1. Keyword and blacklist filtering would be handled at which level in a
network?
A. Layer 2 managed switch
B. DHCP server
C. Hardware firewall
D. Bridge
Answer: C
2. When installing two 802.11g access points in the same building, which
of the following channels
will MOST likely be used to minimize interference?
A. 5 and 6
B. 1 and 6
C. 6 and 10
D. 2 and 6
Answer: B
3. Which of the following devices transmits timed broadcasts onto an
active network?
A. Bridge
B. Unmanaged switch
C. DHCP client
D. Firewall
Answer: C
4. Which of the following describes the location where an administrator
would terminate a bundle of
CAT5e cables?
A. Switch
B. Smart jack
C. Router
D. Patch panel
Answer: D
5. Which of the following can be an STP cable?
A. RG-6
B. CAT5e
C. Fiber
D. RG-59
Answer: B
6. A web server is running correctly but sending a RST packet to any
client trying to connect using
HTTP on TCP port 80.
Which of the following tools should be used to determine the listening
port of the web server?
A. Route
B. Ifconfig
C. Netstat
D. Nslookup
Answer: C
7. At which of the following layers does the TFTP protocol operate?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
Answer: D
8. Which of the following utilities would be used to display a NIC's cache
of MAC addresses?
A. arp
B. nslookup
C. dig
D. netstat
Answer: A
9. Which of the following is an intelligent repeater that is aware of the
MAC addresses of the nodes
on either side of the data link?
A. Gateway
B. Hub
C. Bridge
D. Router
Answer: C
10. At which of the following layers does the ICMP protocol operate?
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 5
Answer: B
11. A user reports sporadic connectivity with their wireless connection. A
technician determines the
wireless speed reported by the laptop to be 1Mbps. Which of the following
is the MOST likely
cause of this issue?
A. The client does not support 802.11n.
B. Incorrect frequency on the client is being used.
C. Incorrect encryption on the AP.
D. The client distance from the AP.
Answer: D
Explanation:
12. Which of the following tools would an administrator use to determine if
a DNS server is answering
authoritatively for a domain?
A. nbtstat
B. dig
C. netstat
D. hostname
Answer: B
13. By default, which of the following ports would a network need to have
opened to allow for the
transmission of incoming and outgoing email? (Select TWO).
A. 21
B. 25
C. 80
D. 110
E. 123
Answer: B,D
14. An administrator is setting up a network and would like to prevent
users from having the ability to
plug their PC into the network to receive an IP address. Which of the
following addressing
schemes should the technician use?
A. NAT
B. Dynamic
C. Subnetting
D. Static
Answer: D
15. An administrator is setting up a network and would like to prevent
users from having the ability to
plug their PC into the network to receive an IP address. Which of the
following addressing
schemes should the technician use?
A. NAT
B. Dynamic
C. Subnetting
D. Static
Answer: D
16. Which of the following connector types is used for coax cable?
A. BNC
B. ST
C. LC
D. SC
Answer: A
17. A technician claims to have crimped a patch cable
according to the T568A standard on one end
and T568B on the other.
Which of the following results is to be expected?
A. Since
only half the leads are used, the cable will only work at 100Mbps.
B. The
cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B
cables.
C. There
will be no proper data continuity; the standards utilize two different wiring
diagrams.
D. The
cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on
T568B
pure cables
Answer: C
18. An administrator is setting up a security camera that will send the
same feed to twelve of the
twenty workstations on the network. Which of the following addressing
schemes was designed for
this scenario?
A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer
Answer: A
19. A technician would like to separate the HR department's workstations
from the other workstations
at the company. Which of the following network topologies should be
used?
A. Peer to peer
B. Subnetting
C. VLAN
D. VPN
Answer: C
20. A client wants to improve the wireless coverage on the third floor of
their house. The wireless
router is located in the basement and there is no easy way to run a
cable to the third floor. Which
of the following devices should be installed to extend the wireless
coverage to cover the entire
third floor without running cables?
A. Switch
B. Router
C. Repeater
D. Bridge
Answer: C
21. Which of the following describes what the number two represents in
l00Base2 cabling?
A. Fiber
B. Coaxial cable
C. UTP
D. Twisted pair
Answer: B
22. A crossover cable is MOST commonly associated with which of the
following layers of the OSI
model?
A. Session
B. Application
C. Network
D. Physical
Answer: D
23. Which of the following devices is used to connect multiple devices to a
network and does not stop
broadcast traffic?
A. Switch
B. Hub
C. Modem
D. Repeater
Answer: B
24. A network administrator needs to add an additional connection to a
room. The administrator adds
a new Ethernet switch and must connect it to an existing switch. Which
cable type should be used
to connect the two switches?
A. CAT3 cable
B. Serial cable
C. Crossover cable
D. Rollover cable
Answer: C
25. Prioritizing traffic between data and voice is defined as which of the
following?
A. Caching engines
B. Proxy server
C. QoS
D. Load balancing
Answer: C
26. A demarcation point is usually installed and managed by which of the
following providers?
A. Web host provider
B. VoIP company
C. Telephone company
D. Hardware manufacturer
Answer: C
27. Users are unable to access the Internet but the users are able to
send/receive email from their
desktops. Which of the following ports is MOST likely being blocked?
A. 25
B. 80
C. 110
D. 143
Answer: B
28. Which of the following would need to be implemented on a wireless
router to allow network access
based on a passphrase that the administrator would supply?
A. WPA-PSK encryption
B. SSID broadcast
C. Port forwarding
D. MAC filtering
Answer: A
29. Which of the following performs posture assessments for unknown devices
that connect to the
network?
A. PKI
B. EAP
C. NAC
D. AAA
Answer: C
30. At which of the following OSI model layers is HTTPS encryption
performed?
A. Layer 3
B. Layer 5
C. Layer 6
D. Layer 7
Answer: C
31. An administrator is concerned about users utilizing the company's
wireless signal with their
personal laptops. Which of the following is the BEST method to use to
prevent unauthorized
devices from using the company's wireless network?
A. Secure VPN
B. MAC filtering
C. IP filtering
D. Static IP addresses
Answer: B
32. Which of the following cables is the MOST susceptible to interference?
A. Fiber
B. Coax
C. UTP
D. STP
Answer: C
33. On which of the following network devices would an administrator
configure an ACL?
A. Router
B. Hub
C. Repeater
D. NIC
Answer: A
34. An administrator would like to know the name of the workstation that is
being repaired. Which of
the following commands, without parameters, will provide this
information?
A. Hostname
B. Ipconfig
C. Netstat
D. Ping
Answer: A
35. Which of the following routing protocols involves all routers knowing
the connections status of
other routers within the network?
A. RIPv2
B. OSPF
C. IGRP
D. BGP
Answer: B
36. A technician is working on a SOHO wireless network and notices that the
wireless adaptor in the
laptop shows excellent connection at 11Mbps. The technician has a
wireless N adaptor. Which of
the following would BEST describe this connection speed?
A. The laptop is too far away from the WAP.
B. The WAP is using 802.11a frequencies.
C. The laptop is only set to allow 802.11n
connections.
D. The technician is on an 802.11b network.
Answer: D
37. Which of the following network devices would MOST likely be installed
on a network to help
reduce broadcast traffic and to allow individual virtual networks?
A. Switch
B. Repeater
C. Hub
D. WAP
Answer: A
38. Which of the following connector types is commonly identified by two
rows of pins with four in one
row and five in the other?
A. DB-9
B. RJ-45
C. SC
D. BNC
Answer: A
39. Which of the following commands would allow a computer to acquire an IP
address?
A. ipconfig/release
B. ipconfig/renew
C. ipconfig/all
D. ipconfig/help
Answer: B
40. Several users are sending emails to CompTIA.org. but they are not being
received. Which of the
following commands could be used to verify that the company is able to
connect to the mail
service at CompTIA.org?
A. Ping
B. Arp
C. Dig
D. telnet
Answer: D
41. Which of the following metrics indentifies the number of connections
that is between two devices?
A. Hop count
B. MTU
C. Latency
D. Bandwidth
Answer: A
42. Which of the following has a maximum data rate of 11Mbps?
A. 802.11n
B. 802.11g
C. 802.11b
D. 802.11a
Answer: C
43. Which of the following networks are reserved for private IP addresses?
A. 168.129.00/24
B. 172.16.128.0/15
C. 192.168.0.0/16
D. 162.17.0.0/12
Answer: C
44. An administrator needs to terminate network cables that have just been
installed in the main
communications closet. Which of the following tools is required?
A. Multimeter
B. Snips
C. Toner probe
D. Punch down tool
Answer: D
45. A computer is able to ping other devices on the same network but is
unable to ping devices on
another network. Which of the following needs to be configured?
A. DNS primary server
B. Host route
C. Proxy ARP
D. Default gateway
Answer: D
46. Which of the following restricts network access to a router
administrator's interface?
A. IDS
B. SSL
C. ACL
D. SMNPv2
Answer: C
47. In which of the following topologies could the failure of one machine
cause the entire network to
stop functioning?
A. Mesh
B. Token ring
C. Star
D. Spanning tree
Answer: B
48. A user reports that their laptop does not have network connectivity,
but was working fine last
week. The technician executes IPCONFIG to see what the IP address is but
it comes up with a
169.254.254.1 address. This address is not part of the company's subnet.
Which of the following
MOST likely identifies this address type?
A. Multicast
B. DHCP
C. APIPA
D. Broadcast
Answer: C
49. Determining when to retransmit frames is an example of which of the
following Ethernet
properties?
A. Carrier sense
B. Collision detection
C. Multiple access points
D. Collision avoidance
Answer: B
50. Which of the following would Joe, a technician, configure to modify the
time a device will hold an
IP address provided through DHCP?
A. DNS suffixes
B. Leases
C. Static IP addressing
D. Reservations
Answer: B
51. Sandy, a technician, wants to limit access to a wireless network to
company owned laptops, but
does not want to use an encryption method. Which of the following methods
would be BEST to
accomplish this?
A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise
Answer: A
52. Joe, a network technician, is tasked with installing a router and
firewall to get an office working
with Internet access. Which of the following features MUST be configured
to allow sharing of a
single public IP address?
A. QoS
B. POP3
C. PAT
D. SMTP
Answer: C
53. Which of the following is a form of encrypting packets for safe, secure
data transmission within a
network?
A. RAS
B. PPTP
C. IPSec
D. ICA
Answer: C
54. Two duplicate pieces of equipment can be used in conjunction for which
of the following
purposes? (Select TWO)
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
Answer: A,B
55. The T568B wiring standard slates that CAT5 cables should be coded as
follows:
A. White/Orange, Orange, White/Green, Green, Blue,
White/Blue, White/Brown, Brown,
B. White/Orange, Orange, White/Green, Blue,
White/Blue, Green, White/Brown, Brown,
C. White/Orange, Orange, \White/Green, Green, White/Blue,
Blue, White/Brown, Brown,
D. White/Orange, Orange, White/Green, Blue,
Answer: B
56. Using network monitoring tools would allow an administrator to do which
of the following?
A. Configure offline devices
B. Examine performance issues
C. Install additional software and updates
D. View syslog events
Answer: B
57. Which of the following wireless technologies can operate at only 5GHz?
A. 802.11b/g
B. 802.11g
C. 802.11b
D. 802.11a
Answer: D
58. Which of the following devices allows multiple internal IP addresses to
access an external website
with minimal impact to the network bandwidth?
A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper
Answer: A
59. A VPN connection is not working correctly and the technician is unable
to ping the VPN server.
Which of the following actions should the technician do FIRST?
A. Call their local ISP
B. Verify the IP information of the server
C. Check their local Internet connection
D. Verify the hostname of the server
Answer: C
60. A technician wants to use an existing DHCP server for three additional
VLANs. Which of the
following features needs to be configured to allow for this addition?
A. DHCP server
B. Proxy server
C. Repeater
D. DHCP relay
Answer: D
61. A client is having problems connecting remotely after replacing a
router. An administrator has just
created an action plan. Which of the following is the NEXT step the
administrator should perform
to resolve this issue?
A. Implement and test the solution.
B. Determine if escalation is necessary.
C. Identify the affected areas of the network.
D. Identify the results and effects of the solution
Answer: A
62. Which of the following technologies was designed to provide the FASTEST
data rates over analog
phone lines?
A. RADSL
B. SONET
C. ADSL
D. MPLS
Answer: C
63. Which of the following wireless standards can be used to avoid the
2.4GHz range? (Select TWO).
A. 802.11g
B. 802.1X
C. 802.11b
D. 802.1 n
E. 802.11a
Answer: D,E
64. A small office in which all workstations are using an ISP provided IP
range has noticed a
consistent decrease in network traffic speed. The decrease does not
occur when the gateway to
the ISP is disconnected. Which of the following should the administrator
implement?
A. Multicast addressing
B. Load balancing
C. Address translation
D. DHCP
Answer: C
65. Which of the following should be used to test an internal NIC without
having to connect it to the
network?
A. Loopback cable
B. Crossover cable
C. Rollover cable
D. Straight cable
Answer: A
66. Kerberos is a form of user authentication that:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only
capabilities.
D. Does not require an authentication server
Answer: A
67. Computers on a small network are not able to receive new addresses from
the DHCP server.
However, the administrator has checked the server and ensured it is
connected, responding, and
functional. Which of the following is the MOST likely problem in this
scenario?
A. The DHCP server has an incorrect gateway configured.
B. The DHCP server was incorrectly configured with a
six hour lease time on addresses.
C. The DHCP server was incorrectly configured with
no-expiring lease time on addresses.
D. The DNS server is no longer functional and internal
name-address resolution is down.
Answer: C
68. Which of the following OSI model layers is used for logical addressing?
A. Physical
B. Transport
C. Network
D. Data link
Answer: C
69. Which of the following is the full range of address block
192.16876.0/23?
A. 192.168.76.0-192.168.77.255
B. 192.168.76.0-192.168.76.255
C. 192.168.76.0-192.168.76.23
D. 192.168.76.0-192.168.78 0
Answer: A
70. A network at a small business utilizes a star topology and is
experiencing frequent collisions
among data packets. Which of the following devices is MOST likely being
used?
A. Unmanaged switch
B. Hardware firewall
C. Hub
D. Managed switch
Answer: C
71. A technician is troubleshooting a network connectivity issue with a
user's desktop configured to
use a static IP address. The technician notes the following
configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1
Which of the following changes will allow the desktop to communicate
properly with remote
networks?
A. Changing the DNS to 172.16.1.100
B. Changing the WINS server to 172.174.136
C. Changing the netmask to 255.255.255.0
D. Changing the default gateway to 172.16.3.1
Answer: D
72. An administrator needs to know the workstation name of a user who
called in for support in order
to remotely manage it. After calling the user and having the user open a
command prompt, which
of the following commands would the administrator ask the user to type?
A. Netstat
B. Ifconfig
C. Hostname
D. Ping
Answer: C
73. Which of the following describes 1Gigabit Ethernet?
A. 10GBaseER
B. 10Base2
C. 1000BaseT
D. 100Base5
Answer: C
74. Which of the following remote access methods allows an administrator to
take control of a user's
machine and block the user from seeing the active session?
A. PPP
B. PPPoE
C. RDP
D. RAS
Answer: C
75. On a network switch, which of the following is the default native VLAN?
A. 0
B. 1
C. 1024
D. 4096
Answer: B
76. Which of the following protocols is used to encrypt data between web
servers and web browsers?
A. SMTP
B. SIP
C. HTTP
D. SSL
Answer: D
77. Which of the following devices separates a LAN segment into two
collision domains, without
affecting the broadcast domain?
A. Firewall
B. Bridge
C. Repeater
D. Router
Answer: B
78. A company wants to secure access to its internal wireless network. The
company wants to use the
most secure means to access the network. Which of the following is the
BEST choice for wireless
security in this situation?
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
Answer: D
79. Which of the following represents the physical address of a network
access card?
A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
Answer: B
80. Which of the following is an invalid IPv4 address?
A. 225.0.0.1
B. 254.254.0.0
C. 256.0.0.4
D. 224.2.1.4
Answer: C
81. 1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (328 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
Answer: B
82. A technician is reporting wireless transmission speeds of 300Mbps. Which
of the following
wireless standards is being used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
83. Which of the following LAN technologies is considered fast Ethernet and
uses two pairs of cabling,
one pair for sending and the other pair for receiving?
A. 100BaseT4
B. 100BaseTX
C. 100BaseX
D. 100BaseFX
Answer: B
84. Which of the following DNS records would be queried to locate a
company's mail server?
A. A
B. MX
C. AAAA
D. CNAME
Answer: B
85. Which of the following uses a ring topology?
A. DSL
B. Ethernet
C. DOCSIS
D. SONET
Answer: D
86. Which of the following connector types would Sandy, a network
technician, use to connect a serial
cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
Answer: D
87. Karen, a technician, needs to test if domain name resolution is
functioning properly. Which of the
following software tools would she use to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat
Answer: B,D
88. Which of the following protocols would Kurt, a technician, use to
synchronize local date and time
of a client workstation to that of a server?
A. RTP
B. NTP
C. TFTP
D. ARP
Answer: B
89. A small office has asked to have six PCs networked together by Joe, a
consultant. The office
users want file sharing capability with no access to the Internet. Which
of the following items will
Joe need? (Select TWO).
A. Network bridge
B. RG-59 patch cabling
C. CAT5e patch cabling
D. Firewall
E. Switch
Answer: C,E
90. Which of the following services would Karen, a technician, use to
create or update a client's DNS
'A' and 'PTR' records automatically?
A. Kerberos
B. BIND
C. WINS
D. DHCP
Answer: D
91. Joe, a network technician, blocks access to ports 25,110, and 143 on
the firewall. Which of the
following application services will be blocked due to this?
A. Email sending and receiving
B. Domain Name Service
C. FTP access to external servers
D. Remote desktop access
Answer: A
92. CAT6 Ethernet cabling has a rated maximum transmission capability of:
A. 10Mbps
B. 100Mbps
C. 20,000Mbps
D. 10,000Mbps
Answer: D
93. Which of the following would Karen, a technician, do to monitor remote
traffic through an access
point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
Answer: A
94. Which of the following network devices MOST likely functions as a
network repeater or a bridge?
A. VPN concentrator
B. IDS
C. Access point
D. Firewall
Answer: C
95. Which of the following VPN methods is BEST used for connecting a remote
office to the main
company office?
A. WEP-to-WPA
B. RDP-to-RAS
C. Client-to-site
D. Site-to-site
Answer: D
96. Users are unable to access the company’s intranet website. Which of the
following attacks has the
network MOST likely experienced?
A. Man-in-the-middle
B. Smurf
C. Trojan
D. DoS
Answer: D
97. Which of the following has a maximum transfer rate of 54Mbps and
operates at the 5GHz
frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A
98. Joe, a network technician, has configured a server with the following
IP settings:
IP Address: 192.168.1.40/27
Default Gateway: 192.168.1.64
DNS: 192.168.1.33
The server cannot access the Internet. Which of the following settings
needs to be changed?
A. Default gateway
B. IP address
C. VLAN
D. DNS
Answer: A
99. After a switch upgrade, several users report no connection to the
Internet, while other users report
no problems. Which of the following is the MOST likely problem?
A. Wrong gateway
B. Faulty or missing routes
C. No DNS
D. VLAN port assignments
Answer: D
100. Which of the following technologies has different upload and download
speeds?
A. OC12
B. SDSL
C. OC3
D. ADSL
Answer: D
101. Which of the following is a Class A private IP address?
A. 4.2.2.2
B. 10.1.1.45
C. 169.254.9.15
D. 192.168.0 100
Answer: B
102. Which of the following defines the purpose of a DHCP scope?
A. To allocate a preset range of MAC addresses
available for assignment.
B. To tell a DHCP server to exclude IP addresses.
C. To properly configure a DHCP server's allowed
bandwidth level.
D. To allocate a preset range of IP addresses
available for assignment.
Answer: D
103. Karen, a technician, is connecting a new desktop computer to a switch.
She was only able to
locate one cable in the office for the installation. The wires at each
end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green,
brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange,
brow-white, brown
Which of the following should Karen do to complete the installation?
A. Re-end the provided cable, keeping the wiring the
same.
B. Use the provided cable
C. Purchase a crossover cable.
D. Purchase a straight-through cable
Answer: D
104. Which of the following identifies the WLAN Joe, a user, is connected
to?
A. SSID
B. Frequency
C. WEP
D. Channel
Answer: A
105. Which of the following connectors push and twist-on?
A. LC
B. SC
C. ST
D. RJ-45
Answer: C
106. Which of the following security devices is used in providing packet and
MAC address filtering
services for the network?
A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS
Answer: B
107. Which of the following media types will block EMI?
A. UTP
B. Serial
C. STP
D. Non-plenum
Answer: C
108. Which of the following devices will allow Sandy, a user, to see a
cached copy of websites?
A. Content switch
B. DNS server
C. Proxy server
D. Load balancer
Answer: C
109. Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router
Answer: B
110. Blocking a known malicious web address by using the ACL on the firewall
is an example of which
of the following?
A. IP filtering
B. Application filtering
C. MAC filtering
D. Port filtering
Answer: A
111. Which of the following DNS records would allow for a website to have
more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
Answer: D
112. Which of the following commands can Sandy, a technician, use on a
server to display the default
router setting?
A. ping
B. nslookup
C. route
D. arp
Answer: C
113. Which of the following OSI layers performs error detection using a
Frame Check Sequence?
A. Session
B. Transport
C. Physical
D. Data link
Answer: D
114. Which of the following layers of the OSI model is above the Session
layer?
A. Data link
B. Presentation
C. Physical
D. Transport
Answer: B
115. Which of the following is the loopback address for IPv6?
A. ::1
B. ::255
C. 127.0.0.1
D. 127:0:0:1
Answer: A
116. Joe, a network administrator, has been requested to install wireless
access throughout the entire
building, while utilizing a single SSID. Which of the following options
will meet this requirement?
A. Set a separate VLAN on each WAP with the same
encryption type
B. Set the SSID on each WAP and set contiguous WAPs to
different channels
C. Set the SSID on each WAP and set contiguous WAPs to
the same channel
D. Set a separate VLAN on each WAP with the same
frequency
Answer: B
117. Which of the following allows for multiple operating systems to be run
simultaneously on a single
server?
A. Dual boot
B. Multiple hard drives
C. PXE boot
D. Virtual machines
Answer: D
118. Sandy, a network technician, would like to keep the IP address of the
Human Resource
department" s server in the same group of 100 DHCP IP addresses
that are assigned to the
Human Resource department's employee workstations. Which of the
following would BEST allow
this and have the ability for the server to keep the same IP address?
A. Implement a set of static IPs for the entire human
resource department.
B. Use a DHCP reservation for the server IP address.
C. Use a small DHCP scope for the human resource
department.
D. Connect the server to a router in the network
closet on the same floor.
Answer: B
119. Which of the following wireless network standards allows for the
HIGHEST speeds?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
120. Which of the following would Joe, a technician, MOST likely use to
remotely verify port
configuration of a switch?
A. traceroute command
B. SNMP monitor
C. nbtstat command
D. dig command
Answer: A
121. Which of the following can be used to view the list of ports on which a
server is listening?
A. dig
B. net statistics
C. netstat
D. nslookup
Answer: C
122. Which of the following is an invalid MAC address?
A. AA:CE:58:FD:90:08
B. 44:98:3E:F8:33:23
C. 56:AD:BX89:55:54
D. 94:9E:FE:EE:8C:DF
Answer: C
123. On which of the following layers does a hub function?
A. Transport
B. Data link
C. Physical
D. Network
Answer: C
124. Which TCP/IP model layer does the OSI model layer named 'session'
respond to?
A. Application
B. Presentation
C. Internet
D. Transport
Answer: B
125. Which of the following defines access for a network?
A. ACL
B. RDP
C. RAS
D. ARP
Answer: A
126. Which of the following uses copper wiring?
A. 10GBaseER
B. 10GBaseLW
C. 100BaseFX
D. 1000BaseT
Answer: D
127. Which of the following tools allows Kurt, an administrator, to test
connectivity between two
computers?
A. route
B. ping
C. ipconfig
D. tfconfig
Answer: B
128. Which of the following is the MAIN purpose of a packet sniffer?
A. To determine open ports on a server
B. To ensure encryption is being used
C. To analyze network traffic
D. To prevent network intrusion
Answer: C
129. Karen, a network technician, is troubleshooting a problem and has just
established a plan of action
to resolve the problem. Which of the following is the NEXT step in the
troubleshooting
methodology?
A. Verify full system functionality and if applicable
implement preventative measures.
B. Implement the solution or escalate as necessary.
C. Document findings, actions, and outcomes.
D. Establish a theory of probable cause (e.g. question
the obvious).
Answer: B
130. Which of the following wireless technologies can support the GREATEST
distance on either
2.4GHz or 5GHz frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
131. A company needs strong wireless security enabled for minimal cost.
Which of the following
security measures is the BEST to use?
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
Answer: C
132. Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
Answer: D
133. Sandy, a network technician, is attempting to map a FQDN to an internal
server at the address of
10.0.0.15 without NAT/PAT. Which of the following is the reason this
will ultimately not work?
A. This is a private address which cannot be seen by
external users.
B. The address does not have the appropriate subnet
mask assigned.
C. This is a public address which can only be seen by
internal users.
D. This is a private address which can only be seen by
external users.
Answer: A
134. Which of the following is the network topology in which computers
connect to form a straight line?
A. Ring
B. Star
C. Bus
D. Mesh
Answer: C
135. Users have reported slow access times when retrieving information from
a server on the
company’s network. Which of the following tools would provide access
time information on each
segment of the network to reach the server?
A. arp
B. route
C. ipconfig
D. tracert
Answer: D
136. 1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (328 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
Answer: B
137. Sandy, an administrator, attempts to open a web page and sees the
following error 'Error 404:
Page not found'. She then uses the ping command and finds that the
default gateway cannot be
pinged. At which of the following layers does the problem MOST likely
reside?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
Answer: A
138. Which of the following wiring standards would Karen, a technician, MOST
likely use to
interconnect two devices without the use of a hub or switch?
A. 568A
B. 568B
C. Crossover
D. Loopback
Answer: C
139. Which of the following is the name of the routing update process
involved when a change occurs
in the routing environment?
A. Supernetting
B. Dynamic
C. Subletting
D. Convergence
Answer: D
140. Which of the following is an intelligent repeater that is aware of the
MAC addresses of the nodes
on either side of the data link?
A. Gateway
B. Hub
C. Bridge
D. Router
Answer: C
No comments:
Post a Comment