Network + Practice Questions 1-100 Flashcards
(100 cards)
QUESTION NO: 2
Which of the following authentication solutions also provides AAA and uses TCP?
A. TACACS+
B. Kerberos
C. RADIUS
D. RAS
Answer: A
QUESTION NO: 1
Which of the following can be configured to restrict specific ports and IP addresses from accessing
the internal network? (Select TWO).
A. Layer 2 switch B. MAC address filtering C. ACLs D. IIS server E. Port scanner F. Firewall
Answer: C,F
QUESTION NO: 3
Which of the following would be used to test out the security of a specific network by allowing it to
receive security attacks?
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
Answer: A
QUESTION NO: 4
The protocols that use a three way handshake to transfer information can be found within which
layer of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Answer: C
QUESTION NO: 5
Which of the following separates broadcast domains?
A. Port mirroring
B. Router
C. Convergence
D. Switch
Answer: B
QUESTION NO: 6
Which of the following would Kim, a technician, do to monitor remote traffic through an access
point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
Answer: A
QUESTION NO: 7
Which of the following commands can Lisa, a technician, use on a server to display the default
router setting?
A. ping
B. nslookup
C. route
D. arp
Answer: C
QUESTION NO: 8
Which of the following commands can Lisa, a network technician, use to check whether the DNS
server for a given domain is reachable?
A. nmap
B. nbtstat
C. dig
D. arp
Answer: C
QUESTION NO: 9
Which of the following could Kim, a network technician, use to find the approximate location of a
break in a long network cable?
A. Protocol analyzer
B. Time domain reflectometer
C. Toner probe
D. Multimeter
Answer: B
QUESTION NO: 10
Which of the following protocols is commonly used for VoIP technology?
A. Telnet
B. SMTP
C. SIP
D. SNMP
Answer: C
QUESTION NO: 11
Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as
an option on an 802.11g device?
A. SSID
B. Encryption
C. Channels
D. Spectrum
Answer: D
QUESTION NO: 12
Which of the following technologies could be implemented to improve call clarity when using VoIP
technology?
A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding
Answer: C
QUESTION NO: 13
When using high bandwidth applications over multiple WAN connections, which of the following
should be used?
A. Static IP addressing
B. Half-duplex
C. PoE devices
D. Load balancing
Answer: D
QUESTION NO: 14
When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step
after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution.
C. Establish a theory of probable cause.
D. Document findings, actions, and outcomes.
Answer: D
QUESTION NO: 15
Kim, a network technician, is troubleshooting a problem and has just established a plan of action
to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?
A. Verify full system functionality and if applicable implement preventative measures.
B. Implement the solution or escalate as necessary.
C. Document findings, actions, and outcomes.
D. Establish a theory of probable cause (e.g. question the obvious).
Answer: B
QUESTION NO: 16
Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects
an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm
this analysis?
A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper
Answer: A
QUESTION NO: 17
A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network
tools should Kim, a technician, use to troubleshoot this problem?
A. Environmental monitor
B. Cable tester
C. TDR
D. Loopback plug
Answer: A
QUESTION NO: 18
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on
the default port?
A. 20
B. 21
C. 22
D. 23
Answer: C
QUESTION NO: 19
Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
Answer: D
QUESTION NO: 20
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area
where multiple wires of the same color are twisted together?
A. Cable tester
B. Toner probe
C. Cable crimper
D. Punch down tool
Answer: B
QUESTION NO: 21
Which of the following DNS records would a web browser access to determine the IP address of
an Internet web page?
A. CNAME
B. A
C. MX
D. PTR
Answer: B
QUESTION NO: 22
Which of the following is used to prevent Layer 2 switching loops within a local area network?
A. STP
B. MTU
C. EGP
D. IGP
Answer: A
QUESTION NO: 23
A bridge handles frames at which of the following layers of the OSI model?
A. Network
B. Session
C. Transport
D. Data Link
Answer: D
QUESTION NO: 24
Which of the following is a method to prioritize network traffic coming from VoIP phones?
A. PAT
B. DNS
C. SIP
D. QoS
Answer: D