Arianna Flashcards

1
Q
Which of the following ports is default for DNS?
A. 53
B. 69
C. 80
D. 143
A

A. 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following components would be used to terminate all distribution and trunk cables in a central
office or PBX?
A. 66 block
B. MDF
C. Demarc
D. IDF
A

B. MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician has received a call from a customer stating that the customer has logged in, but cannot access
the Internet. The technician asks the customer if the gateway and the firewall can be pinged. This is an
example of which of the following troubleshooting skills?
A. Information gathering
B. Implementing and testing
C. Escalation
D. Documenting the solution

A

A. Information gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following components is used to terminate a T1 connection?
A. 66 block
B. Patch panel
C. Smart jack
D. 110 block
A

C. Smart jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following protocols can be found at the transport layer?
A. FTP
B. SMTP
C. TCP
D. DNS
A

C. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is used to relay queries from a private network to the Internet?
A. Content filter
B. Load balancer
C. Proxy server
D. Stateful firewall
A

C. Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician has been tasked to reduce the administrative time spent on the network. The network uses
several VLANs. Which of the following is a protocol that can be added to the switches to help reduce
administrative time?
A. MTU
B. WLAN
C. SIP
D. VTP

A

D. VTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following tools could an administrator use to determine a workstations default gateway?
A. route
B. nslookup
C. dig
D. ping
A

A. route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following routing protocols is based on being open and takes the shortest path FIRST?
A. RIP
B. OSPF
C. EIGRP
D. IS-IS
A

B. OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to obtain the MAC address of all systems on a small SOHO network. Which of the
following is the BEST way to accomplish this?
A. Run nslookup for each IP address.
B. ARP each IP, then look in the ping table.
C. ARP poison the router, then run a network sniffer.
D. Ping each IP then look in the ARP table.

A

D. Ping each IP then look in the ARP table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Installing specialized devices in between network resources and the Internet to distribute network requests and
ensure availability of resources is an example of which of the following network management techniques?
A. Port mirroring
B. Load balancing
C. Port address translation
D. QoS

A

B. Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following wireless technologies uses point-to-multipoint for data transmission?
A. 802.11g
B. 802.11n
C. 802.11b
D. 802.11a
A

B. 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following naming conventions takes place in the data link layer of the OSI model and is often used
in conjunction with IPv6?
A. MAC-48
B. EUI-48
C. EUI-64
D. IP address
A

C. EUI-64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is setting up a network for 25 users at a remote location. All of the users share a single Internet
connection. The ISP provides a single IP address for the location. Which of the following addressing
mechanisms should the technician use to provide access and IP addresses for all 25 users?
A. NAT
B. Proxy
C. Gateway
D. DNS

A

A. NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone
service (POTS)?
A. 66 block
B. 110 block
C. CAT6 patch panels
D. Smart jacks
A

A. 66 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following would an administrator do NEXT once an action plan has been created?
A. Find new symptoms and issues.
B. Identify more areas that may be affected.
C. Determine if escalation is necessary.
D. Implement the plan and test it.

A

D. Implement the plan and test it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following logical topologies uses distributed authentication?
A. Client/server
B. VLAN
C. VPN
D. P2P
A

D. P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A helpdesk team is unable to agree on a solution to an issue. Each technician presents their own solution to
the problem. When a solution is agreed upon, which of the following documentation MOST likely needs to be
reviewed and possibly updated?
A. Baseline
B. Wiring Schematics
C. Procedures
D. Regulations

A

C. Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following devices should be used to connect a router to a T1 line?
A. CSU/DSU
B. Firewall
C. Proxy server
D. Switch
A

A. CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following is a 32- bit address?
A. MAC
B. IPv6
C. WWN
D. IPv4
A

D. IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following would a switch port be an example of?
A. Broadcast domain
B. Spanning-tree loop
C. Routing table entry
D. Collision domain
A

D. Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following tools is BEST used to find where a CAT5e cable is terminated?
A. Cable tester
B. Butt set
C. Toner probe
D. OTDR
A

C. Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is
the MOST likely cause?
A. Encryption strength
B. SSID mismatch
C. Interference
D. Weak signals
A

C. Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A company uses wiring standard 568A throughout their network. However, a contractor for the company
installs a lab using 568B. While the lab technically works, this may cause problems because:
A. the 568B standard conflicts with the 568A standard and causes interference in the network.
B. different crimping tools are needed to adhere to the 568B standard.
C. when replacing connectors other technicians may use the wrong wiring scheme.
D. crosstalk between pairs will be greatly increased due to standard incompatibility.

A

C. when replacing connectors other technicians may use the wrong wiring scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When testing a network wire, the network testing device reports Warning! Voltage on-line. Which of the
following would cause this?
A. Attenuation on the wire is too low.
B. The wire is being used on the phone system.
C. There is crosstalk on the wire.
D. The wire is being used on a satellite connection.

A

B. The wire is being used on the phone system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
A user has accidentally looped two open network jacks together with a spare patch cable. Which of the
following is MOST likely to occur?
A. Domain collision
B. Signal bleed
C. Broadcast storm
D. Signal loss
A

C. Broadcast storm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
E1/T1 service ordered from the local telecommunications company is typically delivered over which of the
following?
A. Copper
B. Cellular
C. Fiber
D. Wireless
A

A. Copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which of the following would allow an administrator to confirm maximum bandwidth is being utilized?
A. Throughput tester
B. Load testing
C. Packet sniffer
D. Protocol analyzer
A

A. Throughput tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
IGP differs from EGP because IGP is designed for use in which of the following?
A. Communication between WANs
B. Communication between networks
C. Single autonomous network
D. Single non-autonomous network
A

C. Single autonomous network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Which of the following network cables would test the ports on a switch?
A. Crossover
B. Rollover
C. Loopback
D. Straight
A

C. Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following is the BEST protocol to use when a user would like to keep emails synchronized over
multiple devices?
A. IGMP
B. IMAP4
C. HTTP
D. POP3
A

B. IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
Which of the following is a required option of a DHCP lease?
A. BootP
B. DNS address
C. Default gateway
D. TFTP server
A

C. Default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A technician spoke to a user regarding a network problem. The technician searched all the logs associated
with the problem and pulled the change logs for the network environment. Which of the following should the
technician perform NEXT?
A. Establish a theory of probable cause.
B. Implement preventative measures.
C. Implement the solution or escalate as necessary.
D. Establish a plan of action to resolve the problem.

A

A. Establish a theory of probable cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An administrator wants to control and limit access to company computers from remote users. Which of the
following services would the administrator MOST likely disable?
A. TELNET
B. HTTP
C. RDP
D. RCP

A

C. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An administrator would like to implement a technology that requires no configuration on the client side and
filters out specified port ranges. Which of the following would accomplish this?
A. Host-based firewall
B. Network-based IDS
C. Network-based firewall
D. Host-based proxy service

A

C. Network-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following would a technician do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
A

A. Enable an SNMP agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
An administrator is replacing a hub on a network. Which of the following devices would be the BEST
replacement choice?
A. Router
B. Switch
C. Repeater
D. Bridge
A

B. Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Which of the following is a Layer 2 device that would MOST likely be used to connect network segments of
different topologies?
A. Bridge
B. Switch
C. Hub
D. Repeater
A

A. Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following tools is used to determine if a phone line is in working order?
A. Voltage event recorder
B. Toner probe
C. Multimeter
D. Butt set
A

D. Butt set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Port scanners are MOST likely used to:
A. generate up-to-date routing tables.
B. identify unused ports on a switch.
C. map a companys network topology.
D. identify running services on a host.
A

D. identify running services on a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
When implementing a WAP, which of the following can be disabled to help prevent unauthorized people from
locating the network?
A. DCHP
B. MAC filtering
C. DNS
D. SSID
A

D. SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
Which of the following would allow an administrator to implement port level security?
A. PKI
B. RADIUS
C. 802.1x
D. MAC filtering
A

C. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Some switches are capable of implementing a specialized technique to segregate network traffic according to
specific rules. This technology is known as:
A. CIDR.
B. PoE.
C. VLAN.
D. trunking.

A

C. VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following offers the GREATEST throughput?
A. 802.11n
B. Bluetooth
C. 802.11a
D. 802.11g
A

A. 802.11n

B. Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
Multiple crossover and straight cables must be created. Which of the following would the administrator use to
create these cables?
A. Wiring documents
B. Logical network diagrams
C. Company policies
D. Baselines configurations
A

A. Wiring documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
A web server that provides shopping cart capabilities for external end users will likely function with which of the
following protocols?
A. HTTPS
B. POP3
C. SSH
D. SMTP
A

A. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

An administrator is installing a new IDS. Which of the following must be configured on the switch to allow the
IDS to capture all company network traffic?
A. Port mirroring
B. Virtual Trunk Protocol
C. Spanning tree
D. Trunking

A

A. Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of the following devices is MOST likely to rely on up-to-date signatures to provide accurate services?
A. Caching server
B. Content filter
C. Router
D. Switch
A

B. Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Which of the following ports carries IMAP traffic, by default, on modern email systems?
A. 23
B. 25
C. 80
D. 143
A

D. 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following technologies must be used to ensure remote Internet hosts will respond to packets
leaving a company by connecting to another companys honeypot?
A. DNS
B. DHCP
C. WINS
D. SNAT

A

D. SNAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
Which of the following can be disabled to help make wireless networks harder to find?
A. DMZ
B. SSID
C. DHCP
D. WPA
A

B. SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A technician needs to identify the type of fiber being used in a distribution panel. The marking the technician
finds on the cable is 62.5/125. Which of the following optical cables has the technician found?
A. Multi-mode fiber
B. Plenum
C. Single-mode fiber
D. Coaxial

A

A. Multi-mode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is true of IGP?
A. IGPs are not used within autonomous systems
B. OSPF, IS-IS and BGP are IGPs
C. Includes routing protocols used for choosing routes between autonomous systems
D. OSPF, RIP, and IS-IS are IGPs

A

D. OSPF, RIP, and IS-IS are IGPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication
and is used for long distances?
A. DSL
B. WiMAX
C. E3/T3
D. ATM
A

B. WiMAX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
Which of the following is MOST effective in filtering incoming malicious packets at the gateway router?
A. IP filtering
B. MAC filtering
C. 802.1x
D. VLAN
A

A. IP filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A technician accidentally plugs both ends of a cable into the same switch. However, this did not cause a
network loop. Which of the following explains this situation?
A. Spanning tree protocol is enabled on the switch.
B. The switch has IGMP snooping enabled.
C. PoE has disabled the ports.
D. The ports are in the same VLAN.

A

A. Spanning tree protocol is enabled on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
Which of the following commands will test the connectivity of a remote website?
A. netstat
B. ping
C. nslookup
D. dig
A

B. ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following represents the BEST method of securing physical access to a network backbone?
A. Installing biometric security in all server room doorways.
B. Forcing all remote users connecting to the network externally to use encrypted SSL VPN.
C. Installing hardened deadbolts in all server room doorways.
D. Requiring users to authenticate network accounts via complex passwords and smart cards.

A

A. Installing biometric security in all server room doorways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
Which of the following cable types transmits data at 1Gbps?
A. 100Base-Fx
B. 1000Base-T
C. 100Base-TX
D. 10Base-T
A

B. 1000Base-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
Which of the following devices should be installed if a client wants to extend their wireless coverage area in
their building?
A. Bridge
B. Media converter
C. Hub
D. Access point
A

D. Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX. Which of
the following should the administrator do NEXT?
A. Reboot the switch to enable the new connection
B. Update the logical network diagram
C. Update the switch configuration logs
D. Update the wiring schematics

A

D. Update the wiring schematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

An administrator suspects an IP address conflict with two systems on the local network. Which of the following tools would be used to verify this conflict?
A. route
B. ping
C. nslookup
D. arptools would be used to verify this conflict?

A

D. arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A technician is troubleshooting a cable problem. The technician has checked both ends and suspects an issue
50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper

A

A. TDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A technician needs to test if domain name resolution is functioning properly. Which of the following software
tools would be used to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat

A

B. dig & D. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
Which of the following cable technologies is BEST suited to provide 1Gbps throughput for a given network?
A. CAT6
B. ThickNet
C. CAT5
D. CAT3
A

A. CAT6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
When comparing 802.11a to 802.11g, which of the following is the major difference?
A. Power
B. Speeds
C. Frequency
D. Encryption type
A

C. Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
Which of the following features is required for information to be passed between VLANs on switches?
A. PoE
B. Port authentication
C. Spanning tree
D. Trunking
A

D. Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A homeowner wants to add DSL and make it available to all rooms of the house. Which of the following should
the homeowner install to provide the BEST coverage?
A. DSL modem
B. ADSL modem
C. 4 port wireless DSL modem
D. Cable modem

A

C. 4 port wireless DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
Which of the following methods would be implemented to correct a network slowdown caused by excessive
video streaming?
A. Traffic shaping
B. Proxy server
C. VPN concentrator
D. High availability
A

A. Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
Which of the following is MOST likely to affect IP based surveillance systems?
A. Vishing
B. Social engineering
C. Man-in-the-middle
D. Mantrap
A

C. Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A printer needs to be moved from one switch to another. Which of the following tools can be used to find out
which printer cable is connected on the switch?
A. Punch down tool
B. Toner probe
C. Cable tester
D. Multimeter

A

B. Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following are common security threat mitigation techniques?
A. Allowing unauthorized devices to connect to the network
B. User training, updating policies and procedures
C. Letting users update their own virus definitions
D. Setting up a PAP connection to provide a point-to-point connection

A

B. User training, updating policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A technician is at a clients site to resolve a wireless network connectivity issue. The technician has found out
that the issue is only happening in the marketing department. Which of the following is the NEXT step the
technician should take?
A. Create an action plan and identify the potential effect.
B. Establish the most probable cause.
C. Identify the affected areas of the network.
D. Determine if anything has changed.

A

D. Determine if anything has changed.

74
Q
Which of the following services typically has the highest amount of latency?
A. ATM
B. Frame relay
C. Cable modem
D. Satellite
A

D. Satellite

75
Q

After receiving reports of network performance issues, the technician sees a 12ms return time when pinging
the remote site. Which of the following should the technician do NEXT?
A. Refer to network documentation baseline to see if the return time is normal.
B. Reboot the routers on both sides of the connection.
C. Determine which machine at the remote site is ping flooding the connection.
D. Increase the bandwidth to the remote site.

A

A. Refer to network documentation baseline to see if the return time is normal.

76
Q
Which of the following devices needs to be installed FIRST before implementing a WLAN?
A. Bridge
B. WAP
C. Repeater
D. Modem
A

B. WAP

77
Q

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully
at its destination?
A. The transport OSI model layer and the transport TCP/IP model layer.
B. The transport OSI model layer and the Internet TCP/IP model layer.
C. The network OSI model layer and the transport TCP/IP model layer.
D. The network OSI model layer and the Internet TCP/IP model layer.

A

A. The transport OSI model layer and the transport TCP/IP model layer.

78
Q

Due to space limitations, LAN cables were installed directly over power lines to certain offices. The offices have
been reporting network connectivity issues. Which of the following MOST likely represents the cause of the
issues?
A. Open pairs on the cable
B. EMI
C. Crosstalk
D. Duplex mismatch

A

B. EMI

79
Q

A company is growing rapidly and is looking for ways to reduce time spent on IT infrastructure administration.
The administrator has decided one way to meet this need will be to reduce 802.1q management duties. Which
of the following technologies would help centralize 802.1q management?
A. VTP
B. BGP
C. CIDR
D. VLAN

A

A. VTP

80
Q
For the BEST performance, wireless signals should use:
A. redundant channels
B. non-overlapping channels
C. different encryption types
D. overlapping channels
A

B. non-overlapping channels

81
Q

Which of the following routing protocols would a technician use if they needed to connect multiple large
networks together where routers advertise all routes to each other?
A. IGP
B. BGP
C. IS-IS
D. OSPF

A

B. BGP

82
Q
Which of the following protocols operates locally between a client and a router to negotiate the flow of multicast
traffic?
A. ICMP
B. PIM
C. IGMP
D. DVMRP
A

C. IGMP

83
Q

An administrator needs to block a virus infected computer. Which of the following provides the HIGHEST level
of network security?
A. IDS at the network perimeter
B. Changing the client port to half duplex
C. MAC ACL on the switch
D. IP ACL on the router

A

C. MAC ACL on the switch

84
Q
Which of the following LAN technologies has the GREATEST throughput speed?
A. 10BaseFX
B. 10BaseF
C. 10BaseTX
D. 10BaseT
A

A. 10BaseFX

85
Q
Which of the following networking protocols is often used for booting or loading programs on diskless
workstations?
A. SSH
B. RTP
C. SNMP
D. TFTP
A

D. TFTP

86
Q
Which of the following can provide clients access to network resources such as a web server as well as
providing Internet usage reports?
A. DHCP server
B. Proxy server
C. Host based firewall
D. Bandwidth shaper
A

B. Proxy server

87
Q

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a
rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of
the following protocols needs to be denied?
A. TCP
B. SMTP
C. ICMP
D. ARP

A

C. ICMP

88
Q
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

89
Q
Where would a technician MOST likely place the company MX and A records?
A. Proxy server
B. Load balancer
C. DNS server
D. Firewall
A

A. Proxy server

90
Q
Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for
multiple routers and switches?
A. DOCSIS
B. HDLC
C. SNMP
D. TACACS+
A

C. SNMP

91
Q
Which of the following packet addresses represents a single NIC?
A. Broadcast address
B. Unicast address
C. Multicast address
D. Broadcast domain
A

B. Unicast address

92
Q
Which of the following cable types has immunity from EMI?
A. UTP
B. Plenum
C. STP
D. Fiber
A

D. Fiber

93
Q

A network engineer needs to troubleshoot a remote router within the WAN. Which of the following user
authentications would be the BEST to implement?
A. MS-CHAP
B. Kerberos
C. TACACS+
D. PKI

A

C. TACACS+

94
Q
Which of the following encryption methods is the MOST secure?
A. WEP
B. WPA
C. WPA2
D. WEP-TKIP
A

C. WPA2

95
Q
Which of the following would be used to quickly check for availability of the HTTP service on the server?
A. Reserved ports
B. Protocol analyzer
C. Packet sniffers
D. Port scanners
A

D. Port scanners

96
Q
Which of the following would be used to identify the hot zone in a server room?
A. OTDR
B. Temperature monitor
C. Cable stripper
D. Voltage event monitor
A

B. Temperature monitor

97
Q
Which of the following is the BEST tool to use when terminating a network jack?
A. Snips
B. Cable stripper
C. Toner probe
D. Punch down
A

D. Punch down

98
Q

Which of the following mitigation techniques would be used in order to defend against social engineering?
A. Updating antivirus definitions
B. Implementing patch management solutions
C. Enabling audit logs on all workstations
D. Revising security and network policies

A

D. Revising security and network policies

99
Q
Which of the following are commonly used FTP ports? (Select TWO).
A. 20
B. 21
C. 22
D. 23
E. 25
A

A. 20 & B. 21

100
Q
A 66 block is MOST commonly used in which of the following networks?
A. Voice
B. Cloud
C. SONET
D. Data
A

A. Voice

101
Q
Which of the following components have home runs from different locations to the telecommunications closet?
A. Smart jack
B. Patch panel
C. Demarc
D. Demarc extension
A

B. Patch panel

102
Q

A user reports that some normally accessible external sites are not responding, but most other sites are
responding normally. Which of the following is MOST likely the cause?
A. VLAN tag mismatch
B. Port filtering
C. Smurf attack
D. Faulty routing rule

A

D. Faulty routing rule

103
Q

After a technician has established a plan of action to resolve the problem, which of the following steps should
be performed NEXT?
A. Establish a theory of probable cause.
B. Implement preventative measures.
C. Verify full system functionality.
D. Implement the solution of escalate as necessary.

A

D. Implement the solution of escalate as necessary.

104
Q
Which of the following standards is implemented in 802.1af?
A. WiMAX
B. Power over Ethernet
C. Fast Ethernet
D. 5Ghz Wireless
A

B. Power over Ethernet

105
Q
An administrator is creating a patch cable. Which of the following devices should the administrator use to
terminate the ends?
A. Cable tester
B. Certifier
C. Cable stripper
D. Data crimper
A

D. Data crimper

106
Q
Which of the following tools would be BEST used to trace a wire through an area where multiple wires of the
same color are twisted together?
A. Cable tester
B. Toner probe
C. Cable crimper
D. Punch down tool
A

B. Toner probe

107
Q

An administrator suspects the computer they are working on has lost its default gateway and its specific route
to the HR department. Which of the following commands should be run to verify the route setting?
A. route add default gateway 192.168.1.1
B. route -nr
C. ipconfig /all
D. route print

A

D. route print

108
Q
Which of the following allows for multiple operating systems to be run simultaneously on a single server?
A. Dual boot
B. Multiple hard drives
C. PXE boot
D. Virtual machines
A

D. Virtual machines

109
Q
Which of the following connector types would MOST likely be used in combination with a GBIC?
A. RS-232
B. SC
C. RJ-11
D. BNC
A

B. SC

110
Q

A home user reports an issue with the wireless network connection on a laptop. It seems to occur only when
the phone rings. Which of the following should be changed to resolve the issue?
A. Change the channel of the WAP.
B. Change the wireless security that is being used.
C. Rename the SSID.
D. Relocate the antenna to another area.

A

A. Change the channel of the WAP.

111
Q
Which of the following technologies relies on up-to-date signatures to protect the network and block malicious
network-based attacks?
A. HIDS
B. IDS
C. IPS
D. Firewall
A

C. IPS

112
Q
Which of the following features of a switch allows WAPs to be installed in locations where no power sources
are available?
A. Aggregation
B. Port forwarding
C. PoE
D. VLAN
A

C. PoE

113
Q
A small office has asked to have their Ethernet NIC enabled PCs networked together by a consultant. The
office users want file sharing capability with no access to the Internet. Which of the following items will the
consultant need? (Select TWO).
A. Network bridge
B. RG-59 patch cabling
C. CAT5e patch cabling
D. Firewall
E. Switch
A

C. CAT5e patch cabling & E. Switch

114
Q
Which of the following is an encrypted client/server authentication?
A. IPSec
B. VNC
C. IP filtering
D. MAC filtering
A

A. IPSec

115
Q
Which of the following has similar functionalities as a wireless repeater?
A. Basic switch
B. Wireless access point
C. Basic firewall
D. DHCP server
A

B. Wireless access point

116
Q
Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of
the network?
A. Convergence
B. Spanning tree
C. Port mirroring
D. Link state
A

A. Convergence

117
Q
Which of the following should an administrator use to identify where all the MDFs are located within the
network?
A. Wiring schematics
B. Security and network policies
C. Physical network diagram
D. Baseline configurations
A

C. Physical network diagram

118
Q
Which of the following attacks is a social engineering attack?
A. Man-in-the-middle
B. Rootkits
C. Vishing
D. DDoS
A

C. Vishing

119
Q

C. Vishing

A

A. Routing table

120
Q

When testing CAT5e cables that were recently terminated, the testing device reports near end crosstalk.
Which of the following is the MOST likely cause of this problem?
A. The cable jacket is plenum rated.
B. The cable is shielded.
C. The technician used RJ-11 connectors on the wire.
D. The technician did not leave enough twists on the pairs.

A

D. The technician did not leave enough twists on the pairs.

121
Q

A technician installed a wireless network, and it worked as expected during testing. However during the
conference, the network was intermittent at best. Which of the following BEST describes what is occurring?
A. Interference from the satellite dish is causing a broadcast storm.
B. PoE requirements are much greater with multiple users.
C. The AP has reached capacity.
D. The network switches have overheated due to capacity.

A

C. The AP has reached capacity.

122
Q
Which of the following devices will forward broadcast traffic by default?
A. Switch
B. Firewall
C. Bridge
D. Hub
A

D. Hub

123
Q
Which of the following WAN technologies uses a maximum line rate of 2.048Mbps?
A. T3
B. E1
C. ISDN PRI
D. ISDN BRI
A

B. E1

124
Q
Which of the following network protocols is required to allow two computers to communicate within the same
network segment?
A. SSH
B. POP3
C. ARP
D. DNS
A

C. ARP

125
Q
Which of the following devices is unable to differentiate the appropriate destination of intended traffic on a
network?
A. Bridge
B. Unmanaged switch
C. Hub
D. Managed switch
A

C. Hub

126
Q
Which of the following should occur when closing a network project?
A. Update documentation
B. Validate the design
C. Configure the new network devices
D. Develop a project plan
A

A. Update documentation

127
Q
Which of the following utilities would a technician use to determine the location of lost packets on a routed
network?
A. ping
B. nslookup
C. route
D. tracert
A

D. tracert

128
Q

A user has reported a problem with a network device. The network technician has theorized that the device is
faulty and has tested to confirm the theory. Which of the following steps in the troubleshooting methodology
should the technician do NEXT?
A. Establish a theory of probable cause.
B. Implement preventative measures.
C. Implement the solution.
D. Establish a plan of action to resolve the problem.

A

D. Establish a plan of action to resolve the problem.

129
Q

A technician is setting up a temporary wired network for a conference being hosted at the company
headquarters. The purpose of the network is to share files between guests laptops, with no Internet access.
Which of the following devices would BEST accomplish this scenario at a low cost?
A. Bridge
B. Repeater
C. Modem
D. Switch

A

D. Switch

130
Q
Which of the following devices is a technician MOST likely to be connecting to if they are using a rollover
cable?
A. Hub
B. Router
C. UPS
D. Unmanaged switch
A

B. Router

131
Q
Which of the following is the address length of an IPv6 address?
A. 32
B. 64
C. 128
D. 256
A

C. 128

132
Q
Which of the following is intended to be used over existing SONET equipment?
A. 10GBaseER
B. 1000BaseT
C. 10GBaseEW
D. 10GBaseLR
A

C. 10GBaseEW

133
Q

A company is adding more users and has leased more office space five floors below their current office. The
company should install which of the following in the additional space?
A. Smart jack
B. EDF
C. IDF
D. MDF

A

C. IDF

134
Q
An administrator would like to display active TCP connections on a computer. Which of the following
commands would BEST accomplish this?
A. route
B. nslookup
C. ifconfig
D. netstat
A

D. netstat

135
Q
Access point placement is determined during which phase of the wireless network project?
A. Site survey
B. Hand-off
C. Installation
D. Testing
A

A. Site survey

136
Q

Which of the following services does UDP connections provide to application layer protocols?
A. Manage large data sizes using segmentation
B. Secure Kerberos password encryption
C. Transport means without error recovery
D. Ensure delivery through error recovery

A

C. Transport means without error recovery

137
Q

A customer has reported that when using a cable to connect an older laptop to a 100Mbps switch that the link
light does not illuminate. When testing the same cable with a newer 1Gbps switch, it works fine. Which of the
following is the MOST likely cause of the problem?
A. The port on the old switch has failed.
B. The cable is pinned as a crossover.
C. The older switch is not compliant with the new cable specifications.
D. The laptop has a failed network card.

A

B. The cable is pinned as a crossover.

138
Q
Which of the following tools will allow an administrator to troubleshoot connectivity problems between two
networks?
A. winipcfg
B. ipconfig
C. tracert
D. ifconfig
A

C. tracert

139
Q

After upgrading the network switch to a gigabit, one users connection no longer works. Which of the following
would an administrator use to verify the network cable will work at a gigabit speed?
A. Toner probe
B. Certifier
C. Snips
D. Cable stripper

A

B. Certifier

140
Q
Which of the following would be a primary concern to the physical security in a wireless network installation?
A. MAC filtering
B. Key logger
C. Antenna placement
D. WAP placement
A

D. WAP placement

141
Q

An administrator is at a clients site to figure out an intermittent network problem. Which of the following is the
FIRST step in the troubleshooting methodology that should be performed?
A. Implement and test the solution.
B. Create an action plan and solution identifying potential effects.
C. Identify the affected areas of the network.
D. Gather information.

A

D. Gather information.

142
Q
Which of the following uses 802.1q?
A. VLAN
B. QoS
C. Port mirroring
D. 802.1x
A

A. VLAN

143
Q
Which of the following cable types are acceptable to use in an environment where EMI/RFI are present?
(Select TWO).
A. MMF
B. UDP
C. CAT5e
D. STP
E. ST
A

A. MMF & D. STP

144
Q

A user browsing the Internet sees a page displaying the following information: Company policy prohibits access
to the following website.
Which of the following is MOST likely in place at the users company?
A. Content filter
B. Application layer firewall
C. Web load balancer
D. NIDS

A

A. Content filter

145
Q
Which of the following allows the LARGEST distance to be covered in a single segment?
A. 10GBaseLR
B. 10GBaseT
C. 10GBaseSR
D. 10GBaseER
A

D. 10GBaseER

146
Q
Which of the following protocols operates securely at the transport layer?
A. TCP
B. SNMP
C. TLS
D. TCP/IP
A

C. TLS

147
Q
A port scanner identifies that port 143 is open on the firewall and port 25 is closed. Which of the following
protocols is being used by the company?
A. POP3
B. SMTP
C. SNMP
D. IMAP4
A

D. IMAP4

148
Q
A technician changes a VLAN name from VLAN10 to VLAN20 in a switch. Which of the following should be
updated?
A. Wiring diagram
B. Physical network diagram
C. Network baseline
D. Logical network diagram
A

D. Logical network diagram

149
Q
In which of the following wireless standards is MIMO used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

150
Q

Clients begin having network problems and ask the technician to expand the pool of available IP addresses.
On which of the following servers should this be done?
A. DNS
B. TFTP
C. DHCP
D. PKI

A

C. DHCP

151
Q
The 10GBaseT specification is an example of a:
A. transport layer protocol
B. data link layer protocol
C. physical layer protocol
D. network layer protocol
A

C. physical layer protocol

152
Q
If network devices are all plugged into an Ethernet switch, the physical network topology is a:
A. star
B. mesh
C. ring
D. point-to-point
A

A. star

153
Q
Which of the following mitigation techniques would be BEST used against cross-site scripting?
A. Content filtering
B. MAC filtering
C. Policies and procedures
D. User training
A

A. Content filtering

154
Q

A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25
network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which of
the following destination IP addresses must the technician configure on the server to send keep-alive packets
to all the devices?
A. 10.137.24.0
B. 10.137.24.1
C. 10.137.24.127
D. 10.137.24.128

A

C. 10.137.24.127

155
Q
Which of the following protocols can be found at the transport layer?
A. HTTP
B. UDP
C. FTP
D. DNS
A

B. UDP

156
Q
Which of the following authentication protocols is typically employed in Cisco networks?
A. NTLMv2
B. TACACS+
C. Kerberos
D. MS CHAP
A

B. TACACS+

157
Q
Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to
provide better security?
A. WPA
B. WPA2
C. WEP
D. IPSec
A

B. WPA2

158
Q
A user reports that the web browser is indicating the site certificate is not trusted. Which of the following
attacks may be in progress?
A. Man-in-the-middle
B. Denial of service
C. Ping flooding
D. Smurfing
A

A. Man-in-the-middle

159
Q

While troubleshooting DHCP configurations, a technician notices that the address pool is full of active leases
although the workstations may not even be on the network. Which of the following would be the BEST
solution?
A. Disabled the DHCP server and set static IP addresses
B. Increase the lease time on the DHCP server
C. Shorten the lease time on the DHCP server
D. Subnet the IP address

A

C. Shorten the lease time on the DHCP server

160
Q

Which of the following is an example of two-factor authentication?
A. A username and PIN
B. A username and password
C. A username, password, finger print scan, and smart card
D. A username, password, and key fob number

A

D. A username, password, and key fob number

161
Q
Which of the following uses eight groups of characters for addressing?
A. MAC
B. IPv4
C. IPv6
D. DHCP
A

C. IPv6

162
Q
Which of the following WAN technologies uses labels to make forwarding decisions?
A. MPLS
B. Frame-relay
C. ISDN
D. ATM
A

A. MPLS

163
Q

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and
802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator
has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of
the following would MOST likely resolve the users connection issues?
A. Limit the devices to 802.11n only.
B. Enable the SSID broadcast.
C. Enable MAC filtering.
D. Use a WEP 128-bit key.

A

B. Enable the SSID broadcast.

164
Q

An administrator would like to monitor the network to evaluate which employees are using an excessive
amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would
BEST be used?
A. Stateful packet inspection
B. Load balancing
C. Packet sniffing
D. Throughput testing

A

C. Packet sniffing

165
Q

A user is getting very weak signals while trying to connect to wireless. Which of the following should the user
do to help with signal strength?
A. Call the wireless provider and ask for a T3 circuit.
B. Move the wireless router to a better location where line of sight is obtained.
C. Reinstall the operating system to the PC to ensure the newest patches are installed.
D. Install a hub to ensure there is a clear path for the cables to run.

A

B. Move the wireless router to a better location where line of sight is obtained.

166
Q
Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?
A. Latency sensitivity
B. EMI
C. Low bandwidth
D. Crosstalk
A

A. Latency sensitivity

167
Q

A network technician is installing multiple 802.11g WAPs with the same SSID. Which of the following channel
combinations would allow all three WAPs to operate without interfering with each other?
A. 1,6,11
B. 2,6,10
C. 3,5,9
D. 7,9,11

A

A. 1,6,11

168
Q
Which of the following identifies the WLAN a user is connected to?
A. SSID
B. Frequency
C. WEP
D. Channel
A

A. SSID

169
Q

An administrator determines that an attack is taking place on the email server from a group of users on the
same ISP. Which of the following is the BEST way to mitigate an attack on the network?
A. Packet filtering
B. ACL
C. MAC filtering
D. CSU

A

A. Packet filtering

170
Q

A network technician has configured a server with the following IP settings:IP Address:
192.168.1.40/27Default Gateway: 192.168.1.64DNS: 192.168.1.33The server cannot access the Internet.
Which of the following settings needs to be changed?
A. Default gateway
B. IP address
C. VLAN
D. DNS

A

A. Default gateway

171
Q
Which of the following configuration management documents will allow an administrator to troubleshoot a
connectivity problem with a CAT5e cable?
A. Wiring schematic
B. Logical network diagram
C. Physical network diagram
D. Baseline configuration
A

A. Wiring schematic

172
Q
Which of the following protocols does a router use to communicate packets to other routers?
A. RIP
B. VLAN
C. STP
D. VTP
A

A. RIP

173
Q

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the
Internet. Which of the following commands should the technician run FIRST?
A. arp
B. ipconfig
C. tracert
D. route

A

B. ipconfig

174
Q
Which of the following is the default port for SMTP?
A. 21
B. 23
C. 24
D. 25
A

D. 25

175
Q
Which of the following connector types is used to connect a serial cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
A

D. DB-9

176
Q
Which of the following is BEST used to proactively identify if a web server has crashed?
A. IPS
B. Packet sniffer
C. Port scanner
D. Caching engine
A

C. Port scanner

177
Q
A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
A. VLAN
B. Trunking
C. Spanning tree
D. Traffic filtering
A

A. VLAN

178
Q

A customer shares a building with several other tenants. The customer reports that an unencrypted wireless
network has been getting slower while their Internet traffic has steadily been increasing. Which of the following
should be configured to resolve this problem?
A. VLAN
B. MTU
C. WPA
D. SSID

A

C. WPA

179
Q

A network administrator is tasked to deploy wireless in a new building. The building will be used by a company
that manufactures 5GHz cordless phones. Additionally, the wireless system must support a minimum speed of
54Mbps. Which of the following should be deployed to meet the requirements and avoid interference?
A. 802.11a
B. 802.11b
C. 801.11g
D. 802.11n

A

C. 801.11g

180
Q

After a switch upgrade, several users report no connection to the Internet, while other users report no
problems. Which of the following is the MOST likely problem?
A. Wrong gateway
B. Faulty or missing routes
C. No DNS
D. VLAN port assignments

A

D. VLAN port assignments