Network + Practice Questions 1-100 Flashcards

(100 cards)

0
Q

QUESTION NO: 2

Which of the following authentication solutions also provides AAA and uses TCP?

A. TACACS+
B. Kerberos
C. RADIUS
D. RAS

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

QUESTION NO: 1

Which of the following can be configured to restrict specific ports and IP addresses from accessing
the internal network? (Select TWO).

A. Layer 2 switch 
B. MAC address filtering 
C. ACLs 
D. IIS server 
E. Port scanner 
F. Firewall
A

Answer: C,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION NO: 3

Which of the following would be used to test out the security of a specific network by allowing it to
receive security attacks?

A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 4

The protocols that use a three way handshake to transfer information can be found within which
layer of the OSI model?

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 5

Which of the following separates broadcast domains?

A. Port mirroring
B. Router
C. Convergence
D. Switch

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION NO: 6

Which of the following would Kim, a technician, do to monitor remote traffic through an access
point?

A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION NO: 7

Which of the following commands can Lisa, a technician, use on a server to display the default
router setting?

A. ping
B. nslookup
C. route
D. arp

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION NO: 8

Which of the following commands can Lisa, a network technician, use to check whether the DNS
server for a given domain is reachable?

A. nmap
B. nbtstat
C. dig
D. arp

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION NO: 9

Which of the following could Kim, a network technician, use to find the approximate location of a
break in a long network cable?

A. Protocol analyzer
B. Time domain reflectometer
C. Toner probe
D. Multimeter

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QUESTION NO: 10

Which of the following protocols is commonly used for VoIP technology?

A. Telnet
B. SMTP
C. SIP
D. SNMP

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION NO: 11

Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as
an option on an 802.11g device?

A. SSID
B. Encryption
C. Channels
D. Spectrum

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

QUESTION NO: 12

Which of the following technologies could be implemented to improve call clarity when using VoIP
technology?

A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QUESTION NO: 13

When using high bandwidth applications over multiple WAN connections, which of the following
should be used?

A. Static IP addressing
B. Half-duplex
C. PoE devices
D. Load balancing

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

QUESTION NO: 14

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step
after verifying full system functionality?

A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution.
C. Establish a theory of probable cause.
D. Document findings, actions, and outcomes.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION NO: 15

Kim, a network technician, is troubleshooting a problem and has just established a plan of action
to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?

A. Verify full system functionality and if applicable implement preventative measures.
B. Implement the solution or escalate as necessary.
C. Document findings, actions, and outcomes.
D. Establish a theory of probable cause (e.g. question the obvious).

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

QUESTION NO: 16

Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects
an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm
this analysis?

A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION NO: 17

A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network
tools should Kim, a technician, use to troubleshoot this problem?

A. Environmental monitor
B. Cable tester
C. TDR
D. Loopback plug

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

QUESTION NO: 18

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on
the default port?

A. 20
B. 21
C. 22
D. 23

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION NO: 19

Which of the following ports is the default telnet port?

A. 20
B. 21
C. 22
D. 23

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION NO: 20

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area
where multiple wires of the same color are twisted together?

A. Cable tester
B. Toner probe
C. Cable crimper
D. Punch down tool

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION NO: 21

Which of the following DNS records would a web browser access to determine the IP address of
an Internet web page?

A. CNAME
B. A
C. MX
D. PTR

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

QUESTION NO: 22

Which of the following is used to prevent Layer 2 switching loops within a local area network?

A. STP
B. MTU
C. EGP
D. IGP

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION NO: 23

A bridge handles frames at which of the following layers of the OSI model?

A. Network
B. Session
C. Transport
D. Data Link

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

QUESTION NO: 24

Which of the following is a method to prioritize network traffic coming from VoIP phones?

A. PAT
B. DNS
C. SIP
D. QoS

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
QUESTION NO: 25 Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO). ``` A. MAC addressing B. IP addressing C. Port speed D. IPv6 addressing E. Duplex ```
Answer: C,E
25
QUESTION NO: 26 Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this? A. Cable tester B. Toner probe C. OTDR D. Loopback plug
Answer: A
26
QUESTION NO: 27 Which of the following technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port Mirroring D. Spanning Tree
Answer: D
27
QUESTION NO: 28 A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice? A. IS-IS B. BGP C. OSPF D. RIP
Answer: B
28
QUESTION NO: 29 Which of the following BEST describes a switch port? A. Broadcast domain B. Distance vector C. Link state D. Collision domain
Answer: D
29
QUESTION NO: 30 Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? A. Loopback plugs B. Butt set C. Cable certifier D. Toner probe
Answer: B
30
QUESTION NO: 31 Which of the following can Jeff, a network technician, change to help limit war driving? A. Signal strength B. SSID C. Frequency D. Channel
Answer: A
31
QUESTION NO: 32 In which of the following wireless standards is MIMO used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Answer: D
32
QUESTION NO: 33 Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address? A. netstat B. route C. nslookup D. arp
Answer: C
33
QUESTION NO: 34 Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? A. WPA should be enabled B. PKI should be turned off C. WAP SSIDs are matching D. WAPs are transmitting on same channel
Answer: C
34
QUESTION NO: 35 Which of the following is the usual number of bits for the host identifier part of an IPv6 address? A. 16 B. 32 C. 48 D. 64
Answer: D
35
QUESTION NO: 36 Which of the following is the prefix for a link-local IPv6 address? A. FE80::/10 B. FF00::/8 C. 2FFE::/16 D. FEEF:/12
Answer: A
36
QUESTION NO: 37 Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO). ``` A. Physical B. Session C. Data Link D. Network E. Transport ```
Answer: A,C
37
QUESTION NO: 38 Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server? A. nbtstat command B. dig command C. ipconfig command D. Protocol analyzer
Answer: D
38
QUESTION NO: 39 DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOST likely use to verify this problem? A. arp B. nbtstat C. traceroute D. dig
Answer: D
39
QUESTION NO: 40 Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost? A. OTDR B. Protocol analyzer C. Toner probe D. TDR
Answer: C
40
QUESTION NO: 41 Which of the following address blocks would MOST likely be blocked from crossing a border router? A. 8.0.0.0/8 B. 172.16.0.0/12 C. 122.0.0.0/24 D. 248.0.0.0/8
Answer: B
41
QUESTION NO: 42 Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of a switch? A. traceroute command B. SNMP monitor C. nbtstat command D. dig command
Answer: B
42
QUESTION NO: 43 Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa’s workstation? A. nslookup B. route C. nbtstat D. arp
Answer: A
43
QUESTION NO: 44 Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO). ``` A. Proxy server B. Traffic shaping C. Caching engines D. Load balancing E. Quality of service ```
Answer: B,E
44
QUESTION NO: 45 Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues? A. Network map B. Cable management C. Change management D. Asset management
Answer: C
45
QUESTION NO: 46 Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work? A. This is a private address which cannot be seen by external users. B. The address does not have the appropriate subnet mask assigned. C. This is a public address which can only be seen by internal users. D. This is a private address which can only be seen by external users.
Answer: A
46
QUESTION NO: 47 Zach, a network technician, is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following? A. Latency B. Attenuation C. Crosstalk D. Frequency hopping
Answer: A
47
QUESTION NO: 48 Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen? A. VLAN malfunction B. Broadcast storm C. Quality of Service loss D. Duplicate IP addresses
Answer: B
48
QUESTION NO: 49 Which of the following is the broadcast address for a network defined as 192.168.0.0/24? A. 192.168.0.255 B. 192.168.0.1 C. 192.168.0.0 D. 192.168.0.253
Answer: A
49
QUESTION NO: 50 Which of the following protocols is used to securely connect to a multi-layer switch? A. HTTP B. SMTP C. SSH D. Telnet
Answer: C
50
QUESTION NO: 51 Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). ``` A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080 ```
Answer: D,E
51
QUESTION NO: 52 Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A. Loopback plug B. Protocol analyzer C. Smart jack D. Coupler
Answer: A
52
QUESTION NO: 53 Which of the following BEST describes how a layer 2 switch functions? A. Switches packets within the same subnet based on MAC addresses B. Switches packets between different subnets based on IP addresses C. Switches packets between different subnets based on MAC addresses D. Switches packets within the same subnet based on IP addresses
Answer: A
53
QUESTION NO: 54 A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings? A. net share B. hostname C. ipconfig D. tracert
Answer: C
54
QUESTION NO: 55 Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used? A. Butt set B. Toner probe C. Wire mapper D. Cable certifier
Answer: A
55
QUESTION NO: 56 An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used? A. Protocol analyzer B. Butt set C. OTDR D. Toner probe
Answer: B
56
QUESTION NO: 57 Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity? A. Multimeter B. Loopback plug C. Cable certifier D. CAT3 coupler
Answer: B
57
QUESTION NO: 58 Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options
Answer: A
58
QUESTION NO: 59 Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device? A. DNS suffixes B. DHCP relay agent C. Static IP addressing D. Scope configuration
Answer: B
59
QUESTION NO: 60 A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel? A. Butt set B. Cable certifier C. Toner probe D. Snips
Answer: B
60
QUESTION NO: 61 A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable? A. Butt set B. Punch down tool C. Toner probe D. Protocol analyzer
Answer: C
61
QUESTION NO: 62 Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? A. STP B. PoE C. VTP trunking D. Port forwarding
Answer: B
62
QUESTION NO: 63 Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured? A. IP address on the native VLAN interface B. Port security C. Port forwarding D. IP address on the fiber interface
Answer: A
63
QUESTION NO: 64 Which of the following methods for Answer: D network performance optimization is used to distribute traffic among similar devices? A. Fault tolerance B. QoS C. Proxy server D. Load balancing
Answer: D
64
QUESTION NO: 65 Which of the following describes a rationale for a network with redundant paths? A. VPN compatibility B. Unified communications implementation C. High availability requirement D. QoS
Answer: C
65
QUESTION NO: 66 Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use? A. OTDR B. Multimeter C. Punch down tool D. Temperature monitor
Answer: C
66
QUESTION NO: 67 Which of the following is an example of a DHCP failover mechanism? A. APIPA B. Inactive lease C. Reservations D. Active lease
Answer: A
67
QUESTION NO: 68 Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? A. WAP placement B. PoE devices C. MAC filtering D. Encryption type
Answer: A
68
QUESTION NO: 69 Lisa, a network technician, is troubleshooting a new wireless network that has been dropping connections. She notices another wireless network in the area. Which of the following BEST explains the reason for the dropped connections? A. Latency B. SSID mismatch C. Interference D. Encryption type
Answer: C
69
QUESTION NO: 70 Which of the following limits the number of devices that can be assigned IP addresses by DHCP? A. Lease B. Reservation C. DNS setting D. Scope
Answer: D
70
QUESTION NO: 71 Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Answer: A
71
QUESTION NO: 72 Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN
Answer: D
72
QUESTION NO: 73 Which of the following devices is used to distribute network traffic equally over multiple links? A. Content filter B. DNS server C. Load balancer D. Proxy server
Answer: C
73
QUESTION NO: 74 Which of the following is used to restrict access according to user policies? A. Content filter B. DHCP server C. DNS server D. VPN concentrator
Answer: A
74
QUESTION NO: 75 Which of the following is used to filter outgoing network requests? A. Proxy server B. VPN concentrator C. DHCP server D. IIS server
Answer: A
75
QUESTION NO: 76 Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable? A. Protocol analyzer B. Cable tester C. Toner probe D. Punch down tool
Answer: C
76
QUESTION NO: 77 Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use? A. Toner probe B. Punch down C. Wire tester D. Crimper
Answer: B
77
QUESTION NO: 78 A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector? A. Wire tester B. Punch down C. Crimper D. Multimeter
Answer: C
78
QUESTION NO: 79 There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic? A. Protocol analyzer B. Cable tester C. Cable certifier D. Environmental monitor
Answer: A
79
QUESTION NO: 80 Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients? A. Name the SSID on the 802.11n network only B. Limit the DHCP address pool C. Disable 802.11b and 802.11g D. Only use WPA encryption
Answer: C
80
QUESTION NO: 81 Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name? A. Channel B. WEP C. SSID D. WPA
Answer: C
81
QUESTION NO: 82 Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach’s NEXT step? A. Test the theory B. Establish a plan of action C. Establish a theory D. Document findings
Answer: D
82
QUESTION NO: 83 Which of the following network devices restricts traffic based on words, signatures, and URLs? A. Layer 2 switch B. Content filter C. Load balancer D. Traffic analyzer
Answer: B
83
QUESTION NO: 84 Which of the following network devices hides network nodes behind one public IP address? A. Layer 3 switch B. Content filter C. VPN server D. Proxy server
Answer: D
84
QUESTION NO: 85 A VPN concentrator is used for which of the following purposes? A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting
Answer: C
85
QUESTION NO: 86 Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified? A. FastEthernet 0/0 B. AUX 0 C. Console 0 D. Serial 0/0/0
Answer: A
86
QUESTION NO: 87 Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration? A. Port speed B. Cryptokey C. Data VLAN D. NAT/PAT
Answer: B
87
QUESTION NO: 88 Jeff, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS? A. PoE B. Port mirroring C. Convergence D. Port speed
Answer: B
88
QUESTION NO: 89 Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information? A. SNMP B. NTP C. SIP D. PPTP
Answer: A
89
QUESTION NO: 90 Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem? A. Network map B. Environmental monitor C. Placement map D. Syslog
Answer: D
90
QUESTION NO: 91 Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause? A. Encryption type B. Channel selection C. Antenna placement D. Signal strength
Answer: B
91
QUESTION NO: 92 Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spatial reuse D. 20MHz channel spacing
Answer: A
92
QUESTION NO: 93 Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause? A. Both T568A and T568B standards are being used. B. STP is disabled. C. The cable is not a crossover. D. The port is not trunked.
Answer: C
93
QUESTION NO: 94 Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should Jeff consider for these requirements? (Select TWO). ``` A. Routing table B. Next hop C. Port mirroring D. Port monitoring E. VLANs ```
Answer: C,E
94
QUESTION NO: 95 Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of? A. Switch loop B. Port bonding C. Virtual switch D. Port mirroring
Answer: A
95
QUESTION NO: 96 Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause? A. TXRX is reversed B. Faulty crossover cable C. Incorrect WEP key D. A short in the cable pairs
Answer: C
96
QUESTION NO: 97 Zach, a user, is unable to print to a network. The cable tests good and the correct VLAN is configured on the switch. Which of the following is MOST likely the cause? A. The printer was configured for DHCP. B. The switch was configured for trunking. C. The printer was configured for duplexing. D. The switch was configured for PoE.
Answer: A
97
QUESTION NO: 98 Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data? A. SNMP v2 B. VPN C. SYSLOG D. SMTP
Answer: A
98
QUESTION NO: 99 Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch? A. SNMP trap B. Bandwidth analyzer C. Network sniffer D. Syslog server
Answer: C
99
QUESTION NO: 100 Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds? A. Change management B. Baselines C. Asset management D. Cable management
Answer: A