Term QUESTION NO: 1After adding a new cable segment to the network, the technician should:A. Update the disaster recovery plan.B. Document the changes in the business continuity plan.C. Update the wiring schematics. D. Create a new baseline document. | | Definition |
|
Term QUESTION NO: 2Which of the following devices can be used to breakup a broadcast domain?A. Unmanaged switchB. RouterC. DHCP server D. Bridge | | Definition |
|
Term QUESTION NO: 3Which of the following is a secure way to transfer files from one device to another?A. SFTPB. SNMPv3C. TFTP D. FTP | | Definition |
|
Term QUESTION NO: 4An administrator has a networking closet on the first floor of a building with all of the network andcommunication equipment. However, the telephony provider installed the communications line inthe basement. Which of the following needs to be extended to connect the line to the networkingcloset?A. Smart jackB. Demarcation pointC. Patch panel D. Router | | Definition |
|
Term QUESTION NO: 5Which of the following methods is used to provide access to a VPN?A. IGPB. PPTPC. PPP D. RAS | | Definition |
|
Term QUESTION NO: 6Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. Thefirst client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the clientexpect to receive a response?A. 1 and 2B. 2 and 3C. 3 and 6 D. 5 and 6 | | Definition |
|
Term QUESTION NO: 7Which of the following network access security methods involves the analysis of a physicalhardware addresses?A. IP filteringB. L2TPC. MAC filtering D. RAS | | Definition |
|
Term QUESTION NO: 8Which of the following is a direct advantage of having wireless standards?A. Increased use of wireless spectrumB. Greater device securityC. Interoperability between devices D. Increased number of protocols can be used | | Definition |
|
Term QUESTION NO: 9Which of the following is a best practice when implementing a basic wireless network?A. Disabling ESSID broadcastB. Configuring encryption with a WEP key and labeling the key on the WAPC. Adding two access points per area of service D. Not configuring the ESSID point | | Definition |
|
Term QUESTION NO: 10Which of the following wiring standards would MOST likely be used to connect a single networknode to a switch?A. LoopbackB. StraightC. Rollover D. Crossover | | Definition |
|
Term QUESTION NO: 11CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 4ActualTests.comWhich of the following is the maximum distance that CAT5 cable can run before experiencing dbloss?A. 100 feet (30.5meters)B. 207 feet (63.1 meters)C. 328 feet (100 meters) D. 358 feet (109.12meters) | | Definition |
|
Term QUESTION NO: 12A media converter is also known as a:A. transceiver.B. hub.C. modem. D. repeater. | | Definition |
|
Term QUESTION NO: 13An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of thefollowing device types is being installed?A. Bandwidth shaperB. Intrusion detectionC. Proxy server D. Load balancer | | Definition |
|
Term QUESTION NO: 14A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the followingsteps should be done FIRST to diagnose the problem?A. Escalate the problem to administrative technician.B. Compare wiring schematics to industry standards.C. Identify symptoms and draw a network diagram. D. Use a port analyzer to determine network topology | | Definition |
|
Term QUESTION NO: 15Which of the following commands can be used to find the MAC address of a connecting router?A. arpB. tracerouteC. ping D. ping sweep | | Definition |
|
Term QUESTION NO: 16Which of the following describes an email that is sent to users with web links that direct them tomalicious websites?A. VirusesB. PhishingC. Rogue access points D. Man-in-the-middle | | Definition |
|
Term QUESTION NO: 17Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack ina cubicle corresponds to a given RJ-45 jack in a patch panel?A. Punch-down toolB. Spectrum analyzerC. Toner probe D. Multimeter | | Definition |
|
Term QUESTION NO: 18CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 6ActualTests.comWhich of the following network types is suitable for a 10 gigabyte core network using 10 meter (33feet) fiber runs?A. 100Base-FXB. 10GBase-SRC. 10GBase-ER D. 10GBase-SW | | Definition |
|
Term QUESTION NO: 19An administrator is troubleshooting network connectivity and would like to view the path thatpackets are taking from workstation A to server 1. Which of the following command line tools isMOST appropriate to use?A. nslookupB. routeC. traceroute D. ping | | Definition |
|
Term QUESTION NO: 20Which of the following is the MOST appropriate policy for updating physical network diagrams?A. Update whenever a connection is changed.B. Update after new personnel are hired.C. Update before regularly scheduled network audits. D. Update after weekly network support team review. | | Definition |
|
Term QUESTION NO: 21After accepting a request packet on port 80, the firewall automatically allows the reply packet topass. Which of the following terms BEST describes this firewall behavior?A. Stateful inspectionB. Intrusion detectionC. Content filtering D. Passive fingerprinting | | Definition |
|
Term QUESTION NO: 22Which of the following connectivity issues is the MOST likely to result from bundling networkcables tightly together?A. CollisionB. AttenuationC. Crosstalk D. Open circuit | | Definition |
|
Term QUESTION NO: 23Which of the following ports does IPSec use, by default?A. 53B. 500C. 3389 D. 8080 | | Definition |
|
Term QUESTION NO: 24Which of the following can be used to find the location of a cable short?A. MultimeterB. CSU/DSUC. Protocol analyzer D. TDR | | Definition |
|
Term QUESTION NO: 25Which of the following authentication mechanisms on a wireless network uses a separate networkauthentication server?A. KerberosB. TKIPC. RADIUS D. WEP | | Definition |
|
Term QUESTION NO: 25Which of the following authentication mechanisms on a wireless network uses a separate networkauthentication server?A. KerberosB. TKIPC. RADIUS D. WEP | | Definition |
|
Term QUESTION NO: 26Which of the following physical connections allows for the BEST performance when connecting toa VPN server for a remote user?A. BasebandB. BroadbandC. Satellite D. POTS | | Definition |
|
Term QUESTION NO: 27A company needs to perform stateful packet filtering on the core network. Which of the followingnetwork devices would BEST be suited to match this equipment?A. FirewallB. ProxyC. Router ACLs D. DHCP server | | Definition |
|
Term QUESTION NO: 28Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 9ActualTests.comA. SFTPB. HTTPC. SNTPD. RCP E. SCP | | Definition |
|
Term QUESTION NO: 29Two network switches need to be cabled together via copper cabling. These switches do notsupport MDI-X. Which of the following cabling will need to be used?A. StraightB. RolloverC. Crossover D. Loopback | | Definition |
|
Term QUESTION NO: 30A technician wishes to implement network authentication at the switch port level. Which of thefollowing standards is designed to accomplish this?A. 802.1adB. TKIPC. WPA2 D. 802.1x | | Definition |
|
Term QUESTION NO: 31Which of the following is a commonly used protocol for VoIP network communication?A. SNMPB. SSHC. DNS D. RTP | | Definition |
|
Term QUESTION NO: 32Which of the following protocols uses port 143 by default?A. NTPB. SNMPC. SSH D. IMAP4 | | Definition |
|
Term QUESTION NO: 33A user calls network support and reports that email is not working. Which of the following shouldthe technician do FIRST?A. Ask the user what operation was performed, what the expected result was, and what the actualresult was.B. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to networkadministrator if needed.C. Attempt to send a test email message to a known account at a remote facility and scan logs tosee if it is sent. D. Determine which mail hub the user was connected to and perform a graceful restart. | | Definition |
|
Term QUESTION NO: 34Which of the following can be used to set options such as TFTP server addresses, DNS searchlists, and broadcast addresses on network clients and workstations?A. NetworkbridgeB. Layer 2 switchC. DHCP server D. Smart jack | | Definition |
|
Term QUESTION NO: 35Which of the following exchanges routing information between two autonomous systems?A. EGPB. OSPFC. IGP D. EIGRP | | Definition |
|
Term QUESTION NO: 36Which of the following is the GREATEST concern when using an orbital satellite WAN link?A. CollisionsB. LatencyC. Duplex D. Cable length | | Definition |
|
Term QUESTION NO: 37An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of thefollowing could be used to accomplish this connection?A. Smart jackB. Optical mediaC. Token ring D. Media converter | | Definition |
|
Term QUESTION NO: 38VLANs occur at which of the following layers of the OSI model?A. 1B. 2C. 3 D. 4 | | Definition |
|
Term QUESTION NO: 39Which of the following is the metric used for OSPF?A. LatencyB. CostC. Bandwidth D. Next hop | | Definition |
|
Term QUESTION NO: 40A computer is unable to access the corporate web server, which has an IP address of172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Basedon the output below, which of the following is the MOST likely cause of this problem?Internet Address Physical Address Type172.30.0.5 00-30-48-82-72-8c dynamic172.30.0.100 00-15-5d-22-44-8d dynamic172.30.0.101 00-15-5d-72-7a-be dynamicA. Reverse ARP failureB. IP address conflictC. MAC spoofing D. Static ARP entries | | Definition |
|
Term QUESTION NO: 41Two networks in different offices have been using DHCP set up for 192.168.0.0/24. Afterconsolidating the officer's networks, they have run out of IP addresses. Which of the following isthe MOST cost-effective solution?A. Request another class C IP scope from the ISP.B. Switch to static IP addressing.C. Change the subnet mask to 255.255.254.0. D. Add a router to connect both networks | | Definition |
|
Term QUESTION NO: 42An administrator suspects that packets to an IP address are being dropped over the internet.Which of the following tools would be the BEST to determine the hop that is dropping the packets?A. pingB. nslookupC. traceroute D. netstat | | Definition |
|
Term QUESTION NO: 43A workstation on the network can ping hosts on the network but it cannot ping any addresses onthe internet. Other hosts on the same network can connect to the internet. Which of the followingshould the technician check?A. The DNS server entriesB. The network cardC. The default gateway D. The hosts file | | Definition |
|
Term QUESTION NO: 44Which of the following commands would MOST likely be used to list the status of all establishedTCP connections on port 80?A. netstat -atB. netstat -aupnC. netstat -rD. netstat -v E. netstat -p tcp | | Definition |
|
Term QUESTION NO: 45An administrator would like to evaluate network traffic. Which of the following tools should theadministrator use?A. OTDRB. Protocol analyzerC. Certifier D. Toner probe | | Definition |
|
Term QUESTION NO: 46Which of the following ports would be commonly used for FTP traffic?A. 20B. 22C. 23 D. 25 | | Definition |
|
Term QUESTION NO: 47Which of the following device can connect multiple workstations, support VLANs, and function as arouter?A. RepeaterB. SwitchC. Hub D. Multilayer switch | | Definition |
|
Term QUESTION NO: 48Which of the following classes is the address 208.177.23.1?A. Class AB. Class BC. Class C D. Class D | | Definition |
|
Term QUESTION NO: 49Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?A. 802.11aB. 802.11bC. 802.11g D. 802.11n | | Definition |
|
Term QUESTION NO: 50Which of the following protocols could be used in a peer-to-peer topology?A. NetBIOSB. IGMPC. RADIUS D. TACACS+ | | Definition |
|
Term QUESTION NO: 51A private AS number is useful in which of the following situations?A. Internet multihoming with multiple carriersB. Isolated network at a single siteC. Enterprise network without redundant links D. Internet multihoming with all ISPs in same BGP area | | Definition |
|
Term QUESTION NO: 52A network with twenty clients needs to view a video file. Which of the following should beconfigured on the client's computers to reduce network traffic?CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 16ActualTests.comA. Class C addressesB. Class A addressesC. Broadcast D. Multicast | | Definition |
|
Term QUESTION NO: 53A new LAN switch is installed with on fiber ports. Which of the following would a technician needon the new switch to allow compatibility to the existing fiber network?A. RouterB. RepeaterC. Media converter D. Hub | | Definition |
|
Term QUESTION NO: 54Mobile users are connecting from sites that have strong security policies and filter most trafficexcept HTTPS. Which of the following would be the BEST solution to allow them access to thecorporate network?A. Dial-in accessB. RDP accessC. IPSec VPN D. SSL VPN | | Definition |
|
Term QUESTION NO: 55Which of the following protocols are commonly used for VoIP? (Select TWO).A. NPPB. SIPC. HSRPD. RTP E. NNTP | | Definition |
|
Term QUESTION NO: 56Which of the following describes how original network diagrams contained in the documentationshould be maintained?A. Used only to satisfy a network upgrade checklist requirementB. Used as a point-in-time reference but never relied uponC. Regular audits to ensure that diagrams remain accurate D. Considered to be the only source-of-truth of the network state | | Definition |
|
Term QUESTION NO: 57Which of the following are usually needed during manual configuration of a client on an 802.11gnetwork segment using DHCP and WEP? (Select TWO)A. IP addressB. Name serversC. SSIDD. Subnet mask E. Shared key | | Definition |
|
Term QUESTION NO: 58To ensure that VoIP phones are provided with power without using independent power supplies,switches on the network must have which of the following features?A. PoEB. VLAN taggingC. PPPoE D. Spanning tree | | Definition |
|
Term QUESTION NO: 59CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 18ActualTests.comA user contacts a technician and states, "The network is down." After further investigation the useris unable to get to a file share on the LAN. Which of the following is the NEXT step the technicianshould take to help determine the root cause of the problem?A. Have the user ping the default gateway.B. Unplug and then plug the network cable back in.C. Reboot the core router. D. Have the user run netstat | | Definition |
|
Term QUESTION NO: 60An end user is able to connect to a wireless network and is able to browse the internet, yet isunable to access network servers. Which of the following is the MOST likely cause of theproblem?A. The end user is connected to the incorrect wireless network.B. The device is configured with an incorrect subnet mask.C. There is a problem with the DNS server. D. The network card is malfunctioning | | Definition |
|
Term QUESTION NO: 61The primary goal of implementing network QoS features isA. Provide predictable network performance.B. Increase network throughput.C. Prevent undesirable network traffic from entering the network. D. Provide fault tolerance to the network design | | Definition |
|
Term QUESTION NO: 62A LAN support team is installing new cables when all networked applications slow and then stopworking. Switches in the server room show all connected ports at 100% activity. Which of thefollowing has MOST likely occurred?CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 19ActualTests.comA. Cable run has a short.B. New switch port is in wrong VLAN.C. Switching loop. D. Cable run has a break. | | Definition |
|
Term QUESTION NO: 63After receiving network problem reports from users, the technician notices that the router isrebooting itself several times a day. Which of the following would the technician do NEXT tofurther diagnose this problem?A. Test the router's connection with a throughput tester.B. Replace the router's memory and CPU.C. Install redundant network connections to the router. D. Review the router's event logs | | Definition |
|
Term QUESTION NO: 64Which of the following protocols has similar functionality to Telnet but operates more securely thanTelnet?A. TFTPB. SSHC. SNAT D. RSH | | Definition |
|
Term QUESTION NO: 65A technician would use a logical network diagram to determine the number of:A. Cables in the network.B. Broadcast domains on the network.C. Switches on the network. D. Users on the network | | Definition |
|
Term QUESTION NO: 66Which of the following methods is used in creating an ACL?A. IP filteringB. PPPsC. Content filtering D. VPNs | | Definition |
|
Term QUESTION NO: 67A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the followingnetwork devices? (Select TWO).A. ServerB. WorkstationC. PrinterD. Hub E. Laptop | | Definition |
|
Term QUESTION NO: 68Which of the following technologies can prevent a department's network broadcast frompropagating to another department's network if they are located on the same switch?A. A hubB. A firewallC. A trunk D. A VLAN | | Definition |
|
Term QUESTION NO: 69CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 21ActualTests.comWhere does the responsibility for maintenance and support shift from the telecommunicationcompany to the customer?A. Central officeB. Where the telecommunication lines enter the buildingC. Smart jack D. Demarc | | Definition |
|
Term QUESTION NO: 70An administrator wants to connect users at three branch offices to the main office through theinternet. Which of the following devices should the administrator install at the main office to BESTaccomplish this goal?A. IPS sensorB. Proxy serverC. Layer 2 switch D. VPN concentrator | | Definition |
|
Term QUESTION NO: 71Which of the following protocols is the MOST secure for transferring network deviceconfigurations?A. TFTPB. FTPC. SCP D. RCP | | Definition |
|
Term QUESTION NO: 72A network has four switches; each switch has a physical link to all other switches. Which of thefollowing topologies is being used?A. RingCompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 22ActualTests.comB. Point-to-multipointC. Star D. Mesh | | Definition |
|
Term QUESTION NO: 73Which of the following commands is MOST appropriate to determine whether a network interfaceis up or down?A. SNORTB. ISAKMPDC. ARP D. IFCONFIG | | Definition |
|
Term QUESTION NO: 74Which of the following WAN technologies requires fiber optics?A. POTSB. SONETC. ADSL D. PSTN | | Definition |
|
Term QUESTION NO: 75Internet-working devices operate at OSI layer:A. 2B. 3C. 4 D. 5 | | Definition |
|
Term QUESTION NO: 76A small company needs to temporarily extend its call center by ten employees. The companydecides to rent office space on the opposite side of the building; the two spaces are 400 feet (122meters) apart. Which of the following is the MOST cost effective solution?A. Install a new T1 line for that office.B. Use a wireless repeater and a WAP.C. Connect the two offices with fiber. D. Install gigabit switches and run Ethernet | | Definition |
|
Term QUESTION NO: 77An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches.Which of the following cable types should the administrator plan to use?A. Multimode fiberB. RG-6 copperC. Single-mode fiber D. CAT6 copper | | Definition |
|
Term QUESTION NO: 78Which of the following network protocols is used for sending outbound email from a host?A. SMTPB. POPC. RTP D. IMAP | | Definition |
|
Term QUESTION NO: 79Which of the following is a correct Ethernet MAC address?A. 12:7H:45:89:9F:65B. 16-15-4D-31-59-5JC. 11:34:7A:88:0C:DB D. 12-88-FF-9X-58-9E | | Definition |
|
Term QUESTION NO: 80Which of the following would a technician set up for a building to building within a campus?A. ESDB. MDFC. IDF D. EMI | | Definition |
|
Term QUESTION NO: 81Which of the following allows an administrator to view malicious activity after it has taken place?A. IDSB. IPSC. Port scanner D. Packet sniffer | | Definition |
|
Term QUESTION NO: 82A technician is running new CAT5 cables; which tool should be used to terminate the cables at thepatch panel?A. Cable crimperB. Punch down toolC. Toner probe D. Multimeter | | Definition |
|
Term QUESTION NO: 83Which of the following is an acceptable method for deciding placement of wireless access points?A. Where there are electrical service and network connections availableB. Every300 feet (91 meters)C. In the middle of each room D. A site survey | | Definition |
|
Term QUESTION NO: 84Which of the following command line tools can be used to display listening sockets andestablished connections on the local computer?A. nslookupB. nbtstatC. netstat D. ipconfig | | Definition |
|
Term QUESTION NO: 85Which of the following tools is used to connect analog telephony wire pairs to a block, such as a110 or 66 block?A. Butt setB. Protocol analyzerC. Toner probe D. Punch down tool | | Definition |
|
Term QUESTION NO: 86An application layer firewall is MOST beneficial when used with which of the following protocols?A. VoIPB. GREC. HTTP D. SNMP | | Definition |
|
Term QUESTION NO: 87Which of the following cable types have a maximum recommended cable length of 100 meters(328 feet)?A. CoaxialB. EthernetC. Serial D. Fiber | | Definition |
|
Term QUESTION NO: 88A network administrator would MOST likely use a port scanner to do which of the following?A. Capture incoming network packets to port 80 on a workstation.B. Trace a physical network port through a building.C. Remotely test a firewall configuration on a server. D. Report the link speed and duplex of all ports on a switch | | Definition |
|
Term QUESTION NO: 89An administrator needs to learn which buildings have multimode or singlemode fiber. Which of thefollowing configuration management documentation would be the BEST choice to use?A. Physical network diagramB. Baseline configurationsC. Security policy D. CAT5 wiring schematics | | Definition |
|
Term QUESTION NO: 90Which of the following standards provides port authentication?A. 802.1xB. 802.11C. 802.1q D. 802.2 | | Definition |
|
Term QUESTION NO: 91Which of the following would be sent to an SNMP network management system in the event that afailure or predefined threshold was crossed?A. SNMP trapB. History logC. System log D. SNMP agent | | Definition |
|
Term QUESTION NO: 92A user is reporting issues connecting to the corporate web server. When analyzing the output froma packet sniffer an administrator sees:Client-> Server SYNServer ->Client ACKClient-> Server RSTWhich of the following is the user experiencing?A. The client is prematurely closing the connection.B. The server is failing to properly respond.C. The 3-way handshake is complete but the browser is unresponsive. D. The server is prematurely closing the connection | | Definition |
|
Term QUESTION NO: 93Which of the following connectors can be used for serial connections?A. SCB. RS-232C. BNC D. ST | | Definition |
|
Term QUESTION NO: 94A client attempts to connect to a network resource and is given an error message about theiraccess being restricted. Which of the following BEST describes the reason for denial?A. The user's account failed to authenticate with correct permissions.B. The user's account is disabled.C. The network resource is unavailable. D. The user is not connected to the network | | Definition |
|
Term Which of the following routing algorithms would provide the fastest convergence time?A. A distance-vector algorithmCompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 29ActualTests.comB. A static algorithmC. A link-state algorithm D. A path-vector algorithm | | Definition |
|
Term QUESTION NO: 96Where would a technician MOST likely place the company MX and A records?A. Proxy serverB. Load balancerC. DNS server D. Firewall | | Definition |
|
Term QUESTION NO: 97Which of the following BEST explains the function of OSI layer 4?A. Connecting hosts on the same segmentB. Specifying signal timing and amplitudeC. Reliable delivery of packets D. Routing packets across segments | | Definition |
|
Term QUESTION NO: 98Which of the following tools can be used to determine the MAC address of a machine on the localsubnet?A. pingB. arpC. host D. dig | | Definition |
|
Term QUESTION NO: 99The task of replacing hubs with switches reduces retransmissions by increasing which of thefollowing?A. Frequency domainsB. Broadcast domainsC. Domain kiting D. Collision domains | | Definition |
|
Term QUESTION NO: 100Which of the following WAN technologies allows for the fastest connection?A. ADSLB. SONETC. T1 D. OC-12 | | Definition |
|
Term QUESTION NO: 101A company recently installed a new VoIP phone system that runs over their existing T3 Internetconnection. Which of the following network technologies would BEST handle voice trafficprioritization above all other data?A. QoSB. IPSecC. PoE D. Load balancing | | Definition |
|
Term QUESTION NO: 102Which of the following mitigation techniques is MOST effective against a man-in-the-middleattack?CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 31ActualTests.comA. AuthenticationB. EncryptionC. Popup blocker D. ACL | | Definition |
|
Term QUESTION NO: 103Which of the following WAN technology types does not use an Ethernet cable as a medium forcommunication and is used for long distances?A. DSLB. WiMAXC. E3/T3 D. ATM | | Definition |
|
Term QUESTION NO: 104Which of the following Internet technologies would provide the GREATEST bandwidth?A. T1B. CableC. OC3 D. T3 | | Definition |
|
Term QUESTION NO: 105An administrator has configured two hosts as follows:HOST AIP 192.168.3.100NETMASK 255.255.254.0GATEWAY 192.168.2.1HOSTBIP 192.168.1.200NETMASK 255.255.254.0GATEWAY 192.168.2.1Which of the following MUST be changed in order to allow HOST A to talk to HOST B?A. HOST B netmask to 255.255.252.0B. HOSTA netmask to 255.255.255.0C. HOST A IP address to192.168.2.100 D. HOST B IP address to192.168.2.200 | | Definition |
|
Term QUESTION NO: 106When installing a new secure wireless network the administrator should turn on:A. WEP and turn on SSID broadcast.B. WPA and turn on SSID broadcast.C. WPA and turn off SSID broadcast. D. WEP and turn off SSID broadcast | | Definition |
|
Term QUESTION NO: 107An administrator is at a client's site to figure out an intermittent network problem. Which of thefollowing is the FIRST step in the troubleshooting methodology that should be performed?A. Implement and test the solution.B. Create an action plan and solution identifying potential effects.C. Identify the affected areas of the network. D. Gather information | | Definition |
|
Term QUESTION NO: 108All nodes on a subnet are experiencing network slowness. The administrator suspects an infectedcomputer is on the network and checks if a node is saturating the network. Which of the followingtools should be utilized in this situation?A. MultimeterCompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 33ActualTests.comB. Port scannerC. Protocol analyzer D. IGMP | | Definition |
|
Term QUESTION NO: 109A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable toconnect to the network. An administrator verifies that the port is configured correctly and the LANdrop is active. Which of the following is the MOST likely cause?A. Crosstalk on the cableB. Duplex mismatchC. Speed mismatch D. Open pairs are present | | Definition |
|
Term QUESTION NO: 110Which of the following devices does not limit network broadcast traffic and does not increaseperformance?A. RouterB. BrouterC. Hub D. Switch | | Definition |
|
Term QUESTION NO: 111Multiple users are reporting network issues. Before taking any course of action, which of thefollowing is the FIRST step a technician should take?A. Create a plan of action and a final solution for the issues.B. Gather information about the problems/symptoms.C. Establish the probable cause behind the network issues. D. Document the solution and update all logical/physical network diagrams. | | Definition |
|
Term QUESTION NO: 112Which of the following network devices would MOST likely be installed to allow a fiber optic cableto be plugged into a network device with only RJ-45 connections?A. WAPB. Basic switchC. Hub D. Media convertor | | Definition |
|
Term QUESTION NO: 113A particular route's destination address is referred to as the:A. RIP peer.B. shot vector.C. link state. D. next hop. | | Definition |
|
Term QUESTION NO: 114The helpdesk has been informed that the company's ISP is experiencing network outages. Whichof the following commands can an administrator run to quickly locate and determine the TTL of thefurther reachable node?A. routeB. pingC. traceroute D. arp | | Definition |
|
Term QUESTION NO: 115CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 35ActualTests.comWhich of the following uses a certificate for a tunneling connection?A. RDPB. PPTPC. VNC D. SSL VPN | | Definition |
|
Term QUESTION NO: 116Multiple users are reporting no connectivity after a recent power outage. An administrator needs acable to plug their laptop into the router in order to be able to console into it. Which of the followingwould the administrator need to make this connection?A. CrossoverB. LoopbackC. Rollover D. 568B | | Definition |
|
Term QUESTION NO: 117Which of the following activities will not be possible if the gateway IP address is set incorrectly ona client's machines?A. Printing over a local networkB. Sniffing the network trafficC. Pinging a remote computer D. Sharing local network files | | Definition |
|
Term QUESTION NO: 118Which of the following replaces the destination IP address of a packet?CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 36ActualTests.comA. NATB. DNSC. SNAT D. DHCP | | Definition |
|
Term QUESTION NO: 119Which of the following is the BEST tool to use when terminating a network jack?A. SnipsB. Cable stripperC. Toner probe D. Punch down | | Definition |
|
Term QUESTION NO: 120An administrator would like to monitor the network to evaluate which employees are using anexcessive amount of bandwidth on peer to peer sharing services. Which of the followingmonitoring techniques would BEST be used?A. Stateful packet inspectionB. Load balancingC. Packet sniffing D. Throughput testing | | Definition |
|
Term QUESTION NO: 121A solution provided less than ideal results, and the technician is forced to go back and devise anew solution. Which of the following would be done NEXT, assuming probable cause isestablished and escalation is not necessary?A. Determine if anything has changed.B. Gather information about the problem.C. Document the solution and steps taken during the process.D. Create an action plan and accompanying solution.CompTIA N10-004: Practice Exam " | | Definition |
|
Term QUESTION NO: 122Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivityissues. Which of the following is MOST likely causing the new issues?A. Antenna placementB. Environment factorsC. Antenna distance D. Signal bounce | | Definition |
|
Term QUESTION NO: 123How many potential MAC address schemes are possible?A. 232B. 246C. 248 D. 264 | | Definition |
|
Term QUESTION NO: 124Which of the following would MOST likely contain information about unlabeled datacenterconnections?A. Procedures manualB. Emergency call listC. Logical network diagram D. Wiring schematic | | Definition |
|
Term QUESTION NO: 125A technician needs to install phones that will only require one cable for both data and power to besupplied. Which of the following features MUST the switch support?A. Port mirroringB. VLANC. Spanning tree D. PoE | | Definition |
|
Term QUESTION NO: 126Which of the following connection methods is considered secure?A. HTTPB. RCPC. HTTPS D. TELNET | | Definition |
|
Term QUESTION NO: 127In which of the following networking types can a computer be a client to other computers and actas a server as well?A. BusB. RingC. VPN D. Peer to peer | | Definition |
|
Term QUESTION NO: 128An administrator has determined that auto-negotiation has failed on a connection. Which of thefollowing are the MOST important settings that should be matched on each side of theconnection?CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 39ActualTests.comA. IP address, OSPF area, route propagationB. Port enable, port mirroring,link aggregationC. Port speed, port duplex, flow control D. VLAN assignment, port authentication, flow control | | Definition |
|
Term QUESTION NO: 129A technician needs to segment a network to provide additional security for the HR departmentshares. Which of the following features would need to be configured to provide this?A. VLANB. Port mirroringC. Spanning tree D. PoE | | Definition |
|
Term QUESTION NO: 130A technician has deployed multiple temperature monitoring devices with IP addresses in the10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the serverevery five minutes. Which of the following destination IP addresses must the technician configureon the server to send keep-alive packets to all the devices?A. 10.137.24.0B. 10.137.24.1C. 10.137.24.127 D. 10.137.24.128 | | Definition |
|
Term QUESTION NO: 131Which of the following OSI layers does a Layer 3 switch operate at? (Select TWO).A. PresentationB. SessionC. TransportD. Data link E. Network | | Definition |
|
Term QUESTION NO: 132An administrator wants to monitor live traffic on a switch to determine if a malicious source isbroadcasting ARP traffic. Which of the following utilities would BEST accomplish this?A. Switchport mapperB. Packet injectorC. Network mapper D. Packet sniffer | | Definition |
|
Term QUESTION NO: 133Which of the following requires the pin-outs to be the same on both ends of a cable?A. StraightB. CrossoverC. Rollover D. Loopback | | Definition |
|
Term QUESTION NO: 134Which of the following tools is designed to send a signal through one end of a cable, so that it canbe found at the other end of the cable?A. MultimeterB. Toner probeC. Cable tester D. Voltage event recorder | | Definition |
|
Term QUESTION NO: 135CompTIA N10-004: Practice Exam"Pass Any Exam. Any Time." - www.actualtests.com 41ActualTests.comAn administrator needs to check the number of active connections on their computer. Which of thefollowing should be administrator use?A. digB. pingC. ipconfig D. netstat | | Definition |
|
Term QUESTION NO: 136Which of the following is used by a company's ISP to troubleshoot network issues?A. DemarcB. 66 BlockC. Smart Jack D. 110 Block | | Definition |
|
Term QUESTION NO: 137IGP differs from EGP because IGP is designed for use in which of the following?A. Communication between WANsB. Communication between networksC. Single autonomous network D. Single non-autonomous network | | Definition |
|
Term QUESTION NO: 138Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the samesubnet?A. 255.255.240.0B. 255.255.255.128C. 255.255.255.0 D. 255.255.255.240 | | Definition |
|
Term QUESTION NO: 139Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of thefollowing commands can be run on HOST A to determine the process attached to TCP port 4444?A. ipconfig /allB. ifconfig -aC. netstat -nav D. netstat -nap | | Definition |
|
Term QUESTION NO: 140Which of the following network cable types is LEAST susceptible to EMI?A. Plenum STP CAT5B. UTP CAT5C. UTP CAT3 D. Coaxial | | Definition |
|
Term QUESTION NO: 141A user has reported slow network response in a large training room; the class requires manystudents to access the same website each day. Which of the following would BEST remedy thisproblem?A. Caching engineB. Jitter correctionC. Firewall D. Fault tolerance | | Definition |
|
Term QUESTION NO: 142Which of the following pairs should be crossed to create a crossover cable?A. 1,2 and 3,4B. 1,2 and 3,6C. 5,6 and 7,8 D. 4,5 and 6,7 | | Definition |
|
Term QUESTION NO: 143An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new1000BaseFX. Which of the following should the administrator do NEXT?A. Reboot the switch to enable the new connectionB. Update the logical network diagramC. Update the switch configuration logs D. Update the wiring schematics | | Definition |
|
Term QUESTION NO: 144A technician moves a VoIP phone to a new location, but discovers the phone does not start upwhen plugged into the network. Which of the following explains this situation?A. The switch does not support PoE.B. The jack needs to be rewired using the 568B standard.C. QoS is not enabled on the switch. D. The phone needs a fiber port | | Definition |
|
Term QUESTION NO: 145A port scanner is used by network administrator for which of the following?A. To find routers with weak passwordsB. To determine open ports on network hostsC. To secure switches and routers D. To make a physical network diagram | | Definition |
|
Term QUESTION NO: 146Which of the following can be used to help verify that a remote web server is not blocked by afirewall?A. Packet injectorB. Toner probeC. Protocol analyzer D. Port scanner | | Definition |
|
Term QUESTION NO: 147SONET is normally associated with which of the following?A. Point to pointB. Point to multipointC. Ring D. Bus | | Definition |
|
Term QUESTION NO: 148An administrator wants to provide redundant paths to network resources in case a link fails. Whichof the following switch features would the administrator need to use to accomplish this task?A. PoEB. VLANC. Trunking D. Spanning tree | | Definition |
|
Term QUESTION NO: 149TCP occurs at which layer of the OSI model?A. Layer 1B. Layer 2C. Layer 3 D. Layer 4 | | Definition |
|
Term QUESTION NO: 150Which of the following would an administrator MOST likely require in order to connect a client to aWPA encrypted network?A. Pre-shared keyB. Gateway addressC. PIND. DSA public key E. SSID | | Definition |
|
Term QUESTION NO: 151Which of the following technologies is the MOST cost-effective when protecting a large number ofnetworked workstations from external attacks?A. Host-based IDSB. External scanning serviceC. Network-based firewall D. Network-based IPS | | Definition |
|
Term QUESTION NO: 152Which of the following transport protocols should be used to avoid retransmitting lost packets?A. UDPB. TCPC. ARP D. IGMP | | Definition |
|
Term QUESTION NO: 153A firewall is set to block inbound connections on port 25. Which of the following protocols wouldenable the administrator to retrieve email without reconfiguring the firewall?A. SNMPB. SMTPC. POP3 D. FTP | | Definition |
|
Term QUESTION NO: 154The 802.11n protocol operates at which of the following layers of the OSI model? (Select TWO).A. Layer 1B. Layer 2C. Layer 3D. Layer 4 E. Layer 5 | | Definition |
|
Term QUESTION NO: 155When installing an access point, which of the following encryption schemes should beimplemented to BEST secure the network?A. WPAB. WEPC. WPA with PSK D. WPA2 with PSK | | Definition |
|
Term QUESTION NO: 156Which of the following networking protocols is used to give the remote computer secure commandline access to the server?A. SSHB. TelnetC. ICMP D. RTP | | Definition |
|
Term QUESTION NO: 157Which of the following defines the required distance between each LAN drop that will be installedwithin a building?A. Acceptance use policyB. Wiring schematicsC. Logical network diagrams D. Company regulations | | Definition |
|
Term QUESTION NO: 158Plenum cable should be used to:A. protect against ESD.B. increase reliability.C. decrease cost. D. comply with fire codes | | Definition |
|
Term QUESTION NO: 159Which of the following describes what happens when a technician pings the broadcast address?A. All clients on the subnet respondB. The broadcast server respondsC. An ICMP loop floods the network D. All clients in the multicast group respond | | Definition |
|
Term QUESTION NO: 160Which of the following describes a routing table that needs to be maintained manually?A. Hop count basedB. Link-stateC. Static D. Dynamic | | Definition |
|
Term QUESTION NO: 161Which of the following protocols resolves MAC addresses from IP addresses?A. RTPB. DHCPC. DNS D. ARP | | Definition |
|
Term QUESTION NO: 162Which of the following is strictly used to convert analog to digital signals?A. NICB. ModemC. Repeater D. Hub | | Definition |
|
Term QUESTION NO: 163In a new wireless network installation, the administrator has successfully installed and tested theequipment. The NEXT step after turning wireless access on would be to:A. Document the physical layout.B. Configure the DHCP server.C. Configure wireless adapters. D. Perform a war drive to test for vulnerabilities | | Definition |
|
Term QUESTION NO: 164The MAIN difference between an IDS and an IPS is the:A. IPS blocks malicious activity while the IDS only alerts about malicious activity.B. IDS blocks malicious activity while the IPS only alerts about malicious activity.C. IDSuses a deterministic engine while the IPS uses probabilistic engine. D. IDSis an inline system while the IPS is placed on a span port and | | Definition |
|
Term QUESTION NO: 165An administrator would like to determine which wire pair on a 100 block connects a jack in the nextroom. Which of the following utilities would MOST likely be used to determine this?A. Port scannerB. Toner probeC. Multimeter D. Protocol analyzer | | Definition |
|
Term QUESTION NO: 166Which of the following commands would test the loopback adapter of an internal NIC?A. ping 127.127.0.0B. ping 127.127.1.0C. ping 127.0.0.1 D. ping 127.1.1.1 | | Definition |
|
Term QUESTION NO: 167Which of the following LAN connection technologies has a full duplex speed of 200Mbps and usesa CAT5e cable?A. 1000BaseXB. 100BaseFXC. 1000BaseTX D. 100BaseT | | Definition |
|
Term QUESTION NO: 168A technician must enable which of the following services to prevent broadcast storms?A. DHCPB. Port mirroringC. Spanning tree D. Bonding | | Definition |
|
Term QUESTION NO: 169One end of a CAT5 cable is punched down following the 568B standard. The other end shouldbeterminated using which standard to make a straightthroughcable?A. 568BB. RJ45C. 568A D. RJ11 | | Definition |
|
Term Which of the following IPv4 address pairs would be able to share files on a network using a hub?A. 10.192.2.220/16 and 10.254.2.222/16B. 10.254.2.220/16 and 10.254.2.222/24C. 10.192.2.220/16 and 10.254.2.222/16 D. 10.254.2.220/16 and 10.254.2.222/16 | | Definition |
|
Term QUESTION NO: 171Which of the following networks has the LEAST likelihood of collisions?A. RingB. MeshC. Star D. Bus | | Definition |
|
Term A technician is configuring a router for a SOHO network. The technician has changed the IPaddress scheme on the router and disabled DHCP service before the wireless was configured.After the router updates the information, the PC can no longer connect to the router. Which of thefollowing would be the BEST solution to reestablish the connection while maintaining the routerscurrent configuration state?A. Restart the PC so it obtains a new IP address from the router.B. Restart the router so that the PC obtains a new IP address.C. Assign a static IP address on the PC that matches the router. D. Use APIPA to connect the PC to the router | | Definition Answer: CExplanation:Your best option in this scenario would be to have a static IP address assigned on the workstationthat matches the router. When planning to set up a web server, a VPN gateway, a mail server orany other workstation that has to be accessible via the Internet your best option would be to make use of static IP addressing | |
|
Term QUESTION NO: 173Which of the following is the number of bits used for IPv6?A. 128B. 32C. 64 D. 256 | | Definition Answer: AExplanation:In the scenario you should remember that the IPv6 standard makes use of a 128-bit addressing scheme, it has more than 79 octillion which is 79,000,000,000,000,000,000,000,000,000 to all | |
|
Term QUESTION NO: 174Which of the following network components would be used to create VLANs?A. RoutersB. GatewaysC. Switches D. Bridges | | Definition Answer: CExplanation:A switch filters and forwards traffic that is based on certain criteria. A bridge and a router is bothan example of a switch. A switch is able to manage multiple, simultaneous pairs of connectionsbetween communicating systems. Switches can in many cases be used as a network concentratorthat will split flat network segments into dedicated communication links. Switches are able to splitcollision domains but can also provide a greater aggregate bandwidth between groups of communicating devices. Switches can also improve the overall performance. | |
|
Term QUESTION NO: 175Which of the following protocols is the MOST susceptible to a packet sniffer?A. SFTPB. SSHC. HTTPS D. SNMPv2 | | Definition Answer: DExplanation:SNMP is a network management protocol that collects information about network devices, such ashubs, routers, and bridges and permits communications via network devices and a management console. SNMP is upgraded to SNMPv2 to provide improved remote monitoring and security. | |
|
Term QUESTION NO: 176Which of the following WAN technologies uses fiber as a transmission medium?A. T1B. ADSLC. E1 D. SONET | | Definition Answer: DExplanation:The SONET uses fiber as a transmission medium. The SONET transport a wide range of digital telecommunication services over optical fiber. | |
|
Term QUESTION NO: 177Which of the following would be a correct statement about VLANs?A. VLANs help isolate network traffic.B. VLAN broadcasts are limited to the switch.C. VLANs create physical segments. D. VLANs help prevent overlapping | | Definition Answer: AExplanation:VLAN's assists you in isolating network traffic. It is software technology that permits for thegrouping of network nodes that is connected to one or more network switches into a single logicalnetwork. By permitting logical aggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network . | |
|
Term QUESTION NO: 178When configuring a wireless access point, which of the following principles should be used toselect a channel to operate on?A. Select the same channel as that configured on the neighboring access points.B. Select the channel closest to that configured on neighboring access points.C. Select the channel with the frequency range least used in the given area. D. Select the channel farthest from that configured on neighboring access points | | Definition |
|
Term QUESTION NO: 179Which of the following protocols enables administrators to control network devices like routers andswitches?A. NATB. SNMPC. DNS D. NFS | | Definition |
|
Term QUESTION NO: 180Which of the following is used to test the operation of a NIC?A. LoopbackB. 568BC. Rollover D. Crossover | | Definition Answer: AExplanation: The Loopback is use to test the transmission and reception capabilities of the NIC | |
|
Term QUESTION NO: 181Which of the following protocols are used for tunneling and encryption purposes?(Select TWO).A. L2TPB. PAPC. SLIPD. PPPoE E. IPSec | | Definition Answer: A,EExplanation:Your best option in this scenario would be to use identify IPSec and L2TP. IPSec is a tunnelingprotocol that can be used between LANs. It is not secure. You should thus make use of IPSec withthis protocol to provide data security. L2TP is a tunneling protocol that will add functionality to PPP. L2TP was created by Cisco and Microsoft. It is often used with virtual private networks. | |
|
Term QUESTION NO: 182Which of the following TCP connect scanners is always set for normal data flow once a connectionis established?A. TCPB. ACKC. SYN D. RSH | | Definition |
|
Term QUESTION NO: 183A company has a wired bus topology and a client accidentally unplugs the network cabling to theircomputer. Which of the following is true about the company's network?A. It will function properly once all affected PCs are rebooted and authenticateto the network.B. It will function with no downtime.C. It will function with minimal downtime. D. It will not function properly until the wires are reconnected | | Definition Answer: DExplanation:In a wired bus topology the computers are connected to a single cable. If one of the cables is unplugged, the entire network will be down. | |
|
Term QUESTION NO: 184Which of the following protocols is used to encrypt packets over the Internet? (Select TWO).A. SIPB. HTTPSC. SMTPD. SMNP E. SSH | | Definition Answer: B,EExplanation:In the scenario you should consider making use of HTTPS because HTTPS allows browsers andservers to sign, authenticate, and encrypt an HTTP message. You additionally can also make useof SSH because the Secure Shell (SSH) protocol is used to establish a secure Telnet session overa standard TCP/ IP connection. You should keep in mind that SSH is also used to run programson remote systems, log in to other systems, and move files from one system to another whilst maintaining a strong, encrypted connection. | |
|
Term QUESTION NO: 185A user is able to access the network shares and their email, but is unable to connect to anywebsite.Which of the following command line tools should a technician use on that users workstation tobegin troubleshooting?A. Traceroute to any website to see where the disconnection is occurring.B. Perform theipconfig command to verify settings on that workstation are correct.C. Use the routeadd command to add static routes to see if the routes are an issue. D. Use the ping command to see if the workstation can access the DHCP server. | | Definition Answer: AExplanation:Your best option would be to make use of the traceroute command. The traceroute command liststhe IP path that it takes to reach the targeted IP and how long it takes to reach every jump. It is particularly useful when establishing where certain bottlenecks are at a particular router | |
|
Term QUESTION NO: 186Users at a branch office have informed a technician that access to static web content is slow fromtheir location. It is determined that most users are visiting the same site repeatedly throughout theday. Which of the following would improve WAN utilization?A. A caching proxy server at the branchB. A traffic shaperC. A load balancer at the datacenter hosting the web servers D. An application level firewall | | Definition Answer: AExplanation:Your best option in this scenario would be to make use of a proxy server to enhance the WAN usage at the branch office. Internet traffic will be reduced when you cache the proxy server | |
|
Term QUESTION NO: 187A technician is asked to verify available phone numbers at a telecommunication block. Which ofthe following tools is required to verify the available numbers?A. MultimeterB. Butt setC. Punch down tool D. Toner probe | | Definition |
|
Term QUESTION NO: 188When connecting two switches together, which of the following protocols would be used to trunkmultiple VLAN traffic across the same physical link?A. PorttrunkingB. 802.1qC. Port mirroring D. 802.1x | | Definition |
|
Term QUESTION NO: 189Which of the following cables is used to connect multiple layer 2 switches?A. LoopbackB. CrossoverC. Serial D. Rollover
| | Definition Answer: BExplanation:Your best option in this scenario would be to make use of a crossover cable. Crossover cablesallows for the direct connection of two devices without necessarily being part of a network. A crossover cable is able to connect two switches or hubs together | |
|
Term QUESTION NO: 190An active/passive server cluster in which only one server is active and handling requests, is anexample of which of the following network performance optimization?A. Traffic shapingB. QoSC. High availability D. Load balancing | | Definition Answer: CExplanation:The scenario sketched above is an example of High availability performance optimization. HighAvailability refers to the capability of a server system to endure a software or hardware disaster and still being able to function. You need to incorporate some system duplication in order toremove any single point of failure. Server clusters are equipped with high availability resolve for systems that may require read and write admittance to data | |
|
Term QUESTION NO: 191A company needs the ability to run a network that can handle 30Mbps datatransfer speeds butalso needs to keep the cost of installing the network down. Which of the following cable typeswould BEST meet the company's needs?A. CAT6B. CAT3C. CAT5e D. CAT1 | | Definition Answer: CExplanation: The best cable type to use is the Category 5e because it has a maximum speed of 100 Mbps | |
|
Term QUESTION NO: 192Which of the following data is included in a wireless access points beacon frame?A. SSID and MAC addressB. IP and MAC addressC. SSID and WEP key D. Channel and WEP key | | Definition |
|
Term QUESTION NO: 193Which of the following devices has a primary purpose of proactively detecting and reacting tosecurity threats?A. SSLB. IDSC. IPS D. VPN | | Definition |
|
Term QUESTION NO: 194Which of the following is the default port for telnet?A. 21B. 23C. 20 D. 22 | | Definition Answer: BExplanation:In the scenario you should remember that the Telnet protocol made use of port 23 and was replaced by the SSH protocol as well as rsh and the rlogin utility | |
|
Term QUESTION NO: 195A technician is resolving an issue where a computer is unable to connect to the Internet using awireless access point. The computer is able to transfer files locally to other machines, but cannotsuccessfully reach the Internet. When the technician examines the IP address and defaultgateway they are both on the 192.168.1.0/24. Which of the following has occurred?A. The computers gateway is not routing to a public IP address.B. The computer is using an invalid IP address.C. The computer and the gateway are not on the same network. D. The computer is not using a private IP address. | | Definition |
|
Term QUESTION NO: 196In an office visitors need to be connected to the Internet without attaching to the company server.Employees also need to connect to the company server and to the Internet. All the connectionsare managed by the same switch. Which of the following should be used to meet theserequirements?A. RIPB. OSPFC. Port trunking D. VLAN | | Definition Answer: DExplanation:Your best option in this scenario would be to make use of a VLAN. VLAN's assists you in isolatingnetwork traffic. It is software technology that permits for the grouping of network nodes that isconnected to one or more network switches into a single logical network. By permitting logicalaggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network | |
|
Term QUESTION NO: 197How much bandwidth does an OC12provide?A. 12MbpsB. 622MbpsC. 1.2Gbps D. 45Mbps | | Definition Answer: BExplanation:The OC12 will provide 622.08Mbps. | |
|
Term QUESTION NO: 198An office has just added an employee kitchen area. The work area and equipment has stayed thesame. Which of the following is the MOST likely reason why they are now having wirelessconnectivity problems?A. DistanceB. InterferenceC. Encryption D. Antenna placement | | Definition Answer: BExplanation:In this scenario the error occurred due to interference. Wireless performance is affected by outside interference. A microwave can be classified as an outside interference | |
|
Term QUESTION NO: 199A scanner has determined the open ports on a network device.Assuming services are running ontheir default ports, which of the following ports will provide secure communications?A. 25B. 21C. 22 D. 23 | | Definition Answer: CExplanation:In the scenario you should know that port 22 is used by SSH because the Secure Shell (SSH)protocol is used to establish a secure Telnet session over a standard TCP/ IP connection. Youshould also keep in mind that SSH is used to run programs on remote systems, log in to other systems, and move files from one system to another, all while maintaining a strong, encrypted | |
|
Term QUESTION NO: 200Implementing a set of policies and procedures that define the corporate information is confidentialand training employees on these procedures can help prevent which of the following?A. Smurf attacksB. ManinthemiddleattacksC. Social engineering D. Patch management | | Definition Answer: CExplanation:Your best option in this scenario would be to identify social engineering. Social engineering dealswith the human aspects of gaining access and passwords. Social engineering attacks can occurvia the telephone, e-mail or a visit. The purpose of social engineering is to obtain access data like user ID's and passwords. | |
|
Term QUESTION NO: 201A network technician is asked to implement a separate network for guests that arrive onsite.Which of the following would be the MOST cost effective solution?A. Create a VLAN.B. Install a firewall.C. Install a VPN. D. Implementtrunking. | | Definition Answer: AExplanation:The VLAN allows you to create groups of users and computers which are segmented on a network. Using the VPN will allow the guest to access the private interconnection to the company. | |
|
Term QUESTION NO: 202A user is unable to send an email to another user at company. A network technician believes thatthe issue is DNS related. After typing nslookup, which of the following commands would helpdetermine the IP address of company As mail server?A. set type=mxB. set type=ptrC. set type=soa D. set type=cname | | Definition Answer: AExplanation:The nslookup command displays information about a particular domain name, the name serversthat serve it, and how they are configured. The type-mx command sets the future query type to email servers for that particular domain. | |
|
Term QUESTION NO: 203Which of the following does a star ring topology use for data transfer?A. CSMA/CAB. CHAPC. CSMA/CD D. Token passing | | Definition Answer: DExplanation: The token passing uses the physical star and the logical ring topology | |
|
Term QUESTION NO: 204Which of the following commands would allow a technician to see the DNS servers that acomputer is configured to use?A. netstatB. nbtstatC. nslookup D. arp | | Definition Answer: CExplanation:nslookup displays information about a particular domain name, the name servers that serve it, and how they are configured. | |
|
Term QUESTION NO: 205A network with multiple devices needs to have a smaller broadcast domain while working with asmall budget. Which of the following is the BEST solution?A. Create VLANs.B. Implement more hubs.C. Implement more switches. D. Assign static IPs. | | Definition Answer: AExplanation:VLANs will allow you to create groups of users and systems and segment them on the network. Doing this will allow you to control access and to manage traffic in a certain area on the network | |
|
Term QUESTION NO: 206None of the users in an office can connect to the servers using the FQDN. Which of the followingis MOST likely the cause of this issue?A. WINS is not enabledB. NetBIOS is not enabledC. DNS is not enabled D. DHCP is not enabled | | Definition Answer: CExplanation:A Fully Qualified Domain Name (FQDN) is the type of name that you use when surfing the Web. Itconsists of a top-level domain name, such as .com, for example, preceded by a second-leveldomain name, such as CompTIA, preceded by a server name or subdomain string, such as www.For FQDN-to-IP address resolution, TCP/IP uses Domain Name Service (DNS). Many operatingsystems use DNS for name resolution, but Unix (whose networking is based on TCP/IP) uses DNS almost exclusively, and today, so does Microsoft Windows | |
|
Term QUESTION NO: 207The role of intelligently forwarding frames from one broadcast domain to another would beperformed by which of the following network equipment?A. RouterB. HubC. Media converter D. Unmanaged switch | | Definition |
|
Term QUESTION NO: 208Which of the following protocols is used for connecting clients to a news server?A. IMAP4B. NCPC. NNTP D. SMTP | | Definition Answer: CExplanation:The Network News Transfer Protocol (NNTP) is the TCP/IP protocol used to access Usenet newsservers. Usenet news servers contain thousands of individual message boards known asnewsgroups. Each newsgroup is about a particular subject (cars, dating, computers, etc.).Chances are, if you have an interest, there is a newsgroup about it. The details of the NNTP protocol are specified in RFC 977. | |
|
Term QUESTION NO: 209Which of the following OSI layers handles the routing of data across segments?A. NetworkB. TransportC. Session D. Data Link | | Definition Answer: AExplanation:The Network Layer of the OSI ensures that the data arrives at the correct destination. As such, it isconcerned with network addressing and routing. A router is responsible for routing and functions atthe Network Layer. Incorrect Answers: | |
|
Term QUESTION NO: 210Which of the following wireless networks is configured without an access point?A. AdhocB. Multiport repeatingC. Local D. Extended | | Definition Answer: AExplanation:This type of network permits multiple devices to intercommunicate without going through an access point. | |
|
Term QUESTION NO: 211Which of the following network devices could be used to extend the range limitation of Ethernetnetworks?A. Load balancerB. RepeaterC. IDS D. Firewall | | Definition Explanation:In order to extend the range limitation of Ethernet networks you should make use of a repeater. ARepeater takes the data packets it received on one Ethernet segment and recreates it on another segment. It will result in a number of computers on a segment as well as longer cables. | |
|
Term QUESTION NO: 212Using a routing table, which of the following routes will be selected MOST frequently?A. The lowest administrative distanceB. The highest administrative distanceC. The BGP route D. The one with the greatest number of hops | | Definition |
|
Term QUESTION NO: 213Automatic private Internet protocol addressing (APIPA) assigns IP addresses from which of thefollowing ranges?A. 10.0.x.xB. 169.254.x.xC. 192.168.x.x D. 172.16.x.x | | Definition Answer: BExplanation:In the scenario you should remember that the APIPA range of automatically assigned addresses starts with the range 192.168.x.x | |
|
Term QUESTION NO: 214How many broadcast domains are created by a 24 port switch configured with 12 VLANs with allof the ports being actively used?A. 2B. 12C. 36 D. 24 | | Definition |
|
Term QUESTION NO: 215A client wants to extend the range of their wireless network without running wires throughout thesmall office. Which of the following could be implemented with the LEAST administrative effort?A. Install a repeater at the end of the office.B. Install an 802.11n router and change all NICS to match.C. Install a WAP in the middle of the office. D. Install an additional router to help with congestion | | Definition Answer: CExplanation:WAP is essentially a wireless bridge. It functions by connecting wireless clients together. WAPindiscriminately propagates all broadcasts to all wireless and wired devices whilst permitting filtering on the MAC address. | |
|
Term QUESTION NO: 216Which of the following is the default port for SMTP?A. 443B. 21C. 110 D. 25 | | Definition Answer: DExplanation:In the scenario you should keep in mind that the SMTP protocol makes use of port 25 and theSMTP protocol is used to allow for a simple e-mail service responsible for forwarding and receiving messages | |
|
Term QUESTION NO: 217When troubleshooting a network error, a technician using a laptop as a network sniffer can see allthe communications on the network segment. Which of the following network devices is the laptopplugged into?A. GatewayB. RouterC. Hub D. Basic switch | | Definition Answer: CExplanation:In this scenario the notebook computer will be plugged into a hub. A hub is an electronic devicethat sits at the center of a stat topology network. It provides a common point for the connection of network devices. The hubs repeat all data out to the ports | |
|
Term QUESTION NO: 218Which of the following could be installed to improve network performance when accessing Internetwebsites?A. Caching engineB. Traffic shapingC. Load balancing D. Firewall | | Definition |
|
Term QUESTION NO: 219Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?A. PPPB. ATMC. MPLS D. Framerelay | | Definition |
|
Term QUESTION NO: 220A network administrator is configuring a network with a dynamic routing protocol. Which of thefollowing would support equal cost load balancing and have all routers contain the same topologyview?A. OSPFB. IGRPC. RIP D. BGP | | Definition Answer: AExplanation:In the scenario you should remember that OSPF is the most popular link-state IP routing protocolin use today and will be popular for some time since OSPF is widely deployed and includes a wide variety of features that have been added over the years to accommodate new requirements | |
|
Term QUESTION NO: 221Which of the following is the maximum amount of wires that fit into a RJ11connector?A. 2B. 8C. 4 D. 6 | | Definition Answer: CExplanation: The RJ-11 connector has four wires or 2 pairs | |
|
Term QUESTION NO: 222Which of the following components in a structured wiring system supports an Ethernet network?A. 110 blockB. 66 blockC. 25 pair cable D. Smart jack | | Definition |
|
Term QUESTION NO: 223Which of the following is the maximum CAT3 length acceptable for a horizontal crossconnect?A. 100 meters (328 feet)B. 125 meters (410 feet)C. 256 meters (840 feet) D. 328 meters (1076 feet) | | Definition Answer: AExplanation:The maximum length of CAT3 should be 100 meters or 328 feet. Beyond that, you will have a reliability problem. | |
|
Term A technician has gathered information on a network issue, and has determined the affected area.Which of the following would be the NEXT step in resolving this issue?A. The technician should test the best solution for the issue.B. The technician should check to see if there have been any recent changes to this area of thenetwork.C. The technician should consider any negative impacts to the network that might be caused by asolution. D. The technician should implement whatthe is the best solution for the issue | | Definition Answer: BExplanation:As soon as you have gathered information on a network issue and determined the affected areacheck if there has been any recent changes to this area of the network. In the network and troubleshooting model this will be your third step. | |
|
Term QUESTION NO: 225A company's web server is located in a climate controlled environment, with multiple powersupplies, and a UPS to provide the maximum uptime available. Which of the following would allowthe company the BEST opportunity to increase network uptime for the web server?A. Upgrade all switches to Gigabit speedB. Install an additional RouterC. Upgrade the outbound NIC to a gigabit card D. Install additional NICs | | Definition |
|
Term QUESTION NO: 226Which of the following devices will segment a network and help cut down on network congestion?A. SwitchB. RepeaterC. Gateway D. Hub | | Definition Answer: AExplanation:Your best option to use in this scenario is a switch. A switch filters and forwards traffic that isbased on certain criteria. A bridge and a router is both an example of a switch. A switch is able tomanage multiple, simultaneous pairs of connections between communicating systems. Switchescan in many cases be used as a network concentrator that will split flat network segments intodedicated communication links. Switches are able to split collision domains but can also provide agreater aggregate bandwidth between groups of communicating devices. Switches can also improve the overall performance. | |
|
Term QUESTION NO: 227Which of the following protocols is used in a ping command?A. IGMPB. ICMPC. SMTP D. TFTP | | Definition |
|
Term QUESTION NO: 228Which of the following would allow for encrypted login credentials to be sent over the network?A. TelnetB. FTPC. SSH D. HTTP | | Definition |
|
Term QUESTION NO: 229Which of the following is the maximum hop count for RIPv2?A. 18B. 10C. 16 D. 17 | | Definition Answer: CExplanation:In the scenario you should remember that RIP-2 has a max hop count of 16 and makes use ofdistance vector logic; uses hop count for the metric whilst sending full, periodic updates; and stillconverges relatively slowly. You should additionally remember that RIP-2 does add support for VLSM, as compared with RIP-1, making it a classless routing protocol | |
|
Term QUESTION NO: 230Which of the following is used to simplify the process of setting up a network and theadministration of the network?A. ZEROCONFB. SNMPC. WINS D. DNS | | Definition Answer: AExplanation:Your best option in this scenario would be to make use of ZEROCONF. It is an InternetEngineering Task Force initiative that is chartered to create recommendations for networking devices is small environments. | |
|
Term QUESTION NO: 231When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. Theresulting cable is:A. astraightthroughcable.B. nonfunctional.C. a crossover cable. D. capable of 10GBaseT | | Definition Answer: CExplanation:With the crossover cable you can terminate at the end with 568A and 568B. However, with CAT5e cable, you should not exceed the 100 meters. | |
|
Term QUESTION NO: 232Which of the following is the maximum CAT5 length acceptable for a horizontal crossconnect?A. 500 feet (152 meters)B. 100 feet (30.5 meters)C. 336 feet (102 meters) D. 328 feet (100 meters) | | Definition Answer: DExplanation: The suitable length of CAT5 will be 100 meters or 328 feet. | |
|
Term QUESTION NO: 233Some users are unable to access the network. A technician determines that the computers thatwere unable to access the network have an IP address of 169.254.0.1. Which of the followingnetwork services should the technician check?A. TFTPB. DNSC. BOOTP D. DHCP | | Definition Answer: DExplanation:In the scenario you should consider making use of the Dynamic Host Configuration Protocol(DHCP) protocol because DHCP is responsible for automating the assignment of IP configurations to computer systems on a TCP/IP network. | |
|
Term QUESTION NO: 234A technician is troubleshooting a workstation that is connected to a star network. The techniciandetermines that the workstation is unable to connect to the network resources. Which of thefollowing should be checked FIRST?A. The link lights on the server network cardB. The link lights on the network cardC. The link lights on the switch D. The installed network drivers | | Definition Answer: BExplanation: You should check the link lights. This will indicate that the NIC has a logical connection | |
|
Term QUESTION NO: 235An administrator is in charge of several remote servers in Japan. Users call and report they cannotconnect to the company's resources located on those servers. Which of the following commandswould allow the administrator to verify the servers are running?A. nbtstatB. pingC. telnet D. netstat | | Definition Answer: BExplanation:Ping is used to test connectivity between two hosts. This command is used to determine how long packets take to reach a specific target and return to the host | |
|
Term QUESTION NO: 236Which of the following does an administrator need to be aware of when installing a wirelessnetwork in a building with multiple floors?A. Frequency configurationB. SSID namingC. Channel overlap D. Encryption algorithm | | Definition |
|
Term QUESTION NO: 237A network technician is contacted about a system that is unable to connect to a file server. Afterinvestigating the problem thoroughly the technician is able to successfully test and resolve theissue.Which of the following is the NEXT step the technician should take?A. Document the solution.B. Create an action plan.C. Reboot the server. D. Identify the problem. | | Definition Explanation:In this scenario your best option would be to document the solution for future references.Documenting the solution is the final step in the troubleshooting process. This step allows you tokeep track of the plans, procedures as well as the schedules. This step allows you to keep track ofthe problems as well as the solution to the problem in the event a similar problem arises in thefuture. If such a problem will arise you will know what steps to take as well as how to solve the problem. | |
|
Term QUESTION NO: 238Which of the following is implemented on multiple switches to allow alternate paths?A. Spanning treeB. VLANC. Port authentication D. Port mirroring | | Definition Answer: AExplanation:The spanning-tree algorithm places every bridge or switch port into either a forwarding state or ablocking state. It ensures that only one path is active between two network stations. It also permits redundant paths that are automatically activated when the active path experiences problems | |
|
Term QUESTION NO: 239A small office home office (SOHO)wireless user reports their new laptop is 802.11b and 802.11gcapable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause ofthe problem?A. The laptop wireless card is running on a different frequency.B. The wireless router needs a firmware update.C. The wireless router is 802.11b only. D. The wireless router is defective. | | Definition Answer: CExplanation:In the scenario you should remember that the 802.11b standard provides for bandwidths of up to 11Mbps (with fallback rates of 5.5, 2, and 1Mbps) in the 2.4GHz frequency spectrum. You should additionally note that this standard is also called WiFi | |
|
Term QUESTION NO: 240An automated application capable of infecting computers without user interaction would bedescribed as which of the following?A. A social engineering attackB. A TrojanC. A smurf attack D. A worm | | Definition Answer: DExplanation:Worms have a similar function to that of a virus. The only difference is that worms are selfreplicating.Worms are built to take advantage of a security hole in an existing application.Thereafter the worm finds other systems running similar software and automatically replicates itself to the new host. | |
|
Term QUESTION NO: 241Which of the following is a valid IP address in the public addressing scheme?A. 172.20.10.1B. 10.20.1.1C. 168.192.10.1 D. 233.10.20.1 | | Definition Answer: CExplanation:In the scenario you should remember that the IP address 168.192.10.1 is a valid public IPaddressing scheme as the IP addressing scheme provides a flexible solution to the task of addressing thousands of networks | |
|
Term QUESTION NO: 242A system administrator is troubleshooting an application that is terminating frequently. Which ofthe following utilities can be used to determine the problem?A. Port scannerB. History logC. DNS log D. Application log | | Definition Answer: DExplanation:The application log tracks events for network services and applications. It makes use of the sameevent types as that of the System log. The application log tracks events for network services as well as applications. | |
|
Term QUESTION NO: 243While analyzing the contents of the IP routing table in a router, the administrator notices thefollowing routes in the table:PrefixNextHopIPInterface 192.168.1.0 /24172.16.31.1Ethernet0 192.168.2.0 /24172.16.31.1Ethernet0 172.16.31.0 /24Directly ConnectedEthernet0 0.0.0.0/0172.16.31.2Ethernet0Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to192.168.3.4?A. The packet will be dropped as there is no matching route in the IP routing table to reach thedestination networkB. An ICMP network unreachable message will be sent to 192.168.1.4C. The packet will be forwarded to 172.16.31.2D. The packet will be forwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range | | Definition Answer: CExplanation:In the scenario you should remember that the packet would be forwarded to the network address 172.16.31.2 as Ethernet 0 0 0 0/0172.16.21.2 uses direct connect. | |
|
Term QUESTION NO: 244Which of the following wireless standards allows for increased bandwidth by allowing channelbonding?A. 802.11gB. 802.11aC. 802.11b D. 802.11n | | Definition Answer: DExplanation:In the scenario you should remember that bonding is a procedure where two ISDN B channels arejoined together to provide greater bandwidth. You should additionally note that BONDING standsfor Bandwidth ON Demand Interoperability Group, but it's often seen in lowercase as a more generalized term referring to inverse multiplexing. | |
|
Term QUESTION NO: 245If static addressing is not configured and the DHCP server for a network is unavailable, which ofthe following will a PC use to configure its IP address?A. APIPAB. BOOTPC. DNS D. TFTP | | Definition Answer: AExplanation:In the scenario you should remember that the APIPA range of automatically assigned addresses starts with the range 192.168.x.x. | |
|
Term QUESTION NO: 246A technician is creating a crossover cable to connect two devices. Which of the following pinswould be different between connector A and connector B?A. Pin4, Pin5, Pin7, Pin8B. Pin6, Pin7, Pin8, Pin1C. Pin4, Pin5, Pin1, Pin2 D. Pin1, Pin2, Pin3, Pin6 | | Definition Answer: DExplanation:The pins 1 and 2 of the one end are connected to the pins 3 and 6. They are used for transmitting and receiving. | |
|
Term QUESTION NO: 247A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?A. Record what steps should be taken to resolve the issue.B. Ask the user who reported the issue what past documentation they have.C. Ask the user who reported the issue to explain the symptoms in detail. D. Record the solution in the appropriate logs for future use | | Definition Answer: CExplanation:The first step that should be executed in this scenario would be to establish the symptoms of the error. | |
|
Term QUESTION NO: 248A user has been transferred from the accounting team to the human resources team. The usercan only print to the accounting teams printer and cannot print to the human resources teamsprinter. Which of the following is the cause of the problem?A. Wrong gatewayB. Wrong DNSC. Wrong host file D. Wrong VLAN | | Definition Answer: DExplanation:In the scenario the network user has the wrong VLAN configured. VLAN's assists you in isolatingnetwork traffic. It is software technology that permits for the grouping of network nodes that isconnected to one or more network switches into a single logical network. By permitting logicalaggregation of devices into virtual network segments, VLAN's offer simplified user management and network resource access controls for switched network | |
|
Term QUESTION NO: 249Which of the following protocols allows secure access to a VPN?A. PPPB. SLIPC. PPPoE D. PPTP | | Definition Answer: DExplanation:Point-to-Point Tunneling Protocol You can access a private network through the Internet or otherpublic network by using a virtual private network (VPN) connection with the Point-to-PointTunneling Protocol (PPTP). Developed as an extension of the Point-to-Point Protocol (PPP),PPTP tunnels and/or encapsulates IP, IPX, or NetBEUI protocols inside of PPP datagram's. PPTPdoes not require a dial-up connection. It does, however, require IP connectivity between yourcomputer and the server. Not B: L2TP is an industry-standard Internet tunneling protocol withroughly the same functionality as the Point-to-Point Tunneling Protocol (PPTP). Like PPTP, L2TPencapsulates Point-to-Point Protocol (PPP) frames, which in turn encapsulate IP, IPX, or NetBEUI protocol. | |
|
Term QUESTION NO: 250Which of the following devices uses the IEEE 1394 standard?A. FireWireB. USB 2.0C. iSCSI D. Parallel | | Definition Answer: AExplanation:In the scenario you should remember that FireWire (IEE 1394) is an IEEE 1394 interconnectionstandard to send wide-band signals over a serialized, physically thin connector system. Youshould additionally keep in mind that the serial bus developed by Apple and Texas Instruments enables connection of 60 devices at speeds up to 800 megabits per second. | |
|
Term QUESTION NO: 251Which of the following is the maximum segment distance of a 100BaseFXnetwork?A. 100 meters (328 feet)B. 2,000 meters (6,561 feet)C. 1,024 meters (3,359 feet) D. 1,023 meters (3,356 feet) | | Definition Answer: BExplanation:The distance of the 100BaseFXnetwork is 2, 000 meters (6, 561 feet). It also has a speed of 100 Mbps. | |
|
Term QUESTION NO: 252Which of the following devices is used to extend the signal strength on a network segment?A. RepeaterB. NICC. Transceiver D. Modem | | Definition Answer: AExplanation:In order to extend the signal strength on the network segment you should make use of a repeater.A Repeater takes the data packets it received on one Ethernet segment and recreates it on another segment. It will result in a number of computers on a segment as well as longer cables | |
|
Term QUESTION NO: 253Which of the following remote access solutions allows the LEAST connection overhead?A. L2TP VPNB. IPSec VPNC. SSL VPN D. PPTP VPN | | Definition Answer: CExplanation:SSL is a protocol that will secure messages by operating between the Application layer HTTP andthe Transport layer. The SSL protocol makes use of an encryption scheme between two systems. SSL makes use of the handshake method in order to establish a session. | |
|
Term QUESTION NO: 254A technician is at a small facility that has five computers connected to a central switch andaccessing a single server for file and print sharing. One computer becomes unable to connect tothe network, while the other four are still connecting properly. Which of the following could becausing the computer to not connect to the network?A. The server has failed.B. The computers OS needs to be updated.C. The switch has failed. D. The NIC has failed. | | Definition |
|
Term QUESTION NO: 255After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is nolonger able to send packets with a size of 1501 bytes. Which of the following is the cause?A. The WAN link does not support frames over 1500 bytes in size.B. The branch router cannot process frames larger than 1500 bytes.C. The router at the other end of the WAN link is configured with an MTU of 1500.D. The frames take too long to send causing collisions with other devices attempting to send traffic. | | Definition |
|
Term QUESTION NO: 256Users on the network can no longer access a custom application that uses TCP 8090 hosted onthe DMZ. A technician has verified that the firewall is permitting the TCP port. Which of thefollowing commands would verify the server is still accepting connections on TCP 8090?A. netstatB. ipconfigC. telnet D. nslookup | | Definition Answer: AExplanation:netstat is used to display the inbound and outbound TCP/IP connections on a local computer. Itprovides packet statistics, such as the number of packets that have been sent and received, the number of errors, etc. | |
|
Term QUESTION NO: 257Which of the following is commonly used to test fiber connectivity?A. OTDRB. Toner probeC. Butt set D. Multimeter | | Definition Answer: AExplanation:You should consider making use of an Optical Time Domain Reflectometer in order to test fiberconnectivity. OTDR is an instrument that characterizes fiber cable loss by means of measuring thebackscatter as well as the reflection of injected light as a function of time. OTDR is very useful in estimating attenuation as well as locating splices, connections, anomalies and breaks. | |
|
Term QUESTION NO: 258Which of the following protocols transmits using UDP ports?A. RIPv2B. HTTPC. HTTPS D. TFTP | | Definition Answer: DExplanation:Trivial File Transfer Protocol (TFTP) is a "stripped down" version of FTP, primarily used to bootdiskless workstations and to transfer boot images to and from routers. It uses a reduced featureset (fewer commands and a smaller overall program size). In addition to its reduced size, it also uses UDP instead of TCP, which makes for faster transfers but with no reliability | |
|
Term QUESTION NO: 259Which of the following routing protocols uses AS-Path as one of the methods to build the routingtable?A. OSPFB. ISISC. BGP D. EIGRP | | Definition Answer: CExplanation:In the scenario you should remember that BGP makes use of the AS-Pathe as the BorderGateway Protocol (BGP) is designed specifically for use between two different organizations. Youshould additionally remember that BGP distributes routing information between ISPs worldwide today and between ISPs and their customers as required | |
|
Term QUESTION NO: 260A network technician wants a server to have fault tolerance. Which of the following would be theMOST cost effective solution?A. Install two NICs for teaming.B. Install two switches.C. Install a single fiber NIC. D. Install a single router. | | Definition Answer: AExplanation:Your best option in this scenario would be to have two NICs installed for teaming. Fault tolerancedeals with the ability to withstand failure without losing information. Multiple NIC's will provide you with fault tolerance for the network connection. | |
|
Term QUESTION NO: 261An employee is having issues accessing shared resources on a file server. Which of the followingtroubleshooting steps should the technician take FIRST?A. Document the problemB. Search the internet for the problemC. Test the results D. Identify the symptoms | | Definition Answer: DExplanation:Your best option in this scenario would be to identify the symptoms. This is usually the first step in the troubleshooting model. | |
|
Term QUESTION NO: 262A user states that they have decreased signal strength on their wireless connection. They havebeen using the wireless network previously without problems and the network configuration hasnot been changed. Which of the following is MOST likely the cause of the degraded signal?A. Incorrect encryptionB. Standards mismatchC. Incorrect SSID D. Environmental factors | | Definition |
|
Term QUESTION NO: 263A user reports their wireless 802.11g Internet connection is intermittently disrupted. Which of thefollowing is the cause of the problem?A. Infrared printerB. Cordless phoneC. Cell phone D. Incandescent light | | Definition Answer: BExplanation:In this scenario the Internet connection is intermittently interrupted by a cordless phone. Wireless performance is affected by outside interference. | |
|
Term QUESTION NO: 264Which of the following will list the destination MAC addresses?A. arpB. pingC. dig D. nbtstat | | Definition |
|
Term QUESTION NO: 265Which of the following cable types has the shortest maximum cable run length?A. SinglemodefiberB. CoaxialC. Plenum D. CAT3 | | Definition Answer: DExplanation: The CAT3 cable has a maximum cable length of 100 meters, if running with Ethernet | |
|
Term QUESTION NO: 266Which of the following is the MOST common pinoutconfiguration used when crimping RJ45connectors?A. UTPB. IEEE 802.5C. T568A/B D. STP | | Definition Answer: CExplanation:T568A/B defines the pin out configuration for Ethernet cabling which terminates in RJ-45 connectors. | |
|
Term QUESTION NO: 267A network administrator is summarizing the following IP address ranges into a single route forredistribution into the network core:192.168.0.0 /24192.168.1.0 /24192.168.2.0 /24192.168.3.0 /24Which of the following IP summary addresses will represent the listed network ranges withoutincluding any ranges not listed?A. 192.168.0.0 /21B. 192.168.0.0 /23C. 192.168.0.0 /16 D. 192.168.0.0 /22 | | Definition |
|
Term QUESTION NO: 268A network technician has been asked to retrieve device statistics, information, and errors. Whichof the following tools would the technician likely use?A. TFTPB. Packet snifferC. SNMP D. SMTP | | Definition |
|
Term QUESTION NO: 269Which of the following is found in a layer two switch?A. SSID settingsB. Routing protocolsC. DNS zones D. VLAN settings | | Definition Answer: DExplanation:When you make use of a layer 2 switch you will find VLAN settings. This level of switching will forward data packets based on the MAC addresses of the sending and receiving machines | |
|
Term QUESTION NO: 270Which of the following cable types transmits data over 100Mbps per direction?A. 100BaseTXB. 10BaseTC. 100BaseT D. 10GBaseT | | Definition |
|
Term QUESTION NO: 271A technician is dispatched to a remote office to install a new NIC in a client computer. Aftersuccessfully installing and configuring the operating system to recognize the device, the computerstill cannot access the network. Which of the following would MOST likely be the problem?A. The CAT5 cable is defectiveB. The NIC is disabled in BIOSC. The NIC is disabled in Device ManagerD. The RJ11 jack is defective | | Definition |
|
Term QUESTION NO: 272Which of the following is the MOST likely cause of a wireless connection dropoffin a wireless Gnetwork?A. Cellular interferenceB. AM RadioC. Cordless phones D. FM Radio | | Definition Answer: CExplanation:In this question the drop offs occur due to a cordless phone. Wireless performance is affected by outside interference. | |
|
Term QUESTION NO: 273Which of the following tools will identify if a CAT5e cable is operating at optimal performance?A. Toner probeB. MultimeterC. Certifier D. Butt set | | Definition |
|
Term QUESTION NO: 274Which of the following is the default port for POP3?A. 21B. 80C. 110 D. 25 | | Definition |
|
Term QUESTION NO: 275A user contacts a technician and states that they are unable to access the network. The techniciandiscovers that the IP address of the workstation is 169.123.142.34. Which of the following hasoccurred?A. The workstation has obtained a public address.B. The workstation has obtained a multicast address.C. The workstation has obtained a private address. D. The workstation has obtained an APIPA address | | Definition |
|
Term QUESTION NO: 276A technician needs to trace a wire that is in the wall. Which of the following is the BEST way forthe technician to identify the wires location?A. Media TesterB. Continuity TesterC. Tone Generator D. Multimeter | | Definition Answer: CExplanation:You should consider making use of a Tone Generator in this scenario. The tone generator is asmall electronic device used to test network cables for breakages as well as other problems bysending an electronic signal down one segment of UTP wires. You make use of a tone generator to locate a single cable within a bundle. | |
|
Term QUESTION NO: 277Users are reporting that they can access Internet web pages but cannot access the internalcompany website. Which of the following is the MOST likely source of the problem?A. The intranet server is down.B. The intranet DNS entry isnonauthoritative.C. The DNS address handed out by DHCP is incorrect. D. The default gateway is incorrect. | | Definition |
|
Term QUESTION NO: 278When connecting two devices for voice on a vertical connect, which of the following cables wouldbe used to connect the two devices?A. CrossconnectwireB. 25 pair cableC. CAT3 D. CAT5 | | Definition |
|
Term QUESTION NO: 279Which of the following protocols allows email to be viewed while remaining on the email server?A. SMTPB. SSLC. POP3 D. IMAP4 | | Definition |
|
Term QUESTION NO: 280A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten inclasslessinterdomain routing notation (CIDR) as which of the following?A. 220.100.100.100 /24B. 220.100.100.100 /16C. 220.100.100.100 /8 D. 220.100.100.100 /32 | | Definition |
|
Term QUESTION NO: 281A company is getting a new sales system that must remain secure and isolated. The networkadministrator needs to segregate network traffic for security reasons. Currently there is oneaddressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0.Which of the followingmethods would BEST help in segregating the traffic?A. Implementing a dedicated broadcast networkB. Implementing a dedicated multicast networkC. Changing the IP scheme to class C addresses D. Creating a new subnet for this system | | Definition |
|
Term QUESTION NO: 282A network administrator has been receiving work orders about poor voice quality crossing abranch T1.The cause is determined to be users running high bandwidth file sharing applicationsacross the T1 sending large packets delaying the smaller voice streams. Which of the followingwould improve voice quality?A. Install a content caching proxy at the branch to reduce inbound WAN traffic.B. Configure traffic shaping to reduce the bandwidth available to the file sharing application.C. Configure a separate VLAN for the IP phones. D. Upgrade switches to provide higher bandwidth ports for workstations and IP phones. | | Definition |
|
Term QUESTION NO: 283Which of the following uses pointer records and A records?A. NAT serverB. IPSC. DNS server D. IDS | | Definition Answer: CExplanation:DNS servers make use of pointer records as well as A records. DNS permits hosts to resolve host names o an Internet Protocol address. The system operates similar to a telephone directory | |
|
Term QUESTION NO: 284DNS services are in a failed state on a network. Some users require FQDN to access specificservices. A temporary solution would be to:A. create a local host file on the PC.B. release and renew DHCP.C. change the IP address of the specific services needed. D. change all domain relationships to WINS. | | Definition Answer: AExplanation:In the scenario you should consider making use of the local hosts file as these are an IP addressfor the computer, a common subnet mask for the LAN, a default gateway IP address for the local router interface, and the address of a DNS server. | |
|
Term QUESTION NO: 285A user has a small network of four computers that they want to connect to a single cable modem.Which of the following devices would allow the user to do this?A. Four port wireless routerB. Four port switchC. Four port hub D. Four port WAP | | Definition |
|
Term QUESTION NO: 286Which of the following devices allows segregation of collision domains but not broadcastingdomains?A. NICB. SwitchC. Hub D. Router | | Definition |
|
Term QUESTION NO: 287A user reports that when the phone rings in their house the wireless on their laptops becomesdisconnected. Which of the following BEST describes the issue?A. The cordless phones are2.4Ghz which interferes with wirelessB. The cordless phones are plugged into the RJ11jackC. The cordless phones are5.8Ghz which interferes with wireless D. The cordless phones are plugged into same outlet as the router | | Definition Answer: AExplanation:In this scenario the problem occurred due to Interference. The 2.4 GHz cordless telephoneinterfered with the wireless connection. Wireless performance is affected by outside interference. You can thus say that the 2.4 GHz cordless phone can be classified as an outside interference | |
|
Term QUESTION NO: 288Which of the following documentation would a network administrator need to update if they havejust finished upgrading the firmware on all the switches within the LAN?A. Wiring schematicsB. Logical network diagramC. Physical network diagram D. Baseline and configuration documentation | | Definition |
|
Term QUESTION NO: 289After deploying three large additional servers in a rack there are reports of network instability andother issues across all servers in the rack. It has been verified that there is sufficient powerresources and network bandwidth. Which of the following should the technician check NEXT?A. Cable testerB. CertifierC. Temperature monitor D. Multimeter | | Definition |
|
Term QUESTION NO: 291Which of the following is the standard data transmission rate for an OC3line?A. 51.84MbpsB. 44.74MbpsC. 622.08Mbps D. 155.52Mbps | | Definition Answer: DExplanation:The OC-3 will provide 155.52Mbps. The OC-1 will provide 51.84Mbps. The OC-12 will provide 622.08Mbps. | |
|
Term QUESTION NO: 292A router receives a packet with a destination address 72.44.69.254?however, no entry in therouting table exists for the network. Which of the following actions will the router take?A. The packet will be queued while the router queries for an acceptable path to the destination.B. The packet will be dropped as nonroutable.C. The packet will be forwarded out until another router forwards the packet. D. The packet will be forwarded to the next hop address of the default route. | | Definition |
|
Term QUESTION NO: 293A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of thefollowing is the NEXT step after verifying that one of the NICs has no LEDs flashing?A. Reinstallapplication.B. Check for hardware conflicts or disabled devices.C. Reinstalldrivers. D. Check system properties for correct caching settings. | | Definition |
|
Term Which of the following WAN technologies uses thirty 64Kbps channels?A. ATMB. T1C. E1 D. MPLS | | Definition |
|
Term QUESTION NO: 295Which of the following is considered a connectionorientedprotocol?A. UDPB. SPXC. TCP D. IP | | Definition |
|
Term QUESTION NO: 296A technician wants to remotely log into an office computer using remote desktop. The technicianneeds to do this in a secure manner. Which of the following would accomplish this?A. VPNB. TelnetC. VLAN D. Tagged packets | | Definition Answer: AExplanation: In a VPN topology, the company makes use of the public Internet. It is used for remote access | |
|
Term QUESTION NO: 298A company requires a hub and spoke WAN solution. Which of the following are BEST suited tomeet this need? (Select THREE).A. ISDNB. MPLSC. ADSLD. SONETE. FramerelayF. ATM G. DOCSIS | | Definition |
|
Term QUESTION NO: 299Which of the following tools enables the technician to trace cables in multiple pair wiring?A. Cable testerB. MultimeterC. Butt set D. Toner probe | | Definition |
|
Term QUESTION NO: 300Which of the following is a routable public class A address?A. 10.0.0.255B. 19.16.18.255C. 10.0.0.10 D. 19.16.18.1 | | Definition |
|
Term QUESTION NO: 301A technician wants to see how many server connections are open on a client machine. Which ofthe following is the command to see these connections?A. digB. netstatC. nslookup D. arp | | Definition |
|
Term QUESTION NO: 302A technician is creating a patch cable to connect two PCs for file sharing. Which of the followingcables should the technician use?A. StraightB. LoopbackC. Crossover D. Rollover | | Definition Answer: CExplanation: You can use a crossover cable to connect two computers | |
|
Term QUESTION NO: 303Which of the following is the maximum number of wire pairs that can be used in an RJ11connector?A. 8B. 2C. 6 D. 4 | | Definition Answer: BExplanation: The RJ-11 connector has four wires or 2 pairs | |
|
Term QUESTION NO: 304Which of the following is correct when converting 192 to binary?A. 00110000B. 00001100C. 11000000 D. 00000011b printers? | | Definition |
|
Term QUESTION NO: 305Which of the following is the FIRST criterion used to select a nexthop from the routing table?A. Lowest administrative distanceB. Greatest number of hopsC. Most precise matching prefix D. The BGP route | | Definition |
|
Term QUESTION NO: 306Which of the following is port 123 commonly used for?A. IMAP4B. HTTPSC. NTP D. DNS | | Definition |
|
Term QUESTION NO: 307A remote user cannot connect to the office via VPN. The user has established Internetconnectivity.Which of the following is the MOST likely next step in troubleshooting?A. Reinstall the VPN client at the remote computer.B. Determine if the VPN service is running at the office.C. Power cycle the VPN concentrator at the office. D. Determine if the user has the correct VPN address and password. | | Definition Answer: DExplanation: Your best option in this scenario would be to ensure that the VPN password is correct | |
|
Term QUESTION NO: 308Which of the following would limit the availability of the types of sites that users on a LAN haveaccess to?A. A DNS serverB. A proxy serverC. A DC server D. A DHCP server | | Definition |
|
Term QUESTION NO: 309Which of the following utilities will produce the results printed below?Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1>A. arpB. tracertC. ping D. netstat | | Definition |
|
Term QUESTION NO: 310Which of the following would a network administrator MOST likely configure on a workstation toblock certain websites and ports?A. NetworkbasedfirewallB. Antivirus serviceC. Hostbasedfirewall D. Port scanner | | Definition |
|
Term A user is having intermittent problems connecting to their network shares. A network technician isable to determine that there is a problem within the network cabling in between the workstationand the switch. All other users are able to connect successfully to the network. Which of thefollowing is the MOST likely cause?A. Patch cable is a crossover cable instead of straightthrough.B. Cable is not punched down at the punch panel.C. Cable has been cut somewhere within the wall. D. Crosstalk and interference are occurring. | | Definition |
|
Term Which of the following protocols provides a secure method to remotely administer a server?A. HTTPB. SFTPC. SSH D. Telnet | | Definition |
|
Term Which of the following is the maximum distance a 10GBaseEWconnection can transmit with onerepeater?A. 10,000 meters (32,808 feet)B. 80,000 meters (262,467 feet)C. 20,000 meters (65,616 feet) D. 40,000 meters (131,233 feet | | Definition |
|
Term QUESTION NO: 314On a Windows network, users are reporting that they cannot access any network resources. Theuserscan ping the IP address and connect to the network resource using the IP address. Which ofthe following is the cause of the problem?A. The domain controller is not responding.B. The DNS server is not resolving correctlyC. The DHCP server is not assigning correct IP addresses. D. The file server is offline | | Definition |
|
Term QUESTION NO: 315A network technician is assigned the task of connecting two switches in two different wiringclosets. Which of the following cable types is the appropriate choice?A. CrossoverB. LoopbackC. 568A D. Rollover | | Definition |
|
Term QUESTION NO: 316Which of the following access methods is used for wireless medium access?A. CSMA / CDB. PPPoEC. CSMA / CA D. PPTP | | Definition |
|
Term QUESTION NO: 317A new segment needs to be added to a network to provide access for 64 servers. Which of thefollowing subnets will provide the needed access and still conserve IP addresses?A. 192.168.1.0/25B. 192.168.1.0/26C. 192.168.1.0/23 D. 192.168.1.0/24 | | Definition |
|
Term QUESTION NO: 318When connecting two devices for data on a vertical cross connect, which of the following cableswould be used to connect those devices?A. CAT5eB. FiberC. Coaxial D. CAT6 | | Definition |
|
Term QUESTION NO: 319Which of the following network protocols is needed to ensure that users can type in a FQDNinstead of the IP address?A. DNSB. WINSC. IMAP4 D. FTP
| | Definition |
|
Term QUESTION NO: 320A technician is called to a clients desktop for connection issues. Which of the following is theFIRST step the technician should take?A. Check the LEDs on the NIC.B. Reinstallthe OS.C. Install a new NIC. D. Reset the router. | | Definition |
|
Term QUESTION NO: 321A technician is extending a data circuit to the other side of the building. Which of the followingwould the technician set up at the new location?A. EMIB. MDFC. IDF D. ESD | | Definition |
|
Term QUESTION NO: 322Which of the following network devices filters packets based on rules that have been configuredfor it?A. Layer 2 switchB. FirewallC. Hub D. Bridge | | Definition |
|
Term QUESTION NO: 323A network administrator is configuring a server to provide file sharing for offices across thecompany. Which of the following addresses would be acceptable to set on a device?A. 255.255.255.255B. 192.168.0.255C. 192.168.0.25 D. 192.255.255.255 | | Definition |
|
Term QUESTION NO: 324Which of the following is the purpose of a packet sniffer?A. Checks the route to a remote host.B. Views network datagrams.C. Verifies if a service is running on a remote host. D. Verifies name to IP address resolution | | Definition |
|
Term QUESTION NO: 325Two PCs have been assigned the following IP addresses, subnet mask, and default gateway:PC1192.168.100.20255.255.255.240No DGPC2192.168.100.10255.255.255.240192.168.100.1Assuming all network devices including the switch the PCs are connected to, network cabling, andthe default gateway are all functioning which of the following will occur when PC1 attempts totransfer a file to PC2?A. PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 doesnot have a default gateway configured.B. PC1 will perform an ARP broadcast to resolve PC2s IP address to MAC address since bothPCs have the same subnet mask and communication will occur.C. PC1 and PC2 will not be able to communicate since both PCs must have the same defaultgateway.D. PC1 will send traffic to the default gateway at 192.168.100.1 since PC2 is in a different subnet and communication will occur | | Definition |
|
Term QUESTION NO: 326Which of the following tools will measure in Ohms?A. Cable testerB. MultimeterC. TDR D. Butt set | | Definition |
|
Term QUESTION NO: 327Which of the following are features of a DHCP server? (Select TWO)A. Transferring files over the networkB. Dynamic IP addressingC. Static IP address reservationsD. Resolving IP addresses to canonical names E. Secure shell connections | | Definition |
|
Term QUESTION NO: 328Which of the following routing protocols uses the next hop metric in deciding how to route traffic?A. RIPB. BGPC. IGP D. ISIS | | Definition |
|
Term QUESTION NO: 329Which of the following techniques would increase the bandwidth for network transmission byjoining together multiple connections into one logical connection?A. BondingB. SupernettingC. Broadcasting D. Traffic shaping | | Definition |
|
Term QUESTION NO: 330Which of the following properties describes a rate at which bits are transmitted over a WAN link?A. Transmission speedB. Baud rateC. Frequency D. Throughput | | Definition Answer: AExplanation:The Transmission speed depicts the rate of bits transmitted. E.g. in the 10BaseX, it means the 10 will be 10 Mbps. | |
|
Term QUESTION NO: 331Which of the following is a utility that translates the IP address to its physical network address?A. netstatB. arpC. rarp D. nslookup | | Definition |
|
Term QUESTION NO: 332When determining responsibility for repair and maintenance of a T1, up to which of the followingpoints is the local exchange carrier responsible for?A. The smart jackB. The central officeC. The point of demarcation D. The router | | Definition |
|
Term QUESTION NO: 333Which of the following is a disadvantage of static routing?A. Unresponsive to changes.B. High network utilization due to updates.C. RIP updates will need to be transmitted via TCP. D. Packet destination cannot be controlled | | Definition |
|
Term QUESTION NO: 334A scanner has determined the open ports on a network device. Assuming services are running ontheir default ports, which of the following ports will provide secure communications?A. 69B. 143C. 67 D. 443 | | Definition |
|
Term QUESTION NO: 335Which of the following tools would be used to determine if the connection is punched down andthere is noise coming across the cable?A. MultimeterB. Cable testerC. Voltage event recorder D. Protocol analyzer | | Definition |
|
Term QUESTION NO: 336Which of the following items changes the encryption key on a users session after a set period oftime?A. TKIPB. AESC. RADIUS D. WEP | | Definition |
|
Term QUESTION NO: 337PPTP is a combination of which of the following protocols? (Select TWO).A. PPPB. POP3C. PPPoED. TCP E. TCP/IP | | Definition |
|
Term QUESTION NO: 338In the OSI model, which of the following layers would be the cause of a session timeoutwhilebrowsing the web?A. Layer 5B. Layer 7C. Layer 3 D. Layer 2 | | Definition Answer: AExplanation:The Session Layer controls the establishment the establishing, managing and terminating communications sessions between presentation layers | |
|
Term QUESTION NO: 339A network administrator has just installed a new framerelayDS3 to connect an office to thecorporate datacenter. Users report long load times for large documents hosted on fileservers inthe datacenter. Which of the following tests would be MOST useful in identifying the problem?A. A penetration testB. A throughput testC. ping t D. ping f | | Definition |
|
Term QUESTION NO: 340A technician has tested a cable and has established it can successfully send and receive signals.Which of the following tools can be used to check the speed and condition of the signal?A. Toner probeB. Voltage event recorderC. Protocol analyzer D. TDR | | Definition |
|
Term QUESTION NO: 341Which of the following wireless security protocols supports the highest encryption standards?A. 3DESB. WPA2C. WPA D. WEP | | Definition |
|
Term QUESTION NO: 342How many pairs are crossed in a crossover cable?A. ThreeB. TwoC. One D. Four | | Definition Answer: BExplanation:The crossover cable use normally four wires. Two is for transmitting and the other two is for receiving. | |
|
Term QUESTION NO: 343Which of the following is the length of a MAC address?A. 48bitB. 32bitC. 24bit D. 64bit | | Definition |
|
Term QUESTION NO: 344Which of the following layers of the OSI model does a network router perform traffic routing at?A. Layer 3B. Layer 4C. Layer 2 D. Layer 5 | | Definition Answer: AExplanation:A router connects separate networks that forwards a packet from one network to another based onthe network address for the protocol being used. Routers operate on the third layer of the OSI model. | |
|
Term QUESTION NO: 345All printers on a network are network printers with server hosted queues. A user reports that theycannot print. The dispatched technician verifies that all jobs sent from the users computer to thenetwork printer fail. Which of the following would be an appropriate NEXT step?A. Reboot the print server.B. Power cycle the switch.C. Try the printer from another PC. D. Replace the printer. | | Definition |
|
Term QUESTION NO: 346Which of the following BEST describes the use of plenum cable?A. Increases the cable signalB. Decreases the cable signalC. Reduces toxic gas released during a fire D. Reduces the amount of EMI going to the cable | | Definition Answer: CExplanation: The plenum cable does not produced toxic gas when it burns | |
|
Term QUESTION NO: 347Which of the following is an example of a valid MAC address for a workstation?A. 05:14:K9:07:B2:M4B. FFFF.FFFF.FFFFC. 00:08:38:05:B5:F4 D. 131.44.32.255 | | Definition |
|
Term QUESTION NO: 348Which of the following would be used before a technician crimps a connector to a UTP/STP cable?A. MultimeterB. Punch down toolC. Cable tester D. Cable stripper | | Definition |
|
Term QUESTION NO: 349A network technician is connecting through the console port to configure a switch. Which of thefollowing ports would be used to transfer configuration files from the switch?A. TCP 110B. UDP 67C. UDP 69 D. TCP 69 | | Definition |
|
Term QUESTION NO: 350Which of the following tools would be used to establish a connection on a wall jack to connect tothe desktop?A. MultimeterB. SnipsC. Punch down tool D. Cable stripper | | Definition |
|
Term QUESTION NO: 351A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA)will assign which of the following addresses?A. 172.16.1.25B. 192.168.1.25C. 169.254.1.25 D. 10.16.1.25 | | Definition Answer: CExplanation:In the scenario you should remember that APIPA is used to assign IP addresses to a workstation in the event that there is no DHCP server available and your lease has expired | |
|
Term QUESTION NO: 352A company guest is requesting to use their personal laptop on the company wireless network.DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptopcannot connect to the network because:A. this laptop is enabled for both 802.11b and 802.11g.B. DNS server is not working properly.C. the network is out of wireless connections. D. MAC filtering is enabled on the WAP | | Definition |
|
Term QUESTION NO: 353221.17.101.223/28 is an example of which kind of notation?A. CIDRB. DNSC. Port Number D. ARP | | Definition |
|
Term QUESTION NO: 354Which of the following is the BEST reason to implement QoS when realtimeapplications are inuse in the network?A. Increase network reliability.B. Prioritize delay sensitive traffic.C. Increase network bandwidth of delay sensitive traffic. D. Prioritize bulk traffic. | | Definition |
|
Term QUESTION NO: 355Which of the following would be an appropriate use of an EGP?A. Unequal cost load balancing over a switched network.B. Advertising a /24 to an upstream provider.C. Periodic updates to neighbors on the LAN. D. Routing between VLANs on an Ethernet network | | Definition |
|
Term QUESTION NO: 356Which of the following cables has a solid Kevlar center to restrict it from making a 90 degreebend?A. CAT6B. CAT5C. CAT5e D. CAT3 | | Definition |
|
Term QUESTION NO: 357A network technician is installing a series of three access points to cover the entire wing of abuilding. Each access point has a wired connection and 802.11g is being used for the wirelesstransmission. Which of the following channels should be used for the access points?A. Channels 7111B. Channels 1611C. Channels 135 D. Channels 246 | | Definition |
|
Term QUESTION NO: 358A technician is working on a new employees workstation in the accounting department? theworkstation needs access to the accounting server. Currently the technician notices that theemployee can only access the Internet. Which of the following would the technician need to verify?A. Correct VPN settingB. Correct VLAN settingC. Correct DNS setting D. Correct WINS setting | | Definition |
|
Term QUESTION NO: 359Which of the following devices can be remotely looped for troubleshooting purposes?A. A 66 blockB. A 110 blockC. A smart jack D. A patch panel | | Definition Answer: CExplanation:The smart jack can be remotely looped, which can be used for troubleshooting. The 66 and 110 block is a punch-down tool that connects wires from the telephone systems | |
|
Term QUESTION NO: 360Which of the following is part of the TCP/IP protocol suite?A. UDPB. IPXC. NetBEUI D. SPX | | Definition |
|
Term QUESTION NO: 361The function of a tone generator is to generate a tone to test:A. continuity.B. signal strength.C. impedance. D. signal feedback. | | Definition |
|
Term QUESTION NO: 362A technician is not able to ping a server by the FQDN but can by the IP. Which of the followingshould the technician check?A. Ensure that WINS is configuredB. Ensure that the DNS is configuredC. Ensure the MAC address is correct D. Ensure that the IP address is correct | | Definition |
|
Term QUESTION NO: 363Which of the following cable types allows for the maximum cable run distance?A. CoaxialB. MultimodefiberC. Singlemodefiber D. CAT3 | | Definition |
|
Term QUESTION NO: 364Which of the following is a function of a NIC?A. It filters frame packetsB. It captures keystrokesC. It sends data to NonVolatileRAM D. It transceives digital data | | Definition |
|
Term QUESTION NO: 365A network technician discovers that the phone company has installed the smart jack in the wronglocation. It needs to be moved 75 feet (23 meters) to the computer room. Which of the followingshould be requested?A. A replacement smart jackB. A 66 block extensionC. A demarc extension D. A 110 block extension | | Definition Answer: CExplanation: The demarc extension is actually the wire that goes from your system to the telephone company | |
|
Term QUESTION NO: 366Remote users are having problems accessing files from a file server. Which of the following shoulda technician check FIRST?A. User accountsB. Access rightsC. Network resources D. Connectivity | | Definition |
|
Term QUESTION NO: 367A technician can successfully remote into the company's server? however, the technician cannotconnect to any of the other servers directories from the server itself, but can ping them via an IPaddress.Which of the following could be the problem?A. The server is on a different physical network.B. DNS is not correctly configured.C. The server is on a different VLAN. D. DHCP is not correctly configured. | | Definition |
|
Term QUESTION NO: 368Which of the following characteristics BEST describe SMF? (Select TWO).A. Can be used for distances exceeding 2 kilometers (1.24 miles).B. Can be used for distances up to 2 kilometers (1.24 miles).C. Uses laser light for transmission.D. Uses LED light for transmission. E. Costs less than MMF | | Definition |
|
Term QUESTION NO: 369A user is unable to connect to the network. A network technician is able to determine that there isa problem on the switch. All other users on that switch are able to connect successfully to thenetwork.Which of the following is a probable cause?A. Switching loop is occurring on the switch.B. Incorrect SNMP settings on the switch.C. Wrong subnet mask on the switch. D. Port is misconfigured on the switch | | Definition |
|
Term QUESTION NO: 370Which of the following would be used to connect a vertical cross connect when using dataconnections?A. 110 blocksB. Demarc extensionC. Patch panel D. 66 blocks | | Definition |
|
Term QUESTION NO: 371Which of the following tools would be used to test the break in a fiber connection on the network?A. Butt setB. MultimeterC. Toner probe D. OTDR | | Definition |
|
Term QUESTION NO: 372Which of the following network devices would be responsible for translating canonical names intoIP addresses?A. A routerB. A DHCP serverC. A DNS server D. A firewall | | Definition |
|
Term QUESTION NO: 373When all routers in a network agree about the path from one point to another, the network is saidto be which of the following?A. StaticB. ConvergedC. Secure D. Dynamic | | Definition |
|
Term QUESTION NO: 374Which of the following would be used to relocate a T1 closer to the switch for connectivity?A. Patch panelB. 25 pair cableC. Demarc extension D. Smart jack | | Definition Answer: DExplanation:The smart jack is used to terminate a PRI/T1 at the office. The demarc extension is actually the wire that goes from your system to the telephone company | |
|
Term QUESTION NO: 375An organization with 2,500 users has exhausted their Internet bandwidth. After some investigation,the network administrator discovers that 95%of the traffic is coming from web browsing. Which ofthe following network devices could be added to BEST reduce the amount of Internet bandwidththe company is using?A. Content switchB. Load balancerC. Proxy server D. An additional DNS server | | Definition |
|
Term QUESTION NO: 376Which of the following subnet masks will produce the smallest subnet size for a pointtopointnetwork link?A. 255.255.255.248B. 255.255.255.128C. 255.255.255.252 D. 255.255.255.0 | | Definition |
|
Term QUESTION NO: 377Which of the following documentation would a network administrator refer to discover a rogueWAP?A. Wiring schematicsB. PoliciesC. Baseline D. Regulations | | Definition |
|
Term QUESTION NO: 378Which of the following Will allow an administrator to restrict communication between networkdevices?A. DHCPB. NATC. CIDR D. ACL | | Definition |
|
Term QUESTION NO: 379For an enterprise to use one of the reserved private IP address ranges, as best practice theyshould coordinate with:A. their IT department.B. IANA.C. IEEE. D. their legal department | | Definition |
|
Term QUESTION NO: 380Which of the following is the maximum transmission distance of 10GBaseLR?A. 6 miles (9.7 kilometers)B. 25 miles (40 kilometers)C. 512 miles (824 kilometers) D. 1,024 miles (1648 kilometers) | | Definition Answer: AExplanation: The maximum range of 10GBase-LR is 10 000 meters | |
|
Term QUESTION NO: 381A company has many traveling sales employees that need secure access to corporate resourcesfrom nontrusteddevices (e.g. computers at client sites and/or public computers). Which VPNsolution is MOST appropriate for this company?A. SSLB. PPTPC. IPSec D. L2TP | | Definition |
|
Term QUESTION NO: 382Which of the following commands would provide the following output?DNS request timed out. timeout was 2 seconds.*** Cant find server name for address 172.30.0.5: Timed out*** Default servers are not availableServer: UnKnownAddress: 172.30.0.5DNS request timed out. timeout was 2 seconds.*** Request to UnKnown timedoutA. winipcfgB. nslookupC. ipconfig D. netstat | | Definition |
|
Term QUESTION NO: 383A technician is troubleshooting a switch and has identified the symptoms. Which of the followingsteps should the technician take NEXT?A. Escalate the issue.B. Determine the scope of the problem.C. Implement and test the solution on the switch. D. Create an action plan for reconfiguring the switch | | Definition |
|
Term QUESTION NO: 384Which of the following transfers data at a maximum rate of 44.7Mbps?A. T3B. T2C. T5 D. T1 | | Definition |
|
Term QUESTION NO: 385A technician is asked toreterminatea wall jack that has become loose. Upon looking at the wiring,the technician notices that it was originally wired as 568A. The company implemented a policystating that all cable terminations should adhere to the 568B standard. With this in mind thetechnician should:A. reterminateboth ends of the cable to the 568B standard.B. run a new cable andterminate both ends to the 568B standard.C. reterminatethe nonlooseend of the cable to the 568B standard.D. reterminate the loose end of the cable to the 568B standard | | Definition Answer: AExplanation:568B describes the pin out configuration for a straight-through cable while 568A describes the pin out configuration for a crossover cable | |
|
Term QUESTION NO: 386When using the ping utility, which switch pings a network device until stopped?A. pingtB. pings3C. pingaD. pingr 3 | | Definition |
|
Term QUESTION NO: 387Which of the following cables would a technician make in order to identify a physical interfaceproblem?A. SerialB. RolloverC. Console D. Loopback | | Definition |
|
Term QUESTION NO: 388A client is able to ping its default gateway, but is unable to communicate with a remote host.Which of the following utilities would the technician use to determine where the fault is?A. arpB. pingtC. traceroute D. nbstat | | Definition |
|
Term QUESTION NO: 389Which of the following is an example of secure tunneling?A. PPPoEB. SSL VPNC. PPP D. PAP | | Definition |
|
Term QUESTION NO: 390Which of the following cable types is used in a 100BaseFXnetwork?A. UTPB. CoaxialC. STP D. Fiber | | Definition Answer: DExplanation: The 100Base-FX network makes use of Multimode fiber | |
|
Term QUESTION NO: 391A technician receives a call on monday morning that several computers will not connect to thenetwork.The technician determines that the computers left on over the weekend are functional and thosethat were turned off over the weekend are not functioning. Which of the following is the MOSTlikely source of the problem?A. WINS needs to be restarted.B. DNS is not functioning.C. LDAP is not functioning. D. DHCP is not functioning. | | Definition |
|
Term QUESTION NO: 392To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25 which of thefollowing devices will be required?A. A routerB. A layer 2 switchC. A hub D. A DNS server | | Definition Answer: AExplanation:Your best option in this scenario would be to identify a router. A Router is a network device that can interconnect two or more network segments | |
|
Term QUESTION NO: 393Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?A. FDDIB. CSMA/CDC. Token ring D. CSMA/CA | | Definition |
|
Term QUESTION NO: 394Which of the following protocols uses port 22 by default?A. FTPB. DNSC. Telnet D. SSH | | Definition |
|
Term QUESTION NO: 395Which of the following protocols permits secure polling of network devices?A. SNMPv2B. SCPC. SNMPv3 D. SSH | | Definition |
|
Term QUESTION NO: 396Which of the following commands is used to provide the output below in a Windows environment?1 * * * Request timed out.2 * * * Request timed out.3 * * * Request timed out.A. nbtstatB. netstatC. tracert D. ping | | Definition |
|
Term QUESTION NO: 397Which of the following traffic types would a network layer firewall be unable to filter?A. SMTP trafficB. HTTP trafficC. ICMP messages D. Email sender verification | | Definition |
|
Term QUESTION NO: 398Which of the following protocols would a multilayer switch use to learn the IP address of a directlyconnected device?A. ARPB. BOOTPC. DNS D. DHCP | | Definition |
|
Term QUESTION NO: 399Two servers and five workstations are connected using a 100BASETnetwork. Which of thefollowing physical topologies is used?A. FDDIB. BusC. Ring D. Star | | Definition |
|
Term QUESTION NO: 400A company's network is wired in a bus topology and one of the computers is unable to access thenetwork. Which of the following is the FIRST step in the troubleshooting process?A. Reinstall the NIC driver.B. Replace the cable.C. Check the cable connections. D. Replace the NIC. | | Definition |
|
Term QUESTION NO: 401Which of the following network segments is located outside the firewall?A. SPAPB. VPNC. DMZ D. PPTP | | Definition |
|
Term QUESTION NO: 402To support roaming across a wireless 802.11g network, each access point should be configured touse which of the following?A. The same channelB. The same frequencyC. The same SSID D. CSMA/CD | | Definition |
|
Term QUESTION NO: 403Which of the following would a technician use a punch down tool on?A. RJ45connectorB. ST connectorC. 110 block D. Smart jack | | Definition Answer: CExplanation:Your best option in this scenario would be to make use of a 100 block. A 100 block is known as a punchdown block due to its method of installation | |
|
Term QUESTION NO: 404Two small companies sharing a switch would MOST likely benefit from which of the followingadvanced switch features?A. Spanning treeB. TrunkingC. PoE D. VLAN | | Definition |
|
Term QUESTION NO: 405Which of the following is the maximum speed available from a full T1 line?A. 1.544MbpsB. 5.23MbpsC. 765Kpbs D. 10.73Mbps | | Definition Answer: AExplanation: The maximum speed of a T1 line is 1.544Mbps | |
|
Term QUESTION NO: 406A technician is connecting two buildings located approximately 1969 feet (600 meters) apart onthe same campus. Primary objectives are to create a secure link that that is capable oftransmitting at 1Gbps. Which of the following would be the BEST way to connect these twobuildings?A. Fiber optic cableB. Pointtopointwireless linkC. CAT6 cableD. RG58 cable | | Definition Answer: AExplanation:The best option will be Fiber optic cabling. With Gigabit Ethernet applications, it will run up to1Gbps. The CAT6 cabling can reach speeds up to 10 gigabits per second; however it is limited up to 100 meters | |
|
Term QUESTION NO: 407An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which ofthe following Ethernet media types should be used to avoid interference?A. 10Base5B. 100BaseTC. 10Base2 D. 100BaseFX | | Definition |
|
Term QUESTION NO: 408Which of the following software types would BEST be used for identifying an attack?A. IDSB. IPSC. Packet sniffer D. Port scanner | | Definition Answer: AExplanation:You make use of IDS to protect and report network abnormalities. IDS works with audit files andrule based processing in order to determine how to act in the event of an unusual situation on the network. | |
|
Term QUESTION NO: 409A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets toserver B. Which of the following packets should be sent from server B in response?A. SYNNAKB. SYNACKC. ACK D. NAK | | Definition |
|
Term QUESTION NO: 410Which of the following Ethernet technologies has the shortest transmission distance?A. 10BaseTB. 10GBaseTC. 100BaseT D. 10GBaseSR | | Definition Answer: BExplanation:The 10Base-2 media type has a transmission distance of 185 meters. The 10Base T media typehas a transmission distance of 100 meters. The 10GBase-SR has a transmission distance of 300 meters. | |
|
Term QUESTION NO: 411A network technician is implementing new wireless access points in an existing wirelessinfrastructure. The security is the WPA 2 standard. Which of the following encryption methods maynot be compatible with the previously installed access points?A. TKIPB. 3DESC. AES D. CHAP | | Definition |
|
Term QUESTION NO: 412In a Class C subnet, a network ID may occupy a maximum of:A. 24bits.B. 16bits.C. 31bits. D. 32bits. | | Definition |
|
Term QUESTION NO: 413A 100 pair cable is typically used to connect:A. telephony distribution.B. computer labs with more than 20 computers.C. security cameras. D. businesses with more than 75 computers | | Definition Answer: AExplanation: A 110 block which is used for telephony distribution supports 100 pair cable | |
|
Term QUESTION NO: 414Which of the following utilities will produce the results printed below?TCP Certs03:1072 172.31.0.78:3389 EstablishedA. netstatB. arpC. ping D. tracert | | Definition |
|
Term QUESTION NO: 415A technician is asked to place wireless Internet access in an open warehouse environment. Afterinstalling the equipment the technician notices varying signal strengths at different locations.Which of the following should the technician consider to increase the consistency of the signalstrength?A. Enable traffic shaping.B. Change the antenna placement.C. Change the encryption method. D. Broadcast the SSID. | | Definition Answer: BExplanation:Traffic shaping delays the excess packets by holding them in buffers and releasing it at preconfigured rates | |
|
Term QUESTION NO: 416Which of the following actions should the administrator do FIRST to help access a gigabitconnection?A. Change the CAT5 cable to a CAT3 cable.B. Change the CAT3 cable to RG58cableC. Change the CAT5 cable to a CAT6 cable. D. Change the CAT5 cable to a CAT5 Crossover cable | | Definition |
|
Term QUESTION NO: 417Which of the following is the point when local exchange carrier responsibility ends?A. DemarcB. Point of Presence (POP)C. Smart jack D. MDF | | Definition |
|
Term QUESTION NO: 418A company would like to configure newsfeeds on the network for employees to be aware ofinternal company information. Which of the following ports would be used to allow newsfeeds topassthrough?A. 25B. 22C. 119 D. 143 | | Definition |
|
Term QUESTION NO: 419A technician needs to change locations of a telephone between 66 blocks. Which of the followingtools would be used in locating the positions in the cross connections?A. Butt setB. Cable testerC. Toner probe D. Voltage meter | | Definition |
|
Term QUESTION NO: 420Which of the following commands would allow the technician to identify the currently assignedDNS server?A. nbtstatB. netstatC. dig D. nslookup | | Definition Answer: DExplanation:Your best option would be to make use of the nslookup command. nslookup displays information about a particular domain name, the name servers that serve it, and how they are configured | |
|
Term QUESTION NO: 421Two ports on switch A are connected to switch B. The advanced switch feature that allows theseports to be combined and managed as a single entity is called:A. port mirroring.B. trunking.C. VLAN. D. spanning tree. | | Definition Answer: BExplanation: This is a method to support multiple VLAN's that have members on more than one switch | |
|
Term QUESTION NO: 422Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?A. 802.11gB. 802.11aC. 802.11b D. 802.11 | | Definition |
|
Term QUESTION NO: 423Which of the following is the recommended maximum distance CAT6 cable should be run?A. 246 feet (75 meters)B. 100 feet (30.5 meters)C. 328 feet (100 meters) D. 292 feet (89 meters) | | Definition Answer: CExplanation: The CAT6 cables should not exceed the 100 meter length or 328 feet | |
|
Term QUESTION NO: 424A user calls saying they are having issues connecting to the Internet, but they are able to connectto the email server. Which of the following commands would the user type in at the commandprompt to display the MAC address?A. ipconfigB. arpsC. arpa D. nbtstat R | | Definition |
|
Term QUESTION NO: 425Which of the following is a utility that translates the physical network address to its IP address?A. nslookupB. pingC. rarp D. netstat | | Definition |
|
Term QUESTION NO: 426Which of the following cable standards has the highest effective range at a greater expense?A. 1000BaseTB. 1000BaseLXC. 1000BaseCX D. 1000BaseSX | | Definition |
|
Term QUESTION NO: 427Which of the following technologies is BEST suited for a pointtopointcircuit that is 6 kilometers(3.7 miles) in distance?A. 10GBaseTB. 10GBaseERC. 10GBaseSR D. 10GBaseLR | | Definition Answer: DExplanation:It is best to use 10GBase-LR media type. The maximum range of 10GBaseLR is 10 000 meters | |
|
Term QUESTION NO: 428Which of the following frequency ranges does 802.11a operate at?A. 4.9GHzB. 5GHzC. 54GHz D. 2.4GHz | | Definition |
|
Term QUESTION NO: 429Which of the following protocols provides the actual encryption used over VPN?A. PPPB. HTTPSC. PPTP D. SSH | | Definition |
|
Term QUESTION NO: 430Which of the following features of a switch will allow two switches to pass network information?A. Disabling the routing protocolsB. Port speedsC. Trunking D. PoE | | Definition Answer: CExplanation:Your best option to identify in this scenario is trucking. This is a method to support multiple VLAN's that have members on more than one switch. | |
|
Term QUESTION NO: 431Which of the following tools can send a signal down a cable and measure how long it takes tocomeback?A. MultimeterB. Voltage event recorderC. TDR D. Toner probe | | Definition |
|
Term QUESTION NO: 432A technician needs to connect a laptop via the small office, home office (SOHO)wireless accesspoint.When the technician does a site survey using the laptop the wireless network is not discovered.Computers previously on the wireless network were connected, and the wireless card appears tobe working. Which of the following could be causing the issue?A. The SSID is set to not broadcast.B. The wireless router does not have adequate AC power.C. The WEP key is not correct. D. The laptop is running on Windows Service Pack 1. | | Definition |
|
Term QUESTION NO: 433A technician has determined that a single computer has suddenly lost network connectivity. Whichof the following should be the next troubleshooting step the technician should take?A. Determine if escalation is necessary.B. Determine if anything has changed.C. Identify the affected areas of the network. D. Establish the most probable cause. | | Definition Answer: BExplanation:As soon as you have determines that a single computer has lost network connectivity you need todetermine whether anything was changed. In the network and troubleshooting model this will be your third step. | |
|
Term QUESTION NO: 434A company has installed a new 802.11g pointtopointconnection between two buildings and isexperiencing low throughput across the link. The current setup involves a wireless bridge on theroof with an omnidirectionalantenna. Which of the following would BEST improve the link performance?A. Replace the omnidirectionalantennas with Yagi antennas.B. Configure channel hopping on both wireless bridges.C. Replace the wireless bridges with wireless access points.D. Install bidirectional amplifiers at both sites | | Definition Answer: AExplanation:In the scenario you should remember that Wireless antennas act as both transmitters andreceivers. You should additionally note that there are two broad classes of antennas on the market, omni directional (Omni, or point-to-multipoint) and directional (Yagi or point-topoint | |
|
Term QUESTION NO: 435A users workstation is able to resolve IP addresses of any host, and can ping other workstationson the local subnet, but is unable to ping addresses on other subnets. Which of the following is theMOST likely cause of the problem?A. The workstation is configured with an incorrect subnet mask.B. The workstation is configured with the incorrect default gateway.C. The workstations NICis configured for a different port speed than the switch. D. The workstation is assigned to the incorrect VLAN. | | Definition |
|
Term QUESTION NO: 436The 66 block termination point is:A. CAT3 compliant.B. coaxial compliant.C. CAT6 compliant. D. IEEE 1394 compliant. | | Definition |
|
Term QUESTION NO: 437A network using RIP has taken several minutes to begin routing traffic around a failed piece ofequipment. Which of the following could be implemented to improve convergence time?A. Replace RIP with adistancevectorrouting protocol such as RIP version 2.B. Replace RIP with an exterior gateway protocol such as BGP.C. Replace RIP with static routes so dynamic updates are not sent.D. Replace RIP with alinkstate routing protocol such as OSPF. | | Definition |
|
Term QUESTION NO: 438Which of the following devices is used to connect a WAN to a LAN?A. Basic routerB. RepeaterC. Bridge D. Basic switch | | Definition Answer: AExplanation:When connecting a WAN to a LAN your best choice would be to make use of a router. A Router is a network device that can interconnect two or more network segments | |
|
Term QUESTION NO: 439Routing convergence time is which of the following?A. Time required for an IDS to detect suspicious softwareB. Time required by switch ports to update their link status and transition to the forwarding stateC. Time required for a VPN connection to occur D. Time required by protocols to update their forwarding tables after changes have occurred | | Definition |
|
Term QUESTION NO: 440A new business with five computers moves into an office where coaxial cable exists. In order touse the existing infrastructure, which of the following topologies would be used?A. Spanning TreeB. StarC. Mesh D. Bus | | Definition |
|
Term QUESTION NO: 441A company is in the process of upgrading their network infrastructure to support new VoIPtelephony equipment. Which of the following is a primary feature to consider when selecting a newswitch to support the phones?A. Port mirroringB. PoEC. VPN capability D. Modular chassis | | Definition |
|
Term QUESTION NO: 442Which of the following protocols are used to transfer files between two systems?(Select TWO).A. RIPB. SCPC. FTPD. NTP E. SNMP | | Definition |
|
Term QUESTION NO: 443Which of the following network devices would a network administrator use to create a DMZ?A. HostbasedfirewallB. File serverC. Networkbasedfirewall D. WINS server | | Definition |
|
Term QUESTION NO: 444Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).A. SnipsB. Cable crimperC. TDRD. Multimeter E. OTDR | | Definition Answer: A,BExplanation:A multimeter is a device that is used to measure voltages and resistances in electronic components. It is not used to terminate DSL lines | |
|
Term QUESTION NO: 445A technician received a call from a remote user who is having issues connecting to a new VPN.Whichof the following is the FIRST step the technician should take?A. Document the solution and processB. Identify the symptoms and potential causesC. Establish what haschanged D. Implement an action plan | | Definition Answer: BExplanation:In this scenario the technician needs to identify the symptoms as well as the potential cause. Thefirst step you need to do in troubleshooting is to determine what symptoms are being displayed. In this scenario the remote users are unable to connect to the new VPN | |
|
Term QUESTION NO: 446A technician installed a new wireless router. The customer is now having a problem playing onlinegames, but they can connect to websites. Which of the following should the technician configure toresolve this problem?A. Port forwardingB. SSIDC. MAC filtering D. Antenna placement | | Definition |
|
Term QUESTION NO: 447Which of the following is an advantage of 100BaseTover 100BaseFX?A. Uses a more flexible cableB. Faster transmission speedsC. Longer cable runs D. Can be used in a topology | | Definition Answer: AExplanation: 100baseFX has a range of 2000 meters. 100baseT only 100 meters | |
|
Term QUESTION NO: 448Which of the following cable types are the MOST widely used in a corporate gigabit networkscheme?A. CAT5B. CAT1C. CAT3 D. CAT6 | | Definition |
|
Term QUESTION NO: 449Which of the following LAN types would utilize CAT5 UTP?A. 100BaseTXB. 1000BaseTC. 100BaseFX D. 10GBaseSR | | Definition Answer: AExplanation: The 100Base-TX uses CAT5-UTP. It has a speed of 100 Mbps | |
|
Term QUESTION NO: 450A network administrator configured several network devices earlier today, but now the Internet isno longer available to several users. Which of the following logs should the network administratorreference to help identify the problem?A. Phone logsB. Event logsC. History logs D. Application logs | | Definition |
|
Term QUESTION NO: 451Which of the following devices would be used to connect different broadcast domains in order toallow them to communicate with each other?A. BridgeB. Layer 2 switchC. Hub D. Multilayer switch | | Definition |
|
Term QUESTION NO: 452Enabling MAC address filtering on a switch can be used to mitigate which of the following securitythreats?A. Rogue access pointsB. VirusesC. Social engineering D. Worms | | Definition |
|
Term QUESTION NO: 453Which of the following mechanisms is used to calculate backofftime on an Ethernet link after acollision?A. CSMA/CDB. CSMA/CAC. Spanning Tree D. Weighted Random Early Detect (WRED) | | Definition Answer: AExplanation: The technician would make use of CSMA/CD | |
|
Term QUESTION NO: 454Which of the following is an advantage of 100BaseFXover 100BaseTX?A. Faster transmission speedsB. Longer cable runsC. Uses a more durable cable D. Ease of installation | | Definition Answer: BExplanation:The 100BaseTXcan be used up to 100 meters per segment while the 100Base-FX can run for 2000 meters. | |
|
Term QUESTION NO: 455At which of the following layers of the OSI model would a repeater operate?A. Layer 7B. Layer 5C. Layer 3 D. Layer 1 | | Definition |
|
Term QUESTION NO: 456Which of the following documentations would a network technician find ports that a company hasblocked?A. Policies, procedures and configurationsB. Baseline reportsC. Network wiring schematics D. RFC | | Definition |
|
Term QUESTION NO: 457A technician is troubleshooting a printer problem in a SOHO environment. The printer is connectedto the network and the computers can print using TCP/IP directly. The computers were able toprint the day before, but now they cannot. Which of the following setups would aid in preventingthis problem?A. Set up the printer on a public IP address.B. Configure the printer to use an APIPA.C. Change the printer setting to use multicast. D. Place the printer on a static IP address | | Definition |
|
Term QUESTION NO: 458Which of the following systems detects and reports attempts of unauthorized access to thenetwork?A. HostbasedfirewallB. Basic firewallC. IDS D. IPS | | Definition |
|
Term QUESTION NO: 459.Which of the following software types would BEST be used at identifying and reacting to an attackby shutting down a port or dropping certain types of packets?A. Port scannerB. IPSC. Packet sniffer D. IDS | | Definition |
|
Term QUESTION NO: 460A user reports that the wireless network is slow and is able to see and access shared folders thatare unknown to the user. Which of the following is the cause of the problem?A. The wireless NIC is defective.B. Wireless router is improperly configured.C. The user is connecting to the wrong SSID. D. The SSID broadcast is disabled | | Definition |
|
Term QUESTION NO: 461Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?A. SONETB. E3C. T3 D. OC12 | | Definition Answer: CExplanation: The maximum transfer rate of T3 is 44.736Mbps | |
|
Term QUESTION NO: 462A new virus was just released and has infected several workstations. A technician receives anewly released patch. Which of the following troubleshooting steps should the technician takeFIRST?A. Implement an action planB. Document the solutionC. Apply the patch as quickly as possible D. Wait for the virus definitions to be updated | | Definition |
|
Term QUESTION NO: 463The network administrator needs to use an IP addressing method that will not require manualupdating. Which of the following should be used?A. StaticB. DynamicC. TCP D. Multiple | | Definition |
|
Term QUESTION NO: 464Which of the following logical topologies uses centralized authentication?A. PeertopeerB. Client/serverC. VPN D. VLAN | | Definition |
|
Term QUESTION NO: 465Which of the following command and switch combination would provide the following output?Interface: 172.30.0.102 0x2Internet Address Physical AddressType 172.30.0.500304882728cdynamicA. arpsB. netstat aC. arpa D. netstat s | | Definition |
|
Term QUESTION NO: 466A second network card in a server that activates if the primary card fails is an example of which ofthe following network performance optimization?A. Fault toleranceB. High availabilityC. QoS D. Load balancing | | Definition |
|
Term QUESTION NO: 467A user is reporting that their inquiries to the database server keep timing out. Which of thefollowing tools would be BEST suited to troubleshoot the issue?A. Cable testerB. Packet analyzerC. Tone probe D. Butt set | | Definition |
|
Term QUESTION NO: 468Which of the following connector types would a technician utilize with fiber lines by pushing itdirectly into the port without twisting?A. RJ45B. STC. SC D. BNC | | Definition Answer: CExplanation: The Fiber-optic cables use the SC connector | |
|
Term QUESTION NO: 469A client is using a device that allows them to synchronize their wireless device to their computer,but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?A. WiFiB. BluetoothC. Serial D. Infrared | | Definition |
|
Term QUESTION NO: 470A technician is building a new network. Which of the following components would be the FIRSTinstalled for the network?A. MDFB. VPNC. EMI D. IDF | | Definition |
|
Term QUESTION NO: 471After a technician came out and installed a new wireless router, one of the wired workstationsbegan having problems connecting to the file server. This is only an intermittent problem. Which ofthe following actions will the technician MOST likely perform to resolve this problem?A. Move the router's location.B. Check the cable ends.C. Check user permissions. D. Change the router's SSID. | | Definition |
|
Term QUESTION NO: 472A network device that is used to connect multiple devices without segmenting a network is a:A. router.B. bridge.C. hub. D. switch. | | Definition |
|
Term QUESTION NO: 473A mail server was recently placed in the network. The users report email is slow. Upon closerinspection a technician notices that error counters on the interface are incrementing. Which of thefollowing could be causing the problem?A. Wrong subnet maskB. Duplex mismatchC. Port speed mismatch D. Switch loop | | Definition |
|
Term QUESTION NO: 474A technician has just finished implementing a solution for a network issue. Which of the followingsteps in troubleshooting should the technician do NEXT?A. Document the issue and the solution that was implemented.B. Escalate the issue to another technician.C. Test if the solution works and identify other effects it may have. D. Gather information about the issue. | | Definition |
|
Term QUESTION NO: 475A technician notices that when trying to ping a workstation by network name the workstation doesnot reply back over the network. The workstation is part of the domain and is able to get to theInternet. Which of the following is the cause of the problem?A. Faulty cable on the workstationB. Wrong host name on the workstationC. Wrong WINS on the workstation D. Incorrect IP address assigned to the workstation | | Definition |
|
Term QUESTION NO: 476Which of the following network performance optimization methods slows or restricts traffic toincrease the performance of other types of traffic? (Select TWO).A. Load balancingB. Traffic shapingC. High availabilityD. Caching engines E. QoS | | Definition |
|
Term QUESTION NO: 477A user has plugged a computer into a switch port and now is unable to access any serverresources on the network.Which of the following are the MOST likely reasons for the accessproblem? (Select TWO).A. The spanning tree protocol has locked down the port.B. The computer is connected to a port in the wrong VLAN.C. The appropriate credentials have not been supplied for network access.D. A port mirroring session was started and is interfering with the connection. E. The computer is connected to an incorrect PoE port. | | Definition |
|
Term QUESTION NO: 478A company has just added a new conference room. The network administrator has decided to addsix new data ports to this room. The administrator has verified that all the cabling is terminated andfunctioning correctly. Which of the following should the administrator do next?A. Update the network baseline.B. Update the wiring diagrams.C. Move some data across each port. D. Check all of the cables with the OTDR. | | Definition Answer: BExplanation: Your best option in this scenario would be to update the wiring diagrams | |
|
Term QUESTION NO: 479A network technician wants to add fault tolerance to a file server. Which of the following should thetechnician do?A. Install the latest NIC driverB. Add an additional DNS server and modify the MX recordC. Upgrade the NIC to a one Gigabit card D. Add an additional NIC and setup network teaming | | Definition |
|
Term QUESTION NO: 480Which of the following VPN protocols runs over port 1723 and allows encryption to be done at thedata level?A. SLIPB. PPPoEC. PPTP D. RAS | | Definition |
|
Term QUESTION NO: 481Which of the following network devices would an administrator have to configure channels on?A. HubB. Unmanaged switchC. Firewall D. Wireless access point | | Definition |
|
Term QUESTION NO: 482A network technician is installing a series of three access points to cover the entire wing of abuilding. Only one access point has a wired connection. 802.11g is being used for the wirelesstransmission. Which of the following channels should be used for the access points?A. Channels 135B. Channels 666C. Channels 7111 D. Channels 555 | | Definition |
|
Term QUESTION NO: 483Which of the following outlines the purpose of using a proxy server in an enterprise environment?A. Allows the administrator to block malicious attacks on the networkB. Allows the user to access hard to find websitesC. Allows the client to get a fixed IP address when added to the network D. Allows granular control over the traffic between the local LAN and the Internet | | Definition |
|
Term QUESTION NO: 484An administrator is using a packet analyzer across a single switch but is only receiving partialpacket information. Which of the following would need to be implemented on the switch for theadministrator?A. Port authenticationB. Port mirroringC. Spanning tree D. VLAN
| | Definition |
|
Term QUESTION NO: 485Which of the following cable types is typically used to connect a hub to a hub that does not supportMDIX?A. StraightB. LoopbackC. Crossover D. Rollover | | Definition Answer: CExplanation: If you want to connect to a hub, you should make use of a crossover cable | |
|
Term QUESTION NO: 486Which of the following features from the switch eliminates a delay in acquiring an IP address?A. Update the SNMP strings.B. Change the duplex mode tohalfduplex.C. Enable spanning tree on the interface. D. Enable trunking. | | Definition |
|
Term QUESTION NO: 487Which of the following is the component in a wiring system designed to support legacy phonesystems?A. Fiber conduitB. 66 blockC. 110 block D. Patch panels | | Definition |
|
Term QUESTION NO: 488Which of the following protocols allows usernames and passwords to be transmitted as cleartext?A. PAPB. RADIUSC. CHAP D. SSH | | Definition |
|
Term QUESTION NO: 489Which of the following will allow certain ports to be part of the same group while other ports withinthat switch are part of a different group?A. TrunkingB. Port authenticationC. Enabling VLANs D. Enabling VTP | | Definition |
|
Term QUESTION NO: 490When preparing to place a RJ45connector on a CAT5 cable, which of the following tools wouldBEST be used to prepare the cable?A. Polishing kitB. PliersC. Razor knife D. Snips | | Definition |
|
Term QUESTION NO: 491Which of the following authentication protocols uses certificates to negotiate access to thenetwork?A. EAPTLSB. PAPC. CHAP D. Kerberos | | Definition |
|
Term QUESTION NO: 492Which of the following components allows a technician to use short Ethernet cables to connectcable drops to other devices?A. EDFB. MDFC. Demarc extension D. Patch panel | | Definition |
|
Term QUESTION NO: 493Which of the following is the strongest type of wireless encryption?A. AESB. RADIUSC. WEP D. TKIP | | Definition |
|
Term QUESTION NO: 494Which of the following wireless communication standards allows for communication at both2.4GHz and 5GHz frequencies?A. 802.11bB. 802.11aC. 802.11n D. 802.11g | | Definition |
|
Term QUESTION NO: 495Which of the following network security devices prevents users from propagating viruses?A. IPSB. FirewallC. IDS D. Content engine | | Definition |
|
Term QUESTION NO: 496A network administrator of a company has many branch locations each using a subnet mask of255.255.255.224. Which of the following dynamic routing protocols should be used?A. RIPv2B. IGRPC. ISIS D. BGP | | Definition |
|
Term QUESTION NO: 497Which of the following network devices operates on Layer 1 of the OSI model?A. BridgeB. SwitchC. Hub D. Router | | Definition |
|
Term QUESTION NO: 498After reconfiguringa server to facilitate DNS requests, which of the following would help providethe highest level of fault tolerance?A. Adding a Kerberos serverB. Configuring traffic shapingC. Configuring WEP D. Adding a second NIC | | Definition |
|
Term QUESTION NO: 499Which of the following devices controls traffic on a LAN?A. SwitchB. HubC. Repeater D. Bridge | | Definition |
|
Term QUESTION NO: 500Which of the following network media has the longest maximum segment length?A. CAT6B. Single Mode FiberC. Coaxial cable D. Multimode Fiber | | Definition Answer: BExplanation:Single Mode Fiber has the longest rang. It can be used for short distances and long distances. It isalso used between buildings, which can be the campus or industrial environments, and separated cities. | |
|
Term QUESTION NO: 501Which of the following are the IEEE designations for the spanning tree protocol? (Select TWO).A. 802.1xB. 802.1pC. 802.1dD. 802.1w E. 802.1n | | Definition |
|
Term QUESTION NO: 502A network technician is trying to find out the NETBIOS name of another workstation using its IPaddress, which of the following commands would be used to find this information?A. nbtstatB. netstatC. ipconfig D. ping | | Definition |
|
Term QUESTION NO: 503Which of the following cable standards is used for Ethernet over fiber?A. 1000BaseTB. 1000BaseCXC. 100BaseTX D. 10BaseFL | | Definition Answer: DExplanation:The 10Base-FL is used for Ethernet over fiber. It has a speed of 10 Mbps and it ranges from 500 meters to 2000 meters. | |
|
Term QUESTION NO: 504An employee is receiving an access denied error message when they try to access a networkresource. Which of the following troubleshooting steps should the technician perform FIRST?A. Identify what the employee cannot accessB. Implement an action plan to resolve the issueC. Document the process D. Ask the employee what has changed since yesterday | | Definition |
|
Term QUESTION NO: 505A technician is installing a basic router for a SOHO network. After installing the router the PCsconnected to it are not able to acquire an IP address. Which of the following did the technician failto configure correctly?A. NATB. DHCPC. WINS D. DNS | | Definition |
|
Term QUESTION NO: 506Internet connectivity for a company is mission critical. The technician must be notified if theInternet router has failed. Which of the following is the BEST method to monitor this device?A. SLIPB. SFTPC. SMTP D. SNMP | | Definition |
|
Term QUESTION NO: 507Which of the following Layer 2 devices is used to connect multiple nodes on a network?A. DHCP serverB. RouterC. Switch D. Bridge | | Definition |
|
Term QUESTION NO: 508A network technician is responsible for setting up four branch offices for a company. Each officewill have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnetmasks should be chosen?A. 255.255.255.224B. 255.255.255.248C. 255.255.255.16 D. 255.255.255.240 | | Definition |
|
Term QUESTION NO: 509Which of the following is a secure method for file transfer to a network device?A. SNMPv2B. TFTPC. SCP D. FTP | | Definition |
|
Term QUESTION NO: 510Which of the following would accelerate repeated access requests for static web content?A. A caching engineB. A traffic shaperC. A load balancer D. A redundant switch | | Definition |
|
Term QUESTION NO: 511Which of the following tools should be used to physically attach an RJ45connector to a CAT5cable?A. SnipsB. ScrewdriverC. Punch down tool D. Crimping tool | | Definition |
|
Term QUESTION NO: 512A wireless network is created for six computers. Five connect correctly? one machine sees thewireless network but will not connect. Which of the following should the technician do?A. Ensure the failed computer has the correct WEP key.B. Restart the wireless router.C. Remove the WEP key from the router. D. Change the WEP key on the router | | Definition |
|
Term QUESTION NO: 513Which of the following IEEE standards describes the power output of a standard switch port?A. 802.3abB. 802.3aeC. 802.3af D. 802.3aa | | Definition |
|
Term QUESTION NO: 514Which of the following can operate at both layers 2 and 3 of the OSI model?A. BridgeB. SwitchC. Repeater D. Hub | | Definition |
|
Term QUESTION NO: 515Which of the following authentication methods allows for domain level authentication on a wirelessnetwork?A. WAPB. TKIPC. RADIUS D. WEP | | Definition |
|
Term QUESTION NO: 516Which of the following routing protocol uses a state algorithm?A. BGPB. RIPC. OSPF D. RIPv2 | | Definition |
|
Term QUESTION NO: 517The data center power will not be restored for several hours. Which of the following can beimplemented in the future to allow the data center to keep running?A. Connect all the switches to a battery backup.B. Connect all the switches to a generator.C. Connect the data centers power to a generator. D. Connect the data centers power to a UPS | | Definition |
|
Term QUESTION NO: 518Which of the following WAN technology types would MOST likely be used in a SOHO environmentwith a few network devices?A. Frame relayB. Cable modemC. ATM D. E1/T1 | | Definition Answer: BExplanation:A SOHO will be used in a small office environment. For remote access, it will be used on ISDN, Frame relay and leased lines | |
|
Term QUESTION NO: 519Which of the following protocols is used for transmitting email?A. SCPB. SFTPC. SMTP D. SNMP | | Definition |
|
Term QUESTION NO: 520According to the OSI model, which of the following layers is responsible for providing reliablecommunication?A. Data LinkB. TransportC. Network D. Session | | Definition |
|
Term QUESTION NO: 521In a network constructed using star topology, all the devices are connecting to one central deviceknown as the:A. router.B. repeater.C. hub. D. gateway. | | Definition |
|
Term QUESTION NO: 522When would a technician use plenumratedcable?A. When installing cable in ceilingsB. If transmission speeds greater than 100Mbps are requiredC. When installing cable in damp environments D. Where EMI may be an issue | | Definition Answer: AExplanation: The plenum-rated cable is best used in walls and ceilings | |
|
Term QUESTION NO: 523Which of the following is part of the IP protocol suite and is used to monitor network manageddevices?A. LDAPB. SMTPC. SNMP D. SMB | | Definition |
|
Term QUESTION NO: 524A user reports that they cannot access any network resources. Which of the following tools woulda technician use to troubleshoot the problem?A. Cable testerB. TDRC. Certifier D. Butt set | | Definition |
|
Term QUESTION NO: 525Which of the following wireless technologies uses the 5GHz spectrum?A. 802.11nB. 801.11gC. 802.11b D. 802.11a | | Definition |
|
Term QUESTION NO: 526Users at a remote office connected to headquarters are using a dynamic routing protocol. Thereare several paths to headquarters in the event of a route failure. The network technician hasnoticed that when a failure occurs there is a time lag of several minutes until service is restored.Which of the following describes the time lag?A. ConvergenceB. Update algorithmC. Static routing D. Distancevector | | Definition |
|
Term QUESTION NO: 527A user can no longer access the network and all other users are having the same problem. Whichof the following should the network administrator do FIRST in order to begin troubleshooting?A. Use the routeadd command to see if static routes can be added.B. Use the ping command to verify connection to the DHCP server.C. Use thearp command to verify connections to the network. D. Use the rarp command to check network settings. | | Definition |
|
Term QUESTION NO: 528A client calls and reports that the office is unable to access the Internet. The error messagedisplays, When attempting to connect, an error on port 53 has occurred. Which of the following isMOST likely not working?A. HTTPSB. DNSC. HTTP D. FTP | | Definition |
|
Term QUESTION NO: 529A network administrator is informed that a users workstation is unable to connect to the Internetbut all other users can. After obtaining all the information about the users workstation, which of thefollowing should be the NEXT step the network administrator should attempt?A. Ping the users workstation to verify network connectivity.B. Go to theusers workstation and do an ipconfig.C. Perform a traceroute to thatusers workstation. D. Replace the NIC in theusers workstation. | | Definition |
|
Term QUESTION NO: 530Which of the following protocols operates at the transport layer of the OSI model and has BESTeffort delivery method?A. UDPB. HTTPC. TCP D. FTP | | Definition |
|
Term QUESTION NO: 531A technician needs to be able to hook three desktop computers to an existing network. There isonly one network connection available. Which of the following would the technician use toaccomplish this task?A. ModemB. SwitchC. Repeater D. Smart jack | | Definition |
|
Term QUESTION NO: 532Which of the following network services is responsible for mapping names to IP addresses?A. IMAP4B. DHCPC. DNS D. Telnet | | Definition |
|
Term QUESTION NO: 533Which of the following are forms of gigabit Ethernet that require the use of fiber optic cables?(Select THREE).A. 1000BaseTB. 1000BaseSXC. 1000BaseLXD. 10BaseTE. 1000BaseTX F. 1000BaseCX | | Definition |
|
Term QUESTION NO: 534An administrator has just installed a VoIP system and has noticed during peak times that calls aredropped. Which of the following would an administrator implement to alleviate the problem?A. QoSB. SSL VPNC. Load balancing D. Fault tolerance | | Definition |
|
Term QUESTION NO: 535A corporate network has grown and manual monitoring of the network devices are no longerfeasible. Which of the following would provide central logging for all devices with message prioritylevels?A. Install a new server with remote terminals open to monitor equipment.B. Install a syslog server and configure the network devices to send log messages to it.C. Install a SNMP polling server to monitor and collect logs on equipment. D. Install a protocol analyzer to monitor traffic logs. | | Definition |
|
Term QUESTION NO: 536An IDS is used for which of the following purpose?A. Controls inbound and outbound connections to prevent unauthorized access to the Internet.B. Controls inbound and outbound connections in a network device by command lines.C. Monitors inbound and outbound network connections in order to identify suspicious activity. D. Monitors inbound and outbound network connections in order to prevent suspicious activity. | | Definition Answer: CExplanation:You make use of IDS to protect and report network abnormalities. This system offers active monitoring as well as rule based responses to unusual activities on a network | |
|
Term QUESTION NO: 537Which of the following WAN technologies would a technician find dense wavelength divisionmultiplexing (DWDM)?A. T1B. SONETC. ADSL D. ISDN | | Definition |
|
Term QUESTION NO: 538Everyday around lunch time there is network latency on the Windows proxyserver 10.1.1.7. Whichof the following network utilities can a technician run in order to determine the severity of thelatency?A. arpt10.1.1.7B. pingt10.1.1.7C. nbtstat t10.1.1.7D. tracert t 10.1.1.7 | | Definition Answer: BExplanation:Your best option in this scenario would be to make use of the ping-t 100.12.20.3 command. Selecting the Ping-t command will continuously ping the host. | |
|
Term QUESTION NO: 539A new laptop has been purchased with an 802.11n wireless card. The laptop will not connect totheir existing 802.11a network. Which of the following is MOST likely the reason the laptop will notconnect?A. The laptop is too far from the existing networkB. InterferenceC. Wrong SSID is being used D. Standard mismatch | | Definition |
|
Term QUESTION NO: 540Which of the following network protocols is used to ensure consistent time across network deviceson the domain?A. FTPB. IGMPC. NTP D. RTP | | Definition |
|
Term QUESTION NO: 541An RJ11connector is capable of having up to how many pins?A. 8B. 2C. 4 D. 6 | | Definition Answer: DExplanation: The RJ-11 connector has four wires, or two pairs | |
|
Term QUESTION NO: 542If a network administrator is asked to inspect network traffic, which of the following should beused?A. NWLinkB. NbtstatC. Tracert D. Network monitor | | Definition |
|
Term QUESTION NO: 543Which of the following is a demarcation device for T1 circuits with the ability to run diagnosticswhen remotely activated?A. 66 blockB. Demarcation extensionC. Smart jack D. 110 block | | Definition |
|
Term QUESTION NO: 544A technician is setting up a wireless network using WEP and DHCP. The technician has set thechannel and SSID on the client workstation. Which of the following is the remaining step tocomplete the configuration?A. Enter the username and password.B. Change the SSID.C. Enter an IP address for the client. D. Enter the encryption key. | | Definition |
|
Term QUESTION NO: 545Which of the following masks the IP address of a device from outside the network?A. DHCPB. NATC. WINS D. DNS | | Definition |
|
Term QUESTION NO: 546A network administrator is troubleshooting a connectivity problem between a PC and a remotesite.An ICMP traceroute reveals that after several hops, addresses start repeating and TTLexceededmessages are returned. Which of the following problems is the cause?A. A switching loopB. An ARP problemC. A routing loop D. A DNS problem | | Definition |
|
Term QUESTION NO: 547Which of the following routing protocols is a link state and uses a backbone called area 0?A. ISISB. OSPFC. BGP D. EIGRP | | Definition |
|
Term QUESTION NO: 548A DHCP enabled computer on the network has been unplugged from the network for a week. Inthe mean time, several other computers were added to the network. When plugging the computerback into the network the computer is unable to reach network resources. Which of the following isthe MOST likely cause?A. The IP address lease has expired on the DHCP server.B. The DHCP scope needs to be redefined.C. The DHCP pool limit has been reached. D. The DHCP server needs to be restarted | | Definition |
|
Term QUESTION NO: 549Convert the following binary string to its dotted decimaladdress:11000000.10101000.01100011.00011010A. 192.168.99.26B. 192.168.101.26C. 192.168.99.34 D. 192.168.101.34 | | Definition |
|
Term QUESTION NO: 550A DHCP enabled computer on the network is changing IP addresses and the technician wants tohave the same IP address assigned for that computer. Which of the following would beimplemented?A. The technician needs to add the IP address to the host file.B. The technician needs to restart the DHCP services.C. The technician needs to add the computer to the reservation list. D. The technician needs to add the MAC address to the host file. | | Definition |
|
Term QUESTION NO: 551Which of the following is the difference between static and dynamic routing?A. Static routes are added automatically.B. Static routing is best used in large scalable networks.C. Dynamic routes are added automatically. D. Dynamic routing is used by a WINS server | | Definition |
|
Term QUESTION NO: 552Which of the following tools is used to show the active routes on a workstation?A. arp pingB. arpaC. netstat r D. nbstat | | Definition |
|
Term QUESTION NO: 553While reviewing a firewall policy, a network administrator notices a large block of addresses aredenied without comment. Given that the blocked address range is from 224.0.0.0 to239.255.255.255, which of the following group of addresses does this specify?A. Multicast addressesB. Unused private addressesC. RFC1918 private addressesD. Asiapacific addresses | | Definition |
|
Term QUESTION NO: 554Which of the following protocols are used in VoIP? (Select TWO).A. RDPB. RTPC. SSHD. SMTP E. SIP | | Definition |
|
Term QUESTION NO: 555Which of the following monitoring software is used to view network traffic at the frame level?A. ConnectivityB. Throughput testingC. Packet sniffer D. Load testing | | Definition |
|
Term QUESTION NO: 556Which of the following network component interfaces with a Telco T1 line at the demarcationpoint?A. ISDN adapterB. ModemC. NIC D. CSU / DSU | | Definition |
|
Term QUESTION NO: 557A trouble ticket has been generated, reporting a workstation has lost network connectivity. Whichof the following should be the FIRST course of action taken?A. Check gateway.B. Gather information.C. Escalate the issue. D. Check switches. | | Definition Answer: BExplanation: Your first step should be to determine the reason why the workstation lost network connectivity | |
|
Term QUESTION NO: 558A technician receives a request to move several established phones? the technician can performthis request at the termination block by moving the wire connection. Which of the following tools isrequired to reconnect wires to the termination block?A. Cable stripperB. Butt setC. Punch down tool D. Snips | | Definition |
|
Term QUESTION NO: 559Which of the following network topologies would BEST prevent downtime in a WAN environment?A. RingB. StarC. Bus D. Mesh | | Definition Answer: DExplanation:In a topology like this, you will have multiple connections between some locations. This is done for redundancy. This will also prevent downtime. | |
|
Term QUESTION NO: 560A computer is not able to connect to the network. The link light on the NIC is not illuminated.Which ofthe following should the technician do FIRST?A. Reinstall NIC drivers with the most current drivers.B. Verify network cable connectivity.C. Replace the NIC card with a known good NIC card. D. Check to make sure that the port on the switch is working properly | | Definition |
|
Term QUESTION NO: 561All the workstations at a company have a static IP address. A newly deployed workstation isunable to connect to the company intranet server using an Internet browser. The technician canping the intranet servers IP address. The MOST likely cause of this is an incorrect:A. VLAN.B. IP address on the new workstation.C. DNS server setting on the client. D. gateway setting on the client. | | Definition |
|
Term QUESTION NO: 562Which of the following devices would administer routing in a network?A. Multilayer switchB. Proxy serverC. DNS server D. Load balancer | | Definition |
|
Term QUESTION NO: 563During testing, technician notices that a user has been given the wrong IP address from the DHCPserver once they connect. Which of the following is the MOST likely problem?A. Incorrect subnet maskB. Incorrect duplexC. Incorrect trunk D. Incorrect VLAN | | Definition |
|
Term QUESTION NO: 564There are two networks sharing the same office space. One network already has an 802.11gaccess point. The second network acquires one as well. If known, which of the following wouldhelp keep the two networks from interfering with each other?A. Encryption typeB. PresharedkeyC. Channel D. WEP key | | Definition |
|
Term QUESTION NO: 565Which of the following type of WAN technologies uses cell switching?A. PSTNB. ATMC. T1 D. Frame relay | | Definition |
|
Term QUESTION NO: 566Which of the following equipment would allow for routing based on logical addresses?A. Layer 2 hubB. Layer 2 switchC. Layer 1 NIC D. Layer 3 switch | | Definition Answer: DExplanation:Your best option to identify in this scenario would be a layer 3 switch. A layer 3 switch filters and forwards data packets based on the network addresses of the sending and receiving machines. | |
|
Term QUESTION NO: 567Ensuring that data is transmitted securely over an IP network is the main purpose of:A. FTP.B. TLS.C. Telnet. D. SIP. | | Definition |
|
Term QUESTION NO: 568Which of the following ipconfig switches will display when the lease was obtained?A. /displaydnsB. /releaseC. /all D. /renew | | Definition |
|
Term QUESTION NO: 569Which of the following is a topology used in networks for its scalability?A. StarB. RingC. Bus D. Mesh | | Definition |
|
Term QUESTION NO: 570Which of the following log files listed below should be reviewed by the network administrator toinform you that there are performance and network issues within the LAN?A. The administrator should check the System logs.B. The administrator should check the Event logs.C. The administrator should check the Application logs. D. The administrator should check the security logs | | Definition |
|
Term QUESTION NO: 571Which of the following is a benefit of using dynamic routing as opposed to static routing?A. More secureB. Scales to large networksC. Improves network speed D. Less network overhead | | Definition |
|
Term QUESTION NO: 572Which of the following tools would be used to verify the wiring installation for the network?A. MultimeterB. Cable testerC. Voltage event recorder D. Protocol analyzer | | Definition |
|
Term QUESTION NO: 573A network administrator needs to ensure that users are authenticated before they are givenaccess to the network. Which of the following BEST meets these requirements?A. 802.1sB. 802.1dC. 802.1x D. 802.1w | | Definition Answer: CExplanation:You should inform the trainee that 802.1x should be used to ensure that users are authenticated before accessing the network. 802.1x will support multiple authentication schemes | |
|
Term QUESTION NO: 574Which of the following is the MOST secure wireless encryption?A. ESSIDB. WPAC. WPA2 D. WEP | | Definition |
|
Term QUESTION NO: 575A network technician is installing a small wireless network. A requirement is that individual usersmust authenticate using usernames and passwords. Which of the following technologies wouldsupport users authenticating with encrypted usernames and passwords?A. WPA TLSB. 64bitWEPC. 128bitWEP D. WPA PEAP | | Definition |
|
Term QUESTION NO: 576A 66 block is typically connected to the telecommunication company through which of the followingtypes of cable?A. Fiber opticB. CAT6C. 25 pair D. 100 pair | | Definition |
|
Term QUESTION NO: 577A network administrator wants to ensure that connections between two servers are split accordingto usage. Which of the following devices can be used to BEST accomplish this?A. Content switchB. Load balancerC. Proxy server D. Bandwidth shaper | | Definition |
|
Term QUESTION NO: 578Which of the following protocols should be used to securely copy a file? (Select TWO).A. SFTPB. SCPC. TFTPD. FTP E. SNMP | | Definition |
|
Term QUESTION NO: 579Which of the following will have problems functioning if a firewall has been set up to block all UDPtraffic?A. A server database applicationB. A VoIP deviceC. The Internet D. A network printer | | Definition |
|
Term QUESTION NO: 580A technician is dispatched to a house where the user reports intermittent problems with theirwireless network. Which of the following is the MOST likely cause of dropoffs?A. Cellular phonesB. Poor cable connectionC. Cordless phones D. Lighting | | Definition |
|
Term QUESTION NO: 581Which of the following is resistant to crosstalk?A. 100BaseFXB. 10GBaseCXC. STP D. 1000BaseT | | Definition |
|
Term QUESTION NO: 582The difference between 10BaseTand 100BaseTis:A. 100BaseTframes hold more data.B. shorter timing between Ethernet frames.C. 100BaseTrequires STP cabling. D. smaller headers on Ethernet frames. | | Definition |
|
Term QUESTION NO: 583Which of the following tools could an administrator use to determine if a machine was using thecorrect DNS server? (Select TWO).A. ipconfigB. nbtstatC. netstatD. ifconfig E. tracert | | Definition |
|
Term QUESTION NO: 584Which of the following would occur at the application layer of the OSI model?A. UDPB. FTPC. TCP D. SPX | | Definition |
|
Term QUESTION NO: 585Given the following routing table entries, which of the following will the nexthopaddress be for apacket destined for the address 192.168.1.203?Network Address Subnet Mask Next Hop Address0.0.0.0 0.0.0.0 77.0.5.5192.168.0.0 255.255.0.0 66.40.90.121192.168.1.0 255.255.255.0 72.40.91.1192.168.1.0 255.255.255.127 40.40.0.254A. 40.40.0.254B. 66.40.90.121C. 77.0.5.5 D. 72.40.91.1 | | Definition |
|
Term QUESTION NO: 586SMTP resides at which of the following layers of the OSI model?A. TransportB. ApplicationC. Network D. Presentation | | Definition |
|
Term QUESTION NO: 588Which of the following is the maximum cable length in a 1000BaseTnetwork?A. 1,024 meters (3360 feet)B. 1000 meters (3280 feet)C. 128 meters (420 feet) D. 100 meters (328 feet) | | Definition Answer: DExplanation: The maximum cable length in a 1000Base-T network is 100 meters | |
|
Term QUESTION NO: 589After a power outage several switches lose their current configurations, but the core router is stillworking properly. The switches affected are not able to connect to the network. After furtherinvestigation the network administrator is able to identify the affected areas, establish the cause,and escalated the problem. Which of the following would be the NEXT step that the networkadministrator should do?A. Immediately implement a solution.B. Meet with the emergency response team to determine the next step.C. Create an action plan and solution. D. Copy the core routers current configuration to all the affected switches | | Definition |
|
Term QUESTION NO: 590100BaseTFuses which of the following types of cabled medium?A. Ethernet implementation over ThinNetB. Ethernet implementation over coaxialC. Ethernet implementation over ThickNet D. Ethernet implementation over fiber | | Definition Answer: DExplanation: The F in 100Base-FX is a short for fiber | |
|
Term QUESTION NO: 591Which of the following protocols are used for email traffic? (Select THREE).A. SNMPB. NTPC. POP3D. TFTPE. IMAP4F. SSH G. SMTP | | Definition |
|
Term QUESTION NO: 592Which of the following is required to pass traffic from one VLAN to another?A. A layer three switchB. A layer two switchC. A server with NICs on both VLANs D. A layer one switch | | Definition |
|
Term QUESTION NO: 593A user is having connectivity issues at multiple locations when using the RJ45port on the laptop.A technician wants to know if the CAT5e cable is the source of the problem. Which of the followingshould the technician use to troubleshoot the issue?A. Toner probeB. Cable stripperC. Protocol analyzer D. Cable tester | | Definition |
|
Term QUESTION NO: 594Which of the following address ranges should a network administrator deny in the ACL to preventmulticast packets from crossing the WAN interface?A. 224.0.0.0239.255.255.255B. 127.0.0.0127.255.255.255C. 192.168.0.0192.168.255.255 D. 10.0.0.010.255.255.255 | | Definition |
|
Term QUESTION NO: 595After installing a new switch and connecting redundant uplinks to other switches, a LANexperiences a broadcast storm causing severe throughput problems. Which of the following is theMOST likely cause of the broadcast storm?A. VLAN assignments on the new switch conflicted with existing VLAN assignments elsewhere onthe network.B. Spanningtreeprotocol was not operational on the LAN.C. Incorrect trunk encapsulation was applied. D. Port aggregation was incorrectly configured. | | Definition |
|
Term QUESTION NO: 596Which of the following routing protocols has a limitation of 15 hops?A. OSPFB. RIPC. IGRP D. BGP | | Definition |
|
Term QUESTION NO: 597Which of the following is the default port for HTTPS?A. 143B. 443C. 80 D. 8080 | | Definition |
|
Term QUESTION NO: 598An administrator is going to be performing maintenance on a network router and wants totemporarily reroutetraffic through another office. Which of the following would allow theadministrator to accomplish this?A. Configure a static route.B. Configure EGP.C. Implement NAT on the server. D. Implement steady state convergence | | Definition |
|
Term QUESTION NO: 599A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver, error code2.Which of the following would resolve this?A. Flush the DNS Cache.B. Install NetBEUI.C. Release the IP Address. D. Install the TCP/IP protocol | | Definition |
|
Term QUESTION NO: 600A corporate office network has 40 computers all in the same private IP subnet. The corporateoffice has purchased an Internet connection from their local ISP. They were assigned one staticpublic IP address, and all 40 computers will require access to the Internet. How can this beaccomplished?A. DHCP will assign addresses capable of accessing the Internet.B. The use of static NAT will allow access to the Internet.C. PAT will allow access to the Internet. D. Supernetting will allow access to the Internet. | | Definition |
|
Term QUESTION NO: 601A user is experiencing slow connections. Which of the following commands would be used todetermine the delay time between the hops?A. tracertB. nbtstatC. nslookup D. ping | | Definition |
|
Term QUESTION NO: 602A technician is troubleshooting a network data transmission issue. Which of the followingcommands would the technician be able to use to identify the location of the packet loss?A. ipconfigB. tracerouteC. ping D. arp | | Definition |
|
Term QUESTION NO: 603Which of the following punch down blocks is BEST suited for highspeeddata transmission?A. 66 blockB. CrossconnectblockC. 110 block D. 25 pair cable block | | Definition Answer: CExplanation:The 110 block component is an improvement of the 66 block. The 110 block component supports a higher frequency | |
|
Term QUESTION NO: 604Which of the following protocols is used by several different operating systems to authenticateresources such as computers, users and printers?A. LDAPB. SMTPC. TCP D. UDP | | Definition |
|
Term QUESTION NO: 605Which of the following will prevent unauthorized access to the server room?A. Biometric lockB. PKI cardC. Cable lock D. RSA token | | Definition |
|
Term QUESTION NO: 606.QoS is used to accomplish which of the following objectives?A. Block traffic from certain websites.B. Block traffic from certain users.C. Provide priority of one or more types of traffic over others. D. Make use of the current bandwidth so it is a constant preset ideal by caching traffic | | Definition |
|
Term QUESTION NO: 607Which of the following network components operates on Layer 2 of the OSI model?A. GatewayB. RouterC. Switch D. Hub | | Definition |
|
Term QUESTION NO: 608Which of the following authentication methods uses public and private keys to securecommunication and ensure the senders identity?A. CHAPB. EAPC. PKI D. Kerberos | | Definition |
|
Term QUESTION NO: 609In a Class A subnet, a Host ID may occupy a maximum of:A. 32bits.B. 31bits.C. 24bits. D. 16bits. | | Definition |
|
Term QUESTION NO: 610Which of the following network hardware allows the MOST network traffic collisions?A. HubB. WAPC. Router D. Switch | | Definition |
|
Term QUESTION NO: 611Which of the following is the maximum range of 10GBaseSR?A. 1000 feet (305 meters)B. 6 miles (1593 kilometers)C. 990 feet (302 meters) D. 328 feet (100 meters) | | Definition Answer: CExplanation:The maximum range of 10GBaseSR is 300 meters | |
|
Term QUESTION NO: 612Which of the following BEST explains the purpose of a DMZ?A. To separate a security zone for an IPS.B. To separate a security zone for a VPN.C. To create a security zone that allows private traffic but is isolated from the public network. D. To create a security zone that allows public traffic but is isolated from the private network | | Definition |
|
Term QUESTION NO: 613Which of the following network protocols allows for automated alerts and reports on networkdevices?A. SMTPB. SNMPC. IGMP D. TLS | | Definition |
|
Term QUESTION NO: 614Which of the following security mitigation techniques is the MOST effective againstzerodayattacks?A. MAC filteringB. User awareness trainingC. Update antivirus definitions D. Effective security policies | | Definition |
|
Term QUESTION NO: 615A power outage occurred over the weekend and on Monday morning the helpdesk was receivingcalls about network issues from only one section of the LAN. A network administrator hasimplemented the solution and identified all the results. After all the network issues were resolved,what would be the NEXT step for that network administrator?A. Identify potential effects of the solution.B. Document the entire process.C. Let all users within the LAN know what the problem was. D. Determine if anything has changed. | | Definition |
|
Term QUESTION NO: 616Which of the following network devices is required to translate a synchronous serial connection totime division multiplexed connection?A. A proxy serverB. A CSU/DSUC. A content switch D. A router | | Definition |
|
Term QUESTION NO: 617Which of the following would a technician need to install to connect a fiber NIC to an Ethernetbackbone?A. HubB. Media converterC. Repeater D. Bridge | | Definition |
|
Term QUESTION NO: 618Which of the following protocols describes a connectionless state and does not useacknowledgements?A. POP3B. UDPC. NTP D. TCP | | Definition |
|
Term QUESTION NO: 619Which of the following protocols maps an IP address to a MAC address?A. RARPB. DHCPC. NTP D. ARP | | Definition |
|
Term QUESTION NO: 620Which of the following utilities shows the relationship between a MAC address and thecorresponding IP address?A. arpB. nslookupC. ipconfig D. tracert | | Definition |
|
Term QUESTION NO: 621A network technician has discovered that passwords are being sent unencrypted over the network.Which of the following network monitoring utilities was used?A. Throughput testerB. Packet snifferC. VPN concentrator D. Network scanner | | Definition |
|
Term QUESTION NO: 622Which of the following advanced features prevents switching loops by using a preferred path?A. Spanning treeB. VLANC. Port bonding D. Port authentication | | Definition |
|
Term QUESTION NO: 623Which of the following port numbers does SSH use?A. 21B. 22C. 23 D. 20 | | Definition |
|
Term QUESTION NO: 624Which of the following protocols will help reduce multicast flooding on a layer 2 switch?A. IGMPB. ARPC. SNMP D. ICMP | | Definition |
|
Term QUESTION NO: 625Which of the following command line utilities is used to display the IP to Physical address table?A. netstatB. arpC. nbtstat D. ping | | Definition |
|
Term QUESTION NO: 626A network administrator is developing a solution that will allow a new remote site with 400 usersaccess to the Internet using only one public routable IP address. The solution must allow for directuser access to the Internet. Which of the following technologies is the BEST to implement?A. VPNB. DHCPC. PAT D. DNS | | Definition |
|
Term QUESTION NO: 627A network technician has addressed an issue where many workstations have lost networkconnectivity, but is not able to establish the most probable cause. Which of the following stepsshould be taken next to resolve this issue?A. Escalate the issue to a senior network associate.B. Reboot the computer to try and recreate the issueC. Determine if anything has changed. D. Document all possible causes | | Definition |
|
Term QUESTION NO: 628The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:A. 1Mbps.B. 10Mbps.C. 1000Mbps. D. 100Mbps | | Definition Answer: DExplanation: The CAT5 network cable operates at to 100 megabits per second | |
|
Term QUESTION NO: 629A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which ofthe following technologies BEST describes the type of wireless printer that was purchased?A. BluetoothB. WiFiC. IEEE 1394 D. 802.11a | | Definition |
|
Term QUESTION NO: 630Which of the following defines the main purpose of dynamic routing?A. Adapts quickly to network changes without manual entries.B. Enables routing protocols with the least amount of hops.C. Adapts to network changes by making manual changes. D. Reduces domain collisions | | Definition |
|
Term QUESTION NO: 631How many DS0s are used in a T1?A. 24B. 30C. 23 D. 31 | | Definition Answer: AExplanation: The T1 line uses 24 DS0s | |
|
Term QUESTION NO: 632Which of the following authentication protocols uses plain text to transmit passwords over theinternet?A. RADIUSB. PAPC. CHAP D. Kerberos | | Definition |
|
Term QUESTION NO: 633A technician is setting up a public server for their company. The IP address of the server is19.19.0.1. Which of the following is the default subnet mask for the server?A. 255.255.255.255B. 255.255.0.0C. 255.255.255.0 D. 255.0.0.0 | | Definition Answer: DExplanation: T he address 255.0.0.0 would belongs to the ClassA range of addresses | |
|
Term QUESTION NO: 634Which of the following is a clientserverbased authentication software system which maintains userprofiles in a central database?A. CHAPB. MSCHAPC. RADIUS D. EAP | | Definition |
|
Term QUESTION NO: 635Which of the following protocols uses port 443?A. SMTPB. FTPC. HTTPS D. HTTP | | Definition |
|
Term QUESTION NO: 636When creating a fault tolerant switched network, which of the following will allow for loops in theswitched topology while preventing a broadcast storm?A. Spanning tree protocolB. Port mirroringC. Port aggregation D. 802.1q VLAN trunking protocol | | Definition |
|
Term QUESTION NO: 637On a wireless network, a user is able to connect to local resources, but not to the Internet. Whichof the following is the MOST likely cause?A. The wireless network card is not working.B. The wireless router does not have DHCP enabled.C. The wireless network card is out of range. D. The gateway is not configured on the router | | Definition |
|
Term QUESTION NO: 638Which of the following wiring standards is depicted below?Pin 1 WhiteOrangePin 2 OrangePin 3 White GreenPin 4 BluePin 5 White BluePin 6 GreenPin 7 White BrownPin 8 BrownA. IEEE 1394B. Crossover cableC. 568A D. 568B | | Definition Answer: DExplanation:The color code for the 568B wiring standard is as follows: from left to right: white/ orange, solid orange, white/green, solid blue, white/blue, solid green, white/brown, and solid brown | |
|
Term QUESTION NO: 639Which of the following would a technician find 568B standard?A. Network baselineB. Logical network diagramC. Wiring schematic D. Local regulation | | Definition Answer: CExplanation:The 568B standard describes the pin out configuration for a straight-through cable and will be illustrated in a wiring schematic | |
|
Term QUESTION NO: 640Which of the following network devices routes packets over a wireless network?A. NICB. WAPC. WEP D. CSU / DSU | | Definition |
|
Term QUESTION NO: 641Which of the following protocols is used to access files on a remote server?A. ARPB. SIPC. FTP D. NTP | | Definition |
|
Term QUESTION NO: 642Which of the following is the MOST secure access method?A. RSHB. SFTPC. SNMPv1 D. RCP | | Definition |
|
Term QUESTION NO: 643After adding a new cable segment to the network, the technician should:A. document the changes in the business continuity plan.B. update the wiring schematics.C. create a new baseline document. D. update the disaster recovery plan | | Definition |
|
Term QUESTION NO: 644A VoIP telephone with a builtinhub is plugged into a single network using both the hub port andthe telephone port. The network begins to experience severe lag due to a significant increase intraffic. Which of the following features would help to prevent this from occurring in the future?A. Port mirroringB. VLANSC. Spanning tree D. Trunking | | Definition |
|
Term QUESTION NO: 645An administrator needs to find out a specific NICs MAC address, the IP address of the NIC isknown. Which of the following network utilities would enable the administrator to discover the MACaddress without physically going to the computer?A. pingB. netstatC. nbtstat D. arp | | Definition |
|
Term QUESTION NO: 646Which of the following devices is used for connecting multiple network hosts where the physicalsignal is always repeated to all ports?A. BridgeB. RouterC. Hub D. Switch | | Definition |
|
Term QUESTION NO: 647Which of the following can an application layer firewall filter that a network layer firewall cannot?A. HTTP URLsB. Telnet trafficC. ICMP D. HTTP traffic | | Definition |
|
Term QUESTION NO: 648A recently installed wireless router needs to be configured to have the highest level of security.Which of the following would MOST likely be used?A. SSLB. WEPC. WPA D. IPSec | | Definition |
|
Term QUESTION NO: 649Which of the following command line tools would BEST be used to verify DNS functionality?A. netstatB. tracerouteC. dig D. arp | | Definition |
|
Term QUESTION NO: 650A company has one headquarters location and ten remote sites. The remote sites do not need tocommunicate with each other, just with headquarters. Which of the following is the BEST topologyto use?A. MeshB. RingC. Hybrid D. Star | | Definition Answer: DExplanation:If you connect the main branch and four branch offices, you should use the star topology. With this topology all the computers are connected to a central point | |
|
Term QUESTION NO: 651A tool that is used to capture usernames and passwords on the network is known as a:A. honey pot.B. firewall.C. sniffer. D. proxy server. | | Definition |
|
Term QUESTION NO: 652An administrator is implementing a new wireless network. Which of the following is the highestlevel of wireless encryption that the administrator can run?A. WEPB. WPA2 AESC. WPA2 TKIP D. TTL | | Definition |
|
Term QUESTION NO: 653A technician is troubleshooting connectivity issues on a clients machine. The technician needs tosee the current NetBIOS configuration and open connections, which of the following commandswould allowthis information to be displayed?A. nbtstatB. netstatC. msconfig D. ipconfig | | Definition |
|
Term QUESTION NO: 654The below output is from which of the following utilities?Interface: 172.30.0.104 0x2Internet AddressPhysical AddressType 172.30.0.500304882728cdynamic 172.30.0.25400304882650edynamicA. pingB. arpC. nbtstat D. netstat | | Definition |
|
Term QUESTION NO: 655The below output is from which of the following utilities?Active Connections Proto Local AddressForeign AddressState TCP COMPUTER1:1085 172.30.0.5:3389ESTABLISHED TCP COMPUTER1:1089172.30.0.5:microsoftdsTIME_WAITA. pingB. ipconfigC. nslookup D. netstat | | Definition |
|
Term QUESTION NO: 656A technician is troubleshooting the phone service at a site. The technician tests one of theconnections on the 66 block and no dial tone is present. Which of the following would be the BESTtool to test the connection at the demarcation point?A. Butt setB. Cable testerC. Multimeter D. Toner probe | | Definition |
|