Network + Practice Questions 401-504 Flashcards

1
Q

QUESTION NO: 401

Which of the following are components of IPSec? (Select TWO).

A. AH 
B. ESP 
C. SSH 
D. ICA 
E. TLS
A

Answer: A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION NO: 402

In IPSec, which of the following is an agreement on how devices will securely transmit
information?

A. SA
B. ESP
C. AH
D. ISAKMP

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 403

An organization recently installed a firewall on the network. Employees must have access to their
work computer from their home computer. In which of the following ways should the firewall be
configured?

A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 404

An organization recently installed a firewall on the network. Employees must be able to send and
receive email from a POP3 server. In which of the following ways should the firewall be
configured? (Select TWO).

A. Allow TCP port 23 
B. Allow TCP port 25 
C. Allow TCP port 110 
D. Allow UDP port 25 
E. Allow UDP port 110
A

Answer: B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION NO: 405

Which of the following OSI model layers is responsible for data encryption?

A. Application
B. Presentation
C. Physical
D. Data Link

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION NO: 406

Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable
was replaced, there were no issues with connectivity. Immediately after the cable was replaced,
users report that they are unable to access a database application on the server. Which of the
following is the MOST likely reason for the inaccessibility?

A. Lisa used a short patch cable.
B. Lisa used a cable with an RJ-45 connector.
C. Lisa used a crossover cable.
D. Lisa used a patch cable that was over 50 meters long.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION NO: 407

Which of the following exterior routing protocols uses an algorithm to determine the quickest route
to a destination?

A. RIP
B. OSPF
C. BGP
D. RIPv2

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION NO: 408

Which of the following is occurring when Jeff, an employee, unintentionally gives information that
is used maliciously?

A. Tailgating
B. DoS attack
C. DDoS attack
D. Social engineering

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QUESTION NO: 409

Which of the following OSI model layers is used for logical addressing?

A. Physical
B. Transport
C. Network
D. Data link

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION NO: 410

Which of the following attacks creates a buffer overflow to stop access to a system?

A. Blue jacking
B. DoS
C. Netstat
D. Man-in-the-middle

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

QUESTION NO: 411

Please refer to the attached exhibit.
Which of the following types of configuration management documentation is represented?

A. Network security policy
B. Network baseline
C. Logical network diagram
D. Wiring schematic

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QUESTION NO: 412

In which of the following layers of the OSI model does the TCP protocol operate?

A. Session
B. Network
C. Data link
D. Transport

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

QUESTION NO: 413

Which of the following basic devices blocks ports and can sometimes filter data?

A. Repeater
B. Hub
C. Firewall
D. Switch

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION NO: 414

At which of the following layers of the OSI model does an unmanaged switch operate?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

QUESTION NO: 415

Which of the following devices will monitor for propagating worms?

A. Firewall
B. Proxy server
C. Mail server
D. IDS

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION NO: 416

Which of the following is an authentication, authorization, and accounting method that provides
administrative access to network devices?

A. PKI
B. TACACS+
C. CHAP
D. SSH

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

QUESTION NO: 417

Which of the following network tools is used to identify running services on host devices?

A. IDS
B. IPS
C. Firewall
D. NMAP

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION NO: 418

Which of the following security devices is used in providing packet and MAC address filtering
services for the network?

A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION NO: 419

Which of the following would Kim, a technician, use in voice over IP communications?

A. SNTP
B. SCP
C. SMTP
D. SIP

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION NO: 420

Which of the following is the MOST appropriate to use when routing Internet traffic through
multiple ISP connections?

A. BGP
B. SNAT
C. RIP
D. GPG

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

QUESTION NO: 421

Which of the following protocols allows more than three non-overlapping channels?

A. 802.11a
B. 802.11g
C. 802.1q
D. 802.15

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION NO: 422

Which of the following represents the physical address of a network access card?

A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

QUESTION NO: 423

ADSL, PPP, and ATM all operate at which of the following layers of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 7

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

QUESTION NO: 424

Which of the following OSI layers BEST describes where an HTTP proxy operates?

A. Transport
B. Application
C. Presentation
D. Session

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

QUESTION NO: 425

Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of
service attack is occurring?

A. RAS
B. RDP
C. IDS
D. VPN

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

QUESTION NO: 426

A MAC address is used at which of the following layers of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

QUESTION NO: 427

Multimode fiber should be used in place of copper when:

A. distances are short.
B. EMI is a concern.
C. PoE is necessary.
D. the switch has BNC connectors.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

QUESTION NO: 428

Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to
the MDF, through a room that has a large number of motors. Which of the following would be the
BEST cable type to choose?

A. CAT3
B. STP
C. Coaxial
D. Fiber

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

QUESTION NO: 429

A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the
following can be used to connect the device to the network?

A. Fiber multiplexer
B. Repeater
C. Attenuator
D. OTDR

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

QUESTION NO: 430

Which of the following regulates the amount of network traffic a single node receives in a server
cluster?

A. Load balancer
B. Proxy server
C. Content filter
D. Quality of service

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

QUESTION NO: 431

Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that
utilization issues do not occur on the company’s T1 Internet access network. Which of the
following optimizations should Lisa implement?

A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service

A

A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

QUESTION NO: 432

Which of the following evaluates packet payload when detecting network threats?

A. IPS
B. Proxy server
C. Caching server
D. Content filter

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

QUESTION NO: 433

A disassociation request is a way to mitigate which of the following threats?

A. ARP poisoning
B. Rogue AP
C. Man-in-the-middle attack
D. Botnet

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

QUESTION NO: 434

A crossover cable is MOST commonly associated with which of the following layers of the OSI
model?

A. Session
B. Application
C. Network
D. Physical

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

QUESTION NO: 435

Which of the following documents will allow Kim, an administrator, to determine a change from the
standard default system configuration?

A. Baseline
B. Physical network diagram
C. Wiring schematic
D. Logical diagram

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

QUESTION NO: 436

Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based
on key words determined by the company?

A. Stateless traffic monitor
B. Stateful traffic monitor
C. Signature identification
D. Content filter

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

QUESTION NO: 437

Which of the following allows a malicious attacker to view network traffic if the attacker is on the
same network segment as Jeff, an administrator?

A. DoS attack
B. Man-in-the-middle attack
C. Smurf attack
D. Xmas attack

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

QUESTION NO: 438

Which of the following cable types would have the LEAST amount of EMI?

A. CAT3
B. CAT5
C. STP CAT6
D. Plenum CAT6

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

QUESTION NO: 439

Which of the following WAN technologies uses four wires for digital and a 66 block?

A. Cable
B. ATM
C. T3
D. POTS

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

QUESTION NO: 440

Which of the following has the HIGHEST data rate speed?

A. T1
B. ADSL
C. SDSL
D. OC-3

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

QUESTION NO: 441

Which of the following is designed to be used with multimode fiber over short wavelengths?

A. 10GBaseLW
B. 10GBaseER
C. 10GBaseSW
D. 10GBaseLR

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

QUESTION NO: 442

Kim, an administrator, wants to list all the network connections to and from the server. Which of
the following commands would MOST likely be used?

A. traceroute
B. ping
C. ipconfig
D. netstat

A

Answer: D

43
Q

QUESTION NO: 443

Kim, an administrator, finds a phone line but does not know where the line goes or if it is active.
Which of the following can be used to test if it is active?

A. Butt set
B. Punch down tool
C. Cable tester
D. Cable stripper

A

Answer: A

44
Q

QUESTION NO: 444

Which of the following is used to verify configuration updates on a firewall?

A. Signature identification
B. Access control lists
C. Scanning services
D. Content filtering

A

Answer: A

45
Q

QUESTION NO: 445

Which of the following sizes is the fixed cell length in ATM?

A. 8 bytes
B. 53 bytes
C. 64 kilobytes
D. 128 kilobytes

A

Answer: B

46
Q

QUESTION NO: 446

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in
order to collect all of the traffic on a LAN segment?

A. Hub
B. VLAN
C. Router
D. Server

A

Answer: A

47
Q

QUESTION NO: 447

In the 2.4GHz range, which of the following channel combinations are non-overlapping?

A. 1, 6, 11
B. 2, 7, 10
C. 2, 8, 13
D. 3, 6, 9

A

Answer: A

48
Q

QUESTION NO: 448

Which of the following tools would Zach, an administrator, use to identify opens and shorts?

A. Ohmmeter
B. Protocol analyzer
C. Cable tester
D. Multimeter

A

Answer: C

49
Q

QUESTION NO: 449

Which of the following technologies relies on a ticket granting server to allow clients to verify their
identity?

A. TACACS+
B. Kerberos
C. PKI
D. RADIUS

A

Answer: B

50
Q

QUESTION NO: 450

Which of the following is used to transfer files between computers?

A. FTP
B. DHCP
C. ARP
D. NTP

A

Answer: A

51
Q

QUESTION NO: 451

Lisa, an administrator, determines there are an excessive number of packets being sent to a web
server repeatedly by a small number of external IP addresses. This is an example of which of the
following attacks?

A. DDoS
B. Viruses
C. Worms
D. Man-in-the-middle

A

Answer: A

52
Q

QUESTION NO: 452

Which of the following authenticates, allows, and controls the execution of router commands?

A. PKI
B. RADIUS
C. Kerberos
D. TACACS+

A

Answer: D

53
Q

QUESTION NO: 453

Which of the following is true of NIPS?

A. Routes traffic to the proper port
B. Detects malicious host traffic
C. Detects and prevents harmful traffic
D. Prevents traffic on network hosts

A

Answer: C

54
Q

QUESTION NO: 454

A user’s new computer is not able to connect to the network at all. Upon further investigation, Kim,
the administrator, finds that the wall jack is terminated with a 568B configuration. After locating the
correct cable in the IDF, which of the following is the MOST likely cause of the problem?

A. Other end of the cable is terminated with a 568B configuration
B. Trunk port on the switch is disabled
C. Other end of the cable is terminated with a 568A configuration
D. Wall jack needs to be replaced with a smart jack

A

Answer: C

55
Q

QUESTION NO: 455

Which of the following network access methods is the MOST secure?

A. PPPoE
B. SIP
C. RSH
D. IPSec

A

Answer: D

56
Q

QUESTION NO: 456

Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following
wireless standards is being used?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

A

Answer: D

57
Q

QUESTION NO: 457

Which of the following handles HTTP requests on behalf of the client?

A. Bandwidth shaper
B. DNS server
C. Proxy server
D. Load balancer

A

Answer: C

58
Q

QUESTION NO: 458

The selection of the correct punch down tool to use depends on which of the following?

A. Connector type
B. Demarcation point location
C. Block type
D. Switch location

A

Answer: C

59
Q

QUESTION NO: 459

Which of the following services do TCP connections provide to application layer protocols? (Select
TWO).

A. Transport services without error recovery
B. Large data size manageability using segmentation
C. Secure Kerberos password encryption on data
D. Delivery through error recovery
E. Proxy server authentication

A

Answer: B,D

60
Q

QUESTION NO: 460

Which of the following devices monitors and reroutes malicious traffic being sent to a host?

A. Bandwidth shaper
B. IPS
C. DNS server
D. Load balancer

A

Answer: B

61
Q

QUESTION NO: 461

Which of the following devices will allow Lisa, a user, to see a cached copy of websites?

A. Content switch
B. DNS server
C. Proxy server
D. Load balancer

A

Answer: C

62
Q

QUESTION NO: 462

Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of
the following attacks may be in progress?

A. Man-in-the-middle
B. Denial of service
C. Ping flooding
D. Smurfing

A

Answer: A

63
Q

QUESTION NO: 463

Which of the following uses a ring topology?

A. DSL
B. Ethernet
C. DOCSIS
D. SONET

A

Answer: D

64
Q

QUESTION NO: 464

Which of the following has a DB-9 connector?

A. SC
B. RS-232
C. LC
D. RJ-45

A

Answer: B

65
Q

QUESTION NO: 465

Which of the following technologies is used to connect public networks using POTS lines?

A. OC3
B. OC12
C. PSTN
D. Cable

A

Answer: C

66
Q

QUESTION NO: 466

Users are unable to access the company’s intranet website. Which of the following attacks has the
network MOST likely experienced?

A. Man-in-the-middle
B. Smurf
C. Trojan
D. DoS

A

Answer: D

67
Q

QUESTION NO: 467

Which of the following defines access for a network?

A. ACL
B. RDP
C. RAS
D. ARP

A

Answer: A

68
Q

QUESTION NO: 468

Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?

A. RAS
B. PPTP
C. IPSec
D. ICA

A

Answer: C

69
Q

QUESTION NO: 469

Which of the following is the BEST method to ensure network performance on a VoIP network?

A. Traffic shaping
B. Quality of service
C. Load balancing
D. Caching engines

A

Answer: B

70
Q

QUESTION NO: 470

Which of the following tools would Lisa, an administrator, use to determine if there is a problem
with a telephone line?

A. Port scanner
B. Punch down tool
C. Butt set
D. Toner probe

A

Answer: C

71
Q

QUESTION NO: 471

Which of the following tools would BEST be used to verify if a network cable is properly
terminated?

A. Multimeter
B. Cable certifier
C. Toner probe
D. Cable stripper

A

Answer: B

72
Q

QUESTION NO: 472

Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given
network. Which of the following tools would accomplish this? (Select TWO).

A. Packet sniffer 
B. Honeypot 
C. Port mirroring 
D. IPS 
E. Port scanner 
F. IDS
A

Answer: A,C

73
Q

QUESTION NO: 473

Which of the following colors represents the outer leads on a connector head of a 568B patch
cable? (Select TWO).

A. Blue, brown/white 
B. Green/white, blue 
C. Orange/white, orange 
D. Blue, blue/white 
E. Brown/white, brown
A

Answer: C,E

74
Q

QUESTION NO: 474

Kim, an administrator, has created a patch cable. Which of the following tools should she use to
check the integrity of the cable?

A. Protocol analyzer
B. Toner probe
C. Cable certifier
D. Cable stripper

A

Answer: C

75
Q

QUESTION NO: 475

PKI is a method of user authentication which uses which of the following?

A. Various router commands
B. Access control lists
C. Certificate services
D. A RADIUS server

A

Answer: C

76
Q

QUESTION NO: 476

Kim and Zach, attackers, use which of the following network scanners to see the protocols that are
being used? (Select TWO).

A. IDS 
B. Packet sniffer 
C. Port scanners 
D. Malware scanner 
E. Ping sweep
A

Answer: B,C

77
Q

QUESTION NO: 477

Lisa, an administrator, believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the following
tools did the attackers MOST likely use to accomplish this?

A. Intrusion prevention software
B. Packet sniffer
C. Intrusion detection software
D. Port scanner

A

Answer: B

78
Q

QUESTION NO: 478

Lisa, an administrator, believes that the network has been attacked and there is no known
definition or prevention method to help avoid this attack. Which of the following BEST describes
this scenario?

A. Zero day attack
B. DDoS
C. DoS
D. SQL injection

A

Answer: A

79
Q

QUESTION NO: 479

Kim, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?

A. Intrusion detection software
B. PoE
C. Packet sniffer
D. Intrusion prevention software

A

Answer: C

80
Q

QUESTION NO: 480

Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect
to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would
BEST describe the type of WAP needed?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

A

Answer: D

81
Q

QUESTION NO: 481

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A. 100 kilometers (62 miles)
B. 10 kilometers (6 miles)
C. 1000 meters (3281 feet)
D. 100 meters (328 feet)

A

Answer: D

82
Q

QUESTION NO: 482

Which of the following is the MAXIMUM distance of a CAT5e cable on a single run when using
Ethernet?

A. 1000 meters (3281 feet)
B. 323 meters (1060 feet)
C. 512 meters (1680 feet)
D. 100 meters (328 feet)

A

Answer: D

83
Q

QUESTION NO: 483

Which of the following wireless standards operates on the same frequency as 802.11a?

A. Compatible with 802.11b wireless networks
B. Compatible with 802.11g wireless networks
C. Compatible with 802.11i wireless networks
D. Compatible with 802.11n wireless networks

A

Answer: D

84
Q

QUESTION NO: 484

Which of the following components would a technician plug into a smart jack?

A. 25 pair cable
B. 100 pair cable
C. Patch cable
D. Patch panel

A

Answer: C

85
Q

QUESTION NO: 485

Which of the following is used by RADIUS to encrypt messages between the server and the
client?

A. Public key
B. CSU/DSU
C. Private key
D. Shared secret

A

Answer: D

86
Q

QUESTION NO: 486

Which of the following security measures is the LEAST intrusive on an end device?

A. NIPS
B. Host-based firewall
C. Antivirus
D. HIDS

A

Answer: A

87
Q

QUESTION NO: 487

Which of the following physical network topologies is MOST likely to be used in an FDDI network?

A. Star
B. Mesh
C. Bus
D. Ring

A

Answer: D

88
Q

QUESTION NO: 488

Which of the following network scanners detects and sends out alerts for malicious network
activity?

A. Packet sniffers
B. IDS
C. Port scanners
D. IPS

A

Answer: B

89
Q

QUESTION NO: 489

Which of the following connectors push and twist-on?

A. LC
B. SC
C. ST
D. RJ-45

A

Answer: C

90
Q

QUESTION NO: 490

Which of the following is a social engineering attack?

A. Worms
B. Man-in-the-middle
C. Phishing
D. Evil twin

A

Answer: C

91
Q

QUESTION NO: 491

Which of the following performs posture assessments for unknown devices that connect to the
network?

A. PKI
B. EAP
C. NAC
D. AAA

A

Answer: C

92
Q

QUESTION NO: 492

Peer to peer networks are used to pass information in between which of the following?

A. Several clients to a centralized server
B. One client to another
C. Several servers to several centralized clients
D. One client to a centralized server

A

Answer: B

93
Q

QUESTION NO: 493

Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A. DoS
B. Smurf attack
C. Virus
D. Man-in-the-middle

A

Answer: D

94
Q

QUESTION NO: 494

Which of the following mitigation techniques is MOST effective against a DoS attack?

A. IDS
B. Antivirus
C. Redundancy
D. Backups

A

Answer: C

95
Q

QUESTION NO: 495

Which of the following solutions will detect and disable a rogue access point?

A. Port scan
B. Packet sniffer
C. IPS
D. IDS

A

Answer: C

96
Q

QUESTION NO: 496

Which of the following is a valid MAC address?

A. 00:AB:C4:FE:60:D3
B. 00-AE-S3-BC-90-F7
C. 13-12-BC-DA-97
D. 15:FA:97:44:AB

A

Answer: A

97
Q

QUESTION NO: 497

Which of the following connector types will MOST likely be located on a serial cable?

A. DB-9
B. LC
C. ST
D. BNC

A

Answer: A

98
Q

QUESTION NO: 498

T568B wiring scheme is typically found on which of the following components?

A. Demarc extension
B. 66 block
C. Patch panel
D. Vertical cross connect

A

Answer: C

99
Q

QUESTION NO: 499

Which of the following is an encrypted remote access protocol?

A. RDP
B. PoE
C. RAS
D. PPP

A

Answer: A

100
Q

QUESTION NO: 500

Port scanners and packet sniffers differ in functionality because:

A. packet sniffers and port scanners are just different names for the same device.
B. packet sniffers can only log events on traffic activity and port scanners can route malicious
packets.
C. packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain
NICs.
D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.

A

Answer: D

101
Q

QUESTION NO: 501

A network topology in which the bandwidth dependency is distributed evenly amongst a large
number of inter-connected clients is known as a:

A. peer-to-peer.
B. bus.
C. star.
D. client/server.

A

Answer: A

102
Q

QUESTION NO: 502

Jeff, an administrator, wishes to add a third network segment to the firewall where the company’s
public web servers will be placed. Which of the following BEST describes this new segment?

A. PKI
B. VPN
C. IPS
D. DMZ

A

Answer: D

103
Q

QUESTION NO: 503

Which of the following would the telecommunications carrier use to segregate customer traffic over
long fiber links?

A. VLAN
B. MPLS
C. VPN
D. PSTN

A

Answer: B

104
Q

QUESTION NO: 504

Which of the following network topologies would be separated into two networks if a client in the
middle is removed or the cable is cut?

A. Mesh
B. Ring
C. Bus
D. Star

A

Answer: C