Test 1 Flashcards
Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (SELECT TWO)
A. Layer 2 Switch B. MAC Address Filtering C. ACLs D. IIS Server E. Port Scanner F. Firewall
C,F
Which of the following authentication solutions also provides AAA and TCP?
A. TACACS+
B. Kerberos
C. RADIUS
D. RAS
A. TACACS+
Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks? A. Honeynet B. Honeypot C. VUlnerability D. Network based IDS
B. Honeypot
Protocol that uses a three way handshake to transfer information can be found within which layer of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5
C. Layer 4
Which of the following separates broadcast domains? A. Port mirroring B. Router C. Convergence D. Switch
B. Router
Which of the following would Kim, a technician, do to monitor traffice through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2
A. Enable an SNMP agent
Which of the following command can Lisa, a technician, use on a server to display the default router setting? A. Ping B. nslookup C. route D. arp
C. route
Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable? A. nmap B. nbstat C. dig D. arp
C. dig
Which of the following could Kim, a network technician, use to find the approsimate location of a break in a long network cable? A. Protocol analyzer B. Time Domain Reflectometer C. Toner Probe D. Multimeter
B. Time Domain Reflectometer (TDR)
Which of the following protocols is commonly used for VoIP technology? A. Telnet B. SMTP C. SIP D. SNMP
C. SIP
Which of the following can Jeff, a technician, modify on an 802.11n router that is not avialable as an option on an 802.11g device? A. SSID B. Encryption C. Channels D. Spectrum
D. Spectrum
Which of the following technologies could be implemented to improve call clarity when using VoIP technology? A. Static IP Addressing B. Caching engines C. QoS D. Port forwarding
C. QoS
When using high bandwidth applications over multiple WAN connections, which of the following should be used? A Static IP Addressing B. Half-duplex C. PoE devices D. Load balancing
D. Load balancing
When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution
C. Establish a theory of probable cause
D. Document findings, actions, and outcomes.
D. Document findings, actions, and outcomes
Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
A. Verify full system functionality and if applicable implement preventive measures
B. Implement the solution or escalate as necessary
C. Document findings, actions, and outcomes
D. Establish a theory of probable cause (e.g. question the obvious)
B. Implement the solution or escalate as necessary
Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis? A. TDR B. Protocol analyzer C. Multimeter D. Cable crimper
A. TDR
A switch in IDF 3 has shut down at 3 P.M. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem? A. Environmental monitor B. Cable tester C. TDR D. Loopback plug
A. Environmental monitor
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? A. 20 B. 21 C. 22 D. 23
C. 22
Which of the following ports is the default telnet port? A. 20 B. 21 C. 22 D. 23
D. 23
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together? A. Cable tester B. Toner probe C. Cable crimper D. Punch down tool
B. toner probe
Which of the following DNS records would a web browser access to determine the IP address of an internet web page? A. CNAME B. A C. MX D. PTR
B. A
Which of the following is used to prevent Layer 2 switching loops within a local area network? A. STP B. MTU C. EGP D. IGP
A. STP
A bridge handles frames at which of the following layers of the OSI model? A. Network B. Session C. Transport D. Data Link
D. Data Link
Which of the following is a method to prioritize network traffic coming from VoIP phones? A. PAT B. DNS C. SIP D. QoS
D. QoS