N10-005 Exam Flashcards

1
Q
Which of the following DNS records would a web browser access to determine the IP address of
an Internet web page?
A. CNAME
B. A
C. MX
D. PTR
A

B. A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree
A

D. Spanning Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following BEST describes a switch port?
A. Broadcast domain
B. Distance vector
C. Link state
D. Collision domain
A

D. Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not
working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel

A

C. WAP SSIDs are matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following could Kim, a network technician, use to inspect connection setup, request,
and response headers for users connecting to a web server?
A. nbtstat command
B. dig command
C. ipconfig command
D. Protocol analyzer

A

D. Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following address blocks would MOST likely be blocked from crossing a border
router?
A. 8.0.0.0/8
B. 172.16.0.0/12
C. 122.0.0.0/24
D. 248.0.0.0/8
A

B. 172.16.0.0/12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following would Jeff, a technician, MOST likely use to remotely verify port
configuration of a switch?
A. traceroute command
B. SNMP monitor
C. nbtstat command
D. dig command
A

B. SNMP monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites.
Which of the following would MOST likely be used when investigating the problem at Lisa’s
workstation?
A. nslookup
B. route
C. nbtstat
D. arp

A

A. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
A. 192.168.0.255
B. 192.168.0.1
C. 192.168.0.0
D. 192.168.0.253
A

A. 192.168.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to
pass on its default port? (Select TWO).
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080
A

D. 161

E. 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
10
Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking
equipment to attach it to. Which of the following would allow him to test basic functionality of the
NIC?
A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler
A

A. Loopback plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets within the same subnet based on IP addresses

A

A. Switches packets within the same subnet based on MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
A. Multimeter
B. Loopback plug
C. Cable certifier
D. CAT3 coupler
A

B. Loopback plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address
is not leased out from the active scope?
A. Reservations
B. Lease times
C. Removing IPs from the active leases
D. Configuring the DNS options
A

A. Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is needed to allow DHCP to route to a different network separated by a
Layer 3 device?
A. DNS suffixes
B. DHCP relay agent
C. Static IP addressing
D. Scope configuration
A

B. DHCP relay agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To
manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface

A

A. IP address on the native VLAN interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following describes a rationale for a network with redundant paths?
A. VPN compatibility
B. Unified communications implementation
C. High availability requirement
D. QoS
A

C. High availability requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz
frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN
A

D. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
20
Which of the following network devices hides network nodes behind one public IP address?
A. Layer 3 switch
B. Content filter
C. VPN server
D. Proxy server
A

D. Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A VPN concentrator is used for which of the following purposes?
A. MAC filtering
B. Content filtering
C. Secure network access
D. Connectivity troubleshooting
A

C. Secure network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following
interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0

A

A. FastEthernet 0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch
is working properly but cannot be accessed remotely. Which of the following items is MOST likely
missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT

A

B. Cryptokey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet
downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP

A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Kim, a user, on a wireless network reports an issue with network access while using a cordless
phone. Which of the following is the MOST likely cause?
A. Encryption type
B. Channel selection
C. Antenna placement
D. Signal strength

25

A

B. Channel selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in
order to increase usable bandwidth?
A. Channel bonding
B. MIMO
C. Spatial reuse
D. 20MHz channel spacing
A

A. Channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Zach, a technician, discovers a switch is not communicating with the other switches in a stack.
Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked.

A

C. The cable is not a crossover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of
the following configurations should Jeff consider for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANs

A

C. Port mirroring

E. VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved
from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately
begin reporting intermittent connectivity issues with both corporate and Internet resources. Which
of the following is the MOST likely cause?
A. Protocol mismatch
B. MTU size was not increased for the new distance
C. Incorrect VLAN assignment
D. Incorrect cabling

A

D. Incorrect cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

30
Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted
wireless network has been getting slower while his Internet traffic has steadily been increasing.
Which of the following should be configured to resolve this problem?
A. VLAN
B. MTU
C. WPA
D. SSID

A

C. WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Kim, a network administrator, is seeing workstations in building C authenticate to the building A
wireless access point. Which of the following would resolve this issue?
A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency

A

B. Reduce the transmission power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Zach, a network technician, is configuring several switches to be managed remotely. Which of the
following must be configured to connect via SSH to each of those devices, as well as to retrieve
various parameters?
A. PoE settings and VTP configuration
B. SNMP configuration only
C. IP address and SNMP configuration
D. QoS and PoE settings

A

C. IP address and SNMP configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Lisa, the network technician, has been instructed to provide connectivity to workstations within a
SOHO that is over 800 feet (243 meters) away from the main switch. Which of the following would
she install to provide connectivity?
A. CAT5e
B. CAT6
C. Coaxial
D. Multimode fiber

A

D. Multimode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

During a disaster recovery test, several billing representatives need to be temporarily setup to take
payments from customers. It has been determined that this will need to occur over a wireless
network, with security being enforced where possible. Which of the following configurations should
be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.

A

D. WPA2, SSID disabled, and 802.11a.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A number of vendors visit a large corporation but are unable to connect to the company’s wireless
network. Kim, the network technician, verifies that other users are connected to the network and it
seems to be fully operational. Which of the following steps should be taken NEXT to troubleshoot
the issue?
A. Verify the SSID is enabled.
B. Ensure the WAP is up and running.
C. Ensure the transmission is not encrypted.
D. Verify the physical network is connected to the wireless network.

A

A. Verify the SSID is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An 801.11g wireless access point was configured as follows:
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-
40
Which is true about the above configuration?
A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the
MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client.
B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.
D. Any 802.11g compatible client can connect to the wireless network if the encryption key is
known by the client.

A

C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which of the following is the correct representation of an IPv6 address?
A. ::
B. 0:0:0:0:0:0:0:0:1
C. 1:2:3:4:AB:CD:EF
D. 2001::4860:800f::
A

A. ::

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Which protocol is represented by the packet capture below?
UDP 0.0.0.0:68 -> 255.255.255.255:67
A. DHCP
B. FTP
C. SNMP
D. DNS
A

A. DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following default ports are used with DHCP? (Select TWO).
A. 22
B. 23
C. 53
D. 67
E. 68
A

D. 67

E. 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

40
Which of the following is a reason to use dynamic DNS?
A. The host IP address is not listed in the firewall.
B. The host IP address is assigned by DHCP.
C. Static routes cannot be used on the host network.
D. A third-party certificate is being used.

A

B. The host IP address is assigned by DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Which of the following virtual components maintains a MAC-to-port forwarding table?
A. Virtual PBX
B. Virtual desktop
C. Virtual switch
D. Virtual server
A

C. Virtual switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room.
Arriving at the conference room, Jeff realizes that the laptop is in process of reconnecting to the
wireless network. Which of the following is a common wireless problem that can cause this issue?
A. Mismatched SSID
B. Incorrect encryption type
C. Weak signal strength
D. Increased latency

A

C. Weak signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Kim, a network administrator, has made changes to the DHCP leasing setup for a given network
and is expecting all devices to recognize the changes shortly. However, after a full week, none of
the machines on the company network are grabbing new addresses with the new lease time.
Which of the following is the problem?
A. The lease time on the original configuration was too long.
B. The firewall was never configured to recognize the changes.
C. The DHCP server was never restarted, so changes never took affect.
D. The lease time on the original configuration was too short.

A

A. The lease time on the original configuration was too long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to
host a website from a server within a privately addressed network and make it publicly available.
Which of the following would have to be configured on the router to allow the public to access the
website from one of the static IP addresses?
A. QoS monitoring
B. Static NAT
C. VLAN tagging
D. MAC filtering

A

B. Static NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
Which of the following default services uses TCP/UDP port 88?
A. LDAP
B. IGMP
C. HTTP
D. Kerberos
A

D. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Which of the following virtualized components would provide a secure operating environment for a
business user?
A. Virtual PBX
B. Virtual switch
C. Virtual desktop
D. Virtual SAN
A

C. Virtual desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model?
(Select TWO).
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
A

B. Layer 2

C. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following examples would require a private static IP address, but not a public static IP
address?
A. A PDA connecting to the wireless network.
B. A laptop that is deployed on a LAN.
C. A file server deployed in the internal datacenter.
D. An Internet facing web server for external access.

A

C. A file server deployed in the internal datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a
large office. Many of the computers are showing moderate to weak signals even though there are
two APs less then 15 feet (4 meters) away in either direction. Which of the following is MOST likely
the cause?
A. The local antennas are not powerful enough.
B. There is an SSID mismatch.
C. The receiver sensitivity is too high.
D. The closest APs are down.

A

D. The closest APs are down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

50
Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses
from a new, properly configured DHCP server on another subnet. Statically addressed clients can
get onto the same network with no issues. Which of the following is causing the issue?
A. Incorrect VLAN tagging
B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols

50

A

B. Missing helper addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A new small business needs a network solution that provides at least 50Mbps of bandwidth and
supports full duplex communication. Which of the following meets those needs?
A. 10/100 layer 2 switch
B. 2.4GHz 802.11g
C. 5.0GHz 802.11a
D. 10Base2 Ethernet

A

A. 10/100 layer 2 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
Which of the following services would Kim, a technician, use to create or update a client's DNS 'A'
and 'PTR' records automatically?
A. Kerberos
B. BIND
C. WINS
D. DHCP
A

D. DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have
reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g
speeds. Which of the following would MOST likely fix this issue?
A. Enable wireless multimedia (WMM) for QoS
B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops

A

A. Enable wireless multimedia (WMM) for QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Kim, a network administrator, is configuring a switch with an LACP port group for uplink. She plugs
in the secondary uplink of the group, and shortly thereafter receives widespread reports that the
network is malfunctioning. Which of the following is MOST likely the cause?
A. A network loop was created due to a misconfiguration of the port group.
B. The port on the switch for the new secondary link was never enabled.
C. The LACP group was mistakenly configured to do layer 2 + 3 + 4 hashing for its link balancing.
D. The LACP group was only configured to do layer 2 hashing for its link balancing.

A

A. A network loop was created due to a misconfiguration of the port group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Kim,
a network administrator, is assigned to provide connectivity between the existing office and the
new office. Which of the following solutions provides the MOST security from third party
tampering?
A. CAT5e connection between offices via the patch panel located in building’s communication
closet.
B. CAT5e cable run through ceiling in the public space between offices.
C. VPN between routers located in each office space.
D. A WEP encrypted wireless bridge with directional antennae between offices.

A

C. VPN between routers located in each office space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a
device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is
a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.
C. Manually adjust the duplex mode on the server’s link.
D. Configure the laptop to receive a DHCP address from the server, rather than manually setting
one.

A

A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following?
A. Only the 5GHz band
B. Only the 2.4GHz band
C. Only the 900MHz band
D. Both 2.4GHz and 5GHz bands
A

A. Only the 5GHz band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Clients are unable to connect to the wireless network. The network is secured with WPA2-
Enterprise. Which of the following is MOST likely the cause of the problem?
A. MAC address authentication is being used.
B. The RADIUS server is down.
C. The users are using incorrect passwords.
D. The PSK is wrong.

A

B. The RADIUS server is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Jeff, a user, reports getting a “This page cannot be displayed” error message in his web browser.
However, Jeff can ping the default gateway. Which of the following is the MOST likely cause of the
problem?
A. SSL certificates are expired
B. Incorrect WINS server
C. The browser is unsupported
D. Incorrect DNS settings

A

D. Incorrect DNS settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

60
A small business would like to connect a second building on their property to the network. The
building is about 200 meters (656 feet) away from the main building. Which of the following would
be the MOST cost-effective method to supply a gigabit Ethernet connection to the second
building?
A. 10GBase-LW
B. 1000Base-LX
C. 1000Base-SX
D. 1000BaseT

A

C. 1000Base-SX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Lisa, a network technician, has implemented DHCP on the network last week. Employees are now
reporting duplicate IP addresses and network connectivity errors. Which of the following would
cause duplicate IP addresses on the network?
A. A second DHCP server is on the network.
B. The network IP leases are expiring and not renewing.
C. The DNS record A pointers are incorrect.
D. The DHCP server has run out of IP addresses to issue to clients.

A

A. A second DHCP server is on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which
of the following would allow her to perform this activity?
A. Behavioral Based IDS
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS

A

D. Signature Based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
Which of the following protocols uses port 3389?
A. IMAP
B. DHCP
C. SSH
D. RDP
A

D. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Zach, a network administrator, is responding to a support ticket. The ticket does not have enough
information to determine the problem. Which of the following should Zach perform FIRST before
responding to the ticket?
A. Determine if anything has changed.
B. Test a theory to determine a cause.
C. Establish a plan of action to resolve the problem.
D. Escalate the problem if necessary.

A

A. Determine if anything has changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use
802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to
communicate?
A. Enable mixed mode
B. Disable SSID
C. Disable encryption
D. Enable ‘n’ only mode

A

A. Enable mixed mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Zach, a technician, is installing a new wireless network. There are currently no wireless devices in
the area. Which of the following should Zach consider before installing the new devices?
A. Frequencies
B. SSID broadcast
C. WAP placement
D. Channels

A

C. WAP placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Zach, a user, cannot access any network resources. The technician has determined that the
problem is isolated to Zach, and that there have not been any changes to his workstation or switch
port recently. Which of the following steps in the troubleshooting methodology should the
technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Implement preventative measures.
C. Implement the solution or escalate as necessary.
D. Establish a theory of probable cause.

A

D. Establish a theory of probable cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Zach, a customer, wants to network several computers within a large warehouse. The warehouse
has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the
network switch. Which of the following cable types should a technician use for this computer?
A. CAT3
B. CAT5
C. CAT6
D. Fiber

A

D. Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
A layer 3 switch can move packets between subnets based on which of the following criteria?
A. 802.1q tag
B. Port
C. Application
D. IP address
A

D. IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

70
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the
fiber cable, which of the following configurations MUST be present?
A. Reverse ARP
B. Full duplex on the fiber link
C. PoE
D. 802.1q trunking

A

D. 802.1q trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
A managed switch offers which of the following benefits over an unmanaged switch? (Select
TWO).
A. 802.1q
B. SNMP
C. Gigabit
D. Layer 2 forwarding
E. Fewer collision domains
A

A. 802.1q

B. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

After installing new cabling, Kim, a technician, notices that several computers are connecting to
network resources very slowly. Which of the following tools would BEST help in determining if the
new cabling is the cause of the problem?
A. Multimeter
B. Cable certifier
C. Cable tester
D. Toner probe

A

B. Cable certifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A new network printer needs to be installed in the finance department. The switch port, server, and
printer NIC have been configured properly but no link light is coming up when the printer is
plugged into the wall port. Which of the following tools would Jeff, an administrator, use to
diagnose the problem?
A. Cable tester
B. Protocol analyzer
C. OTDR
D. Crimper

A

A. Cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port.
Which of the following configuration changes would facilitate access?
A. Traffic filtering
B. Trunking
C. MAC filtering
D. Port mirroring

A

B. Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
Zach, a network administrator, wants to separate the network into broadcast domains. Which of
the following can he use? (Select TWO).
A. WAPs
B. Routers
C. Patch panels
D. Hubs
E. Bridges
F. VLANs
A

B. Routers

F. VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following routing protocols utilizes only hop count as a metric, broadcasts its routing
table every 30 seconds by default, and has a MAXIMUM hop count of 15?
A. Interior Gateway Routing Protocol (IGRP)
B. Routing Information Protocol (RIP)
C. Open Shortest Path First (OSPF)
D. Border Gateway Routing Protocol (BGP)

A

B. Routing Information Protocol (RIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
Which of the following is the common port used for IMAP?
A. 25
B. 53
C. 143
D. 443
A

C. 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the
same subnet?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.248
A

A. 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur
to an outside DNS server?
A. 20
B. 53
C. 80
D. 3389
A

B. 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
80
Which of the following is a Class A private IP address?
A. 4.2.2.2
B. 10.1.1.45
C. 169.254.9.15
D. 192.168.0.100
A

B. 10.1.1.45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following
commands can Zach use to BEST troubleshoot this issue?
A. netsh
B. nslookup
C. ipconfig
D. tracert

A

A. netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

After a brownout, Zach, a user, can connect to the internal network, but not the Internet. Which of
the following is the company’s DSL router experiencing that is causing this issue?
A. Switching loop
B. Power failure
C. Broadcast storm
D. Duplicate IP address

A

B. Power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Lisa, a technician, is asked to install a wireless router in a company’s public café area. The
company wants the public to be able to connect to the wireless network with minimal security, but
not be able to connect to the private internal network. Which of the following firewall rules would
BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point

A

C. Block traffic from the wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Lisa, an administrator, attempts to open a web page and sees the following error: ‘Error 404: Page
not found’. She then uses the ping command and finds that the default gateway cannot be pinged.
At which of the following layers does the problem MOST likely reside?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7

A

A. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication
between devices within each VLAN is functioning. At which of the following layers does the
problem MOST likely reside?
A. Network
B. Data link
C. Transport
D. Session

A

A. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot
access the Internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.

A

B. An incorrect subnet mask has been entered in the WAP configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs
of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable
to reach the Internet. Jeff sees the following information in the switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST
likely cause of the problem?
A. The subnet mask is incorrect.
B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.

A

D. The server is missing default-gateway information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but
receives reports from the server administrator that servers connected to the new switch seem to
be experiencing slow LAN connections. Zach checks the port connecting the new switch to the
core switch and sees the following information:
#show run interface GigabitEthernet0/10
Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.

A

B. Speed and duplex have not been set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet).
B. 100 meters (328 feet).
C. 500 meters (1640 feet).
D. 1000 meters (3280 feet).
A

B. 100 meters (328 feet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
90
Which of the following DNS record types provides the hostname to IP address mapping?
A. A record
B. NS record
C. CNAME record
D. MX record
A

A. A record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the
device at the hotel. She can reach the Internet, but cannot access any internal network resources.
Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID

A

A. Incorrect DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Teachers and students at a school currently share the same bandwidth. The Internet performance
for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST
method to mitigate the issue?
A. Increased uptime
B. Caching engines
C. Traffic shaping
D. Load balancing

A

C. Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the
following user authentications would be the BEST to implement?
A. MS-CHAP
B. Kerberos
C. TACACS+
D. PKI

A

C. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
Which of the following uses copper wiring?
A. 10GBaseER
B. 10GBaseLW
C. 100BaseFX
D. 1000BaseT
A

D. 1000BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q
Which of the following cables covers the LONGEST distance?
A. 10GBaseT
B. 10GBaseFR
C. 100BaseTX
D. 1000BaseX
A

B. 10GBaseFR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion
that users are streaming video and music. Which of the following would BEST confirm Zach’s
theory?
A. Traffic analysis
B. SNMP
C. History logs
D. System logs

A

A. Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed
though or dumped is a example of which of the following?
A. Packet sniffing
B. Packet filter
C. Stateful inspection
D. Content filter

A

C. Stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q
Two duplicate pieces of equipment can be used in conjunction for which of the following
purposes? (Select TWO).
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
A

A. High availability

B. Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q
Which of the following improves wireless performance by allowing only one wireless transmission
on the network at a time?
A. CSMA/CA
B. CSMA/CD
C. Wireless encryption
D. Wireless bonding
A

A. CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

100
Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to
review all server logs centrally. Which of the following services could Lisa use in this scenario?
A. Event logs
B. Baselines
C. Change management
D. Syslog

A

D. Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Lisa, a network technician, needs to push changes out to network devices and also monitor the
devices based on each device’s MIB. Which of the following should she use?
A. SNMP
B. Traffic analysis
C. Syslog
D. Asset management

A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Users have reported slow access times when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
A. arp
B. route
C. ipconfig
D. tracert

A

D. tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with
a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants
to use the workstation’s MAC address. Which of the following protocols would provide the needed
information?
A. DHCP
B. ARP
C. DNS
D. PING

A

B. ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
Which of the following OSI layers performs error detection using a Frame Check Sequence?
A. Session
B. Transport
C. Physical
D. Data link
A

D. Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
Which of the following VPN methods is BEST used for connecting a remote office to the main
company office?
A. WEP-to-WPA
B. RDP-to-RAS
C. Client-to-site
D. Site-to-site
A

D. Site-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

The ISP needs to terminate the WAN connection. The connection should be located in the network
server room where the company LAN equipment resides. Which of the following identifies the
location?
A. Smart jack
B. MDF
C. VPN
D. 66 block

A

B. MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Zach, an administrator, wants to eliminate remote access to a network from all users, except those
users in Zach’s own country. Which of the following security measures could he use to set up this
functionality?
A. MAC filtering
B. Port filtering
C. IP filtering
D. TLS

A

C. IP filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check
the server for an IP address conflict on the server. Which of the following commands should Lisa
use?
A. traceroute
B. tracert
C. ifconfig
D. ipconfig

A

C. ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Network upgrades have been completed and the WINS server was shutdown. It was decided that
NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this
objective?
A. Content filtering
B. Port filtering
C. MAC filtering
D. IP filtering

A

B. Port filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

110
Lisa, a network technician, has determined that the initial theory of probable cause was incorrect.
Which of the following would be the NEXT step in the troubleshooting process?
A. Implement the solution
B. Establish a plan
C. Document findings
D. Escalate the issue

A

D. Escalate the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q
Which of the following is the MAXIMUM hop count for RIP before the network is considered
converged?
A. 1
B. 5
C. 10
D. 15
A

D. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

A company is expanding and has found that logging into each device to collect error information is
consuming too much time. They have asked Lisa, a network administrator, to set up a server that
will capture errors from each device automatically. Which of the following technologies would
BEST fit this requirement?
A. Syslog
B. RADIUS
C. IPSec
D. Network sniffer

A

A. Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Jeff, a network administrator, has been requested to install wireless access throughout the entire
building, while utilizing a single SSID. Which of the following options will meet this requirement?
A. Set a separate VLAN on each WAP with the same encryption type.
B. Set the SSID on each WAP and set contiguous WAPs to different channels.
C. Set the SSID on each WAP and set contiguous WAPs to the same channel.
D. Set a separate VLAN on each WAP with the same frequency.

A

B. Set the SSID on each WAP and set contiguous WAPs to different channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports
should be blocked on the firewall to achieve this?
A. 21
B. 22
C. 23
D. 25

A

A. 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Lisa, a network consultant, is asked to set up a wireless network in a home. The home user wants
the wireless network to be available in every corner of the house. Which of the following additional
information will Lisa need to determine the equipment for the installation? (Select TWO).
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house

A

A. The length of the house

D. The building material of the house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the
following software tools would she use to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat

A

B. dig

D. nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q
Which of the following DNS records would be queried to locate a company’s mail server?
A. A
B. MX
C. AAAA
D. CNAME
A

B. MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q
Which of the following protocols would Lisa, a technician, use to disable switch ports automatically
to prevent switching loops?
A. RIP
B. OSPF
C. STP
D. EGP
A

C. STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Which of the following network appliances can BEST be described as allowing multiple servers to
share requests for a website through the same public IP address?
A. VPN concentrator
B. Content filter
C. Load balancer
D. Proxy server

A

C. Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q
120
Which of the following connectors would Kim, a technician, use only for RG-6 cables?
A. F-connector
B. MTRJ
C. RJ-45
D. RS-232
A

A. F-connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q
Which of the following technologies implements authentication headers and encapsulating security
payloads?
A. IPSec
B. ISAKMP
C. TLS
D. SSL VPN
A

A. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q
Which of the following implements two-factor authentication?
A. Username and password
B. Fingerprint and facial recognition
C. Check card and PIN
D. PIN and password
A

C. Check card and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
Which of the following protocols works at the LOWEST layer of the OSI model?
A. L2TP
B. PPTP
C. ISAKMP
D. IPSec
A

A. L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q
Which of the following protocols provides security through encryption? (Select TWO).
A. PPPoE
B. L2TP
C. IPSec
D. PPP
E. TLS
A

C. IPSec

E. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q
Which of the following records would be used for a Reverse DNS lookup?
A. AAAA
B. MX
C. PTR
D. A
A

C. PTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q
Which of the following ports are MOST commonly used to interactively configure a networking
device? (Select TWO).
A. 21
B. 22
C. 23
D. 53
E. 67
A

B. 22

C. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q
Which of the following protocols is used to resolve FQDNs to IP addresses?
A. SSH
B. FTP
C. DNS
D. HTTP
A

C. DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q
IP address based routing occurs on which of the following layers of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
A

B. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q
Data arranged into packets would be on which of the following layers of the OSI model?
A. Datagram
B. Transport
C. Presentation
D. Network
A

D. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q
130
Which of the following DNS record types is used for IPv6 resolution?
A. MX
B. AAAA
C. A
D. PTR
A

B. AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house.
Which of the following will accomplish this?
A. Decreasing radio strength
B. MAC filtering
C. WEP encryption
D. SSID broadcast disable

A

A. Decreasing radio strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

A company wishes to have a wireless signal broadcast only through a specific stretch of a highway
tunnel. Which of the following measures will accomplish this?
A. WPA encryption
B. MAC filtering
C. Changing antenna type
D. Decreasing radio strength

A

C. Changing antenna type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and
shows a high value of NEXT. Which of the following represents the cause?
A. Crosstalk
B. TX/RX reversed
C. Split cables
D. DB loss

A

A. Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the
server is successful. Which of the following software tools is used to check if NetBIOS is enabled?
A. netstat
B. arp
C. nbtstat
D. nslookup

A

C. nbtstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following
items would be used to setup the office using a new DSL line? (Select TWO).
A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables

A

A. Router

B. Wi-Fi Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port
from which of the following port numbers to port number 587?
A. 20
B. 21
C. 23
D. 25

A

D. 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the
following port numbers needs to be redirected through the proxy server to accomplish this?
A. 20
B. 80
C. 143
D. 443

A

B. 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

An office would like to set up an unsecured wireless network for their customers in their lounge
area. Which of the following firewall capabilities should be configured to prevent the wireless traffic
from communicating with the office’s LAN traffic?

A

C. Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Kim, an employee, connects to a work computer from home via the built-in Windows remote
desktop connection. Which of the following is she MOST likely using to establish the connection?
A. RDP
B. RTP
C. RIP
D. RAS

A

A. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q
140
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She
needs to quickly determine which workstation is infected with the virus. Which of the following
would BEST help Kim?
A. Web server
B. Syslog
C. Network sniffer
D. SNMP
A

C. Network sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q
Which of the following is the default subnet mask for a Class B address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
A

B. 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q
Which of the following default ports would need to be disabled to block TFTP traffic?
A. 20
B. 21
C. 69
D. 123
A

C. 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

When troubleshooting a connectivity issue, which of the following commands will give Jeff, the
technician, a list of the host names connected to the network?
A. ping
B. nbstat
C. arp
D. msconfig

A

B. nbstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet
connection?
A. Multimode fiber
B. CAT6a
C. Single mode fiber
D. Coaxial
A

C. Single mode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q
Which of the following wireless technologies has the LARGEST cell size?
A. 802.11a
B. 802.3af
C. 802.11g
D. 802.11i
A

C. 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q
Which of the following is similar to MIMO?
A. WPA
B. SSID
C. PoE
D. Diversity
A

D. Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q
Which of the following are available speeds when using 802.11b? (Select TWO).
A. 1 Mb/s
B. 5.5 Mb/s
C. 6 Mb/s
D. 12 Mb/s
E. 54 Mb/s
A

A. 1 Mb/s

B. 5.5 Mb/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q
RADAR avoidance technologies are built into which of the following technologies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11i
A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q
Which of the following technologies can cause interference for 802.11g?
A. RADAR
B. 802.11a
C. IrDA
D. Bluetooth
A

D. Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q
150
Which of the following technologies would be used in a large office area that has a lot of 2.4GHz
noise?
A. 802.3af
B. 802.1q
C. 802.11a
D. MIMO
A

C. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q
Which of the following occurs when antenna gain is increased on an access point?
A. Connection speeds decrease
B. Throughput decreases
C. Cell size increases
D. Attenuation increases
A

C. Cell size increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q
Which encryption type uses only a 28 character key?
A. 40/64 bit WEP
B. 104/128 bit WEP
C. WPA2 PSK
D. WPA Personal
A

B. 104/128 bit WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is
MOST widely used with remote access?
A. PKI
B. VPN
C. MS-CHAP
D. RADIUS
A

D. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q
Which of the following uses a Management Information Base (MIB) to monitor the network?
A. History Logs
B. Syslog
C. SMTP
D. SNMP
A

D. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q
Which of the following does SNMPv3 BEST provide over previous versions?
A. Increased security
B. Simplified management
C. More data types
D. Higher productivity
A

A. Increased security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q
Which of the following is a terminal emulator used to manage a network device?
A. VPN
B. IDS
C. PuTTY
D. IPS
A

C. PuTTY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Zach, a network administrator, is tasked with simplifying the review of events from network
devices. Which of the following is used to accomplish this?
A. History logs
B. Event logs
C. Syslog server
D. Traffic analyzer

A

C. Syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that
the ST fiber jumper is good. Which of the following is the problem?
A. TX/RX reversed
B. Interference
C. Cable length
D. Bad connectors

A

A. TX/RX reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Users are reporting that Internet performance is slow. Jeff, the technician, has determined that the
Internet connection is saturated. Which of the following is BEST used to determine the source,
destination, and type of the traffic?
A. Netflow
B. Protocol analyzer
C. Network sniffer
D. SNMP

A

A. Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q
160
Which of the following is a valid IPv6 address?
A. 1056:958:E486::F8:8962
B. 1596:H593:B5D8::B859
C. 2048::9584:A6B8::0983
D. 4820::0985:489D::8761
A

A. 1056:958:E486::F8:8962

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q
Which of the following OSI model layers is responsible for the transmission of bits?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

A. Layer 1

162
Q
Frames are the Protocol Data Unit for which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

163
Q

Lisa, a network administrator, wants to automatically assign 168.254.1.0/24 addresses to
computers on the network. Which of the following will need to be configured?
A. DHCP addressing
B. Private addressing
C. DNS addressing
D. APIPA addressing

A

A. DHCP addressing

164
Q
IPSec relies on which of the following protocols? (Select TWO).
A. ESP
B. EAP
C. AH
D. PKI
E. RDP
A

A. ESP

C. AH

165
Q

A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet
access. Which of the following has MOST likely occurred?
A. Port security is blocking all traffic.
B. An IDS is blocking all traffic.
C. Implicit deny is blocking all traffic.
D. SMTP is blocking all traffic.

A

C. Implicit deny is blocking all traffic.

166
Q

An organization has installed a new firewall. Users need to have access to remote websites and
must be able to use SSH to retrieve files from remote locations. Which of the following actions
should be taken on the new firewall? (Select TWO).
A. Allow UDP port 21 outbound
B. Allow UDP port 22 outbound
C. Allow UDP port 80 outbound
D. Allow TCP port 21 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound

A

E. Allow TCP port 22 outbound

F. Allow TCP port 80 outbound

167
Q

How many collision domains and broadcast domains are present on a 24-port switch with no
VLAN assignments?
A. 1 collision domain, 1 broadcast domain
B. 1 collision domain, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
D. 24 collision domains, 24 broadcast domains

A

C. 24 collision domains, 1 broadcast domain

168
Q

Users report that an internal web server is not responding. Which of the following commands could
be used on the server to confirm that the web service is running?
A. nbtstat
B. traceroute
C. nslookup
D. netstat

A

D. netstat

169
Q
Kim, a network administrator, is attempting to join a workstation to a domain. Which of the
following commands would assist Kim in determining the computer name of the workstation?
(Select TWO).
A. nbtstat
B. net statistics
C. traceroute
D. netstat
E. nslookup
A

A. nbtstat

B. net statistics

170
Q
170
After a router upgrade, Jeff, the network administrator, needs to determine if workstations still
have the correct default gateway. Which of the following commands could he use? (Select TWO).
A. netstat
B. ipconfig
C. dig
D. traceroute
E. nbtstat
A

A. netstat

B. ipconfig

171
Q

Kim, an administrator, has detected a worm spreading throughout the network. Which of the
following ACLs can be configured on a Layer2 switch port to mitigate the attack?
A. Drop 19:21:68:10:20:00
B. Permit ::1/32
C. Permit A0:H1:B0:90:1D:6C
D. Drop 192.168.10.20

A

A. Drop 19:21:68:10:20:00

172
Q
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
A. Kerberos
B. Two factor authentication
C. CHAP
D. PKI
A

D. PKI

173
Q

After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal
RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s
public interface IP address. Which of the following must Jeff implement to assign a different public
IP from the router’s public interface IP address to one of the workstations in the office?
A. NAT
B. PAT
C. DMZ
D. ACL

A

A. NAT

174
Q
Which of the following OSI layers is responsible for encrypting HTTPS traffic?
A. 3
B. 4
C. 5
D. 6
A

D. 6

175
Q
00:12:34:56:78 can be used in which of the following?
A. WPA-PSK password
B. Channel selection
C. WEP key
D. MAC filtering
A

A. WPA-PSK password

176
Q

Lisa, a network administrator, must implement a wireless security encryption protocol that
supports the AES cipher. Which of the following should be implemented?
A. WEP
B. TKIP
C. WPA2
D. WPA Enterprise

A

C. WPA2

177
Q
Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the
following did she MOST likely setup?
A. Deep packet inspection
B. DDNS
C. Port forwarding
D. DMZ
A

C. Port forwarding

178
Q
Which of the following protocols is used by the ping command?
A. SMTP
B. ICMP
C. TFTP
D. ARP
A

B. ICMP

179
Q

Zach, a user, cannot access the Internet. A similar problem occurred several times last week to
other users, and the solution was to reboot each workstation. As the first step, the technician
reboots the workstation and it does not solve the problem. Which of the following should have
been done instead?
A. Change the DNS server IP on the client
B. Information gathering
C. Change the workstation IP address
D. Establish a plan of action

A

B. Information gathering

180
Q
180
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch
panels?
A. MDF
B. Caching engines
C. Demarc
D. IDF
A

A. MDF

181
Q

Which of the following is the BEST encryption protocol to use to allow customers to access a
secure website from the Internet without using VPNs?
A. IPSec
B. TLS
C. SSL version 1
D. SSL version 2

A

B. TLS

182
Q
Which of the following wireless security measures, although widely implemented, does not provide
strong security?
A. IPSec
B. WPA2
C. MAC address filtering
D. 802.1x
A

C. MAC address filtering

183
Q

After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the
network any longer. Which of the following would be the MOST likely reason? (Select TWO).
A. Bad Ethernet switch port
B. TX/RX reversed
C. Bad connectors
D. Bad patch cable
E. Mismatched MTU

A

C. Bad connectors

D. Bad patch cable

184
Q
Kim, a technician, suspects an attacker has accessed the network. Which of the following would
BEST help confirm her theory?
A. SNMP
B. Traffic analysis
C. Network sniffer
D. System logs
A

D. System logs

185
Q

Zach, a technician, notices a newly installed CAT5 cable is longer than the standard maximum
length. Which of the following problems would this MOST likely cause?
A. Split cable
B. EMI
C. DB loss
D. Crosstalk

A

C. DB loss

186
Q

Which of the following wiring standards has both ends colored as follows: orange-white, orange,
green-white, blue, blue-white, green, brown-white, brown?
A. T568A
B. T568B
C. Multimode fiber
D. Crossover

A

B. T568B

187
Q

Zach, a technician, working remotely cannot connect to the database server. The server does not
respond when he tries to ping it. Zach wants to determine which network device is preventing ping
from responding. Which of the following commands should he use to determine this?
A. tracert
B. nslookup
C. dig
D. ipconfig

A

A. tracert

188
Q

Which of the following could be installed to allow a home user with one desktop computer to
economically have Internet access in every room in the house?
A. Fiber optic
B. CAT6
C. Broadband over powerline
D. CAT5

A

C. Broadband over powerline

189
Q
Which of the following connectors push and twist on?
A. ST
B. LC
C. MTRJ
D. SC
A

A. ST

190
Q
190
Which of the following would be used to supply Internet to a cable modem?
A. RJ-11 connector
B. RJ-45 connector
C. F-connector
D. BNC connector
A

C. F-connector

191
Q
Which of the following 802.11 standards transmits the signals the GREATEST distance?
A. a
B. b
C. g
D. n
A

D. n

192
Q
Which of the following wireless authentication methods provides the GREATEST amount of
security?
A. WEP
B. WPA Enterprise
C. WPA Personal
D. WPA2 Personal
A

B. WPA Enterprise

193
Q
Antenna gain is measured in which of the following units?
A. dBi
B. GHz
C. mW
D. MHz
A

A. dBi

194
Q
Which of the following fiber types is MOST often used indoors?
A. Plenum
B. Modal conditioning
C. Multimode
D. Singlemode
A

C. Multimode

195
Q
Which of the following types of fiber connectors is used on an SFP?
A. MTRJ
B. LC
C. SC
D. ST
A

B. LC

196
Q
Horizontal cable is terminated on which device in the wiring closet?
A. Demarc
B. Switch
C. Punch down tool
D. Patch panel
A

D. Patch panel

197
Q
Which of the following are fiber connectors? (Select TWO).
A. LC
B. MTRJ
C. BNC
D. T1
E. DB-9
A

A. LC

B. MTRJ

198
Q
Which of the following is the standard 802.11g channel separation?
A. 11 MHz
B. 20 MHz
C. 54 MHz
D. 20 GHz
A

B. 20 MHz

199
Q
Which of the following devices is installed by a telecommunications company to deliver a T1 or
E1?
A. Smart jack
B. CSU/DSU
C. 66 block
D. Modem
A

A. Smart jack

200
Q

200
Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a
RADIUS server. Which technology should be used?
A. PEAP
B. WPA Personal
C. WPA2 Enterprise
D. WPA2 PSK

A

D. WPA2 PSK

201
Q
802.3 defines which of the following LAN access methods?
A. CSMA/CA
B. CSMA/CD
C. DSL
D. MPLS
A

B. CSMA/CD

202
Q
Which of the following technologies allows more than two transceivers with an access point?
A. MIMO
B. FIFO
C. 802.1x
D. WPA
A

A. MIMO

203
Q
A patch cable terminated with one end as T568A and the other as T568B will create which of the
following cable types?
A. Crossover
B. Serial
C. Roll over
D. Straight through
A

A. Crossover

204
Q
Which of the following will a firewall NOT protect the network from?
A. Intrusion
B. DDoS
C. Denial of Service
D. Spam e-mails
A

D. Spam e-mails

205
Q
Which of the following is a standard measure of signal power?
A. MHz
B. mips
C. dBm
D. Gbps
A

C. dBm

206
Q
Which of the following would Jeff, a technician, use for a service that needs fast communication
and is unaffected by packet loss?
A. UDP
B. ARP
C. ICMP
D. TCP
A

A. UDP

207
Q
Which of the following circuits provides the MOST bandwidth?
A. T3
B. OC3
C. T1
D. PRI
A

B. OC3

208
Q

Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and
router interfaces. Which of the following is MOST likely used as a source for creating the charts?
A. SNMP
B. Port scanner
C. Traffic sniffer
D. SYSLOG

A

A. SNMP

209
Q
Which of the following technologies is associated with the DOCSIS standard?
A. Cable
B. Dialup
C. Wireless
D. Cellular
A

A. Cable

210
Q
210
Which of the following is a contention based broadcast technology used for wireless networking?
A. CSMA/CA
B. CSMA/CD
C. CSU/DSU
D. TCP/IP
A

A. CSMA/CA

211
Q

Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters
(820 feet) from the IDF. Which of the following LAN technologies would be BEST to use?
A. 100BaseFX
B. 10GBaseT
C. MPLS
D. Coaxial

A

A. 100BaseFX

212
Q

Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of
the following utilities should be used to locate the network issue?
A. ipconfig
B. arp
C. tracert
D. netstat

A

C. tracert

213
Q
Which of the following are components of IPSec? (Select TWO).
A. AH
B. ESP
C. SSH
D. ICA
E. TLS
A

A. AH

B. ESP

214
Q
In IPSec, which of the following is an agreement on how devices will securely transmit
information?
A. SA
B. ESP
C. AH
D. ISAKMP
A

A. SA

215
Q

An organization recently installed a firewall on the network. Employees must have access to their
work computer from their home computer. In which of the following ways should the firewall be
configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound

A

D. Allow TCP port 3389 inbound

216
Q
An organization recently installed a firewall on the network. Employees must be able to send and
receive email from a POP3 server. In which of the following ways should the firewall be
configured? (Select TWO).
A. Allow TCP port 23
B. Allow TCP port 25
C. Allow TCP port 110
D. Allow UDP port 25
E. Allow UDP port 110
A

B. Allow TCP port 25

C. Allow TCP port 110

217
Q
Which of the following OSI model layers is responsible for data encryption?
A. Application
B. Presentation
C. Physical
D. Data Link
A

B. Presentation

218
Q
Which of the following exterior routing protocols uses an algorithm to determine the quickest route
to a destination?
A. RIP
B. OSPF
C. BGP
D. RIPv2
A

C. BGP

219
Q
Which of the following OSI model layers is used for logical addressing?
A. Physical
B. Transport
C. Network
D. Data link
A

C. Network

220
Q
220
In which of the following layers of the OSI model does the TCP protocol operate?
A. Session
B. Network
C. Data link
D. Transport
A

D. Transport

221
Q
At which of the following layers of the OSI model does an unmanaged switch operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

222
Q

Which of the following is an authentication, authorization, and accounting method that provides
administrative access to network devices?
A. PKI
B. TACACS+
C. CHAP
D. SSH

A

B. TACACS+

223
Q
Which of the following security devices is used in providing packet and MAC address filtering
services for the network?
A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS
A

B. Network-based firewall

224
Q
Which of the following is the MOST appropriate to use when routing Internet traffic through
multiple ISP connections?
A. BGP
B. SNAT
C. RIP
D. GPG
A

A. BGP

225
Q
Which of the following protocols allows more than three non-overlapping channels?
A. 802.11a
B. 802.11g
C. 802.1q
D. 802.15
A

A. 802.11a

226
Q
Which of the following represents the physical address of a network access card?
A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
A

B. 00-30-48-83-9B-C8

227
Q
ADSL, PPP, and ATM all operate at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 7
A

B. Layer 2

228
Q
Which of the following OSI layers BEST describes where an HTTP proxy operates?
A. Transport
B. Application
C. Presentation
D. Session
A

A. Transport

229
Q
A MAC address is used at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

230
Q

230
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the
following can be used to connect the device to the network?
A. Fiber multiplexer
B. Repeater
C. Attenuator
D. OTDR

A

B. Repeater

231
Q
A disassociation request is a way to mitigate which of the following threats?
A. ARP poisoning
B. Rogue AP
C. Man-in-the-middle attack
D. Botnet
A

B. Rogue AP

232
Q

Which of the following allows a malicious attacker to view network traffic if the attacker is on the
same network segment as Jeff, an administrator?
A. DoS attack
B. Man-in-the-middle attack
C. Smurf attack
D. Xmas attack

A

B. Man-in-the-middle attack

233
Q
Which of the following cable types would have the LEAST amount of EMI?
A. CAT3
B. CAT5
C. STP CAT6
D. Plenum CAT6
A

C. STP CAT6

234
Q
Which of the following WAN technologies uses four wires for digital and a 66 block?
A. Cable
B. ATM
C. T3
D. POTS
A

D. POTS

235
Q

Kim, an administrator, wants to list all the network connections to and from the server. Which of
the following commands would MOST likely be used?
A. traceroute
B. ping
C. ipconfig
D. netstat

A

D. netstat

236
Q
Which of the following is used to verify configuration updates on a firewall?
A. Signature identification
B. Access control lists
C. Scanning services
D. Content filtering
A

A. Signature identification

237
Q
Which of the following sizes is the fixed cell length in ATM?
A. 8 bytes
B. 53 bytes
C. 64 kilobytes
D. 128 kilobytes
A

B. 53 bytes

238
Q

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in
order to collect all of the traffic on a LAN segment?
A. Hub
B. VLAN
C. Router
D. Server

A

A. Hub

239
Q
Which of the following tools would Zach, an administrator, use to identify opens and shorts?
A. Ohmmeter
B. Protocol analyzer
C. Cable tester
D. Multimeter
A

C. Cable tester

240
Q
240
Which of the following technologies relies on a ticket granting server to allow clients to verify their
identity?
A. TACACS+
B. Kerberos
C. PKI
D. RADIUS
A

B. Kerberos

241
Q
Which of the following authenticates, allows, and controls the execution of router commands?
A. PKI
B. RADIUS
C. Kerberos
D. TACACS+
A

D. TACACS+

242
Q
Which of the following is true of NIPS?
A. Routes traffic to the proper port
B. Detects malicious host traffic
C. Detects and prevents harmful traffic
D. Prevents traffic on network hosts
A

C. Detects and prevents harmful traffic

243
Q
Which of the following network access methods is the MOST secure?
A. PPPoE
B. SIP
C. RSH
D. IPSec
A

D. IPSec

244
Q
Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following
wireless standards is being used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

245
Q

Which of the following services do TCP connections provide to application layer protocols? (Select
TWO).
A. Transport services without error recovery
B. Large data size manageability using segmentation
C. Secure Kerberos password encryption on data
D. Delivery through error recovery
E. Proxy server authentication

A

B. Large data size manageability using segmentation

D. Delivery through error recovery

246
Q

Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of
the following attacks may be in progress?
A. Man-in-the-middle
B. Denial of service
C. Ping flooding
D. Smurfing

A

A. Man-in-the-middle

247
Q
Which of the following technologies is used to connect public networks using POTS lines?
A. OC3
B. OC12
C. PSTN
D. Cable
A

C. PSTN

248
Q
Which of the following defines access for a network?
A. ACL
B. RDP
C. RAS
D. ARP
A

A. ACL

249
Q
Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?
A. RAS
B. PPTP
C. IPSec
D. ICA
A

C. IPSec

250
Q
250
Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given
network. Which of the following tools would accomplish this? (Select TWO).
A. Packet sniffer
B. Honeypot
C. Port mirroring
D. IPS
E. Port scanner
F. IDS
A

A. Packet sniffer

C. Port mirroring

251
Q
PKI is a method of user authentication which uses which of the following?
A. Various router commands
B. Access control lists
C. Certificate services
D. A RADIUS server
A

C. Certificate services

252
Q

Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect
to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would
BEST describe the type of WAP needed?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

A

D. 802.11n

253
Q
Which of the following components would a technician plug into a smart jack?
A. 25 pair cable
B. 100 pair cable
C. Patch cable
D. Patch panel
A

C. Patch cable

254
Q
Which of the following is used by RADIUS to encrypt messages between the server and the
client?
A. Public key
B. CSU/DSU
C. Private key
D. Shared secret
A

D. Shared secret

255
Q
Which of the following security measures is the LEAST intrusive on an end device?
A. NIPS
B. Host-based firewall
C. Antivirus
D. HIDS
A

A. NIPS

256
Q
Which of the following is a social engineering attack?
A. Worms
B. Man-in-the-middle
C. Phishing
D. Evil twin
A

C. Phishing

257
Q
Which of the following performs posture assessments for unknown devices that connect to the
network?
A. PKI
B. EAP
C. NAC
D. AAA
A

C. NAC

258
Q
Which of the following mitigation techniques is MOST effective against a DoS attack?
A. IDS
B. Antivirus
C. Redundancy
D. Backups
A

C. Redundancy

259
Q
Which of the following is a valid MAC address?
A. 00:AB:C4:FE:60:D3
B. 00-AE-S3-BC-90-F7
C. 13-12-BC-DA-97
D. 15:FA:97:44:AB
A

A. 00:AB:C4:FE:60:D3

260
Q
260
Which of the following is an encrypted remote access protocol?
A. RDP
B. PoE
C. RAS
D. PPP
A

A. RDP

261
Q

Port scanners and packet sniffers differ in functionality because:
A. packet sniffers and port scanners are just different names for the same device.
B. packet sniffers can only log events on traffic activity and port scanners can route malicious
packets.
C. packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain
NICs.
D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.

A

D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.

262
Q

A network topology in which the bandwidth dependency is distributed evenly amongst a large
number of inter-connected clients is known as a:
A. peer-to-peer.
B. bus.
C. star.
D. client/server.

A

A. peer-to-peer.

263
Q
Which of the following would the telecommunications carrier use to segregate customer traffic over
long fiber links?
A. VLAN
B. MPLS
C. VPN
D. PSTN
A

B. MPLS

264
Q

A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack.
Which of the following commands can help repair the damage?
A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock

A

D. netsh winsock

265
Q
Which of the following devices exist as either hardware or software to assist in routing traffic?
(Select TWO).
A. Cable modem
B. Layer 2 switch
C. Router
D. NIDS
E. Layer 3 switch
A

C. Router

E. Layer 3 switch

266
Q
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
A. Switch
B. Proxy Server
C. Router
D. VPN Concentrator
A

A. Switch

267
Q
Which of the following is used to provide hot standby capabilities using paired routers?
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
A

A. CARP

268
Q

A network technician is configuring a wireless network. To avoid interference from other wireless
networks in the area, the technician should change which setting?
A. Channel
B. SSID
C. Firewall rule
D. Encryption

A

A. Channel

269
Q

Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router

A

B. Segments broadcast traffic

270
Q
270
Which of the following default ports would need to be open on a firewall to allow remote desktop
access?
A. 143
B. 443
C. 3389
D. 8080
A

C. 3389

271
Q
Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
A

D. CNAME

272
Q
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

273
Q
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
A. TELNET
B. SSH
C. RDP
D. HTTP
E. DNS
F. FTP
A

B. SSH

C. RDP

274
Q
Which of the following utilities would a technician use to determine the location of lost packets on a
routed network?
A. ping
B. nslookup
C. route
D. tracert
A

D. tracert

275
Q
Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4
tunnel?
A. Routing loop
B. MTU black hole
C. Framing errors
D. SYN flood
A

B. MTU black hole

276
Q
Which of the following could be used to estimate RTT across a router?
A. dig
B. traceroute
C. arp
D. uptime
A

B. traceroute

277
Q
Which of the following DNS records allows for reverse lookup of a domain?
A. PTR
B. AAAA
C. A
D. MX
A

A. PTR

278
Q

Which of the following BEST describes the difference between layer 2 switching and layer 2
routing?
A. Switching moves packets between hosts on different subnets, and routing moves packets
between hosts on the same subnet.
B. Routing moves packets between hosts on different subnets, and switching moves packets
between hosts on the same subnet.
C. Both routing and switching move packets between hosts on the same subnet, but routing does
so at a faster pace.
D. Both routing and switching move packets between hosts on different subnets, but switching
does so at a faster pace.

A

B. Routing moves packets between hosts on different subnets, and switching moves packets
between hosts on the same subnet.

279
Q

A technician notices that network access is becoming increasingly slow. All of the activity lights, on
the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is
the MOST likely cause of the increased traffic?
A. STP blocking
B. Duplicate IP addresses
C. MTU mismatch
D. Switching loop

A

D. Switching loop

280
Q
280
No link lights on a switch’s SFP are functioning, so the network technician re-terminates the end.
After testing the cable, the tester is showing a db loss of -9. Which of the following types of cable
is MOST likely being tested?
A. Fiber
B. CAT3
C. CAT5e
D. CAT6a
A

A. Fiber

281
Q

Several users from the same building are reporting connectivity issues. The SFP at that building’s
IDF switch is showing a link light, but there is no link light to the corresponding switch’s SFP at the
MDF. Which of the following is the MOST likely cause?
A. A crossover cable is being used.
B. DB loss is too high on all strands.
C. Only TX or RX strand is working.
D. TX and RX are reversed.

A

C. Only TX or RX strand is working.

282
Q

Joe, a user, reports that his PC is the only one that does not have network connectivity. All the
wiring has been tested properly and the problem still exists. Joe is getting an APIPA address.
Which of the following is the MOST likely cause?
A. Crossover cable is being used
B. Switch was powered off
C. PoE is disabled on the port
D. Port on the switch is disabled

A

D. Port on the switch is disabled

283
Q
Which of the following IP addresses would be classified as private?
A. 10.100.200.0
B. 169.253.10.20
C. 172.168.5.0
D. 200.100.25.0
A

A. 10.100.200.0

284
Q

Joe, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of
the following configurations should Joe consider for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANs

A

C. Port mirroring

E. VLANs

285
Q
A supervisor requests that a technician downloads a MIB for a particular server. Which of the
following protocols requires MIBs?
A. IPSec
B. SSL
C. ISAKMP
D. SNMP
A

D. SNMP

286
Q

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of
the following should the technician check?
A. The arp table of the new customer’s router.
B. The route table of the next-hop router.
C. The route table of the new customer’s router.
D. The arp table of a network user.

A

C. The route table of the new customer’s router.

287
Q

A new monitoring device is installed in the network that uses ping to determine whether critical
network Internet routers are up. After three missing pings, the alarm reports the device is down.
The device is now constantly reporting alarms, yet there are no reported Internet problems from
users. Which of the following is the MOST likely cause?
A. A missing route on the alarm device.
B. Incorrect VLAN assignment on the router.
C. A missing route on the network routers.
D. Incorrect speed/duplex setting on the alarm device.

A

D. Incorrect speed/duplex setting on the alarm device.

288
Q
Which of the following protocols is used for remote management of devices?
A. SNMP
B. TFTP
C. Syslog
D. SMTP
A

A. SNMP

289
Q
A DSL modem connects to the provider’s network using which of the following authentication
techniques?
A. PoE
B. MS-CHAP
C. PPPoE
D. EAP
A

C. PPPoE

290
Q

290
A technician needs to test the length of a newly installed cable run because it is believed that it
exceeds the maximum specification length. Which of the following tools should be used?
A. Cable certifier
B. Toner probe
C. Cable tester
D. Protocol analyzer

A

A. Cable certifier

291
Q
Keeping an authoritative and timely record of network devices and their settings is a key activity of
which of the following?
A. Project management
B. Quality of service
C. Configuration management
D. Bandwidth shaping
A

C. Configuration management

292
Q
Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?
A. ifconfig
B. ping
C. route
D. nbtstat
A

B. ping

293
Q

A technician has replaced the Internet gateway router, and now no users can reach the Internet.
The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the
following is the MOST likely problem?
A. Faulty crossover cable
B. DNS server is down
C. Switching loop
D. Outside interface shutdown

A

D. Outside interface shutdown

294
Q

A network technician performs several switch commands to enable various advanced features on
the switch in the accounting department. During the configuration changes, several users from this
department report connectivity issues. Which of the following logs would the network technician
need to analyze to troubleshoot the connectivity issues?
A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs

A

B. History logs

295
Q

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received
successfully at its destination?
A. The transport OSI model layer and the transport TCP/IP model layer.
B. The transport OSI model layer and the Internet TCP/IP model layer.
C. The network OSI model layer and the transport TCP/IP model layer.
D. The network OSI model layer and the Internet TCP/IP model layer.

A

A. The transport OSI model layer and the transport TCP/IP model layer.

296
Q

A user reports a network failure on a computer. The technician determines that the computer and
NIC are operating properly. Which of the following tools can the technician use to trace the
network cabling back to the punch down block?
A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe

A

D. Toner probe

297
Q
A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network
monitoring resources would be used?
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP
A

D. SNMP

298
Q

A company has attempted to introduce a new major network segment to allow growth in capacity.
On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution
switch for the first time. Soon after this implementation, a network flood and an outage occurred
between the core and new distribution network modules. Which of the following should the
network administrator troubleshoot FIRST in order to rectify the issue?
A. Check for switching loops between core and distribution switches.
B. Check whether an incorrect VLAN has been assigned to the new distribution switch.
C. Check for inconsistent or missing routes between the core and distribution switches.
D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.

A

A. Check for switching loops between core and distribution switches.

299
Q

Which of the following commands will display the associated IP address of a network adapter in
Windows and Linux environments? (Select TWO).
A. dig
B. nslookup
C. nbstat
D. ifconfig
E. ipconfig

A

D. ifconfig

E. ipconfig

300
Q
300
A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would
be MOST appropriate for this scenario?
A. Crimper
B. OTDR
C. Throughput tester
D. Punch down tool
A

D. Punch down tool

301
Q

A technician is looking to secure an entire network by blocking all non-essential ports. Which of
the following devices would BEST provide this functionality?
A. Firewall
B. Honeynet
C. IDS
D. IPS

A

A. Firewall

302
Q
CAT6 Ethernet cabling has a rated maximum transmission capability of:
A. 10Mbps
B. 100Mbps
C. 20,000Mbps
D. 10,000Mbps
A

D. 10,000Mbps

303
Q
Which of the following methods limits access to a network based on characteristics of the network
card?
A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption
A

B. MAC filtering

304
Q
A router operates at which of the following layers of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
A

B. Layer 3

305
Q

An organization wants to perform maintenance on any of its web servers without affecting the
service availability during a scheduled change window. Which of the following network devices
would be required to provide this functionality?
A. Router
B. Forward proxy
C. Load balancer
D. Firewall

A

C. Load balancer

306
Q

Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP

A

D. Password and hardware token OTP

307
Q
Which of the following protocols are used for accessing a command line terminal session for
management purposes? (Select TWO).
A. Telnet
B. FTP
C. SNMP
D. SSH
E. RDP
A

A. Telnet

D. SSH

308
Q

The software in a virtualized environment that controls resource allocation and allows multiple
operating system guests to run on the same physical platform is known as the:
A. Hypervisor
B. LPAR.
C. Broker
D. VDI.

A

A. Hypervisor

309
Q
Which of the following communication modes has the LOWEST overhead necessary to support
streaming protocols such as RTP?
A. Connectionless
B. Stateful
C. Full Duplex
D. Quality of Service
A

A. Connectionless

310
Q

310
An administrator is setting up a secure wireless network. The administrator decides to support
802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared
key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have
reported connection issues. Which of the following would MOST likely resolve the users’
connection issues?
A. Limit the devices to 802.11n only
B. Enable the SSID broadcast
C. Enable MAC filtering
D. Use a WEP 128-bit key

A

B. Enable the SSID broadcast

311
Q

An administrator has received a recommendation against deploying WEP as a wireless encryption
protection scheme. Which of the following is MOST likely the reason?
A. WEP’s IV is too small.
B. WEP uses RC4 which is easily accessible and not secure.
C. WEP uses plain text.
D. WEP is not well supported.

A

A. WEP’s IV is too small.

312
Q

An administrator would like to redirect connections to the firewall external interface IP address on
port 80 to web server A and connections on port 8080 to web server B. Which of the following
technologies would be used for this?
A. NAT
B. PAT
C. NAT-T
D. ACL

A

B. PAT

313
Q
On which of the following OSI layers would a computer send ARP packets in order to discover
physical addresses?
A. Layer 2
B. Layer 3
C. Layer 6
D. Layer 7
A

A. Layer 2

314
Q
When querying a DNS server for an AAAA record, which of the following is an appropriate
response?
A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
A

D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

315
Q

Joe, a user, reports getting a “This page cannot be displayed” error message in his web browser.
However, Joe can ping the default gateway. Which of the following is the MOST likely cause of the
problem?
A. SSL certificates are expired
B. Incorrect WINS server
C. The browser is unsupported
D. Incorrect DNS settings

A

D. Incorrect DNS settings

316
Q
Which of the following uses IPSec to provide encryption?
A. PPPoE
B. PPTP
C. L2TP
D. TLS
A

C. L2TP

317
Q

A technician notices that the application server’s resources are momentary at full capacity for the
amount of incoming and outgoing packets outside the LAN. Which of the following tools would be
used to find out what IPs are connecting to the server and in active mode?
A. ping
B. tracert
C. netstat
D. ipconfig

A

C. netstat

318
Q

A server technician notices that some changes were implemented on a server during nonbusiness
hours. Which of the following would allow the technician to identify the last time an
administrator was remotely connected to the server?
A. Network sniffer
B. Traffic analyzer
C. System log
D. Security log

A

D. Security log

319
Q
Which of the following would a server technician use before deploying an email server to mitigate
A. Disable unused services
B. Network cut sheet
C. Baseline image
D. Enable all services
A

A. Disable unused services

320
Q

320
A network technician is installing a honeypot in the DMZ and wants to create a report of all the
UDP protocols that are being used. Which of the following firewalls can be used to track this?
A. Dual homed
B. Packet filtering
C. Kernel proxy
D. Stateful-inspection

A

D. Stateful-inspection

321
Q

A network technician is examining network traffic before setting up QoS on the switch. Which of
the following tools is the technician MOST likely using to examine the network traffic?
A. Connectivity software
B. Throughput tester
C. ipconfig
D. Protocol analyzer

A

D. Protocol analyzer

322
Q

A technician is configuring a wireless network. Which of the following should the technician setup
in order to prevent intruders if the encryption key gets compromised?
A. WAP placement
B. MAC filtering
C. WPA2 PSK
D. Disable SSID broadcasting

A

B. MAC filtering

323
Q

A technician is troubleshooting network connectivity on a laptop. The user reports that a new
network interface card (NIC) was recently installed. The technician thinks the NIC has not been
properly configured to access the network. Which of the following network troubleshooting steps
should the technician do NEXT?
A. Implement the solution.
B. Escalate the problem to another technician.
C. Test the theory to determine cause.
D. Establish a plan of action to resolve the problem.

A

C. Test the theory to determine cause.

324
Q

An administrator wants to prevent traffic from a specific VLAN from reaching any internal
resources, but will be able to reach the Internet. The BEST technique to accomplish this task will
be:
A. an ACL
B. a MAC-filtering table
C. a static gateway
D. aTLS tunnel

A

A. an ACL

325
Q
Which of the following would cause signal interference in a 2.4 GHz WAP? (Select TWO).
A. Cell phone
B. Cordless phone
C. Microwave oven
D. Printer
E. Television
A

B. Cordless phone

C. Microwave oven

326
Q

An administrator setup a firewall to secure the network and only allow traffic that originated from
the internal network to return; no traffic originating from the outside is allowed to enter. A new
email server needs to be added to the network that will allow traffic to originate from the outside to
access the server. Which of the following is the BEST method to accomplish this?
A. Add NAT to the firewall for the email server
B. Set a rule on the firewall to allow email to go to the email server
C. Add stateful packet filtering to the firewall
D. Add a DMZ to the firewall for the email server

A

B. Set a rule on the firewall to allow email to go to the email server

327
Q
A network administrator is monitoring switches on a network. Which of the following protocols is
generating this traffic?
A. SMTP
B. PPoE
C. PoE
D. SNMP
A

D. SNMP

328
Q

Which of the following would BEST be described as a central connection point for secured client
access to a private network from a public network?
A. Content filter
B. VPN concentrator
C. Load balancer
D. Proxy server

A

B. VPN concentrator

329
Q
Which of the following wireless networking standards has the SLOWEST maximum transmission rate?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

B. 802.11b

330
Q

330
A company wants to implement VLANs and is upgrading their networking equipment to
accommodate this. Which of the following should be purchased to allow for the VLANs?
A. Routers
B. Layer 3 switches
C. Hubs
D. Repeaters

A

B. Layer 3 switches

331
Q
Redundant network devices are used to provide which of the following performance optimizations?
(Select TWO).
A. Load balancing
B. High availability
C. QoS
D. Traffic shaping
E. Content filtering
A

A. Load balancing

B. High availability

332
Q

While troubleshooting network connectivity, a technician notices a computer has assigned itself an
APIPA IP address of 169.254.0.1. Assuming the DNS servers have been properly configured,
which of the following tools should the technician use to verify the DHCP server is reachable?
A. ipconfig
B. dig
C. nslookup
D. tracert

A

D. tracert

333
Q
Which of the following provides a device with an IP address that does not remain the same each
time the lease is renewed?
A. Reservation
B. Static IP address
C. Scope
D. Dynamic IP address
A

D. Dynamic IP address

334
Q
Which of the following is used to share traffic between multiple network connections?
A. Load balancer
B. Content filter
C. VPN concentrator
D. Proxy server
A

A. Load balancer

335
Q
A standard CAT1 line requires a specific connector. Which of the following is the standard
connector type?
A. DB-9
B. BNC
C. RJ-45
D. RJ-11
A

D. RJ-11

336
Q

A network technician is having connectivity issues from the T3 to the fiber module of the switch.
The technician suspects that the fiber cable might be faulty. Which of the following tools can the
network technician use to confirm this?
A. OTDR
B. Punch down tool
C. TDR
D. Toner probe

A

A. OTDR

337
Q

A network technician needs to address bandwidth issues on the wireless network. There are
currently four 802.11n access points. The technician would like to increase the bandwidth. Which
of the following would be the BEST solution?
A. Disable SSID
B. Channel bonding
C. MIMO
D. Increase the signal

A

B. Channel bonding

338
Q
At which of the following OSI layers does the CSU/DSU operate?
A. Data link
B. Network
C. Transport
D. Physical
A

D. Physical

339
Q

When a user logs in and is authenticated a ticket/token is granted and used throughout the
network session. The ticket/token grants the user access to different system resources. This is an
example of which of the following?
A. PKI certificates
B. IPSec
C. Kerberos
D. MS-Chap

A

C. Kerberos

340
Q
340
A firewall that looks at the source IP and destination IP then routes them accordingly is an
example of which of the following?
A. Packet filtering
B. Content filtering
C. Packet sniffing
D. Application gateway
A

A. Packet filtering

341
Q
The cable tester displays the following information:
1 1
2 ---------- 2
3 ---------- 3
4 xxxxxxxx 4
5 xxxxxxxx 5
6 ---------- 6
7 ---------- 7
8 ---------- 8
Which is being reported?
A. 5 is open, 1/4 are open
B. 4/5 is shorted, 1 is ok
C. 1 is open, 4/5 are shorted
D. 1 is shorted, 4/5 are open
A

C. 1 is open, 4/5 are shorted

342
Q

An administrator is receiving reports from an executive that the executive’s wireless access point
loses the signal frequently, even though the WAP is on the executive’s desk. The office contains
four other 802.11n access points. Which of the following would MOST likely correct interference
problems in the executive’s office?
A. Turn off SSID broadcasting for the executive’s access point.
B. Replace the 802.11n access point in the office with an 802.11a access point.
C. Change the channel on the access point to channel 11.
D. Turn off as many lights in the executive’s office as possible to reduce interference.

A

C. Change the channel on the access point to channel 11.

343
Q

A network technician has setup three VLANs on two of the company switches, enabled all the
ports as access ports, and assigned the ports to VLANs. How many connections will be needed to
connect the two switches together?
A. 1
B. 2
C. 3
D. 5

A

C. 3

344
Q

A network technician has configured a new firewall to allow TCP port 80 traffic and deny UDP
traffic. Users have reported that they are unable to access Internet websites. The technician
verifies by attempting to access a popular website. Which of the following will MOST likely correct the error?
A. HTTP uses UDP
B. DNS port 23 needs to be allowed
C. HTTP needs port 443 allowed
D. UDP port 53 needs to be allowed

A

D. UDP port 53 needs to be allowed

345
Q

Kurt, a network technician, has configured a new firewall on the network. Users are reporting
errors when attempting to access several websites. Kurt attempts to access several popular
websites with no errors, however, he does receive an error when attempting to access a bank
website. Which of the following rules would BEST allow access to the bank website?
A. Allow UDP port 53
B. Allow TCP port 80
C. Allow UDP port 340
D. Allow TCP port 443

A

D. Allow TCP port 443

346
Q

A company has installed a VPN concentrator at the main company headquarters and needs
employees that travel to access the company network. Which of the following solutions will allow
the employees to access the VPN without installing client software?
A. Kerberos
B. SSL VPN
C. Site-to-site VPN
D. WPA enterprise

A

B. SSL VPN

347
Q

Fifty users in an office are actively connected to the wireless network. A new employee is given
the password, but is not able to connect to the network. Which of the following is the MOST likely
cause of this issue?
A. SSID broadcast was disabled.
B. The channels are configured incorrectly.
C. The wireless network has reached the maximum number of users.
D. Interference is occurring.

A

A. SSID broadcast was disabled.

348
Q

An administrator has been asked to connect an analog phone cabling in a server room. Which of
the following should the administrator use?
A. 66 block
B. Demarc
C. Circuit switch
D. Smart jack

A

A. 66 block

349
Q
Which of the following wireless device frequencies uses light waves?
A. 802.11b
B. 802.11n
C. IrDA
D. Bluetooth
A

C. IrDA

350
Q

350
A technician installing a new switch notices that users on the switch can communicate with other
devices on the network, but not with the Internet. Which of the following is the MOST likely cause?
A. Duplicate IP address
B. Wrong DHCP
C. Wrong VLAN configuration
D. Wrong subnet mask

A

C. Wrong VLAN configuration

351
Q

A senior technician is inspecting a junior technician’s created patch cables. There is a visible
space between the ends of the copper wiring and the top of the plastic at each end of the cables.
Which of the following is the reason these cables cannot be used?
A. Bad connectors
B. Open shorts
C. UTP
D. EMI

A

A. Bad connectors

352
Q
Which of the following ports does DHCP use? (Select TWO).
A. 22
B. 23
C. 67
D. 68
E. 69
A

C. 67

D. 68

353
Q
A company wants to implement a wireless encryption method, but wants the key to be a simple phrase so they can easily allow visitors to connect. Which of the following wireless encryption
methods should they employ?
A. WPA
B. WPA2 Enterprise
C. PKI
D. MS-CHAP
A

A. WPA

354
Q

A distribution layer switch with an SC GBIC that has a fiber connection back to the core has gone
bad and needs to be replaced with a newer model and an LC GBIC. The fiber patch cable was
replaced with a known good LC patch cable. After replacing the switch, the fiber connection shows
no link. Which of the following is MOST likely the cause of the problem?
A. DB loss
B. Incompatible GBIC
C. TXRX reversed
D. Cross-talk

A

C. TXRX reversed

355
Q
Which of the following has a rated MAXIMUM speed of 100Mbps?
A. CAT3
B. CAT5
C. CAT5e
D. CAT6
A

B. CAT5

356
Q

A technician is configuring a wireless network. The technician would like to add multiple WAPs.
Which of the following should the technician ensure during setup?
A. Make sure the WAPs use different frequencies.
B. Disable SSID broadcast on all of the WAPs.
C. Make sure WAPs channels do not overlap.
D. Make sure WAPs are using the same channels.

A

C. Make sure WAPs channels do not overlap.

357
Q
A technician is getting ready to install a WLAN in a warehouse. Which of the following will MOST
likely determine the WAP placement?
A. Antenna types
B. SSID broadcast
C. VTP configuration
D. Channels
A

A. Antenna types

358
Q
Which of the following IEEE standards use the same frequency? (Select TWO).
A. 802.11a
B. 802.11b
C. 802.11e
D. 802.11g
E. 802.11i
A

B. 802.11b

D. 802.11g

359
Q

A user is not able to connect to 802.11n WAP. The user has an 802.11g WLAN card and has
connected to other 802.11n networks. Which of the following is MOST likely the reason the user is
unable to connect?
A. WAP is set to use only the 2.4 GHz frequency.
B. WAP is set to use “N only”.
C. WAP encryption is using WEP 128.
D. WAP has MAC filtering disabled.

A

B. WAP is set to use “N only”.

360
Q
360
Which of the following options would need to be configured on a DHCP server to boot from the
network?
A. DNS Server
B. Proxy Server
C. TFTP Server
D. NTP Server
A

C. TFTP Server

361
Q
Which of the following can a technician increase on an antenna to create a larger cell size in a
WLAN?
A. Attenuation
B. Bandwidth
C. Length
D. Gain
A

D. Gain

362
Q
How many pairs of CAT5e wires are used for data with 1000BaseT?
A. 2
B. 4
C. 6
D. 8
A

B. 4

363
Q
Which of the following should be utilized to reduce null zones?
A. SSID broadcasting
B. Diversity
C. WPA
D. Horizontal polarization
A

B. Diversity

364
Q
Which of the following can be done to increase a wireless LAN cell size?
A. Add a higher gain omni antenna
B. Add diversity antennas
C. Add a higher gain yagi antenna
D. Increase the PoE wattage
A

A. Add a higher gain omni antenna

365
Q
RADAR can cause interference with which of the following technologies?
A. WiMAX
B. 802.11i
C. 802.11n
D. Bluetooth
A

C. 802.11n

366
Q
Which of the following is considered an Exterior Gateway Protocol (EGP)?
A. BGP
B. IGRP
C. RIP
D. OSPF
A

A. BGP

367
Q
IPv6 routing occurs at which of the following OSI model layers?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
A

B. Layer 3

368
Q
At which of the following layers of the OSI model does Media Access Control reside?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 7
A

B. Layer 2

369
Q
Routers are used instead of Layer 2 switches to separate which of the following?
A. Collision Domains
B. Link States
C. Distant Vectors
D. Broadcast Domains
A

D. Broadcast Domains

370
Q

370
A power failure caused a router to reboot. Now users are not able to reach remote networks.
Which of the following is the MOST likely cause?
A. The dynamic NAT tables were erased by the reset.
B. The DNS server setting on the workstations are incorrect.
C. MAC entries in the ARP table were not saved.
D. A technician did not save the running configuration.

A

D. A technician did not save the running configuration.

371
Q

A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN
20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be
successful?
A. Replace the router with a Layer 2 switch that supports VLANs
B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D. AllowICMP to pass through the Router

A

D. AllowICMP to pass through the Router

372
Q
At which of the following layers of the OSI model do frames exist?
A. Application
B. Network
C. Transport
D. Data Link
A

D. Data Link

373
Q
Which of the following technologies is considered to be cell-switched?
A. ISDN
B. Frame Relay
C. ATM
D. DSL
A

C. ATM

374
Q

The Chief Information Officer (CIO) is unable to send or receive email and has asked the network
administrator to resolve the email problem. Which of the following should the network
administrator do NEXT?
A. Establish a plan of action to resolve the problem
B. Gather additional information
C. Escalate to a senior network administrator
D. Document the problem and proposed solution

A

B. Gather additional information

375
Q
Which of the following uses port 53 by default?
A. RDP
B. QoS
C. DHCP
D. DNS
A

D. DNS

376
Q

A technician has disabled ICMP on a server. Which of the following will continue to function for the
purpose of troubleshooting connectivity on the server?
A. telnet
B. ping
C. arp
D. tracert

A

A. telnet

377
Q
Which of the following is the MAXIMUM rated throughput of 10BaseT?
A. 10Gbps
B. 10GHz
C. 10Mbps
D. 10MHz
A

C. 10Mbps

378
Q
Which of the following WAN technologies will vary in bandwidth depending on the amount of traffic
in the local area on the same provider?
A. Satellite
B. Cable
C. T1
D. DSL
A

B. Cable

379
Q

Which of the following would provide the ability to have a pool of web servers provide content as
users visit the website’s single domain name?
A. Protocol analyzer
B. Load balancer
C. Content filter
D. Channel bonding

A

B. Load balancer

380
Q
380
Which of the following is based ENTIRELY on using ICMP packets?
A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack
A

D. Smurf attack

381
Q
Which of the following could be used to stop unknown threats?
A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots
A

C. Behavior based IPS

382
Q
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?
A. CAT3
B. CAT5
C. CAT5e
D. CAT6
A

B. CAT5

383
Q
Which of the following allows a technician to gather information about the operating system?
A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance
A

B. Fingerprinting

384
Q
Which of the following is indicative of an FTP bounce?
A. Arbitrary IP address
B. Reverse DNS lookups
C. Same Port Number
D. File Transfer Success
A

A. Arbitrary IP address

385
Q
The software that allows a machine to run multiple operating systems at once is called the:
A. server manager
B. hypervisor
C. boot loader
D. partition manager
A

B. hypervisor

386
Q
Which of the following routing protocols relies on hop count as its ONLY metric?
A. BGP
B. EIGRP
C. OSPF
D. RIP
A

D. RIP

387
Q

A technician recently fixed a computer with several viruses and spyware programs on it and
notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of
attack is known as which of the following?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing

A

C. Man-in-the-middle

388
Q
Which of the following is an IPv6 address?
A. 00:14:38:05:7B:E5
B. 10.10.1.1
C. 192.168.1.1
D. 2001:cdba::3257:9652
A

D. 2001:cdba::3257:9652

389
Q

A company has a large number of employees that need VPN access from home. Which of the
following is the BEST solution for deploying and managing the remote access?
A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall

A

C. SSL VPN

390
Q
390
Which of the following is a routed protocol that functions at layer 3 of the OSI model?
A. IP
B. Frame relay
C. PPP
D. ADSL
A

A. IP

391
Q
Something you have, something you are, and something you know are the three tenets of:
A. social engineering
B. change management
C. remote access
D. access control
A

D. access control

392
Q
Which of the following technologies is used on cellular networks?
A. Ethernet
B. CDMA
C. CSMA/CA
D. POTS
A

B. CDMA

393
Q
Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

394
Q
Which of the following mediums is circuit switched?
A. PSTN
B. ATM
C. Frame relay
D. MPLS
A

A. PSTN

395
Q

Which of the following is true about tunneling and encryption?
A. SIP encrypts all data going through the tunnel.
B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.

A

C. SSL VPN provides a secure tunnel.

396
Q
Which of the following is a secure way to connect to a device?
A. RSH
B. TFTP
C. SNMPv2
D. SFTP
A

D. SFTP

397
Q
Which of the following uses eight groups of characters for addressing?
A. MAC
B. IPv4
C. IPv6
D. DHCP
A

C. IPv6

398
Q

A pest control contractor attempts to gain access to the datacenter; however, the manager on duty
notes that a pest control inspection was not on the schedule. Which of the following attacks is in
progress?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing

A

B. Social engineering

399
Q
Which of the following is true about an IP address if the first bit is a one and the second bit is a
zero?
A. The address is a Class A address.
B. The address is a Class B address.
C. The address is a Class C address.
D. The address is a Class D address.
A

B. The address is a Class B address.

400
Q
400
Which of the following MUST be used when securing a VoIP network consisting of private IP
addresses?
A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch
A

B. Application layer firewall

401
Q
Which of the following uses certificates as a form of security?
A. Kerberos
B. LDAP
C. PKI
D. CHAP
A

C. PKI

402
Q
Which of the following is a proprietary routing protocol?
A. RIP
B. EIGRP
C. OSPF
D. BGP
A

B. EIGRP