Wednesday, December 19, 2012

networking questions and answers


1. Keyword and blacklist filtering would be handled at which level in a network?
A. Layer 2 managed switch
B. DHCP server
C. Hardware firewall
D. Bridge
Answer: C
2. When installing two 802.11g access points in the same building, which of the following channels
will MOST likely be used to minimize interference?
A. 5 and 6
B. 1 and 6
C. 6 and 10
D. 2 and 6
Answer: B
3. Which of the following devices transmits timed broadcasts onto an active network?
A. Bridge
B. Unmanaged switch
C. DHCP client
D. Firewall
Answer: C
4. Which of the following describes the location where an administrator would terminate a bundle of
CAT5e cables?
A. Switch
B. Smart jack
C. Router
D. Patch panel
Answer: D
5. Which of the following can be an STP cable?
A. RG-6
B. CAT5e
C. Fiber
D. RG-59
Answer: B
6. A web server is running correctly but sending a RST packet to any client trying to connect using
HTTP on TCP port 80.
Which of the following tools should be used to determine the listening port of the web server?
A. Route
B. Ifconfig
C. Netstat
D. Nslookup
Answer: C
7. At which of the following layers does the TFTP protocol operate?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
Answer: D
8. Which of the following utilities would be used to display a NIC's cache of MAC addresses?
A. arp
B. nslookup
C. dig
D. netstat
Answer: A
9. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes
on either side of the data link?
A. Gateway
B. Hub
C. Bridge
D. Router
Answer: C
10. At which of the following layers does the ICMP protocol operate?
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 5
Answer: B
11. A user reports sporadic connectivity with their wireless connection. A technician determines the
wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely
cause of this issue?
A. The client does not support 802.11n.
B. Incorrect frequency on the client is being used.
C. Incorrect encryption on the AP.
D. The client distance from the AP.
Answer: D
Explanation:
12. Which of the following tools would an administrator use to determine if a DNS server is answering
authoritatively for a domain?
A. nbtstat
B. dig
C. netstat
D. hostname
Answer: B
13. By default, which of the following ports would a network need to have opened to allow for the
transmission of incoming and outgoing email? (Select TWO).
A. 21
B. 25
C. 80
D. 110
E. 123
Answer: B,D
14. An administrator is setting up a network and would like to prevent users from having the ability to
plug their PC into the network to receive an IP address. Which of the following addressing
schemes should the technician use?
A. NAT
B. Dynamic
C. Subnetting
D. Static
Answer: D
15. An administrator is setting up a network and would like to prevent users from having the ability to
plug their PC into the network to receive an IP address. Which of the following addressing
schemes should the technician use?
A. NAT
B. Dynamic
C. Subnetting
D. Static
Answer: D
16. Which of the following connector types is used for coax cable?
A. BNC
B. ST
C. LC
D. SC
Answer: A
17. A technician claims to have crimped a patch cable according to the T568A standard on one end
and T568B on the other.
Which of the following results is to be expected?
A. Since only half the leads are used, the cable will only work at 100Mbps.
B. The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.
C. There will be no proper data continuity; the standards utilize two different wiring diagrams.
D. The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B
pure cables
Answer: C
18. An administrator is setting up a security camera that will send the same feed to twelve of the
twenty workstations on the network. Which of the following addressing schemes was designed for
this scenario?
A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer
Answer: A
19. A technician would like to separate the HR department's workstations from the other workstations
at the company. Which of the following network topologies should be used?
A. Peer to peer
B. Subnetting
C. VLAN
D. VPN
Answer: C
20. A client wants to improve the wireless coverage on the third floor of their house. The wireless
router is located in the basement and there is no easy way to run a cable to the third floor. Which
of the following devices should be installed to extend the wireless coverage to cover the entire
third floor without running cables?
A. Switch
B. Router
C. Repeater
D. Bridge
Answer: C
21. Which of the following describes what the number two represents in l00Base2 cabling?
A. Fiber
B. Coaxial cable
C. UTP
D. Twisted pair
Answer: B
22. A crossover cable is MOST commonly associated with which of the following layers of the OSI
model?
A. Session
B. Application
C. Network
D. Physical
Answer: D
23. Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic?
A. Switch
B. Hub
C. Modem
D. Repeater
Answer: B
24. A network administrator needs to add an additional connection to a room. The administrator adds
a new Ethernet switch and must connect it to an existing switch. Which cable type should be used
to connect the two switches?
A. CAT3 cable
B. Serial cable
C. Crossover cable
D. Rollover cable
Answer: C
25. Prioritizing traffic between data and voice is defined as which of the following?
A. Caching engines
B. Proxy server
C. QoS
D. Load balancing
Answer: C
26. A demarcation point is usually installed and managed by which of the following providers?
A. Web host provider
B. VoIP company
C. Telephone company
D. Hardware manufacturer
Answer: C
27. Users are unable to access the Internet but the users are able to send/receive email from their
desktops. Which of the following ports is MOST likely being blocked?
A. 25
B. 80
C. 110
D. 143
Answer: B
28. Which of the following would need to be implemented on a wireless router to allow network access
based on a passphrase that the administrator would supply?
A. WPA-PSK encryption
B. SSID broadcast
C. Port forwarding
D. MAC filtering
Answer: A
29. Which of the following performs posture assessments for unknown devices that connect to the
network?
A. PKI
B. EAP
C. NAC
D. AAA
Answer: C
30. At which of the following OSI model layers is HTTPS encryption performed?
A. Layer 3
B. Layer 5
C. Layer 6
D. Layer 7
Answer: C
31. An administrator is concerned about users utilizing the company's wireless signal with their
personal laptops. Which of the following is the BEST method to use to prevent unauthorized
devices from using the company's wireless network?
A. Secure VPN
B. MAC filtering
C. IP filtering
D. Static IP addresses
Answer: B
32. Which of the following cables is the MOST susceptible to interference?
A. Fiber
B. Coax
C. UTP
D. STP
Answer: C
33. On which of the following network devices would an administrator configure an ACL?
A. Router
B. Hub
C. Repeater
D. NIC
Answer: A
34. An administrator would like to know the name of the workstation that is being repaired. Which of
the following commands, without parameters, will provide this information?
A. Hostname
B. Ipconfig
C. Netstat
D. Ping
Answer: A
35. Which of the following routing protocols involves all routers knowing the connections status of
other routers within the network?
A. RIPv2
B. OSPF
C. IGRP
D. BGP
Answer: B
36. A technician is working on a SOHO wireless network and notices that the wireless adaptor in the
laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of
the following would BEST describe this connection speed?
A. The laptop is too far away from the WAP.
B. The WAP is using 802.11a frequencies.
C. The laptop is only set to allow 802.11n connections.
D. The technician is on an 802.11b network.
Answer: D
37. Which of the following network devices would MOST likely be installed on a network to help
reduce broadcast traffic and to allow individual virtual networks?
A. Switch
B. Repeater
C. Hub
D. WAP
Answer: A
38. Which of the following connector types is commonly identified by two rows of pins with four in one
row and five in the other?
A. DB-9
B. RJ-45
C. SC
D. BNC
Answer: A
39. Which of the following commands would allow a computer to acquire an IP address?
A. ipconfig/release
B. ipconfig/renew
C. ipconfig/all
D. ipconfig/help
Answer: B
40. Several users are sending emails to CompTIA.org. but they are not being received. Which of the
following commands could be used to verify that the company is able to connect to the mail
service at CompTIA.org?
A. Ping
B. Arp
C. Dig
D. telnet
Answer: D
41. Which of the following metrics indentifies the number of connections that is between two devices?
A. Hop count
B. MTU
C. Latency
D. Bandwidth
Answer: A
42. Which of the following has a maximum data rate of 11Mbps?
A. 802.11n
B. 802.11g
C. 802.11b
D. 802.11a
Answer: C
43. Which of the following networks are reserved for private IP addresses?
A. 168.129.00/24
B. 172.16.128.0/15
C. 192.168.0.0/16
D. 162.17.0.0/12
Answer: C
44. An administrator needs to terminate network cables that have just been installed in the main
communications closet. Which of the following tools is required?
A. Multimeter
B. Snips
C. Toner probe
D. Punch down tool
Answer: D
45. A computer is able to ping other devices on the same network but is unable to ping devices on
another network. Which of the following needs to be configured?
A. DNS primary server
B. Host route
C. Proxy ARP
D. Default gateway
Answer: D
46. Which of the following restricts network access to a router administrator's interface?
A. IDS
B. SSL
C. ACL
D. SMNPv2
Answer: C

47. In which of the following topologies could the failure of one machine cause the entire network to
stop functioning?
A. Mesh
B. Token ring
C. Star
D. Spanning tree
Answer: B
48. A user reports that their laptop does not have network connectivity, but was working fine last
week. The technician executes IPCONFIG to see what the IP address is but it comes up with a
169.254.254.1 address. This address is not part of the company's subnet. Which of the following
MOST likely identifies this address type?
A. Multicast
B. DHCP
C. APIPA
D. Broadcast
Answer: C
49. Determining when to retransmit frames is an example of which of the following Ethernet
properties?
A. Carrier sense
B. Collision detection
C. Multiple access points
D. Collision avoidance
Answer: B
50. Which of the following would Joe, a technician, configure to modify the time a device will hold an
IP address provided through DHCP?
A. DNS suffixes
B. Leases
C. Static IP addressing
D. Reservations
Answer: B
51. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but
does not want to use an encryption method. Which of the following methods would be BEST to
accomplish this?
A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise
Answer: A
52. Joe, a network technician, is tasked with installing a router and firewall to get an office working
with Internet access. Which of the following features MUST be configured to allow sharing of a
single public IP address?
A. QoS
B. POP3
C. PAT
D. SMTP
Answer: C
53. Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?
A. RAS
B. PPTP
C. IPSec
D. ICA
Answer: C
54. Two duplicate pieces of equipment can be used in conjunction for which of the following
purposes? (Select TWO)
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
Answer: A,B
55. The T568B wiring standard slates that CAT5 cables should be coded as follows:
A. White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown,
B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
C. White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown,
D. White/Orange, Orange, White/Green, Blue,
Answer: B
56. Using network monitoring tools would allow an administrator to do which of the following?
A. Configure offline devices
B. Examine performance issues
C. Install additional software and updates
D. View syslog events
Answer: B
57. Which of the following wireless technologies can operate at only 5GHz?
A. 802.11b/g
B. 802.11g
C. 802.11b
D. 802.11a
Answer: D
58. Which of the following devices allows multiple internal IP addresses to access an external website
with minimal impact to the network bandwidth?
A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper
Answer: A
59. A VPN connection is not working correctly and the technician is unable to ping the VPN server.
Which of the following actions should the technician do FIRST?
A. Call their local ISP
B. Verify the IP information of the server
C. Check their local Internet connection
D. Verify the hostname of the server
Answer: C
60. A technician wants to use an existing DHCP server for three additional VLANs. Which of the
following features needs to be configured to allow for this addition?
A. DHCP server
B. Proxy server
C. Repeater
D. DHCP relay
Answer: D
61. A client is having problems connecting remotely after replacing a router. An administrator has just
created an action plan. Which of the following is the NEXT step the administrator should perform
to resolve this issue?
A. Implement and test the solution.
B. Determine if escalation is necessary.
C. Identify the affected areas of the network.
D. Identify the results and effects of the solution
Answer: A
62. Which of the following technologies was designed to provide the FASTEST data rates over analog
phone lines?
A. RADSL
B. SONET
C. ADSL
D. MPLS
Answer: C
63. Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).
A. 802.11g
B. 802.1X
C. 802.11b
D. 802.1 n
E. 802.11a
Answer: D,E
64. A small office in which all workstations are using an ISP provided IP range has noticed a
consistent decrease in network traffic speed. The decrease does not occur when the gateway to
the ISP is disconnected. Which of the following should the administrator implement?
A. Multicast addressing
B. Load balancing
C. Address translation
D. DHCP
Answer: C
65. Which of the following should be used to test an internal NIC without having to connect it to the
network?
A. Loopback cable
B. Crossover cable
C. Rollover cable
D. Straight cable
Answer: A
66. Kerberos is a form of user authentication that:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only capabilities.
D. Does not require an authentication server
Answer: A
67. Computers on a small network are not able to receive new addresses from the DHCP server.
However, the administrator has checked the server and ensured it is connected, responding, and
functional. Which of the following is the MOST likely problem in this scenario?
A. The DHCP server has an incorrect gateway configured.
B. The DHCP server was incorrectly configured with a six hour lease time on addresses.
C. The DHCP server was incorrectly configured with no-expiring lease time on addresses.
D. The DNS server is no longer functional and internal name-address resolution is down.
Answer: C
68. Which of the following OSI model layers is used for logical addressing?
A. Physical
B. Transport
C. Network
D. Data link
Answer: C
69. Which of the following is the full range of address block 192.16876.0/23?
A. 192.168.76.0-192.168.77.255
B. 192.168.76.0-192.168.76.255
C. 192.168.76.0-192.168.76.23
D. 192.168.76.0-192.168.78 0
Answer: A
70. A network at a small business utilizes a star topology and is experiencing frequent collisions
among data packets. Which of the following devices is MOST likely being used?
A. Unmanaged switch
B. Hardware firewall
C. Hub
D. Managed switch
Answer: C
71. A technician is troubleshooting a network connectivity issue with a user's desktop configured to
use a static IP address. The technician notes the following configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1
Which of the following changes will allow the desktop to communicate properly with remote
networks?
A. Changing the DNS to 172.16.1.100
B. Changing the WINS server to 172.174.136
C. Changing the netmask to 255.255.255.0
D. Changing the default gateway to 172.16.3.1
Answer: D
72. An administrator needs to know the workstation name of a user who called in for support in order
to remotely manage it. After calling the user and having the user open a command prompt, which
of the following commands would the administrator ask the user to type?
A. Netstat
B. Ifconfig
C. Hostname
D. Ping
Answer: C
73. Which of the following describes 1Gigabit Ethernet?
A. 10GBaseER
B. 10Base2
C. 1000BaseT
D. 100Base5
Answer: C
74. Which of the following remote access methods allows an administrator to take control of a user's
machine and block the user from seeing the active session?
A. PPP
B. PPPoE
C. RDP
D. RAS
Answer: C
75. On a network switch, which of the following is the default native VLAN?
A. 0
B. 1
C. 1024
D. 4096
Answer: B
76. Which of the following protocols is used to encrypt data between web servers and web browsers?
A. SMTP
B. SIP
C. HTTP
D. SSL
Answer: D
77. Which of the following devices separates a LAN segment into two collision domains, without
affecting the broadcast domain?
A. Firewall
B. Bridge
C. Repeater
D. Router
Answer: B
78. A company wants to secure access to its internal wireless network. The company wants to use the
most secure means to access the network. Which of the following is the BEST choice for wireless
security in this situation?
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
Answer: D
79. Which of the following represents the physical address of a network access card?
A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
Answer: B
80. Which of the following is an invalid IPv4 address?
A. 225.0.0.1
B. 254.254.0.0
C. 256.0.0.4
D. 224.2.1.4
Answer: C
81. 1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (328 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
Answer: B
82. A technician is reporting wireless transmission speeds of 300Mbps. Which of the following
wireless standards is being used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
83. Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,
one pair for sending and the other pair for receiving?
A. 100BaseT4
B. 100BaseTX
C. 100BaseX
D. 100BaseFX
Answer: B
84. Which of the following DNS records would be queried to locate a company's mail server?
A. A
B. MX
C. AAAA
D. CNAME
Answer: B
85. Which of the following uses a ring topology?
A. DSL
B. Ethernet
C. DOCSIS
D. SONET
Answer: D
86. Which of the following connector types would Sandy, a network technician, use to connect a serial
cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
Answer: D
87. Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the
following software tools would she use to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat
Answer: B,D
88. Which of the following protocols would Kurt, a technician, use to synchronize local date and time
of a client workstation to that of a server?
A. RTP
B. NTP
C. TFTP
D. ARP
Answer: B
89. A small office has asked to have six PCs networked together by Joe, a consultant. The office
users want file sharing capability with no access to the Internet. Which of the following items will
Joe need? (Select TWO).
A. Network bridge
B. RG-59 patch cabling
C. CAT5e patch cabling
D. Firewall
E. Switch
Answer: C,E
90. Which of the following services would Karen, a technician, use to create or update a client's DNS
'A' and 'PTR' records automatically?
A. Kerberos
B. BIND
C. WINS
D. DHCP
Answer: D
91. Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the
following application services will be blocked due to this?
A. Email sending and receiving
B. Domain Name Service
C. FTP access to external servers
D. Remote desktop access
Answer: A
92. CAT6 Ethernet cabling has a rated maximum transmission capability of:
A. 10Mbps
B. 100Mbps
C. 20,000Mbps
D. 10,000Mbps
Answer: D
93. Which of the following would Karen, a technician, do to monitor remote traffic through an access
point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
Answer: A
94. Which of the following network devices MOST likely functions as a network repeater or a bridge?
A. VPN concentrator
B. IDS
C. Access point
D. Firewall
Answer: C
95. Which of the following VPN methods is BEST used for connecting a remote office to the main
company office?
A. WEP-to-WPA
B. RDP-to-RAS
C. Client-to-site
D. Site-to-site
Answer: D
96. Users are unable to access the company’s intranet website. Which of the following attacks has the
network MOST likely experienced?
A. Man-in-the-middle
B. Smurf
C. Trojan
D. DoS
Answer: D
97. Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz
frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A
98. Joe, a network technician, has configured a server with the following IP settings:
IP Address: 192.168.1.40/27
Default Gateway: 192.168.1.64
DNS: 192.168.1.33
The server cannot access the Internet. Which of the following settings needs to be changed?
A. Default gateway
B. IP address
C. VLAN
D. DNS
Answer: A
99. After a switch upgrade, several users report no connection to the Internet, while other users report
no problems. Which of the following is the MOST likely problem?
A. Wrong gateway
B. Faulty or missing routes
C. No DNS
D. VLAN port assignments
Answer: D
100. Which of the following technologies has different upload and download speeds?
A. OC12
B. SDSL
C. OC3
D. ADSL
Answer: D
101. Which of the following is a Class A private IP address?
A. 4.2.2.2
B. 10.1.1.45
C. 169.254.9.15
D. 192.168.0 100
Answer: B
102. Which of the following defines the purpose of a DHCP scope?
A. To allocate a preset range of MAC addresses available for assignment.
B. To tell a DHCP server to exclude IP addresses.
C. To properly configure a DHCP server's allowed bandwidth level.
D. To allocate a preset range of IP addresses available for assignment.
Answer: D
103. Karen, a technician, is connecting a new desktop computer to a switch. She was only able to
locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown
Which of the following should Karen do to complete the installation?
A. Re-end the provided cable, keeping the wiring the same.
B. Use the provided cable
C. Purchase a crossover cable.
D. Purchase a straight-through cable
Answer: D
104. Which of the following identifies the WLAN Joe, a user, is connected to?
A. SSID
B. Frequency
C. WEP
D. Channel
Answer: A
105. Which of the following connectors push and twist-on?
A. LC
B. SC
C. ST
D. RJ-45
Answer: C
106. Which of the following security devices is used in providing packet and MAC address filtering
services for the network?
A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS
Answer: B
107. Which of the following media types will block EMI?
A. UTP
B. Serial
C. STP
D. Non-plenum
Answer: C
108. Which of the following devices will allow Sandy, a user, to see a cached copy of websites?
A. Content switch
B. DNS server
C. Proxy server
D. Load balancer
Answer: C
109. Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router
Answer: B
110. Blocking a known malicious web address by using the ACL on the firewall is an example of which
of the following?
A. IP filtering
B. Application filtering
C. MAC filtering
D. Port filtering
Answer: A
111. Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
Answer: D
112. Which of the following commands can Sandy, a technician, use on a server to display the default
router setting?
A. ping
B. nslookup
C. route
D. arp
Answer: C
113. Which of the following OSI layers performs error detection using a Frame Check Sequence?
A. Session
B. Transport
C. Physical
D. Data link
Answer: D
114. Which of the following layers of the OSI model is above the Session layer?
A. Data link
B. Presentation
C. Physical
D. Transport
Answer: B
115. Which of the following is the loopback address for IPv6?
A. ::1
B. ::255
C. 127.0.0.1
D. 127:0:0:1
Answer: A
116. Joe, a network administrator, has been requested to install wireless access throughout the entire
building, while utilizing a single SSID. Which of the following options will meet this requirement?
A. Set a separate VLAN on each WAP with the same encryption type
B. Set the SSID on each WAP and set contiguous WAPs to different channels
C. Set the SSID on each WAP and set contiguous WAPs to the same channel
D. Set a separate VLAN on each WAP with the same frequency
Answer: B
117. Which of the following allows for multiple operating systems to be run simultaneously on a single
server?
A. Dual boot
B. Multiple hard drives
C. PXE boot
D. Virtual machines
Answer: D
118. Sandy, a network technician, would like to keep the IP address of the Human Resource
department" s server in the same group of 100 DHCP IP addresses that are assigned to the
Human Resource department's employee workstations. Which of the following would BEST allow
this and have the ability for the server to keep the same IP address?
A. Implement a set of static IPs for the entire human resource department.
B. Use a DHCP reservation for the server IP address.
C. Use a small DHCP scope for the human resource department.
D. Connect the server to a router in the network closet on the same floor.
Answer: B
119. Which of the following wireless network standards allows for the HIGHEST speeds?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
120. Which of the following would Joe, a technician, MOST likely use to remotely verify port
configuration of a switch?
A. traceroute command
B. SNMP monitor
C. nbtstat command
D. dig command
Answer: A
121. Which of the following can be used to view the list of ports on which a server is listening?
A. dig
B. net statistics
C. netstat
D. nslookup
Answer: C
122. Which of the following is an invalid MAC address?
A. AA:CE:58:FD:90:08
B. 44:98:3E:F8:33:23
C. 56:AD:BX89:55:54
D. 94:9E:FE:EE:8C:DF
Answer: C
123. On which of the following layers does a hub function?
A. Transport
B. Data link
C. Physical
D. Network
Answer: C
124. Which TCP/IP model layer does the OSI model layer named 'session' respond to?
A. Application
B. Presentation
C. Internet
D. Transport
Answer: B
125. Which of the following defines access for a network?
A. ACL
B. RDP
C. RAS
D. ARP
Answer: A
126. Which of the following uses copper wiring?
A. 10GBaseER
B. 10GBaseLW
C. 100BaseFX
D. 1000BaseT
Answer: D
127. Which of the following tools allows Kurt, an administrator, to test connectivity between two
computers?
A. route
B. ping
C. ipconfig
D. tfconfig
Answer: B
128. Which of the following is the MAIN purpose of a packet sniffer?
A. To determine open ports on a server
B. To ensure encryption is being used
C. To analyze network traffic
D. To prevent network intrusion
Answer: C
129. Karen, a network technician, is troubleshooting a problem and has just established a plan of action
to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?
A. Verify full system functionality and if applicable implement preventative measures.
B. Implement the solution or escalate as necessary.
C. Document findings, actions, and outcomes.
D. Establish a theory of probable cause (e.g. question the obvious).
Answer: B
130. Which of the following wireless technologies can support the GREATEST distance on either
2.4GHz or 5GHz frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
131. A company needs strong wireless security enabled for minimal cost. Which of the following
security measures is the BEST to use?
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
Answer: C
132. Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
Answer: D
133. Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. This is a private address which cannot be seen by external users.
B. The address does not have the appropriate subnet mask assigned.
C. This is a public address which can only be seen by internal users.
D. This is a private address which can only be seen by external users.
Answer: A
134. Which of the following is the network topology in which computers connect to form a straight line?
A. Ring
B. Star
C. Bus
D. Mesh
Answer: C
135. Users have reported slow access times when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
A. arp
B. route
C. ipconfig
D. tracert
Answer: D
136. 1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (328 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
Answer: B
137. Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404:
Page not found'. She then uses the ping command and finds that the default gateway cannot be
pinged. At which of the following layers does the problem MOST likely reside?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
Answer: A
138. Which of the following wiring standards would Karen, a technician, MOST likely use to
interconnect two devices without the use of a hub or switch?
A. 568A
B. 568B
C. Crossover
D. Loopback
Answer: C
139. Which of the following is the name of the routing update process involved when a change occurs
in the routing environment?
A. Supernetting
B. Dynamic
C. Subletting
D. Convergence
Answer: D
140. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes
on either side of the data link?
A. Gateway
B. Hub
C. Bridge
D. Router
Answer: C







No comments:

Post a Comment