N10-005 Exam Flashcards
(402 cards)
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page? A. CNAME B. A C. MX D. PTR
B. A
Which of the following technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port Mirroring D. Spanning Tree
D. Spanning Tree
Which of the following BEST describes a switch port? A. Broadcast domain B. Distance vector C. Link state D. Collision domain
D. Collision domain
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not
working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel
C. WAP SSIDs are matching
Which of the following could Kim, a network technician, use to inspect connection setup, request,
and response headers for users connecting to a web server?
A. nbtstat command
B. dig command
C. ipconfig command
D. Protocol analyzer
D. Protocol analyzer
Which of the following address blocks would MOST likely be blocked from crossing a border router? A. 8.0.0.0/8 B. 172.16.0.0/12 C. 122.0.0.0/24 D. 248.0.0.0/8
B. 172.16.0.0/12
Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of a switch? A. traceroute command B. SNMP monitor C. nbtstat command D. dig command
B. SNMP monitor
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites.
Which of the following would MOST likely be used when investigating the problem at Lisa’s
workstation?
A. nslookup
B. route
C. nbtstat
D. arp
A. nslookup
Which of the following is the broadcast address for a network defined as 192.168.0.0/24? A. 192.168.0.255 B. 192.168.0.1 C. 192.168.0.0 D. 192.168.0.253
A. 192.168.0.255
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080
D. 161
E. 162
10 Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A. Loopback plug B. Protocol analyzer C. Smart jack D. Coupler
A. Loopback plug
Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets within the same subnet based on IP addresses
A. Switches packets within the same subnet based on MAC addresses
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity? A. Multimeter B. Loopback plug C. Cable certifier D. CAT3 coupler
B. Loopback plug
Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options
A. Reservations
Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device? A. DNS suffixes B. DHCP relay agent C. Static IP addressing D. Scope configuration
B. DHCP relay agent
Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To
manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface
A. IP address on the native VLAN interface
Which of the following describes a rationale for a network with redundant paths? A. VPN compatibility B. Unified communications implementation C. High availability requirement D. QoS
C. High availability requirement
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A. 802.11a
Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN
D. VPN
20 Which of the following network devices hides network nodes behind one public IP address? A. Layer 3 switch B. Content filter C. VPN server D. Proxy server
D. Proxy server
A VPN concentrator is used for which of the following purposes? A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting
C. Secure network access
Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following
interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
A. FastEthernet 0/0
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch
is working properly but cannot be accessed remotely. Which of the following items is MOST likely
missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT
B. Cryptokey
Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet
downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP
A. SNMP