following cable types is unshielded?A. STPB. Twinax C. UTP D. Coax

c

Which of the following wireless standards can transmit data up to 540Mbps?A. 802.11a B. 802.11b C. 802.11g D. 802.11n

d

Which of the following preventative measures would BEST secure a web server from being port scanned by attackers publicly?A. Content filterB. Proxy serverC. ACL implicit allowD. Firewall

d

A user calls the helpdesk to report not being able to access network resources over the company's Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?A. SSID mismatchB. Incorrect WPA keyC. Signal bounceD. Antenna placement
a

A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet 100BaseT switch. Which of the following cabling will be needed for the installation?A. Multimode fiberB. RG-59 coaxialC. CAT6aD. CAT3

c

A customer has requested that a new piece of network equipment be installed so that the customer can have multiple subnets for each department, but allow network traffic from each department to reach one another without the use of a router. Which of the following network devices would satisfy this customer's requirements?A. Packet filterB. Layer 3 switchC. Stateful firewallD. Wireless bridge

b

18A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause?A. Incorrect VLANB. MTU mismatchC. Hijacked HOSTS fileD. Missing routes

a

A user's network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?A. DB loss on the cableB. InterferenceC. Split cableD. Distance limitations

c

Which of the following provides RSA encryption at the session layer?A. SSHB. ISAKMP C. SSLD. TLS

c

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?A. Load balancerB. VPN concentratorC. Proxy serverD. DNS server

c

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?A. IPS logsB. Application logsC. IDS logsD. History logs

a

The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?A. 2 B. 4 C. 5 D. 8

a

Which of the following wireless standards can operate on the same frequency but are not compatible?A. 802.11a / 802.11bB. 802.11a / 802.11nC. 802.11b / 802.11gD. 802.11g / 802.11n

b

25The DHCP server leases IP addresses 10.162.233.158 to WBAC11 for a period of 14 days. At which of the following times would WBAC11 send an initial request to the DHCP server to renew the IP address lease?A. Day 4 B. Day 6 C. Day 8 D. Day 10

c