Arianna Flashcards
Which of the following ports is default for DNS? A. 53 B. 69 C. 80 D. 143
A. 53
Which of the following components would be used to terminate all distribution and trunk cables in a central office or PBX? A. 66 block B. MDF C. Demarc D. IDF
B. MDF
A technician has received a call from a customer stating that the customer has logged in, but cannot access
the Internet. The technician asks the customer if the gateway and the firewall can be pinged. This is an
example of which of the following troubleshooting skills?
A. Information gathering
B. Implementing and testing
C. Escalation
D. Documenting the solution
A. Information gathering
Which of the following components is used to terminate a T1 connection? A. 66 block B. Patch panel C. Smart jack D. 110 block
C. Smart jack
Which of the following protocols can be found at the transport layer? A. FTP B. SMTP C. TCP D. DNS
C. TCP
Which of the following is used to relay queries from a private network to the Internet? A. Content filter B. Load balancer C. Proxy server D. Stateful firewall
C. Proxy server
A technician has been tasked to reduce the administrative time spent on the network. The network uses
several VLANs. Which of the following is a protocol that can be added to the switches to help reduce
administrative time?
A. MTU
B. WLAN
C. SIP
D. VTP
D. VTP
Which of the following tools could an administrator use to determine a workstations default gateway? A. route B. nslookup C. dig D. ping
A. route
Which of the following routing protocols is based on being open and takes the shortest path FIRST? A. RIP B. OSPF C. EIGRP D. IS-IS
B. OSPF
An administrator needs to obtain the MAC address of all systems on a small SOHO network. Which of the
following is the BEST way to accomplish this?
A. Run nslookup for each IP address.
B. ARP each IP, then look in the ping table.
C. ARP poison the router, then run a network sniffer.
D. Ping each IP then look in the ARP table.
D. Ping each IP then look in the ARP table.
Installing specialized devices in between network resources and the Internet to distribute network requests and
ensure availability of resources is an example of which of the following network management techniques?
A. Port mirroring
B. Load balancing
C. Port address translation
D. QoS
B. Load balancing
Which of the following wireless technologies uses point-to-multipoint for data transmission? A. 802.11g B. 802.11n C. 802.11b D. 802.11a
B. 802.11n
Which of the following naming conventions takes place in the data link layer of the OSI model and is often used in conjunction with IPv6? A. MAC-48 B. EUI-48 C. EUI-64 D. IP address
C. EUI-64
A technician is setting up a network for 25 users at a remote location. All of the users share a single Internet
connection. The ISP provides a single IP address for the location. Which of the following addressing
mechanisms should the technician use to provide access and IP addresses for all 25 users?
A. NAT
B. Proxy
C. Gateway
D. DNS
A. NAT
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone service (POTS)? A. 66 block B. 110 block C. CAT6 patch panels D. Smart jacks
A. 66 block
Which of the following would an administrator do NEXT once an action plan has been created?
A. Find new symptoms and issues.
B. Identify more areas that may be affected.
C. Determine if escalation is necessary.
D. Implement the plan and test it.
D. Implement the plan and test it.
Which of the following logical topologies uses distributed authentication? A. Client/server B. VLAN C. VPN D. P2P
D. P2P
A helpdesk team is unable to agree on a solution to an issue. Each technician presents their own solution to
the problem. When a solution is agreed upon, which of the following documentation MOST likely needs to be
reviewed and possibly updated?
A. Baseline
B. Wiring Schematics
C. Procedures
D. Regulations
C. Procedures
Which of the following devices should be used to connect a router to a T1 line? A. CSU/DSU B. Firewall C. Proxy server D. Switch
A. CSU/DSU
Which of the following is a 32- bit address? A. MAC B. IPv6 C. WWN D. IPv4
D. IPv4
Which of the following would a switch port be an example of? A. Broadcast domain B. Spanning-tree loop C. Routing table entry D. Collision domain
D. Collision domain
Which of the following tools is BEST used to find where a CAT5e cable is terminated? A. Cable tester B. Butt set C. Toner probe D. OTDR
C. Toner probe
Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause? A. Encryption strength B. SSID mismatch C. Interference D. Weak signals
C. Interference
A company uses wiring standard 568A throughout their network. However, a contractor for the company
installs a lab using 568B. While the lab technically works, this may cause problems because:
A. the 568B standard conflicts with the 568A standard and causes interference in the network.
B. different crimping tools are needed to adhere to the 568B standard.
C. when replacing connectors other technicians may use the wrong wiring scheme.
D. crosstalk between pairs will be greatly increased due to standard incompatibility.
C. when replacing connectors other technicians may use the wrong wiring scheme.
When testing a network wire, the network testing device reports Warning! Voltage on-line. Which of the
following would cause this?
A. Attenuation on the wire is too low.
B. The wire is being used on the phone system.
C. There is crosstalk on the wire.
D. The wire is being used on a satellite connection.
B. The wire is being used on the phone system.
A user has accidentally looped two open network jacks together with a spare patch cable. Which of the following is MOST likely to occur? A. Domain collision B. Signal bleed C. Broadcast storm D. Signal loss
C. Broadcast storm
E1/T1 service ordered from the local telecommunications company is typically delivered over which of the following? A. Copper B. Cellular C. Fiber D. Wireless
A. Copper
Which of the following would allow an administrator to confirm maximum bandwidth is being utilized? A. Throughput tester B. Load testing C. Packet sniffer D. Protocol analyzer
A. Throughput tester
IGP differs from EGP because IGP is designed for use in which of the following? A. Communication between WANs B. Communication between networks C. Single autonomous network D. Single non-autonomous network
C. Single autonomous network
Which of the following network cables would test the ports on a switch? A. Crossover B. Rollover C. Loopback D. Straight
C. Loopback
Which of the following is the BEST protocol to use when a user would like to keep emails synchronized over multiple devices? A. IGMP B. IMAP4 C. HTTP D. POP3
B. IMAP4
Which of the following is a required option of a DHCP lease? A. BootP B. DNS address C. Default gateway D. TFTP server
C. Default gateway
A technician spoke to a user regarding a network problem. The technician searched all the logs associated
with the problem and pulled the change logs for the network environment. Which of the following should the
technician perform NEXT?
A. Establish a theory of probable cause.
B. Implement preventative measures.
C. Implement the solution or escalate as necessary.
D. Establish a plan of action to resolve the problem.
A. Establish a theory of probable cause.
An administrator wants to control and limit access to company computers from remote users. Which of the
following services would the administrator MOST likely disable?
A. TELNET
B. HTTP
C. RDP
D. RCP
C. RDP
An administrator would like to implement a technology that requires no configuration on the client side and
filters out specified port ranges. Which of the following would accomplish this?
A. Host-based firewall
B. Network-based IDS
C. Network-based firewall
D. Host-based proxy service
C. Network-based firewall
Which of the following would a technician do to monitor remote traffic through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2
A. Enable an SNMP agent
An administrator is replacing a hub on a network. Which of the following devices would be the BEST replacement choice? A. Router B. Switch C. Repeater D. Bridge
B. Switch
Which of the following is a Layer 2 device that would MOST likely be used to connect network segments of different topologies? A. Bridge B. Switch C. Hub D. Repeater
A. Bridge
Which of the following tools is used to determine if a phone line is in working order? A. Voltage event recorder B. Toner probe C. Multimeter D. Butt set
D. Butt set
Port scanners are MOST likely used to: A. generate up-to-date routing tables. B. identify unused ports on a switch. C. map a companys network topology. D. identify running services on a host.
D. identify running services on a host.
When implementing a WAP, which of the following can be disabled to help prevent unauthorized people from locating the network? A. DCHP B. MAC filtering C. DNS D. SSID
D. SSID
Which of the following would allow an administrator to implement port level security? A. PKI B. RADIUS C. 802.1x D. MAC filtering
C. 802.1x
Some switches are capable of implementing a specialized technique to segregate network traffic according to
specific rules. This technology is known as:
A. CIDR.
B. PoE.
C. VLAN.
D. trunking.
C. VLAN.
Which of the following offers the GREATEST throughput? A. 802.11n B. Bluetooth C. 802.11a D. 802.11g
A. 802.11n
B. Bluetooth
Multiple crossover and straight cables must be created. Which of the following would the administrator use to create these cables? A. Wiring documents B. Logical network diagrams C. Company policies D. Baselines configurations
A. Wiring documents
A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols? A. HTTPS B. POP3 C. SSH D. SMTP
A. HTTPS
An administrator is installing a new IDS. Which of the following must be configured on the switch to allow the
IDS to capture all company network traffic?
A. Port mirroring
B. Virtual Trunk Protocol
C. Spanning tree
D. Trunking
A. Port mirroring
Which of the following devices is MOST likely to rely on up-to-date signatures to provide accurate services? A. Caching server B. Content filter C. Router D. Switch
B. Content filter
Which of the following ports carries IMAP traffic, by default, on modern email systems? A. 23 B. 25 C. 80 D. 143
D. 143
Which of the following technologies must be used to ensure remote Internet hosts will respond to packets
leaving a company by connecting to another companys honeypot?
A. DNS
B. DHCP
C. WINS
D. SNAT
D. SNAT
Which of the following can be disabled to help make wireless networks harder to find? A. DMZ B. SSID C. DHCP D. WPA
B. SSID
A technician needs to identify the type of fiber being used in a distribution panel. The marking the technician
finds on the cable is 62.5/125. Which of the following optical cables has the technician found?
A. Multi-mode fiber
B. Plenum
C. Single-mode fiber
D. Coaxial
A. Multi-mode fiber
Which of the following is true of IGP?
A. IGPs are not used within autonomous systems
B. OSPF, IS-IS and BGP are IGPs
C. Includes routing protocols used for choosing routes between autonomous systems
D. OSPF, RIP, and IS-IS are IGPs
D. OSPF, RIP, and IS-IS are IGPs
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distances? A. DSL B. WiMAX C. E3/T3 D. ATM
B. WiMAX
Which of the following is MOST effective in filtering incoming malicious packets at the gateway router? A. IP filtering B. MAC filtering C. 802.1x D. VLAN
A. IP filtering
A technician accidentally plugs both ends of a cable into the same switch. However, this did not cause a
network loop. Which of the following explains this situation?
A. Spanning tree protocol is enabled on the switch.
B. The switch has IGMP snooping enabled.
C. PoE has disabled the ports.
D. The ports are in the same VLAN.
A. Spanning tree protocol is enabled on the switch.
Which of the following commands will test the connectivity of a remote website? A. netstat B. ping C. nslookup D. dig
B. ping
Which of the following represents the BEST method of securing physical access to a network backbone?
A. Installing biometric security in all server room doorways.
B. Forcing all remote users connecting to the network externally to use encrypted SSL VPN.
C. Installing hardened deadbolts in all server room doorways.
D. Requiring users to authenticate network accounts via complex passwords and smart cards.
A. Installing biometric security in all server room doorways.
Which of the following cable types transmits data at 1Gbps? A. 100Base-Fx B. 1000Base-T C. 100Base-TX D. 10Base-T
B. 1000Base-T
Which of the following devices should be installed if a client wants to extend their wireless coverage area in their building? A. Bridge B. Media converter C. Hub D. Access point
D. Access point
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX. Which of
the following should the administrator do NEXT?
A. Reboot the switch to enable the new connection
B. Update the logical network diagram
C. Update the switch configuration logs
D. Update the wiring schematics
D. Update the wiring schematics
An administrator suspects an IP address conflict with two systems on the local network. Which of the following tools would be used to verify this conflict?
A. route
B. ping
C. nslookup
D. arptools would be used to verify this conflict?
D. arp
A technician is troubleshooting a cable problem. The technician has checked both ends and suspects an issue
50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper
A. TDR
A technician needs to test if domain name resolution is functioning properly. Which of the following software
tools would be used to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat
B. dig & D. nslookup
Which of the following cable technologies is BEST suited to provide 1Gbps throughput for a given network? A. CAT6 B. ThickNet C. CAT5 D. CAT3
A. CAT6
When comparing 802.11a to 802.11g, which of the following is the major difference? A. Power B. Speeds C. Frequency D. Encryption type
C. Frequency
Which of the following features is required for information to be passed between VLANs on switches? A. PoE B. Port authentication C. Spanning tree D. Trunking
D. Trunking
A homeowner wants to add DSL and make it available to all rooms of the house. Which of the following should
the homeowner install to provide the BEST coverage?
A. DSL modem
B. ADSL modem
C. 4 port wireless DSL modem
D. Cable modem
C. 4 port wireless DSL modem
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming? A. Traffic shaping B. Proxy server C. VPN concentrator D. High availability
A. Traffic shaping
Which of the following is MOST likely to affect IP based surveillance systems? A. Vishing B. Social engineering C. Man-in-the-middle D. Mantrap
C. Man-in-the-middle
A printer needs to be moved from one switch to another. Which of the following tools can be used to find out
which printer cable is connected on the switch?
A. Punch down tool
B. Toner probe
C. Cable tester
D. Multimeter
B. Toner probe
Which of the following are common security threat mitigation techniques?
A. Allowing unauthorized devices to connect to the network
B. User training, updating policies and procedures
C. Letting users update their own virus definitions
D. Setting up a PAP connection to provide a point-to-point connection
B. User training, updating policies and procedures