Test 2 Flashcards
Which of the following is the common port used for IMAP?
A. 25
B. 53
C. 143
D. 443
C. 143
Before installing a wireless network, which of the following should Kim, a network technician, take into consideration to reduce signal exposure for war drivers? A. Device placement B. MAC address filtering C. User authentication D. Encryption protocols
A. Device placement
Which of the following OSI model layers is between the data link and transport layers? A. Presentation B. Physical C. Session D. Network
D. Network
Which of the following subnet masks would allow for 192.168.0.3 abd 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248
A. 255.255.255.0
Which of he following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389
B. 53
Which of the following is a Class A private IP address? A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0.100
B. 10.1.1.45
Which of the following services would have assigned the IP address 169.254.1.89? A. DHCP B. APIPA C. IDS D. DNS
B. APIPA
Which of the following BEST describes the point at which an ISP's responsibility for an internet conenction ends? A. Router B. MDF C. IDF D. Demarc
D. Demarc
Which of the following defines the range of IP addresses a DHCP server can assign? A. Scope B. Lease C. Reservation D. Subnet
A. Scope
Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: Orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
Which of the following should Kim do to complete the installation?
A. Re-end the provided cable, keeping the wiring the same
B. Use the provided cable
C. Purchase a crossover cable
D. Purchase a straight-through cable.
D. Purchase a straight-through cable.
Straight through- A network cabling that connects a computer to a network device. For example, straight through cables are cables that connect a computer to a network hub, network switch, and network routers. These are the standard network cables you would find at the store, unless labeled as a cross-over cable.
Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following command can Zach use to BEST troubleshoot this issue? A. netsh B. nslookup C. ipconfig D. tracert
A. netsh
After a brownout, Zach, a user, can connect to the internal network, but not the internet. Which of the following is the company's DSL router experiencing that is causing the issue? A. Switching loop B. Power failure C. Broadcast storm D. Duplicate IP address
B. Power failure
Lisa, a technician, is asked to install a wireless router in a company’s public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point.
C. Block traffic from the wireless access point
Lisa, and administrator, attempts to open a web page and sees the following error: 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7
A. Layer 1
At which of the following layers does HTML operate? A. Layer 2 B. Layer 3 C. Layer 5 D. Layer 7
D. Layer 7
Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLANs is functioning. At which of the following layers does the problem MOST likely reside? A. Network B. Data link C. Transport D. Session
A. Network
A company has decided to increase wireless infrastructure security by moving WEP encryption to the WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem.
A. The users who cannot are using older NICs without WPA2 support
B. The users who cannot connect are in areas without wireless coverage
C. The users who cannot connect have not been placed in the correct VLAN
D. The users who cannot connect have not specified the correct signal strength.
A. The users who cannot are using older NICs without WPA2 support
Lisa, a technician, installs a new WAP and users are able to connect, however, users cannot access the internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
B. An incorrect subnet mask has been entered in the WAP configuration.
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicated with each other, but are unable to reach the internet. Jeff sees the following information in he switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?
A. The subnet mask is incorrect
B. A routing loop has occurred
C. Jeff used a crossover cable to connect the switch to the gateway
D. The server is missing default-gateway information
D. The server is missing default-gateway information
show run interface GigabitEthernet0/10
Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Zach checks the port connecting the new switch to the core switch and sees the following information:
Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
B. Speed and duplex have not been set.
1000BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet) B. 100 meters (238 feet) C. 500 meters (1640 feet) D. 1000 meters (3280 feet)
B. 100 meters (238 feet)
Which of the following DNS record types provides the hostname to IP address mapping? A. A record B. NS record C. CNAME record D. MX record
A. A record
Kim, a user, took a laptop on a vacation and made changes to the configuration in order to use the device at the hotel. She can reach the internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID
A. incorrect DNS
Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting? A. A 110 block B. A demarc C. A DB-9 D. A smart jack
A. A 110 block