N10-005 Exam Flashcards

(402 cards)

1
Q
Which of the following DNS records would a web browser access to determine the IP address of
an Internet web page?
A. CNAME
B. A
C. MX
D. PTR
A

B. A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree
A

D. Spanning Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following BEST describes a switch port?
A. Broadcast domain
B. Distance vector
C. Link state
D. Collision domain
A

D. Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not
working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel

A

C. WAP SSIDs are matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following could Kim, a network technician, use to inspect connection setup, request,
and response headers for users connecting to a web server?
A. nbtstat command
B. dig command
C. ipconfig command
D. Protocol analyzer

A

D. Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following address blocks would MOST likely be blocked from crossing a border
router?
A. 8.0.0.0/8
B. 172.16.0.0/12
C. 122.0.0.0/24
D. 248.0.0.0/8
A

B. 172.16.0.0/12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following would Jeff, a technician, MOST likely use to remotely verify port
configuration of a switch?
A. traceroute command
B. SNMP monitor
C. nbtstat command
D. dig command
A

B. SNMP monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites.
Which of the following would MOST likely be used when investigating the problem at Lisa’s
workstation?
A. nslookup
B. route
C. nbtstat
D. arp

A

A. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
A. 192.168.0.255
B. 192.168.0.1
C. 192.168.0.0
D. 192.168.0.253
A

A. 192.168.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to
pass on its default port? (Select TWO).
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080
A

D. 161

E. 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
10
Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking
equipment to attach it to. Which of the following would allow him to test basic functionality of the
NIC?
A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler
A

A. Loopback plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets within the same subnet based on IP addresses

A

A. Switches packets within the same subnet based on MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
A. Multimeter
B. Loopback plug
C. Cable certifier
D. CAT3 coupler
A

B. Loopback plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address
is not leased out from the active scope?
A. Reservations
B. Lease times
C. Removing IPs from the active leases
D. Configuring the DNS options
A

A. Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is needed to allow DHCP to route to a different network separated by a
Layer 3 device?
A. DNS suffixes
B. DHCP relay agent
C. Static IP addressing
D. Scope configuration
A

B. DHCP relay agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To
manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface

A

A. IP address on the native VLAN interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following describes a rationale for a network with redundant paths?
A. VPN compatibility
B. Unified communications implementation
C. High availability requirement
D. QoS
A

C. High availability requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz
frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN
A

D. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
20
Which of the following network devices hides network nodes behind one public IP address?
A. Layer 3 switch
B. Content filter
C. VPN server
D. Proxy server
A

D. Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A VPN concentrator is used for which of the following purposes?
A. MAC filtering
B. Content filtering
C. Secure network access
D. Connectivity troubleshooting
A

C. Secure network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following
interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0

A

A. FastEthernet 0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch
is working properly but cannot be accessed remotely. Which of the following items is MOST likely
missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT

A

B. Cryptokey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet
downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP

A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause? A. Encryption type B. Channel selection C. Antenna placement D. Signal strength 25
B. Channel selection
26
``` Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spatial reuse D. 20MHz channel spacing ```
A. Channel bonding
27
Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause? A. Both T568A and T568B standards are being used. B. STP is disabled. C. The cable is not a crossover. D. The port is not trunked.
C. The cable is not a crossover.
28
Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should Jeff consider for these requirements? (Select TWO). A. Routing table B. Next hop C. Port mirroring D. Port monitoring E. VLANs
C. Port mirroring | E. VLANs
29
A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause? A. Protocol mismatch B. MTU size was not increased for the new distance C. Incorrect VLAN assignment D. Incorrect cabling
D. Incorrect cabling
30
30 Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem? A. VLAN B. MTU C. WPA D. SSID
C. WPA
31
Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue? A. Change the security method B. Reduce the transmission power C. Change the SSID D. Change the frequency
B. Reduce the transmission power
32
Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters? A. PoE settings and VTP configuration B. SNMP configuration only C. IP address and SNMP configuration D. QoS and PoE settings
C. IP address and SNMP configuration
33
Lisa, the network technician, has been instructed to provide connectivity to workstations within a SOHO that is over 800 feet (243 meters) away from the main switch. Which of the following would she install to provide connectivity? A. CAT5e B. CAT6 C. Coaxial D. Multimode fiber
D. Multimode fiber
34
During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario? A. WPA2, SSID enabled, and 802.11n. B. WEP, SSID enabled, and 802.11b. C. WEP, SSID disabled, and 802.11g. D. WPA2, SSID disabled, and 802.11a.
D. WPA2, SSID disabled, and 802.11a.
35
A number of vendors visit a large corporation but are unable to connect to the company’s wireless network. Kim, the network technician, verifies that other users are connected to the network and it seems to be fully operational. Which of the following steps should be taken NEXT to troubleshoot the issue? A. Verify the SSID is enabled. B. Ensure the WAP is up and running. C. Ensure the transmission is not encrypted. D. Verify the physical network is connected to the wireless network.
A. Verify the SSID is enabled.
36
An 801.11g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3- 40 Which is true about the above configuration? A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
37
``` Which of the following is the correct representation of an IPv6 address? A. :: B. 0:0:0:0:0:0:0:0:1 C. 1:2:3:4:AB:CD:EF D. 2001::4860:800f:: ```
A. ::
38
``` Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67 A. DHCP B. FTP C. SNMP D. DNS ```
A. DHCP
39
``` Which of the following default ports are used with DHCP? (Select TWO). A. 22 B. 23 C. 53 D. 67 E. 68 ```
D. 67 | E. 68
40
40 Which of the following is a reason to use dynamic DNS? A. The host IP address is not listed in the firewall. B. The host IP address is assigned by DHCP. C. Static routes cannot be used on the host network. D. A third-party certificate is being used.
B. The host IP address is assigned by DHCP.
41
``` Which of the following virtual components maintains a MAC-to-port forwarding table? A. Virtual PBX B. Virtual desktop C. Virtual switch D. Virtual server ```
C. Virtual switch
42
Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room. Arriving at the conference room, Jeff realizes that the laptop is in process of reconnecting to the wireless network. Which of the following is a common wireless problem that can cause this issue? A. Mismatched SSID B. Incorrect encryption type C. Weak signal strength D. Increased latency
C. Weak signal strength
43
Kim, a network administrator, has made changes to the DHCP leasing setup for a given network and is expecting all devices to recognize the changes shortly. However, after a full week, none of the machines on the company network are grabbing new addresses with the new lease time. Which of the following is the problem? A. The lease time on the original configuration was too long. B. The firewall was never configured to recognize the changes. C. The DHCP server was never restarted, so changes never took affect. D. The lease time on the original configuration was too short.
A. The lease time on the original configuration was too long.
44
Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to host a website from a server within a privately addressed network and make it publicly available. Which of the following would have to be configured on the router to allow the public to access the website from one of the static IP addresses? A. QoS monitoring B. Static NAT C. VLAN tagging D. MAC filtering
B. Static NAT
45
``` Which of the following default services uses TCP/UDP port 88? A. LDAP B. IGMP C. HTTP D. Kerberos ```
D. Kerberos
46
``` Which of the following virtualized components would provide a secure operating environment for a business user? A. Virtual PBX B. Virtual switch C. Virtual desktop D. Virtual SAN ```
C. Virtual desktop
47
``` Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 ```
B. Layer 2 | C. Layer 3
48
Which of the following examples would require a private static IP address, but not a public static IP address? A. A PDA connecting to the wireless network. B. A laptop that is deployed on a LAN. C. A file server deployed in the internal datacenter. D. An Internet facing web server for external access.
C. A file server deployed in the internal datacenter
49
Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a large office. Many of the computers are showing moderate to weak signals even though there are two APs less then 15 feet (4 meters) away in either direction. Which of the following is MOST likely the cause? A. The local antennas are not powerful enough. B. There is an SSID mismatch. C. The receiver sensitivity is too high. D. The closest APs are down.
D. The closest APs are down.
50
50 Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue? A. Incorrect VLAN tagging B. Missing helper addresses C. Wrong default gateway D. Improper routing protocols 50
B. Missing helper addresses
51
A new small business needs a network solution that provides at least 50Mbps of bandwidth and supports full duplex communication. Which of the following meets those needs? A. 10/100 layer 2 switch B. 2.4GHz 802.11g C. 5.0GHz 802.11a D. 10Base2 Ethernet
A. 10/100 layer 2 switch
52
``` Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically? A. Kerberos B. BIND C. WINS D. DHCP ```
D. DHCP
53
Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue? A. Enable wireless multimedia (WMM) for QoS B. Use the 40MHz channels in the 2.4GHz band C. Enable access point antenna isolation D. Limit the clients to 802.11g compatible laptops
A. Enable wireless multimedia (WMM) for QoS
54
Kim, a network administrator, is configuring a switch with an LACP port group for uplink. She plugs in the secondary uplink of the group, and shortly thereafter receives widespread reports that the network is malfunctioning. Which of the following is MOST likely the cause? A. A network loop was created due to a misconfiguration of the port group. B. The port on the switch for the new secondary link was never enabled. C. The LACP group was mistakenly configured to do layer 2 + 3 + 4 hashing for its link balancing. D. The LACP group was only configured to do layer 2 hashing for its link balancing.
A. A network loop was created due to a misconfiguration of the port group.
55
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Kim, a network administrator, is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering? A. CAT5e connection between offices via the patch panel located in building’s communication closet. B. CAT5e cable run through ceiling in the public space between offices. C. VPN between routers located in each office space. D. A WEP encrypted wireless bridge with directional antennae between offices.
C. VPN between routers located in each office space.
56
Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem? A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable. B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. C. Manually adjust the duplex mode on the server’s link. D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one.
A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
57
``` To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following? A. Only the 5GHz band B. Only the 2.4GHz band C. Only the 900MHz band D. Both 2.4GHz and 5GHz bands ```
A. Only the 5GHz band
58
Clients are unable to connect to the wireless network. The network is secured with WPA2- Enterprise. Which of the following is MOST likely the cause of the problem? A. MAC address authentication is being used. B. The RADIUS server is down. C. The users are using incorrect passwords. D. The PSK is wrong.
B. The RADIUS server is down.
59
Jeff, a user, reports getting a “This page cannot be displayed” error message in his web browser. However, Jeff can ping the default gateway. Which of the following is the MOST likely cause of the problem? A. SSL certificates are expired B. Incorrect WINS server C. The browser is unsupported D. Incorrect DNS settings
D. Incorrect DNS settings
60
60 A small business would like to connect a second building on their property to the network. The building is about 200 meters (656 feet) away from the main building. Which of the following would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building? A. 10GBase-LW B. 1000Base-LX C. 1000Base-SX D. 1000BaseT
C. 1000Base-SX
61
Lisa, a network technician, has implemented DHCP on the network last week. Employees are now reporting duplicate IP addresses and network connectivity errors. Which of the following would cause duplicate IP addresses on the network? A. A second DHCP server is on the network. B. The network IP leases are expiring and not renewing. C. The DNS record A pointers are incorrect. D. The DHCP server has run out of IP addresses to issue to clients.
A. A second DHCP server is on the network.
62
Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity? A. Behavioral Based IDS B. Signature Based IDS C. Behavioral Based IPS D. Signature Based IPS
D. Signature Based IPS
63
``` Which of the following protocols uses port 3389? A. IMAP B. DHCP C. SSH D. RDP ```
D. RDP
64
Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Zach perform FIRST before responding to the ticket? A. Determine if anything has changed. B. Test a theory to determine a cause. C. Establish a plan of action to resolve the problem. D. Escalate the problem if necessary.
A. Determine if anything has changed.
65
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? A. Enable mixed mode B. Disable SSID C. Disable encryption D. Enable ‘n’ only mode
A. Enable mixed mode
66
Zach, a technician, is installing a new wireless network. There are currently no wireless devices in the area. Which of the following should Zach consider before installing the new devices? A. Frequencies B. SSID broadcast C. WAP placement D. Channels
C. WAP placement
67
Zach, a user, cannot access any network resources. The technician has determined that the problem is isolated to Zach, and that there have not been any changes to his workstation or switch port recently. Which of the following steps in the troubleshooting methodology should the technician do NEXT? A. Establish a plan of action to resolve the problem. B. Implement preventative measures. C. Implement the solution or escalate as necessary. D. Establish a theory of probable cause.
D. Establish a theory of probable cause.
68
Zach, a customer, wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer? A. CAT3 B. CAT5 C. CAT6 D. Fiber
D. Fiber
69
``` A layer 3 switch can move packets between subnets based on which of the following criteria? A. 802.1q tag B. Port C. Application D. IP address ```
D. IP address
70
70 Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present? A. Reverse ARP B. Full duplex on the fiber link C. PoE D. 802.1q trunking
D. 802.1q trunking
71
``` A managed switch offers which of the following benefits over an unmanaged switch? (Select TWO). A. 802.1q B. SNMP C. Gigabit D. Layer 2 forwarding E. Fewer collision domains ```
A. 802.1q | B. SNMP
72
After installing new cabling, Kim, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem? A. Multimeter B. Cable certifier C. Cable tester D. Toner probe
B. Cable certifier
73
A new network printer needs to be installed in the finance department. The switch port, server, and printer NIC have been configured properly but no link light is coming up when the printer is plugged into the wall port. Which of the following tools would Jeff, an administrator, use to diagnose the problem? A. Cable tester B. Protocol analyzer C. OTDR D. Crimper
A. Cable tester
74
Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port. Which of the following configuration changes would facilitate access? A. Traffic filtering B. Trunking C. MAC filtering D. Port mirroring
B. Trunking
75
``` Zach, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO). A. WAPs B. Routers C. Patch panels D. Hubs E. Bridges F. VLANs ```
B. Routers | F. VLANs
76
Which of the following routing protocols utilizes only hop count as a metric, broadcasts its routing table every 30 seconds by default, and has a MAXIMUM hop count of 15? A. Interior Gateway Routing Protocol (IGRP) B. Routing Information Protocol (RIP) C. Open Shortest Path First (OSPF) D. Border Gateway Routing Protocol (BGP)
B. Routing Information Protocol (RIP)
77
``` Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443 ```
C. 143
78
``` Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248 ```
A. 255.255.255.0
79
``` Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389 ```
B. 53
80
``` 80 Which of the following is a Class A private IP address? A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0.100 ```
B. 10.1.1.45
81
Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following commands can Zach use to BEST troubleshoot this issue? A. netsh B. nslookup C. ipconfig D. tracert
A. netsh
82
After a brownout, Zach, a user, can connect to the internal network, but not the Internet. Which of the following is the company’s DSL router experiencing that is causing this issue? A. Switching loop B. Power failure C. Broadcast storm D. Duplicate IP address
B. Power failure
83
Lisa, a technician, is asked to install a wireless router in a company’s public café area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A. Content filtering on the wireless access point B. Allow traffic from the wireless access point C. Block traffic from the wireless access point D. Packet filtering on the wireless access point
C. Block traffic from the wireless access point
84
Lisa, an administrator, attempts to open a web page and sees the following error: ‘Error 404: Page not found’. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7
A. Layer 1
85
Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside? A. Network B. Data link C. Transport D. Session
A. Network
86
Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected.
B. An incorrect subnet mask has been entered in the WAP configuration.
87
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem? A. The subnet mask is incorrect. B. A routing loop has occurred. C. Jeff used a crossover cable to connect the switch to the gateway. D. The server is missing default-gateway information.
D. The server is missing default-gateway information.
88
Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Zach checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet0/10 Switchport trunk encapsulation dot1q Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections? A. The servers have not had VLAN tagging enabled on their NICs. B. Speed and duplex have not been set. C. VLAN tagging was not set on the trunk. D. The servers have been connected with CAT5 cable.
B. Speed and duplex have not been set.
89
``` 1000BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet). B. 100 meters (328 feet). C. 500 meters (1640 feet). D. 1000 meters (3280 feet). ```
B. 100 meters (328 feet).
90
``` 90 Which of the following DNS record types provides the hostname to IP address mapping? A. A record B. NS record C. CNAME record D. MX record ```
A. A record
91
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID
A. Incorrect DNS
92
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue? A. Increased uptime B. Caching engines C. Traffic shaping D. Load balancing
C. Traffic shaping
93
Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement? A. MS-CHAP B. Kerberos C. TACACS+ D. PKI
C. TACACS+
94
``` Which of the following uses copper wiring? A. 10GBaseER B. 10GBaseLW C. 100BaseFX D. 1000BaseT ```
D. 1000BaseT
95
``` Which of the following cables covers the LONGEST distance? A. 10GBaseT B. 10GBaseFR C. 100BaseTX D. 1000BaseX ```
B. 10GBaseFR
96
Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory? A. Traffic analysis B. SNMP C. History logs D. System logs
A. Traffic analysis
97
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following? A. Packet sniffing B. Packet filter C. Stateful inspection D. Content filter
C. Stateful inspection
98
``` Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO). A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP ```
A. High availability | B. Fault tolerance
99
``` Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding ```
A. CSMA/CA
100
100 Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario? A. Event logs B. Baselines C. Change management D. Syslog
D. Syslog
101
Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device’s MIB. Which of the following should she use? A. SNMP B. Traffic analysis C. Syslog D. Asset management
A. SNMP
102
Users have reported slow access times when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server? A. arp B. route C. ipconfig D. tracert
D. tracert
103
Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants to use the workstation’s MAC address. Which of the following protocols would provide the needed information? A. DHCP B. ARP C. DNS D. PING
B. ARP
104
``` Which of the following OSI layers performs error detection using a Frame Check Sequence? A. Session B. Transport C. Physical D. Data link ```
D. Data link
105
``` Which of the following VPN methods is BEST used for connecting a remote office to the main company office? A. WEP-to-WPA B. RDP-to-RAS C. Client-to-site D. Site-to-site ```
D. Site-to-site
106
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location? A. Smart jack B. MDF C. VPN D. 66 block
B. MDF
107
Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach’s own country. Which of the following security measures could he use to set up this functionality? A. MAC filtering B. Port filtering C. IP filtering D. TLS
C. IP filtering
108
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use? A. traceroute B. tracert C. ifconfig D. ipconfig
C. ifconfig
109
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective? A. Content filtering B. Port filtering C. MAC filtering D. IP filtering
B. Port filtering
110
110 Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of the following would be the NEXT step in the troubleshooting process? A. Implement the solution B. Establish a plan C. Document findings D. Escalate the issue
D. Escalate the issue
111
``` Which of the following is the MAXIMUM hop count for RIP before the network is considered converged? A. 1 B. 5 C. 10 D. 15 ```
D. 15
112
A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Lisa, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement? A. Syslog B. RADIUS C. IPSec D. Network sniffer
A. Syslog
113
Jeff, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement? A. Set a separate VLAN on each WAP with the same encryption type. B. Set the SSID on each WAP and set contiguous WAPs to different channels. C. Set the SSID on each WAP and set contiguous WAPs to the same channel. D. Set a separate VLAN on each WAP with the same frequency.
B. Set the SSID on each WAP and set contiguous WAPs to different channels.
114
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? A. 21 B. 22 C. 23 D. 25
A. 21
115
Lisa, a network consultant, is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every corner of the house. Which of the following additional information will Lisa need to determine the equipment for the installation? (Select TWO). A. The length of the house B. How many rooms are in the house C. How many users will be using the wireless network D. The building material of the house E. The cost of the house
A. The length of the house | D. The building material of the house
116
Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO). A. arp B. dig C. route D. nslookup E. netstat
B. dig | D. nslookup
117
``` Which of the following DNS records would be queried to locate a company’s mail server? A. A B. MX C. AAAA D. CNAME ```
B. MX
118
``` Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops? A. RIP B. OSPF C. STP D. EGP ```
C. STP
119
Which of the following network appliances can BEST be described as allowing multiple servers to share requests for a website through the same public IP address? A. VPN concentrator B. Content filter C. Load balancer D. Proxy server
C. Load balancer
120
``` 120 Which of the following connectors would Kim, a technician, use only for RG-6 cables? A. F-connector B. MTRJ C. RJ-45 D. RS-232 ```
A. F-connector
121
``` Which of the following technologies implements authentication headers and encapsulating security payloads? A. IPSec B. ISAKMP C. TLS D. SSL VPN ```
A. IPSec
122
``` Which of the following implements two-factor authentication? A. Username and password B. Fingerprint and facial recognition C. Check card and PIN D. PIN and password ```
C. Check card and PIN
123
``` Which of the following protocols works at the LOWEST layer of the OSI model? A. L2TP B. PPTP C. ISAKMP D. IPSec ```
A. L2TP
124
``` Which of the following protocols provides security through encryption? (Select TWO). A. PPPoE B. L2TP C. IPSec D. PPP E. TLS ```
C. IPSec | E. TLS
125
``` Which of the following records would be used for a Reverse DNS lookup? A. AAAA B. MX C. PTR D. A ```
C. PTR
126
``` Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO). A. 21 B. 22 C. 23 D. 53 E. 67 ```
B. 22 | C. 23
127
``` Which of the following protocols is used to resolve FQDNs to IP addresses? A. SSH B. FTP C. DNS D. HTTP ```
C. DNS
128
``` IP address based routing occurs on which of the following layers of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 ```
B. Layer 3
129
``` Data arranged into packets would be on which of the following layers of the OSI model? A. Datagram B. Transport C. Presentation D. Network ```
D. Network
130
``` 130 Which of the following DNS record types is used for IPv6 resolution? A. MX B. AAAA C. A D. PTR ```
B. AAAA
131
Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this? A. Decreasing radio strength B. MAC filtering C. WEP encryption D. SSID broadcast disable
A. Decreasing radio strength
132
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this? A. WPA encryption B. MAC filtering C. Changing antenna type D. Decreasing radio strength
C. Changing antenna type
133
Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a high value of NEXT. Which of the following represents the cause? A. Crosstalk B. TX/RX reversed C. Split cables D. DB loss
A. Crosstalk
134
Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server is successful. Which of the following software tools is used to check if NetBIOS is enabled? A. netstat B. arp C. nbtstat D. nslookup
C. nbtstat
135
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO). A. Router B. Wi-Fi Access point C. Cable modem D. Ten WiMAX adapters E. Ten CAT6 patch cables
A. Router | B. Wi-Fi Access point
136
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587? A. 20 B. 21 C. 23 D. 25
D. 25
137
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this? A. 20 B. 80 C. 143 D. 443
B. 80
138
An office would like to set up an unsecured wireless network for their customers in their lounge area. Which of the following firewall capabilities should be configured to prevent the wireless traffic from communicating with the office’s LAN traffic?
C. Packet filtering
139
Kim, an employee, connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is she MOST likely using to establish the connection? A. RDP B. RTP C. RIP D. RAS
A. RDP
140
``` 140 Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim? A. Web server B. Syslog C. Network sniffer D. SNMP ```
C. Network sniffer
141
``` Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 ```
B. 255.255.0.0
142
``` Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123 ```
C. 69
143
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a list of the host names connected to the network? A. ping B. nbstat C. arp D. msconfig
B. nbstat
144
``` Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A. Multimode fiber B. CAT6a C. Single mode fiber D. Coaxial ```
C. Single mode fiber
145
``` Which of the following wireless technologies has the LARGEST cell size? A. 802.11a B. 802.3af C. 802.11g D. 802.11i ```
C. 802.11g
146
``` Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity ```
D. Diversity
147
``` Which of the following are available speeds when using 802.11b? (Select TWO). A. 1 Mb/s B. 5.5 Mb/s C. 6 Mb/s D. 12 Mb/s E. 54 Mb/s ```
A. 1 Mb/s | B. 5.5 Mb/s
148
``` RADAR avoidance technologies are built into which of the following technologies? A. 802.11a B. 802.11b C. 802.11g D. 802.11i ```
A. 802.11a
149
``` Which of the following technologies can cause interference for 802.11g? A. RADAR B. 802.11a C. IrDA D. Bluetooth ```
D. Bluetooth
150
``` 150 Which of the following technologies would be used in a large office area that has a lot of 2.4GHz noise? A. 802.3af B. 802.1q C. 802.11a D. MIMO ```
C. 802.11a
151
``` Which of the following occurs when antenna gain is increased on an access point? A. Connection speeds decrease B. Throughput decreases C. Cell size increases D. Attenuation increases ```
C. Cell size increases
152
``` Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. WPA2 PSK D. WPA Personal ```
B. 104/128 bit WEP
153
``` Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST widely used with remote access? A. PKI B. VPN C. MS-CHAP D. RADIUS ```
D. RADIUS
154
``` Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP ```
D. SNMP
155
``` Which of the following does SNMPv3 BEST provide over previous versions? A. Increased security B. Simplified management C. More data types D. Higher productivity ```
A. Increased security
156
``` Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS ```
C. PuTTY
157
Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this? A. History logs B. Event logs C. Syslog server D. Traffic analyzer
C. Syslog server
158
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem? A. TX/RX reversed B. Interference C. Cable length D. Bad connectors
A. TX/RX reversed
159
Users are reporting that Internet performance is slow. Jeff, the technician, has determined that the Internet connection is saturated. Which of the following is BEST used to determine the source, destination, and type of the traffic? A. Netflow B. Protocol analyzer C. Network sniffer D. SNMP
A. Netflow
160
``` 160 Which of the following is a valid IPv6 address? A. 1056:958:E486::F8:8962 B. 1596:H593:B5D8::B859 C. 2048::9584:A6B8::0983 D. 4820::0985:489D::8761 ```
A. 1056:958:E486::F8:8962
161
``` Which of the following OSI model layers is responsible for the transmission of bits? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 ```
A. Layer 1
162
``` Frames are the Protocol Data Unit for which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 ```
B. Layer 2
163
Lisa, a network administrator, wants to automatically assign 168.254.1.0/24 addresses to computers on the network. Which of the following will need to be configured? A. DHCP addressing B. Private addressing C. DNS addressing D. APIPA addressing
A. DHCP addressing
164
``` IPSec relies on which of the following protocols? (Select TWO). A. ESP B. EAP C. AH D. PKI E. RDP ```
A. ESP | C. AH
165
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred? A. Port security is blocking all traffic. B. An IDS is blocking all traffic. C. Implicit deny is blocking all traffic. D. SMTP is blocking all traffic.
C. Implicit deny is blocking all traffic.
166
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (Select TWO). A. Allow UDP port 21 outbound B. Allow UDP port 22 outbound C. Allow UDP port 80 outbound D. Allow TCP port 21 outbound E. Allow TCP port 22 outbound F. Allow TCP port 80 outbound
E. Allow TCP port 22 outbound | F. Allow TCP port 80 outbound
167
How many collision domains and broadcast domains are present on a 24-port switch with no VLAN assignments? A. 1 collision domain, 1 broadcast domain B. 1 collision domain, 24 broadcast domains C. 24 collision domains, 1 broadcast domain D. 24 collision domains, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
168
Users report that an internal web server is not responding. Which of the following commands could be used on the server to confirm that the web service is running? A. nbtstat B. traceroute C. nslookup D. netstat
D. netstat
169
``` Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following commands would assist Kim in determining the computer name of the workstation? (Select TWO). A. nbtstat B. net statistics C. traceroute D. netstat E. nslookup ```
A. nbtstat | B. net statistics
170
``` 170 After a router upgrade, Jeff, the network administrator, needs to determine if workstations still have the correct default gateway. Which of the following commands could he use? (Select TWO). A. netstat B. ipconfig C. dig D. traceroute E. nbtstat ```
A. netstat | B. ipconfig
171
Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack? A. Drop 19:21:68:10:20:00 B. Permit ::1/32 C. Permit A0:H1:B0:90:1D:6C D. Drop 192.168.10.20
A. Drop 19:21:68:10:20:00
172
``` Which of the following MUST be used to implement a wireless network supporting EAP-TTLS? A. Kerberos B. Two factor authentication C. CHAP D. PKI ```
D. PKI
173
After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Jeff implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office? A. NAT B. PAT C. DMZ D. ACL
A. NAT
174
``` Which of the following OSI layers is responsible for encrypting HTTPS traffic? A. 3 B. 4 C. 5 D. 6 ```
D. 6
175
``` 00:12:34:56:78 can be used in which of the following? A. WPA-PSK password B. Channel selection C. WEP key D. MAC filtering ```
A. WPA-PSK password
176
Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented? A. WEP B. TKIP C. WPA2 D. WPA Enterprise
C. WPA2
177
``` Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the following did she MOST likely setup? A. Deep packet inspection B. DDNS C. Port forwarding D. DMZ ```
C. Port forwarding
178
``` Which of the following protocols is used by the ping command? A. SMTP B. ICMP C. TFTP D. ARP ```
B. ICMP
179
Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead? A. Change the DNS server IP on the client B. Information gathering C. Change the workstation IP address D. Establish a plan of action
B. Information gathering
180
``` 180 In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels? A. MDF B. Caching engines C. Demarc D. IDF ```
A. MDF
181
Which of the following is the BEST encryption protocol to use to allow customers to access a secure website from the Internet without using VPNs? A. IPSec B. TLS C. SSL version 1 D. SSL version 2
B. TLS
182
``` Which of the following wireless security measures, although widely implemented, does not provide strong security? A. IPSec B. WPA2 C. MAC address filtering D. 802.1x ```
C. MAC address filtering
183
After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO). A. Bad Ethernet switch port B. TX/RX reversed C. Bad connectors D. Bad patch cable E. Mismatched MTU
C. Bad connectors | D. Bad patch cable
184
``` Kim, a technician, suspects an attacker has accessed the network. Which of the following would BEST help confirm her theory? A. SNMP B. Traffic analysis C. Network sniffer D. System logs ```
D. System logs
185
Zach, a technician, notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause? A. Split cable B. EMI C. DB loss D. Crosstalk
C. DB loss
186
Which of the following wiring standards has both ends colored as follows: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown? A. T568A B. T568B C. Multimode fiber D. Crossover
B. T568B
187
Zach, a technician, working remotely cannot connect to the database server. The server does not respond when he tries to ping it. Zach wants to determine which network device is preventing ping from responding. Which of the following commands should he use to determine this? A. tracert B. nslookup C. dig D. ipconfig
A. tracert
188
Which of the following could be installed to allow a home user with one desktop computer to economically have Internet access in every room in the house? A. Fiber optic B. CAT6 C. Broadband over powerline D. CAT5
C. Broadband over powerline
189
``` Which of the following connectors push and twist on? A. ST B. LC C. MTRJ D. SC ```
A. ST
190
``` 190 Which of the following would be used to supply Internet to a cable modem? A. RJ-11 connector B. RJ-45 connector C. F-connector D. BNC connector ```
C. F-connector
191
``` Which of the following 802.11 standards transmits the signals the GREATEST distance? A. a B. b C. g D. n ```
D. n
192
``` Which of the following wireless authentication methods provides the GREATEST amount of security? A. WEP B. WPA Enterprise C. WPA Personal D. WPA2 Personal ```
B. WPA Enterprise
193
``` Antenna gain is measured in which of the following units? A. dBi B. GHz C. mW D. MHz ```
A. dBi
194
``` Which of the following fiber types is MOST often used indoors? A. Plenum B. Modal conditioning C. Multimode D. Singlemode ```
C. Multimode
195
``` Which of the following types of fiber connectors is used on an SFP? A. MTRJ B. LC C. SC D. ST ```
B. LC
196
``` Horizontal cable is terminated on which device in the wiring closet? A. Demarc B. Switch C. Punch down tool D. Patch panel ```
D. Patch panel
197
``` Which of the following are fiber connectors? (Select TWO). A. LC B. MTRJ C. BNC D. T1 E. DB-9 ```
A. LC | B. MTRJ
198
``` Which of the following is the standard 802.11g channel separation? A. 11 MHz B. 20 MHz C. 54 MHz D. 20 GHz ```
B. 20 MHz
199
``` Which of the following devices is installed by a telecommunications company to deliver a T1 or E1? A. Smart jack B. CSU/DSU C. 66 block D. Modem ```
A. Smart jack
200
200 Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used? A. PEAP B. WPA Personal C. WPA2 Enterprise D. WPA2 PSK
D. WPA2 PSK
201
``` 802.3 defines which of the following LAN access methods? A. CSMA/CA B. CSMA/CD C. DSL D. MPLS ```
B. CSMA/CD
202
``` Which of the following technologies allows more than two transceivers with an access point? A. MIMO B. FIFO C. 802.1x D. WPA ```
A. MIMO
203
``` A patch cable terminated with one end as T568A and the other as T568B will create which of the following cable types? A. Crossover B. Serial C. Roll over D. Straight through ```
A. Crossover
204
``` Which of the following will a firewall NOT protect the network from? A. Intrusion B. DDoS C. Denial of Service D. Spam e-mails ```
D. Spam e-mails
205
``` Which of the following is a standard measure of signal power? A. MHz B. mips C. dBm D. Gbps ```
C. dBm
206
``` Which of the following would Jeff, a technician, use for a service that needs fast communication and is unaffected by packet loss? A. UDP B. ARP C. ICMP D. TCP ```
A. UDP
207
``` Which of the following circuits provides the MOST bandwidth? A. T3 B. OC3 C. T1 D. PRI ```
B. OC3
208
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router interfaces. Which of the following is MOST likely used as a source for creating the charts? A. SNMP B. Port scanner C. Traffic sniffer D. SYSLOG
A. SNMP
209
``` Which of the following technologies is associated with the DOCSIS standard? A. Cable B. Dialup C. Wireless D. Cellular ```
A. Cable
210
``` 210 Which of the following is a contention based broadcast technology used for wireless networking? A. CSMA/CA B. CSMA/CD C. CSU/DSU D. TCP/IP ```
A. CSMA/CA
211
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use? A. 100BaseFX B. 10GBaseT C. MPLS D. Coaxial
A. 100BaseFX
212
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the network issue? A. ipconfig B. arp C. tracert D. netstat
C. tracert
213
``` Which of the following are components of IPSec? (Select TWO). A. AH B. ESP C. SSH D. ICA E. TLS ```
A. AH | B. ESP
214
``` In IPSec, which of the following is an agreement on how devices will securely transmit information? A. SA B. ESP C. AH D. ISAKMP ```
A. SA
215
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured? A. Allow TCP port 3389 outbound B. Allow UDP port 3389 inbound C. Allow UDP port 3389 outbound D. Allow TCP port 3389 inbound
D. Allow TCP port 3389 inbound
216
``` An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO). A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110 ```
B. Allow TCP port 25 | C. Allow TCP port 110
217
``` Which of the following OSI model layers is responsible for data encryption? A. Application B. Presentation C. Physical D. Data Link ```
B. Presentation
218
``` Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination? A. RIP B. OSPF C. BGP D. RIPv2 ```
C. BGP
219
``` Which of the following OSI model layers is used for logical addressing? A. Physical B. Transport C. Network D. Data link ```
C. Network
220
``` 220 In which of the following layers of the OSI model does the TCP protocol operate? A. Session B. Network C. Data link D. Transport ```
D. Transport
221
``` At which of the following layers of the OSI model does an unmanaged switch operate? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 ```
B. Layer 2
222
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices? A. PKI B. TACACS+ C. CHAP D. SSH
B. TACACS+
223
``` Which of the following security devices is used in providing packet and MAC address filtering services for the network? A. Host-based proxy server B. Network-based firewall C. IDS D. IPS ```
B. Network-based firewall
224
``` Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections? A. BGP B. SNAT C. RIP D. GPG ```
A. BGP
225
``` Which of the following protocols allows more than three non-overlapping channels? A. 802.11a B. 802.11g C. 802.1q D. 802.15 ```
A. 802.11a
226
``` Which of the following represents the physical address of a network access card? A. FF01:D2:C4:87::11 B. 00-30-48-83-9B-C8 C. 08-9D-35-22-L2-34-FF-21 D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A ```
B. 00-30-48-83-9B-C8
227
``` ADSL, PPP, and ATM all operate at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 7 ```
B. Layer 2
228
``` Which of the following OSI layers BEST describes where an HTTP proxy operates? A. Transport B. Application C. Presentation D. Session ```
A. Transport
229
``` A MAC address is used at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 ```
B. Layer 2
230
230 A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network? A. Fiber multiplexer B. Repeater C. Attenuator D. OTDR
B. Repeater
231
``` A disassociation request is a way to mitigate which of the following threats? A. ARP poisoning B. Rogue AP C. Man-in-the-middle attack D. Botnet ```
B. Rogue AP
232
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Jeff, an administrator? A. DoS attack B. Man-in-the-middle attack C. Smurf attack D. Xmas attack
B. Man-in-the-middle attack
233
``` Which of the following cable types would have the LEAST amount of EMI? A. CAT3 B. CAT5 C. STP CAT6 D. Plenum CAT6 ```
C. STP CAT6
234
``` Which of the following WAN technologies uses four wires for digital and a 66 block? A. Cable B. ATM C. T3 D. POTS ```
D. POTS
235
Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? A. traceroute B. ping C. ipconfig D. netstat
D. netstat
236
``` Which of the following is used to verify configuration updates on a firewall? A. Signature identification B. Access control lists C. Scanning services D. Content filtering ```
A. Signature identification
237
``` Which of the following sizes is the fixed cell length in ATM? A. 8 bytes B. 53 bytes C. 64 kilobytes D. 128 kilobytes ```
B. 53 bytes
238
Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment? A. Hub B. VLAN C. Router D. Server
A. Hub
239
``` Which of the following tools would Zach, an administrator, use to identify opens and shorts? A. Ohmmeter B. Protocol analyzer C. Cable tester D. Multimeter ```
C. Cable tester
240
``` 240 Which of the following technologies relies on a ticket granting server to allow clients to verify their identity? A. TACACS+ B. Kerberos C. PKI D. RADIUS ```
B. Kerberos
241
``` Which of the following authenticates, allows, and controls the execution of router commands? A. PKI B. RADIUS C. Kerberos D. TACACS+ ```
D. TACACS+
242
``` Which of the following is true of NIPS? A. Routes traffic to the proper port B. Detects malicious host traffic C. Detects and prevents harmful traffic D. Prevents traffic on network hosts ```
C. Detects and prevents harmful traffic
243
``` Which of the following network access methods is the MOST secure? A. PPPoE B. SIP C. RSH D. IPSec ```
D. IPSec
244
``` Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n ```
D. 802.11n
245
Which of the following services do TCP connections provide to application layer protocols? (Select TWO). A. Transport services without error recovery B. Large data size manageability using segmentation C. Secure Kerberos password encryption on data D. Delivery through error recovery E. Proxy server authentication
B. Large data size manageability using segmentation | D. Delivery through error recovery
246
Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress? A. Man-in-the-middle B. Denial of service C. Ping flooding D. Smurfing
A. Man-in-the-middle
247
``` Which of the following technologies is used to connect public networks using POTS lines? A. OC3 B. OC12 C. PSTN D. Cable ```
C. PSTN
248
``` Which of the following defines access for a network? A. ACL B. RDP C. RAS D. ARP ```
A. ACL
249
``` Which of the following is a form of encrypting packets for safe, secure data transmission within a network? A. RAS B. PPTP C. IPSec D. ICA ```
C. IPSec
250
``` 250 Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO). A. Packet sniffer B. Honeypot C. Port mirroring D. IPS E. Port scanner F. IDS ```
A. Packet sniffer | C. Port mirroring
251
``` PKI is a method of user authentication which uses which of the following? A. Various router commands B. Access control lists C. Certificate services D. A RADIUS server ```
C. Certificate services
252
Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
D. 802.11n
253
``` Which of the following components would a technician plug into a smart jack? A. 25 pair cable B. 100 pair cable C. Patch cable D. Patch panel ```
C. Patch cable
254
``` Which of the following is used by RADIUS to encrypt messages between the server and the client? A. Public key B. CSU/DSU C. Private key D. Shared secret ```
D. Shared secret
255
``` Which of the following security measures is the LEAST intrusive on an end device? A. NIPS B. Host-based firewall C. Antivirus D. HIDS ```
A. NIPS
256
``` Which of the following is a social engineering attack? A. Worms B. Man-in-the-middle C. Phishing D. Evil twin ```
C. Phishing
257
``` Which of the following performs posture assessments for unknown devices that connect to the network? A. PKI B. EAP C. NAC D. AAA ```
C. NAC
258
``` Which of the following mitigation techniques is MOST effective against a DoS attack? A. IDS B. Antivirus C. Redundancy D. Backups ```
C. Redundancy
259
``` Which of the following is a valid MAC address? A. 00:AB:C4:FE:60:D3 B. 00-AE-S3-BC-90-F7 C. 13-12-BC-DA-97 D. 15:FA:97:44:AB ```
A. 00:AB:C4:FE:60:D3
260
``` 260 Which of the following is an encrypted remote access protocol? A. RDP B. PoE C. RAS D. PPP ```
A. RDP
261
Port scanners and packet sniffers differ in functionality because: A. packet sniffers and port scanners are just different names for the same device. B. packet sniffers can only log events on traffic activity and port scanners can route malicious packets. C. packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs. D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.
D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.
262
A network topology in which the bandwidth dependency is distributed evenly amongst a large number of inter-connected clients is known as a: A. peer-to-peer. B. bus. C. star. D. client/server.
A. peer-to-peer.
263
``` Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? A. VLAN B. MPLS C. VPN D. PSTN ```
B. MPLS
264
A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage? A. netsh lan B. netsh interface C. netsh wlan D. netsh winsock
D. netsh winsock
265
``` Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO). A. Cable modem B. Layer 2 switch C. Router D. NIDS E. Layer 3 switch ```
C. Router | E. Layer 3 switch
266
``` Which of the following operates at OSI layer 2 to forward traffic based on the MAC address? A. Switch B. Proxy Server C. Router D. VPN Concentrator ```
A. Switch
267
``` Which of the following is used to provide hot standby capabilities using paired routers? A. CARP B. L2TP C. PPTP D. ISAKMP ```
A. CARP
268
A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting? A. Channel B. SSID C. Firewall rule D. Encryption
A. Channel
269
Which of the following is a purpose of a VLAN? A. Decreases bandwidth on a network B. Segments broadcast traffic C. Increases port speed D. Allows another connection to the router
B. Segments broadcast traffic
270
``` 270 Which of the following default ports would need to be open on a firewall to allow remote desktop access? A. 143 B. 443 C. 3389 D. 8080 ```
C. 3389
271
``` Which of the following DNS records would allow for a website to have more than one FQDN? A. TXT B. PTR C. MX D. CNAME ```
D. CNAME
272
``` Which of the following wireless standards is capable of ONLY operating on 5.8GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11n ```
A. 802.11a
273
``` Which of the following protocols are used to connect devices in a secure manner? (Select TWO). A. TELNET B. SSH C. RDP D. HTTP E. DNS F. FTP ```
B. SSH | C. RDP
274
``` Which of the following utilities would a technician use to determine the location of lost packets on a routed network? A. ping B. nslookup C. route D. tracert ```
D. tracert
275
``` Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel? A. Routing loop B. MTU black hole C. Framing errors D. SYN flood ```
B. MTU black hole
276
``` Which of the following could be used to estimate RTT across a router? A. dig B. traceroute C. arp D. uptime ```
B. traceroute
277
``` Which of the following DNS records allows for reverse lookup of a domain? A. PTR B. AAAA C. A D. MX ```
A. PTR
278
Which of the following BEST describes the difference between layer 2 switching and layer 2 routing? A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet. B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet. C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace. D. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.
B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet.
279
A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic? A. STP blocking B. Duplicate IP addresses C. MTU mismatch D. Switching loop
D. Switching loop
280
``` 280 No link lights on a switch’s SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of -9. Which of the following types of cable is MOST likely being tested? A. Fiber B. CAT3 C. CAT5e D. CAT6a ```
A. Fiber
281
Several users from the same building are reporting connectivity issues. The SFP at that building’s IDF switch is showing a link light, but there is no link light to the corresponding switch’s SFP at the MDF. Which of the following is the MOST likely cause? A. A crossover cable is being used. B. DB loss is too high on all strands. C. Only TX or RX strand is working. D. TX and RX are reversed.
C. Only TX or RX strand is working.
282
Joe, a user, reports that his PC is the only one that does not have network connectivity. All the wiring has been tested properly and the problem still exists. Joe is getting an APIPA address. Which of the following is the MOST likely cause? A. Crossover cable is being used B. Switch was powered off C. PoE is disabled on the port D. Port on the switch is disabled
D. Port on the switch is disabled
283
``` Which of the following IP addresses would be classified as private? A. 10.100.200.0 B. 169.253.10.20 C. 172.168.5.0 D. 200.100.25.0 ```
A. 10.100.200.0
284
Joe, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should Joe consider for these requirements? (Select TWO). A. Routing table B. Next hop C. Port mirroring D. Port monitoring E. VLANs
C. Port mirroring | E. VLANs
285
``` A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs? A. IPSec B. SSL C. ISAKMP D. SNMP ```
D. SNMP
286
A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check? A. The arp table of the new customer’s router. B. The route table of the next-hop router. C. The route table of the new customer’s router. D. The arp table of a network user.
C. The route table of the new customer’s router.
287
A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause? A. A missing route on the alarm device. B. Incorrect VLAN assignment on the router. C. A missing route on the network routers. D. Incorrect speed/duplex setting on the alarm device.
D. Incorrect speed/duplex setting on the alarm device.
288
``` Which of the following protocols is used for remote management of devices? A. SNMP B. TFTP C. Syslog D. SMTP ```
A. SNMP
289
``` A DSL modem connects to the provider’s network using which of the following authentication techniques? A. PoE B. MS-CHAP C. PPPoE D. EAP ```
C. PPPoE
290
290 A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used? A. Cable certifier B. Toner probe C. Cable tester D. Protocol analyzer
A. Cable certifier
291
``` Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following? A. Project management B. Quality of service C. Configuration management D. Bandwidth shaping ```
C. Configuration management
292
``` Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets? A. ifconfig B. ping C. route D. nbtstat ```
B. ping
293
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem? A. Faulty crossover cable B. DNS server is down C. Switching loop D. Outside interface shutdown
D. Outside interface shutdown
294
A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues? A. Router logs B. History logs C. Startup/bootup config logs D. Event Viewer logs
B. History logs
295
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination? A. The transport OSI model layer and the transport TCP/IP model layer. B. The transport OSI model layer and the Internet TCP/IP model layer. C. The network OSI model layer and the transport TCP/IP model layer. D. The network OSI model layer and the Internet TCP/IP model layer.
A. The transport OSI model layer and the transport TCP/IP model layer.
296
A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block? A. Protocol analyzer B. Multimeter C. Punch down tool D. Toner probe
D. Toner probe
297
``` A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used? A. SCTP B. Packet sniffer C. DCCP D. SNMP ```
D. SNMP
298
A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue? A. Check for switching loops between core and distribution switches. B. Check whether an incorrect VLAN has been assigned to the new distribution switch. C. Check for inconsistent or missing routes between the core and distribution switches. D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.
A. Check for switching loops between core and distribution switches.
299
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO). A. dig B. nslookup C. nbstat D. ifconfig E. ipconfig
D. ifconfig | E. ipconfig
300
``` 300 A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario? A. Crimper B. OTDR C. Throughput tester D. Punch down tool ```
D. Punch down tool
301
A technician is looking to secure an entire network by blocking all non-essential ports. Which of the following devices would BEST provide this functionality? A. Firewall B. Honeynet C. IDS D. IPS
A. Firewall
302
``` CAT6 Ethernet cabling has a rated maximum transmission capability of: A. 10Mbps B. 100Mbps C. 20,000Mbps D. 10,000Mbps ```
D. 10,000Mbps
303
``` Which of the following methods limits access to a network based on characteristics of the network card? A. IP filtering B. MAC filtering C. Port filtering D. Encryption ```
B. MAC filtering
304
``` A router operates at which of the following layers of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 ```
B. Layer 3
305
An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality? A. Router B. Forward proxy C. Load balancer D. Firewall
C. Load balancer
306
Which of the following is an example of two factor authentication? A. Password, device certificate and PIN B. SSL web server certificate and password C. User password and administrator password D. Password and hardware token OTP
D. Password and hardware token OTP
307
``` Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO). A. Telnet B. FTP C. SNMP D. SSH E. RDP ```
A. Telnet | D. SSH
308
The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the: A. Hypervisor B. LPAR. C. Broker D. VDI.
A. Hypervisor
309
``` Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP? A. Connectionless B. Stateful C. Full Duplex D. Quality of Service ```
A. Connectionless
310
310 An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues? A. Limit the devices to 802.11n only B. Enable the SSID broadcast C. Enable MAC filtering D. Use a WEP 128-bit key
B. Enable the SSID broadcast
311
An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason? A. WEP's IV is too small. B. WEP uses RC4 which is easily accessible and not secure. C. WEP uses plain text. D. WEP is not well supported.
A. WEP's IV is too small.
312
An administrator would like to redirect connections to the firewall external interface IP address on port 80 to web server A and connections on port 8080 to web server B. Which of the following technologies would be used for this? A. NAT B. PAT C. NAT-T D. ACL
B. PAT
313
``` On which of the following OSI layers would a computer send ARP packets in order to discover physical addresses? A. Layer 2 B. Layer 3 C. Layer 6 D. Layer 7 ```
A. Layer 2
314
``` When querying a DNS server for an AAAA record, which of the following is an appropriate response? A. 192.168.2.1 B. 00:f3:82:99:a2:b8 C. 61.23.168.192.in-addr.arpa D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf ```
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
315
Joe, a user, reports getting a “This page cannot be displayed” error message in his web browser. However, Joe can ping the default gateway. Which of the following is the MOST likely cause of the problem? A. SSL certificates are expired B. Incorrect WINS server C. The browser is unsupported D. Incorrect DNS settings
D. Incorrect DNS settings
316
``` Which of the following uses IPSec to provide encryption? A. PPPoE B. PPTP C. L2TP D. TLS ```
C. L2TP
317
A technician notices that the application server’s resources are momentary at full capacity for the amount of incoming and outgoing packets outside the LAN. Which of the following tools would be used to find out what IPs are connecting to the server and in active mode? A. ping B. tracert C. netstat D. ipconfig
C. netstat
318
A server technician notices that some changes were implemented on a server during nonbusiness hours. Which of the following would allow the technician to identify the last time an administrator was remotely connected to the server? A. Network sniffer B. Traffic analyzer C. System log D. Security log
D. Security log
319
``` Which of the following would a server technician use before deploying an email server to mitigate A. Disable unused services B. Network cut sheet C. Baseline image D. Enable all services ```
A. Disable unused services
320
320 A network technician is installing a honeypot in the DMZ and wants to create a report of all the UDP protocols that are being used. Which of the following firewalls can be used to track this? A. Dual homed B. Packet filtering C. Kernel proxy D. Stateful-inspection
D. Stateful-inspection
321
A network technician is examining network traffic before setting up QoS on the switch. Which of the following tools is the technician MOST likely using to examine the network traffic? A. Connectivity software B. Throughput tester C. ipconfig D. Protocol analyzer
D. Protocol analyzer
322
A technician is configuring a wireless network. Which of the following should the technician setup in order to prevent intruders if the encryption key gets compromised? A. WAP placement B. MAC filtering C. WPA2 PSK D. Disable SSID broadcasting
B. MAC filtering
323
A technician is troubleshooting network connectivity on a laptop. The user reports that a new network interface card (NIC) was recently installed. The technician thinks the NIC has not been properly configured to access the network. Which of the following network troubleshooting steps should the technician do NEXT? A. Implement the solution. B. Escalate the problem to another technician. C. Test the theory to determine cause. D. Establish a plan of action to resolve the problem.
C. Test the theory to determine cause.
324
An administrator wants to prevent traffic from a specific VLAN from reaching any internal resources, but will be able to reach the Internet. The BEST technique to accomplish this task will be: A. an ACL B. a MAC-filtering table C. a static gateway D. aTLS tunnel
A. an ACL
325
``` Which of the following would cause signal interference in a 2.4 GHz WAP? (Select TWO). A. Cell phone B. Cordless phone C. Microwave oven D. Printer E. Television ```
B. Cordless phone | C. Microwave oven
326
An administrator setup a firewall to secure the network and only allow traffic that originated from the internal network to return; no traffic originating from the outside is allowed to enter. A new email server needs to be added to the network that will allow traffic to originate from the outside to access the server. Which of the following is the BEST method to accomplish this? A. Add NAT to the firewall for the email server B. Set a rule on the firewall to allow email to go to the email server C. Add stateful packet filtering to the firewall D. Add a DMZ to the firewall for the email server
B. Set a rule on the firewall to allow email to go to the email server
327
``` A network administrator is monitoring switches on a network. Which of the following protocols is generating this traffic? A. SMTP B. PPoE C. PoE D. SNMP ```
D. SNMP
328
Which of the following would BEST be described as a central connection point for secured client access to a private network from a public network? A. Content filter B. VPN concentrator C. Load balancer D. Proxy server
B. VPN concentrator
329
``` Which of the following wireless networking standards has the SLOWEST maximum transmission rate? A. 802.11a B. 802.11b C. 802.11g D. 802.11n ```
B. 802.11b
330
330 A company wants to implement VLANs and is upgrading their networking equipment to accommodate this. Which of the following should be purchased to allow for the VLANs? A. Routers B. Layer 3 switches C. Hubs D. Repeaters
B. Layer 3 switches
331
``` Redundant network devices are used to provide which of the following performance optimizations? (Select TWO). A. Load balancing B. High availability C. QoS D. Traffic shaping E. Content filtering ```
A. Load balancing | B. High availability
332
While troubleshooting network connectivity, a technician notices a computer has assigned itself an APIPA IP address of 169.254.0.1. Assuming the DNS servers have been properly configured, which of the following tools should the technician use to verify the DHCP server is reachable? A. ipconfig B. dig C. nslookup D. tracert
D. tracert
333
``` Which of the following provides a device with an IP address that does not remain the same each time the lease is renewed? A. Reservation B. Static IP address C. Scope D. Dynamic IP address ```
D. Dynamic IP address
334
``` Which of the following is used to share traffic between multiple network connections? A. Load balancer B. Content filter C. VPN concentrator D. Proxy server ```
A. Load balancer
335
``` A standard CAT1 line requires a specific connector. Which of the following is the standard connector type? A. DB-9 B. BNC C. RJ-45 D. RJ-11 ```
D. RJ-11
336
A network technician is having connectivity issues from the T3 to the fiber module of the switch. The technician suspects that the fiber cable might be faulty. Which of the following tools can the network technician use to confirm this? A. OTDR B. Punch down tool C. TDR D. Toner probe
A. OTDR
337
A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution? A. Disable SSID B. Channel bonding C. MIMO D. Increase the signal
B. Channel bonding
338
``` At which of the following OSI layers does the CSU/DSU operate? A. Data link B. Network C. Transport D. Physical ```
D. Physical
339
When a user logs in and is authenticated a ticket/token is granted and used throughout the network session. The ticket/token grants the user access to different system resources. This is an example of which of the following? A. PKI certificates B. IPSec C. Kerberos D. MS-Chap
C. Kerberos
340
``` 340 A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following? A. Packet filtering B. Content filtering C. Packet sniffing D. Application gateway ```
A. Packet filtering
341
``` The cable tester displays the following information: 1 1 2 ---------- 2 3 ---------- 3 4 xxxxxxxx 4 5 xxxxxxxx 5 6 ---------- 6 7 ---------- 7 8 ---------- 8 Which is being reported? A. 5 is open, 1/4 are open B. 4/5 is shorted, 1 is ok C. 1 is open, 4/5 are shorted D. 1 is shorted, 4/5 are open ```
C. 1 is open, 4/5 are shorted
342
An administrator is receiving reports from an executive that the executive’s wireless access point loses the signal frequently, even though the WAP is on the executive’s desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive’s office? A. Turn off SSID broadcasting for the executive’s access point. B. Replace the 802.11n access point in the office with an 802.11a access point. C. Change the channel on the access point to channel 11. D. Turn off as many lights in the executive’s office as possible to reduce interference.
C. Change the channel on the access point to channel 11.
343
A network technician has setup three VLANs on two of the company switches, enabled all the ports as access ports, and assigned the ports to VLANs. How many connections will be needed to connect the two switches together? A. 1 B. 2 C. 3 D. 5
C. 3
344
A network technician has configured a new firewall to allow TCP port 80 traffic and deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies by attempting to access a popular website. Which of the following will MOST likely correct the error? A. HTTP uses UDP B. DNS port 23 needs to be allowed C. HTTP needs port 443 allowed D. UDP port 53 needs to be allowed
D. UDP port 53 needs to be allowed
345
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website? A. Allow UDP port 53 B. Allow TCP port 80 C. Allow UDP port 340 D. Allow TCP port 443
D. Allow TCP port 443
346
A company has installed a VPN concentrator at the main company headquarters and needs employees that travel to access the company network. Which of the following solutions will allow the employees to access the VPN without installing client software? A. Kerberos B. SSL VPN C. Site-to-site VPN D. WPA enterprise
B. SSL VPN
347
Fifty users in an office are actively connected to the wireless network. A new employee is given the password, but is not able to connect to the network. Which of the following is the MOST likely cause of this issue? A. SSID broadcast was disabled. B. The channels are configured incorrectly. C. The wireless network has reached the maximum number of users. D. Interference is occurring.
A. SSID broadcast was disabled.
348
An administrator has been asked to connect an analog phone cabling in a server room. Which of the following should the administrator use? A. 66 block B. Demarc C. Circuit switch D. Smart jack
A. 66 block
349
``` Which of the following wireless device frequencies uses light waves? A. 802.11b B. 802.11n C. IrDA D. Bluetooth ```
C. IrDA
350
350 A technician installing a new switch notices that users on the switch can communicate with other devices on the network, but not with the Internet. Which of the following is the MOST likely cause? A. Duplicate IP address B. Wrong DHCP C. Wrong VLAN configuration D. Wrong subnet mask
C. Wrong VLAN configuration
351
A senior technician is inspecting a junior technician’s created patch cables. There is a visible space between the ends of the copper wiring and the top of the plastic at each end of the cables. Which of the following is the reason these cables cannot be used? A. Bad connectors B. Open shorts C. UTP D. EMI
A. Bad connectors
352
``` Which of the following ports does DHCP use? (Select TWO). A. 22 B. 23 C. 67 D. 68 E. 69 ```
C. 67 | D. 68
353
``` A company wants to implement a wireless encryption method, but wants the key to be a simple phrase so they can easily allow visitors to connect. Which of the following wireless encryption methods should they employ? A. WPA B. WPA2 Enterprise C. PKI D. MS-CHAP ```
A. WPA
354
A distribution layer switch with an SC GBIC that has a fiber connection back to the core has gone bad and needs to be replaced with a newer model and an LC GBIC. The fiber patch cable was replaced with a known good LC patch cable. After replacing the switch, the fiber connection shows no link. Which of the following is MOST likely the cause of the problem? A. DB loss B. Incompatible GBIC C. TXRX reversed D. Cross-talk
C. TXRX reversed
355
``` Which of the following has a rated MAXIMUM speed of 100Mbps? A. CAT3 B. CAT5 C. CAT5e D. CAT6 ```
B. CAT5
356
A technician is configuring a wireless network. The technician would like to add multiple WAPs. Which of the following should the technician ensure during setup? A. Make sure the WAPs use different frequencies. B. Disable SSID broadcast on all of the WAPs. C. Make sure WAPs channels do not overlap. D. Make sure WAPs are using the same channels.
C. Make sure WAPs channels do not overlap.
357
``` A technician is getting ready to install a WLAN in a warehouse. Which of the following will MOST likely determine the WAP placement? A. Antenna types B. SSID broadcast C. VTP configuration D. Channels ```
A. Antenna types
358
``` Which of the following IEEE standards use the same frequency? (Select TWO). A. 802.11a B. 802.11b C. 802.11e D. 802.11g E. 802.11i ```
B. 802.11b | D. 802.11g
359
A user is not able to connect to 802.11n WAP. The user has an 802.11g WLAN card and has connected to other 802.11n networks. Which of the following is MOST likely the reason the user is unable to connect? A. WAP is set to use only the 2.4 GHz frequency. B. WAP is set to use “N only”. C. WAP encryption is using WEP 128. D. WAP has MAC filtering disabled.
B. WAP is set to use “N only”.
360
``` 360 Which of the following options would need to be configured on a DHCP server to boot from the network? A. DNS Server B. Proxy Server C. TFTP Server D. NTP Server ```
C. TFTP Server
361
``` Which of the following can a technician increase on an antenna to create a larger cell size in a WLAN? A. Attenuation B. Bandwidth C. Length D. Gain ```
D. Gain
362
``` How many pairs of CAT5e wires are used for data with 1000BaseT? A. 2 B. 4 C. 6 D. 8 ```
B. 4
363
``` Which of the following should be utilized to reduce null zones? A. SSID broadcasting B. Diversity C. WPA D. Horizontal polarization ```
B. Diversity
364
``` Which of the following can be done to increase a wireless LAN cell size? A. Add a higher gain omni antenna B. Add diversity antennas C. Add a higher gain yagi antenna D. Increase the PoE wattage ```
A. Add a higher gain omni antenna
365
``` RADAR can cause interference with which of the following technologies? A. WiMAX B. 802.11i C. 802.11n D. Bluetooth ```
C. 802.11n
366
``` Which of the following is considered an Exterior Gateway Protocol (EGP)? A. BGP B. IGRP C. RIP D. OSPF ```
A. BGP
367
``` IPv6 routing occurs at which of the following OSI model layers? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 ```
B. Layer 3
368
``` At which of the following layers of the OSI model does Media Access Control reside? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 7 ```
B. Layer 2
369
``` Routers are used instead of Layer 2 switches to separate which of the following? A. Collision Domains B. Link States C. Distant Vectors D. Broadcast Domains ```
D. Broadcast Domains
370
370 A power failure caused a router to reboot. Now users are not able to reach remote networks. Which of the following is the MOST likely cause? A. The dynamic NAT tables were erased by the reset. B. The DNS server setting on the workstations are incorrect. C. MAC entries in the ARP table were not saved. D. A technician did not save the running configuration.
D. A technician did not save the running configuration.
371
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful? A. Replace the router with a Layer 2 switch that supports VLANs B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27 C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27 D. AllowICMP to pass through the Router
D. AllowICMP to pass through the Router
372
``` At which of the following layers of the OSI model do frames exist? A. Application B. Network C. Transport D. Data Link ```
D. Data Link
373
``` Which of the following technologies is considered to be cell-switched? A. ISDN B. Frame Relay C. ATM D. DSL ```
C. ATM
374
The Chief Information Officer (CIO) is unable to send or receive email and has asked the network administrator to resolve the email problem. Which of the following should the network administrator do NEXT? A. Establish a plan of action to resolve the problem B. Gather additional information C. Escalate to a senior network administrator D. Document the problem and proposed solution
B. Gather additional information
375
``` Which of the following uses port 53 by default? A. RDP B. QoS C. DHCP D. DNS ```
D. DNS
376
A technician has disabled ICMP on a server. Which of the following will continue to function for the purpose of troubleshooting connectivity on the server? A. telnet B. ping C. arp D. tracert
A. telnet
377
``` Which of the following is the MAXIMUM rated throughput of 10BaseT? A. 10Gbps B. 10GHz C. 10Mbps D. 10MHz ```
C. 10Mbps
378
``` Which of the following WAN technologies will vary in bandwidth depending on the amount of traffic in the local area on the same provider? A. Satellite B. Cable C. T1 D. DSL ```
B. Cable
379
Which of the following would provide the ability to have a pool of web servers provide content as users visit the website’s single domain name? A. Protocol analyzer B. Load balancer C. Content filter D. Channel bonding
B. Load balancer
380
``` 380 Which of the following is based ENTIRELY on using ICMP packets? A. Social engineering B. NMAP C. Buffer overflow attack D. Smurf attack ```
D. Smurf attack
381
``` Which of the following could be used to stop unknown threats? A. DMZ B. Signature based IPS C. Behavior based IPS D. Honeypots ```
C. Behavior based IPS
382
``` Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps? A. CAT3 B. CAT5 C. CAT5e D. CAT6 ```
B. CAT5
383
``` Which of the following allows a technician to gather information about the operating system? A. Domain services B. Fingerprinting C. Countermeasures D. Reconnaissance ```
B. Fingerprinting
384
``` Which of the following is indicative of an FTP bounce? A. Arbitrary IP address B. Reverse DNS lookups C. Same Port Number D. File Transfer Success ```
A. Arbitrary IP address
385
``` The software that allows a machine to run multiple operating systems at once is called the: A. server manager B. hypervisor C. boot loader D. partition manager ```
B. hypervisor
386
``` Which of the following routing protocols relies on hop count as its ONLY metric? A. BGP B. EIGRP C. OSPF D. RIP ```
D. RIP
387
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following? A. Phishing B. Social engineering C. Man-in-the-middle D. Shoulder surfing
C. Man-in-the-middle
388
``` Which of the following is an IPv6 address? A. 00:14:38:05:7B:E5 B. 10.10.1.1 C. 192.168.1.1 D. 2001:cdba::3257:9652 ```
D. 2001:cdba::3257:9652
389
A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access? A. Site-to-site VPN B. Network-based firewall C. SSL VPN D. Host-based firewall
C. SSL VPN
390
``` 390 Which of the following is a routed protocol that functions at layer 3 of the OSI model? A. IP B. Frame relay C. PPP D. ADSL ```
A. IP
391
``` Something you have, something you are, and something you know are the three tenets of: A. social engineering B. change management C. remote access D. access control ```
D. access control
392
``` Which of the following technologies is used on cellular networks? A. Ethernet B. CDMA C. CSMA/CA D. POTS ```
B. CDMA
393
``` Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n ```
D. 802.11n
394
``` Which of the following mediums is circuit switched? A. PSTN B. ATM C. Frame relay D. MPLS ```
A. PSTN
395
Which of the following is true about tunneling and encryption? A. SIP encrypts all data going through the tunnel. B. PPTP creates a secure tunnel. C. SSL VPN provides a secure tunnel. D. RAS is a secure way to create a tunnel.
C. SSL VPN provides a secure tunnel.
396
``` Which of the following is a secure way to connect to a device? A. RSH B. TFTP C. SNMPv2 D. SFTP ```
D. SFTP
397
``` Which of the following uses eight groups of characters for addressing? A. MAC B. IPv4 C. IPv6 D. DHCP ```
C. IPv6
398
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress? A. Phishing B. Social engineering C. Man-in-the-middle D. Smurfing
B. Social engineering
399
``` Which of the following is true about an IP address if the first bit is a one and the second bit is a zero? A. The address is a Class A address. B. The address is a Class B address. C. The address is a Class C address. D. The address is a Class D address. ```
B. The address is a Class B address.
400
``` 400 Which of the following MUST be used when securing a VoIP network consisting of private IP addresses? A. IPS B. Application layer firewall C. IDS D. An unmanaged switch ```
B. Application layer firewall
401
``` Which of the following uses certificates as a form of security? A. Kerberos B. LDAP C. PKI D. CHAP ```
C. PKI
402
``` Which of the following is a proprietary routing protocol? A. RIP B. EIGRP C. OSPF D. BGP ```
B. EIGRP