N10-005 Exam Flashcards
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page? A. CNAME B. A C. MX D. PTR
B. A
Which of the following technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port Mirroring D. Spanning Tree
D. Spanning Tree
Which of the following BEST describes a switch port? A. Broadcast domain B. Distance vector C. Link state D. Collision domain
D. Collision domain
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not
working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel
C. WAP SSIDs are matching
Which of the following could Kim, a network technician, use to inspect connection setup, request,
and response headers for users connecting to a web server?
A. nbtstat command
B. dig command
C. ipconfig command
D. Protocol analyzer
D. Protocol analyzer
Which of the following address blocks would MOST likely be blocked from crossing a border router? A. 8.0.0.0/8 B. 172.16.0.0/12 C. 122.0.0.0/24 D. 248.0.0.0/8
B. 172.16.0.0/12
Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of a switch? A. traceroute command B. SNMP monitor C. nbtstat command D. dig command
B. SNMP monitor
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites.
Which of the following would MOST likely be used when investigating the problem at Lisa’s
workstation?
A. nslookup
B. route
C. nbtstat
D. arp
A. nslookup
Which of the following is the broadcast address for a network defined as 192.168.0.0/24? A. 192.168.0.255 B. 192.168.0.1 C. 192.168.0.0 D. 192.168.0.253
A. 192.168.0.255
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080
D. 161
E. 162
10 Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A. Loopback plug B. Protocol analyzer C. Smart jack D. Coupler
A. Loopback plug
Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets within the same subnet based on IP addresses
A. Switches packets within the same subnet based on MAC addresses
Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity? A. Multimeter B. Loopback plug C. Cable certifier D. CAT3 coupler
B. Loopback plug
Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options
A. Reservations
Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device? A. DNS suffixes B. DHCP relay agent C. Static IP addressing D. Scope configuration
B. DHCP relay agent
Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To
manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface
A. IP address on the native VLAN interface
Which of the following describes a rationale for a network with redundant paths? A. VPN compatibility B. Unified communications implementation C. High availability requirement D. QoS
C. High availability requirement
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A. 802.11a
Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN
D. VPN
20 Which of the following network devices hides network nodes behind one public IP address? A. Layer 3 switch B. Content filter C. VPN server D. Proxy server
D. Proxy server
A VPN concentrator is used for which of the following purposes? A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting
C. Secure network access
Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following
interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
A. FastEthernet 0/0
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch
is working properly but cannot be accessed remotely. Which of the following items is MOST likely
missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT
B. Cryptokey
Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet
downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP
A. SNMP
Kim, a user, on a wireless network reports an issue with network access while using a cordless
phone. Which of the following is the MOST likely cause?
A. Encryption type
B. Channel selection
C. Antenna placement
D. Signal strength
25
B. Channel selection
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spatial reuse D. 20MHz channel spacing
A. Channel bonding
Zach, a technician, discovers a switch is not communicating with the other switches in a stack.
Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked.
C. The cable is not a crossover.
Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of
the following configurations should Jeff consider for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANs
C. Port mirroring
E. VLANs
A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved
from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately
begin reporting intermittent connectivity issues with both corporate and Internet resources. Which
of the following is the MOST likely cause?
A. Protocol mismatch
B. MTU size was not increased for the new distance
C. Incorrect VLAN assignment
D. Incorrect cabling
D. Incorrect cabling
30
Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted
wireless network has been getting slower while his Internet traffic has steadily been increasing.
Which of the following should be configured to resolve this problem?
A. VLAN
B. MTU
C. WPA
D. SSID
C. WPA
Kim, a network administrator, is seeing workstations in building C authenticate to the building A
wireless access point. Which of the following would resolve this issue?
A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency
B. Reduce the transmission power
Zach, a network technician, is configuring several switches to be managed remotely. Which of the
following must be configured to connect via SSH to each of those devices, as well as to retrieve
various parameters?
A. PoE settings and VTP configuration
B. SNMP configuration only
C. IP address and SNMP configuration
D. QoS and PoE settings
C. IP address and SNMP configuration
Lisa, the network technician, has been instructed to provide connectivity to workstations within a
SOHO that is over 800 feet (243 meters) away from the main switch. Which of the following would
she install to provide connectivity?
A. CAT5e
B. CAT6
C. Coaxial
D. Multimode fiber
D. Multimode fiber
During a disaster recovery test, several billing representatives need to be temporarily setup to take
payments from customers. It has been determined that this will need to occur over a wireless
network, with security being enforced where possible. Which of the following configurations should
be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.
D. WPA2, SSID disabled, and 802.11a.
A number of vendors visit a large corporation but are unable to connect to the company’s wireless
network. Kim, the network technician, verifies that other users are connected to the network and it
seems to be fully operational. Which of the following steps should be taken NEXT to troubleshoot
the issue?
A. Verify the SSID is enabled.
B. Ensure the WAP is up and running.
C. Ensure the transmission is not encrypted.
D. Verify the physical network is connected to the wireless network.
A. Verify the SSID is enabled.
An 801.11g wireless access point was configured as follows:
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-
40
Which is true about the above configuration?
A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the
MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client.
B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.
D. Any 802.11g compatible client can connect to the wireless network if the encryption key is
known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00-
ab-29-da-c3-40 and the encryption key is known by the client.
Which of the following is the correct representation of an IPv6 address? A. :: B. 0:0:0:0:0:0:0:0:1 C. 1:2:3:4:AB:CD:EF D. 2001::4860:800f::
A. ::
Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67 A. DHCP B. FTP C. SNMP D. DNS
A. DHCP
Which of the following default ports are used with DHCP? (Select TWO). A. 22 B. 23 C. 53 D. 67 E. 68
D. 67
E. 68
40
Which of the following is a reason to use dynamic DNS?
A. The host IP address is not listed in the firewall.
B. The host IP address is assigned by DHCP.
C. Static routes cannot be used on the host network.
D. A third-party certificate is being used.
B. The host IP address is assigned by DHCP.
Which of the following virtual components maintains a MAC-to-port forwarding table? A. Virtual PBX B. Virtual desktop C. Virtual switch D. Virtual server
C. Virtual switch
Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room.
Arriving at the conference room, Jeff realizes that the laptop is in process of reconnecting to the
wireless network. Which of the following is a common wireless problem that can cause this issue?
A. Mismatched SSID
B. Incorrect encryption type
C. Weak signal strength
D. Increased latency
C. Weak signal strength
Kim, a network administrator, has made changes to the DHCP leasing setup for a given network
and is expecting all devices to recognize the changes shortly. However, after a full week, none of
the machines on the company network are grabbing new addresses with the new lease time.
Which of the following is the problem?
A. The lease time on the original configuration was too long.
B. The firewall was never configured to recognize the changes.
C. The DHCP server was never restarted, so changes never took affect.
D. The lease time on the original configuration was too short.
A. The lease time on the original configuration was too long.
Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to
host a website from a server within a privately addressed network and make it publicly available.
Which of the following would have to be configured on the router to allow the public to access the
website from one of the static IP addresses?
A. QoS monitoring
B. Static NAT
C. VLAN tagging
D. MAC filtering
B. Static NAT
Which of the following default services uses TCP/UDP port 88? A. LDAP B. IGMP C. HTTP D. Kerberos
D. Kerberos
Which of the following virtualized components would provide a secure operating environment for a business user? A. Virtual PBX B. Virtual switch C. Virtual desktop D. Virtual SAN
C. Virtual desktop
Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5
B. Layer 2
C. Layer 3
Which of the following examples would require a private static IP address, but not a public static IP
address?
A. A PDA connecting to the wireless network.
B. A laptop that is deployed on a LAN.
C. A file server deployed in the internal datacenter.
D. An Internet facing web server for external access.
C. A file server deployed in the internal datacenter
Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a
large office. Many of the computers are showing moderate to weak signals even though there are
two APs less then 15 feet (4 meters) away in either direction. Which of the following is MOST likely
the cause?
A. The local antennas are not powerful enough.
B. There is an SSID mismatch.
C. The receiver sensitivity is too high.
D. The closest APs are down.
D. The closest APs are down.
50
Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses
from a new, properly configured DHCP server on another subnet. Statically addressed clients can
get onto the same network with no issues. Which of the following is causing the issue?
A. Incorrect VLAN tagging
B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols
50
B. Missing helper addresses
A new small business needs a network solution that provides at least 50Mbps of bandwidth and
supports full duplex communication. Which of the following meets those needs?
A. 10/100 layer 2 switch
B. 2.4GHz 802.11g
C. 5.0GHz 802.11a
D. 10Base2 Ethernet
A. 10/100 layer 2 switch
Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically? A. Kerberos B. BIND C. WINS D. DHCP
D. DHCP
Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have
reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g
speeds. Which of the following would MOST likely fix this issue?
A. Enable wireless multimedia (WMM) for QoS
B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops
A. Enable wireless multimedia (WMM) for QoS
Kim, a network administrator, is configuring a switch with an LACP port group for uplink. She plugs
in the secondary uplink of the group, and shortly thereafter receives widespread reports that the
network is malfunctioning. Which of the following is MOST likely the cause?
A. A network loop was created due to a misconfiguration of the port group.
B. The port on the switch for the new secondary link was never enabled.
C. The LACP group was mistakenly configured to do layer 2 + 3 + 4 hashing for its link balancing.
D. The LACP group was only configured to do layer 2 hashing for its link balancing.
A. A network loop was created due to a misconfiguration of the port group.
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Kim,
a network administrator, is assigned to provide connectivity between the existing office and the
new office. Which of the following solutions provides the MOST security from third party
tampering?
A. CAT5e connection between offices via the patch panel located in building’s communication
closet.
B. CAT5e cable run through ceiling in the public space between offices.
C. VPN between routers located in each office space.
D. A WEP encrypted wireless bridge with directional antennae between offices.
C. VPN between routers located in each office space.
Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a
device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is
a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.
C. Manually adjust the duplex mode on the server’s link.
D. Configure the laptop to receive a DHCP address from the server, rather than manually setting
one.
A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following? A. Only the 5GHz band B. Only the 2.4GHz band C. Only the 900MHz band D. Both 2.4GHz and 5GHz bands
A. Only the 5GHz band
Clients are unable to connect to the wireless network. The network is secured with WPA2-
Enterprise. Which of the following is MOST likely the cause of the problem?
A. MAC address authentication is being used.
B. The RADIUS server is down.
C. The users are using incorrect passwords.
D. The PSK is wrong.
B. The RADIUS server is down.
Jeff, a user, reports getting a “This page cannot be displayed” error message in his web browser.
However, Jeff can ping the default gateway. Which of the following is the MOST likely cause of the
problem?
A. SSL certificates are expired
B. Incorrect WINS server
C. The browser is unsupported
D. Incorrect DNS settings
D. Incorrect DNS settings
60
A small business would like to connect a second building on their property to the network. The
building is about 200 meters (656 feet) away from the main building. Which of the following would
be the MOST cost-effective method to supply a gigabit Ethernet connection to the second
building?
A. 10GBase-LW
B. 1000Base-LX
C. 1000Base-SX
D. 1000BaseT
C. 1000Base-SX
Lisa, a network technician, has implemented DHCP on the network last week. Employees are now
reporting duplicate IP addresses and network connectivity errors. Which of the following would
cause duplicate IP addresses on the network?
A. A second DHCP server is on the network.
B. The network IP leases are expiring and not renewing.
C. The DNS record A pointers are incorrect.
D. The DHCP server has run out of IP addresses to issue to clients.
A. A second DHCP server is on the network.
Lisa, a network administrator, wants to be able to block all already known malicious activity. Which
of the following would allow her to perform this activity?
A. Behavioral Based IDS
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS
D. Signature Based IPS
Which of the following protocols uses port 3389? A. IMAP B. DHCP C. SSH D. RDP
D. RDP
Zach, a network administrator, is responding to a support ticket. The ticket does not have enough
information to determine the problem. Which of the following should Zach perform FIRST before
responding to the ticket?
A. Determine if anything has changed.
B. Test a theory to determine a cause.
C. Establish a plan of action to resolve the problem.
D. Escalate the problem if necessary.
A. Determine if anything has changed.
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use
802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to
communicate?
A. Enable mixed mode
B. Disable SSID
C. Disable encryption
D. Enable ‘n’ only mode
A. Enable mixed mode
Zach, a technician, is installing a new wireless network. There are currently no wireless devices in
the area. Which of the following should Zach consider before installing the new devices?
A. Frequencies
B. SSID broadcast
C. WAP placement
D. Channels
C. WAP placement
Zach, a user, cannot access any network resources. The technician has determined that the
problem is isolated to Zach, and that there have not been any changes to his workstation or switch
port recently. Which of the following steps in the troubleshooting methodology should the
technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Implement preventative measures.
C. Implement the solution or escalate as necessary.
D. Establish a theory of probable cause.
D. Establish a theory of probable cause.
Zach, a customer, wants to network several computers within a large warehouse. The warehouse
has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the
network switch. Which of the following cable types should a technician use for this computer?
A. CAT3
B. CAT5
C. CAT6
D. Fiber
D. Fiber
A layer 3 switch can move packets between subnets based on which of the following criteria? A. 802.1q tag B. Port C. Application D. IP address
D. IP address
70
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the
fiber cable, which of the following configurations MUST be present?
A. Reverse ARP
B. Full duplex on the fiber link
C. PoE
D. 802.1q trunking
D. 802.1q trunking
A managed switch offers which of the following benefits over an unmanaged switch? (Select TWO). A. 802.1q B. SNMP C. Gigabit D. Layer 2 forwarding E. Fewer collision domains
A. 802.1q
B. SNMP
After installing new cabling, Kim, a technician, notices that several computers are connecting to
network resources very slowly. Which of the following tools would BEST help in determining if the
new cabling is the cause of the problem?
A. Multimeter
B. Cable certifier
C. Cable tester
D. Toner probe
B. Cable certifier
A new network printer needs to be installed in the finance department. The switch port, server, and
printer NIC have been configured properly but no link light is coming up when the printer is
plugged into the wall port. Which of the following tools would Jeff, an administrator, use to
diagnose the problem?
A. Cable tester
B. Protocol analyzer
C. OTDR
D. Crimper
A. Cable tester
Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port.
Which of the following configuration changes would facilitate access?
A. Traffic filtering
B. Trunking
C. MAC filtering
D. Port mirroring
B. Trunking
Zach, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO). A. WAPs B. Routers C. Patch panels D. Hubs E. Bridges F. VLANs
B. Routers
F. VLANs
Which of the following routing protocols utilizes only hop count as a metric, broadcasts its routing
table every 30 seconds by default, and has a MAXIMUM hop count of 15?
A. Interior Gateway Routing Protocol (IGRP)
B. Routing Information Protocol (RIP)
C. Open Shortest Path First (OSPF)
D. Border Gateway Routing Protocol (BGP)
B. Routing Information Protocol (RIP)
Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443
C. 143
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248
A. 255.255.255.0
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389
B. 53
80 Which of the following is a Class A private IP address? A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0.100
B. 10.1.1.45
Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following
commands can Zach use to BEST troubleshoot this issue?
A. netsh
B. nslookup
C. ipconfig
D. tracert
A. netsh
After a brownout, Zach, a user, can connect to the internal network, but not the Internet. Which of
the following is the company’s DSL router experiencing that is causing this issue?
A. Switching loop
B. Power failure
C. Broadcast storm
D. Duplicate IP address
B. Power failure
Lisa, a technician, is asked to install a wireless router in a company’s public café area. The
company wants the public to be able to connect to the wireless network with minimal security, but
not be able to connect to the private internal network. Which of the following firewall rules would
BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point
C. Block traffic from the wireless access point
Lisa, an administrator, attempts to open a web page and sees the following error: ‘Error 404: Page
not found’. She then uses the ping command and finds that the default gateway cannot be pinged.
At which of the following layers does the problem MOST likely reside?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
A. Layer 1
Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication
between devices within each VLAN is functioning. At which of the following layers does the
problem MOST likely reside?
A. Network
B. Data link
C. Transport
D. Session
A. Network
Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot
access the Internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
B. An incorrect subnet mask has been entered in the WAP configuration.
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs
of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable
to reach the Internet. Jeff sees the following information in the switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST
likely cause of the problem?
A. The subnet mask is incorrect.
B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.
D. The server is missing default-gateway information.
Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but
receives reports from the server administrator that servers connected to the new switch seem to
be experiencing slow LAN connections. Zach checks the port connecting the new switch to the
core switch and sees the following information:
#show run interface GigabitEthernet0/10
Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
B. Speed and duplex have not been set.
1000BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet). B. 100 meters (328 feet). C. 500 meters (1640 feet). D. 1000 meters (3280 feet).
B. 100 meters (328 feet).
90 Which of the following DNS record types provides the hostname to IP address mapping? A. A record B. NS record C. CNAME record D. MX record
A. A record
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the
device at the hotel. She can reach the Internet, but cannot access any internal network resources.
Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
A. Incorrect DNS
Teachers and students at a school currently share the same bandwidth. The Internet performance
for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST
method to mitigate the issue?
A. Increased uptime
B. Caching engines
C. Traffic shaping
D. Load balancing
C. Traffic shaping
Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the
following user authentications would be the BEST to implement?
A. MS-CHAP
B. Kerberos
C. TACACS+
D. PKI
C. TACACS+
Which of the following uses copper wiring? A. 10GBaseER B. 10GBaseLW C. 100BaseFX D. 1000BaseT
D. 1000BaseT
Which of the following cables covers the LONGEST distance? A. 10GBaseT B. 10GBaseFR C. 100BaseTX D. 1000BaseX
B. 10GBaseFR
Users report that their Internet connection is slow. Zach, the network technician, has a suspicion
that users are streaming video and music. Which of the following would BEST confirm Zach’s
theory?
A. Traffic analysis
B. SNMP
C. History logs
D. System logs
A. Traffic analysis
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed
though or dumped is a example of which of the following?
A. Packet sniffing
B. Packet filter
C. Stateful inspection
D. Content filter
C. Stateful inspection
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO). A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP
A. High availability
B. Fault tolerance
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding
A. CSMA/CA
100
Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to
review all server logs centrally. Which of the following services could Lisa use in this scenario?
A. Event logs
B. Baselines
C. Change management
D. Syslog
D. Syslog
Lisa, a network technician, needs to push changes out to network devices and also monitor the
devices based on each device’s MIB. Which of the following should she use?
A. SNMP
B. Traffic analysis
C. Syslog
D. Asset management
A. SNMP
Users have reported slow access times when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
A. arp
B. route
C. ipconfig
D. tracert
D. tracert
Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with
a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants
to use the workstation’s MAC address. Which of the following protocols would provide the needed
information?
A. DHCP
B. ARP
C. DNS
D. PING
B. ARP
Which of the following OSI layers performs error detection using a Frame Check Sequence? A. Session B. Transport C. Physical D. Data link
D. Data link
Which of the following VPN methods is BEST used for connecting a remote office to the main company office? A. WEP-to-WPA B. RDP-to-RAS C. Client-to-site D. Site-to-site
D. Site-to-site
The ISP needs to terminate the WAN connection. The connection should be located in the network
server room where the company LAN equipment resides. Which of the following identifies the
location?
A. Smart jack
B. MDF
C. VPN
D. 66 block
B. MDF
Zach, an administrator, wants to eliminate remote access to a network from all users, except those
users in Zach’s own country. Which of the following security measures could he use to set up this
functionality?
A. MAC filtering
B. Port filtering
C. IP filtering
D. TLS
C. IP filtering
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check
the server for an IP address conflict on the server. Which of the following commands should Lisa
use?
A. traceroute
B. tracert
C. ifconfig
D. ipconfig
C. ifconfig
Network upgrades have been completed and the WINS server was shutdown. It was decided that
NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this
objective?
A. Content filtering
B. Port filtering
C. MAC filtering
D. IP filtering
B. Port filtering
110
Lisa, a network technician, has determined that the initial theory of probable cause was incorrect.
Which of the following would be the NEXT step in the troubleshooting process?
A. Implement the solution
B. Establish a plan
C. Document findings
D. Escalate the issue
D. Escalate the issue
Which of the following is the MAXIMUM hop count for RIP before the network is considered converged? A. 1 B. 5 C. 10 D. 15
D. 15
A company is expanding and has found that logging into each device to collect error information is
consuming too much time. They have asked Lisa, a network administrator, to set up a server that
will capture errors from each device automatically. Which of the following technologies would
BEST fit this requirement?
A. Syslog
B. RADIUS
C. IPSec
D. Network sniffer
A. Syslog
Jeff, a network administrator, has been requested to install wireless access throughout the entire
building, while utilizing a single SSID. Which of the following options will meet this requirement?
A. Set a separate VLAN on each WAP with the same encryption type.
B. Set the SSID on each WAP and set contiguous WAPs to different channels.
C. Set the SSID on each WAP and set contiguous WAPs to the same channel.
D. Set a separate VLAN on each WAP with the same frequency.
B. Set the SSID on each WAP and set contiguous WAPs to different channels.
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports
should be blocked on the firewall to achieve this?
A. 21
B. 22
C. 23
D. 25
A. 21
Lisa, a network consultant, is asked to set up a wireless network in a home. The home user wants
the wireless network to be available in every corner of the house. Which of the following additional
information will Lisa need to determine the equipment for the installation? (Select TWO).
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house
A. The length of the house
D. The building material of the house
Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the
following software tools would she use to accomplish this? (Select TWO).
A. arp
B. dig
C. route
D. nslookup
E. netstat
B. dig
D. nslookup
Which of the following DNS records would be queried to locate a company’s mail server? A. A B. MX C. AAAA D. CNAME
B. MX
Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops? A. RIP B. OSPF C. STP D. EGP
C. STP
Which of the following network appliances can BEST be described as allowing multiple servers to
share requests for a website through the same public IP address?
A. VPN concentrator
B. Content filter
C. Load balancer
D. Proxy server
C. Load balancer
120 Which of the following connectors would Kim, a technician, use only for RG-6 cables? A. F-connector B. MTRJ C. RJ-45 D. RS-232
A. F-connector
Which of the following technologies implements authentication headers and encapsulating security payloads? A. IPSec B. ISAKMP C. TLS D. SSL VPN
A. IPSec
Which of the following implements two-factor authentication? A. Username and password B. Fingerprint and facial recognition C. Check card and PIN D. PIN and password
C. Check card and PIN
Which of the following protocols works at the LOWEST layer of the OSI model? A. L2TP B. PPTP C. ISAKMP D. IPSec
A. L2TP
Which of the following protocols provides security through encryption? (Select TWO). A. PPPoE B. L2TP C. IPSec D. PPP E. TLS
C. IPSec
E. TLS
Which of the following records would be used for a Reverse DNS lookup? A. AAAA B. MX C. PTR D. A
C. PTR
Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO). A. 21 B. 22 C. 23 D. 53 E. 67
B. 22
C. 23
Which of the following protocols is used to resolve FQDNs to IP addresses? A. SSH B. FTP C. DNS D. HTTP
C. DNS
IP address based routing occurs on which of the following layers of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5
B. Layer 3
Data arranged into packets would be on which of the following layers of the OSI model? A. Datagram B. Transport C. Presentation D. Network
D. Network
130 Which of the following DNS record types is used for IPv6 resolution? A. MX B. AAAA C. A D. PTR
B. AAAA
Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house.
Which of the following will accomplish this?
A. Decreasing radio strength
B. MAC filtering
C. WEP encryption
D. SSID broadcast disable
A. Decreasing radio strength
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway
tunnel. Which of the following measures will accomplish this?
A. WPA encryption
B. MAC filtering
C. Changing antenna type
D. Decreasing radio strength
C. Changing antenna type
Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and
shows a high value of NEXT. Which of the following represents the cause?
A. Crosstalk
B. TX/RX reversed
C. Split cables
D. DB loss
A. Crosstalk
Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the
server is successful. Which of the following software tools is used to check if NetBIOS is enabled?
A. netstat
B. arp
C. nbtstat
D. nslookup
C. nbtstat
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following
items would be used to setup the office using a new DSL line? (Select TWO).
A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables
A. Router
B. Wi-Fi Access point
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port
from which of the following port numbers to port number 587?
A. 20
B. 21
C. 23
D. 25
D. 25
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the
following port numbers needs to be redirected through the proxy server to accomplish this?
A. 20
B. 80
C. 143
D. 443
B. 80
An office would like to set up an unsecured wireless network for their customers in their lounge
area. Which of the following firewall capabilities should be configured to prevent the wireless traffic
from communicating with the office’s LAN traffic?
C. Packet filtering
Kim, an employee, connects to a work computer from home via the built-in Windows remote
desktop connection. Which of the following is she MOST likely using to establish the connection?
A. RDP
B. RTP
C. RIP
D. RAS
A. RDP
140 Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim? A. Web server B. Syslog C. Network sniffer D. SNMP
C. Network sniffer
Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
B. 255.255.0.0
Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123
C. 69
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the
technician, a list of the host names connected to the network?
A. ping
B. nbstat
C. arp
D. msconfig
B. nbstat
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A. Multimode fiber B. CAT6a C. Single mode fiber D. Coaxial
C. Single mode fiber
Which of the following wireless technologies has the LARGEST cell size? A. 802.11a B. 802.3af C. 802.11g D. 802.11i
C. 802.11g
Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity
D. Diversity
Which of the following are available speeds when using 802.11b? (Select TWO). A. 1 Mb/s B. 5.5 Mb/s C. 6 Mb/s D. 12 Mb/s E. 54 Mb/s
A. 1 Mb/s
B. 5.5 Mb/s
RADAR avoidance technologies are built into which of the following technologies? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
A. 802.11a
Which of the following technologies can cause interference for 802.11g? A. RADAR B. 802.11a C. IrDA D. Bluetooth
D. Bluetooth
150 Which of the following technologies would be used in a large office area that has a lot of 2.4GHz noise? A. 802.3af B. 802.1q C. 802.11a D. MIMO
C. 802.11a
Which of the following occurs when antenna gain is increased on an access point? A. Connection speeds decrease B. Throughput decreases C. Cell size increases D. Attenuation increases
C. Cell size increases
Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. WPA2 PSK D. WPA Personal
B. 104/128 bit WEP
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST widely used with remote access? A. PKI B. VPN C. MS-CHAP D. RADIUS
D. RADIUS
Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP
D. SNMP
Which of the following does SNMPv3 BEST provide over previous versions? A. Increased security B. Simplified management C. More data types D. Higher productivity
A. Increased security
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
C. PuTTY
Zach, a network administrator, is tasked with simplifying the review of events from network
devices. Which of the following is used to accomplish this?
A. History logs
B. Event logs
C. Syslog server
D. Traffic analyzer
C. Syslog server
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that
the ST fiber jumper is good. Which of the following is the problem?
A. TX/RX reversed
B. Interference
C. Cable length
D. Bad connectors
A. TX/RX reversed
Users are reporting that Internet performance is slow. Jeff, the technician, has determined that the
Internet connection is saturated. Which of the following is BEST used to determine the source,
destination, and type of the traffic?
A. Netflow
B. Protocol analyzer
C. Network sniffer
D. SNMP
A. Netflow
160 Which of the following is a valid IPv6 address? A. 1056:958:E486::F8:8962 B. 1596:H593:B5D8::B859 C. 2048::9584:A6B8::0983 D. 4820::0985:489D::8761
A. 1056:958:E486::F8:8962