Networking Warm-Up Flashcards
Study 10 per day
Which of the following would be the BEST way to maintain uptime if a server motherboard failure occurs?
A) NIC teaming
B) Redundant switches
C) RAID
D) Load balancing
D) Load balancing
A network administrator needs to connect devices between buildings located four kilometers from each other. Which of the following standards would be the BEST choice?
A) 1000BASE-SX
B) 1000BASE-T
C) 1000BASE-LX
D) 10GBASE-T
C) 1000BASE-LX
A network administrator is connecting two devices using twisted pair copper cables transmitting at ten gigabits per second. Which of the following Ethernet standards would describe this connection?
A) 10GBASE-T
B) 1000BASE-SX
C) 1000BASE-T
D) 100BASE-TX
A) 10GBASE-T
A network administrator is upgrading the wireless network in a warehouse that operates at 54 megabits per second in the 5 GHz range. Which of the following would describe this network type?
A) 802.1x
B) 802.11ac
C) 802.3
D) 802.11a
D) 802.11a
A remote office WAN link is a single connection communicating at 1.544 Mbit/sec. Which of the following would describe this network type?
A) OC-48
B) POTS
C) Metro E
D) T1
D) T1
A switch is not forwarding traffic to the destination device, and the MAC address of the destination does not appear in the switch forwarding table. Which of the following OSI layers is MOST associated with this issue?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
B) Layer 2
Which of the following would be MOST associated with 802.1X?
A) Multiple VLANs between switches
B) Loop prevention on a switched network
C) RADIUS server
D) Redundant storage
C) RADIUS server
Which of the following would BEST describe a Z-Wave network topology?
A) Ring
B) Star
C) Mesh
D) Bus
C) Mesh
Which of the following attacks would describe an exploit of a web server with a vulnerability that had not previously been detected or published?
A) Brute force
B) VLAN hopping
C) Zero-day
D) Insider threat
C) Zero-day
A network administrator is troubleshooting an issue with a blocked port number on a firewall. Which of the following OSI layers would be MOST associated with this issue?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
D) Layer 4
The audio during a VoIP phone call breaks up and parts of the audio are missing during the call. Which of the following would BEST describe this issue?
A) Excessive jitter
B) VLAN mismatch
C) TX/RX reversal
D) Transceiver mismatch
A) Excessive jitter
A company’s contract with a third party states that the Internet router should continue to operate properly for approximately three years, but if it needs replacing it will be fixed within four hours. Which of the following describes the three-year and the four-hour timeframe, respectively?
A) SLA, MTFB
B) MTFB, SLA
C) MTTR, MTBF
D) SLA, MTTR
B) MTFB, SLA
Which of the following would BEST describe the protocol used on a DSL network?
A) PPPoE
B) ATM
C) DMVPN
D) MPLS
A) PPPoE
A network administrator is concerned that a nearby office building may be interfering with their 802.11ac network. Which of the following tools would be the BEST way to troubleshoot this issue?
A) Protocol analyzer
B) Spectrum analyzer
C) Loopback plug
D) Inductive probe
B) Spectrum analyzer
Which of the following measures the signal loss across a length of twisted pair cabling?
A) TDR
B) Tone generator
C) Light meter
D) Cable tester
A) TDR
Which of the following would be the BEST way to identify open services on a remote server?
A) Wireless analyzer
B) Port scanner
C) Protocol analyzer
D) OTDR
B) Port scanner
Which of the following would best describe distributed switching in an SDN?
A) Application servers have a redundant path through the network
B) VMs are connected through a high-speed fiber network
C) Any missing routes will automatically converge
D) Devices can belong to any VLAN, regardless of where the VM is running
D) Devices can belong to any VLAN, regardless of where the VM is running
Distributed switching removes the physical network segmentation created by a VM server farm and allows the network administrator to define VLANs regardless of physical VM location. If the VM moves to another server, the VLAN and IP addressing remains static.
When entering a car, a user’s mobile phone automatically pairs to their automobile and all phone audio is sent over the car’s speakers. What kind of network would best describe this connection?
A) WAN
B) LAN
C) SAN
D) PAN
D) PAN
A PAN (Personal Area Network) is commonly associated with devices that are in immediate proximity to the user.
A network administrator has been asked to create a secondary name for an existing file server. Which DNS record type would be the best choice for this task?
A) SRV
B) MX
C) CNAME
D) TXT
C) CNAME
A canonical name (CNAME) DNS record is used to create an alias for an existing device.
What command would be the best way to reboot a Windows computer from the command line?
A) RESTART
B) SHUTDOWN
C) BOOT
D) TASKKILL
B) SHUTDOWN
The Windows SHUTDOWN command can be used to shutdown and power off Windows or to restart the system.
A network administrator needs to update the software in all of the access points across a college campus. Which of the following would be the best fit for this task?
A) Mobile Device Manager
B) Application Proxy
C) Wireless LAN Controller
D) AAA Server
C) Wireless LAN Controller
A wireless LAN controller provides centralized management of all wireless access points on the network.
A network engineer is designing a WAN that would connect all remote locations to each other using encrypted tunnels. Which of these WAN technologies best fits this description?
A) DMVPN
B) ATM
C) PPPoE
D) MPLS
A) DMVPN
A DMVPN (Dynamic Multipoint VPN) is designed to dynamically build encrypted VPN tunnels between multiple sites to create a meshed WAN architecture.
A network administrator has configured two Ethernet adapters in a database server to operate as a single connection. Which of these would best describe this configuration?
A) Channel bonding
B) Mesh network
C) MIMO
D) NIC teaming
D) NIC teaming
NIC teaming combines multiple network interfaces together to operate as a single entity, allowing for aggregate bandwidth and redundant network paths.
Which of the following device hardening techniques would best protect the information transmitted across the network while administering the device?
A) Disable unnecessary services
B) Use complex passwords
C) Create new keys during the installation
D) Check the hash of each patch file
C) Create new keys during the installation
Devices often ship with encryption keys that are used by default, but that usually means that everyone has access to the same keys. Creating your own keys ensures that others would not have the ability to tap into your encrypted communications.
Vala, a security administrator, is concerned that an internal application may not be using secure protocols over the network. Which of these would be the best way for Vala to verify the type of network security used by this application?
A) Port scanner
B) Tone generator
C) Protocol analyzer
D) Speed test site
C) Protocol analyzer
A protocol analyzer will capture and display all of the network traffic and provide a decode of the captured frames.
A network administrator would like to configure a firewall to allow direct SMB file transfers between Windows machines. Which of the following should be enabled on the firewall?
A) tcp/3389
B) tcp/445
C) tcp/25
D) tcp/22
B) tcp/445
NetBIOS-less SMB (Server Message Block) communication communicates using tcp/445.
A network administrator needs to connect to a third-party network using an EGP. Which of the following would be the BEST choice for this task?
A) BGP
B) EIGRP
C) OSPF
D) WPA2
A) BGP
BGP (Border Gateway Protocol) is a common EGP (Exterior Gateway Protocol). EIGRP (Enhanced Interior Gateway Routing Protocol), OSPF (Open Shortest Path First), and RIPv2 (Routing Information Protocol version 2) are categorized as IGPs (Interior Gateway Protocols). WPA2 is an encryption protocol used on 802.11 wireless networks.
A network administrator would like to prioritize different VLANs traversing an 802.1Q trunk. Which of these technologies would be the best choice for this task?
A) DiffServ
B) DSCP
C) DS
D) CoS
D) CoS
CoS (Class of Service) is a method of traffic prioritization managed in the Ethernet frame header of an 802.1Q trunk. One common use of CoS is to prioritize voice VLAN traffic over other VLANs traversing a trunked link.
When classful subnetting, what is the default subnet mask for the IP address 147.240.1.195?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
B) 255.255.0.0
An IP address that starts with 147 is a class B address, so the default subnet mask is 255.255.0.0.
A medical facility consists of four separate buildings at the same address, and each building is connected with private fiber runs. Which of the following would BEST describe this network?
A) CAN
B) IaaS
C) Hybrid
D) WAN
A) CAN
A CAN (Campus Area Network) describes connectivity between separate buildings in a limited geographical area. Since these facilities are usually under the management of a single group, it’s relatively easy to install conduit and connect the buildings using fiber optic cabling.
A network administrator needs to install a wireless network that can support 150 Mbit/sec data transfers. Which of the following would be the minimum standard to support this requirement?
A) 802.11a
B) 802.11b
C) 802.11ac
D) 802.11n
D) 802.11n
802.11n can support four separate MIMO channels that each support a theoretical maximum throughput of 150 megabits per second.
A system administrator is not able to browse a web site using the FQDN, but using the IP address works perfectly. Which of the following would be the MOST likely reason for this issue?
A) Bad DNS setting
B) Incorrect subnet mask
C) Invalid web server configuration
D) Invalid routing table
A) Bad DNS setting
The DNS server is responsible for converting a FQDN (Fully-Qualified Domain Name) to an IP address. If this resolution process isn’t working, then the client workstation will not know the IP address of the destination device.
A network administrator has configured a switch to reference a stratum 1 server. Which of the following would describe this configuration?
A) DNS
B) NTP
C) SNMP
D) SSH
B) NTP
NTP (Network Time Protocol) uses stratums to describe the distance from the original reference clock. Stratum 0 describes the most accurate atomic clock, stratum 1 is a primary time server synchronized to the stratum 0 source, and stratum 2 NTP servers are synchronized to stratum 1 servers.
A network administrator has run a 1 gigabit per second ethernet connection between a switch and a server using a category 5 patch cable. Which of these standards is in use?
A) 1000BASE-T
B) 10GBASE-T
C) 1000BASE-SX
D) 100BASE-TX
A) 1000BASE-T
1000BASE-T provides gigabit (1,000 megabit per second) connectivity over a minimum of category 5 twisted pair cable.
A network administrator is transferring files to a SAN using Ethernet frames of 9,000 bytes in length. Which of the following would BEST describe this transfer method?
A) Full duplex
B) Jumbo frames
C) Point-to-point
D) Deep packet inspection
B) Jumbo frames
By default, Ethernet frames have a maximum payload length of 1,500 bytes. Ethernet frames that extend beyond this payload size are called jumbo frames.
Which of the following WAN technologies would be commonly found on DSL networks?
A) DMVPN
B) MPLS
C) ATM
D) PPPoE
D) PPPoE
DSL networks commonly use PPPoE (Point to Point Protocol over Ethernet) as their primary protocol.
A company has contracted with a third-party to provide a recovery site that contains racks, server hardware, network infrastructure, and storage systems. To activate this location, the company would send a team that would install software and data. Which of the following would BEST describe this site?
A) Hot site
B) Redundant site
C) Warm site
D) Remote site
C) Warm site
A warm site contains everything a company might need to recover their services except for the applications and data.
A network administrator would like to centralize the reporting of switch, router, and firewall log data. Which of the following would be the BEST choice for this task?
A) SIEM
B) LDAP
C) RADIUS
D) DMVPN
A) SIEM
A SIEM (Security Information and Event Management) service provides consolidated log file storage, security alerts, data correlation and reporting, and more.
A company is interviewing engineers for a new project, but wants to prevent the engineers from discussing these details with others. Which of the following would restrict the release of this information?
A) EULA
B) AUP
C) NDA
D) BYOD
C) NDA
An NDA (Non-Disclosure Agreement) is a confidentiality agreement between parties. An NDA would allow the company do discuss the details of their project but prevent any of the interviewees from discussing those details with others.
A user connecting to the corporate wireless network is presented with a username and password prompt before they can continue. Which of the following would BEST describe this prompt?
A) MAC filtering
B) Port security
C) ACL
D) 802.1X
D) 802.1X
IEEE 802.1X is a standard that provides port-based network access control (NAC). Before a user can gain access to the network, they must first authenticate with proper credentials.
Daniel is constructing some Ethernet patch cables for a data center. Which of the following would be the BEST way to validate the pinouts of these cables?
A) Punch-down tool
B) Crimper
C) Cable tester
D) Spectrum analyzer
C) Cable tester
A cable tester can quickly show continuity between the eight RJ45 connectors on both ends of the cable.
A network administrator is installing a new VoIP server at a branch office. Which of the following port numbers should be allowed on the local network?
A) tcp/3389
B) udp/53
C) tcp/22
D) tcp/5060
D) tcp/5060
TCP ports 5060 and 5061 are commonly used for the SIP (Session Initiation Protocol) signaling VoIP (Voice over IP) protocol.
Which of the following would be a valid IP address?
A) 2600:dddd:1111:1::1
B) 192.168.1.55.7
C) fe80::9b8f:44d1:14e1::93fd
D) 10.17.265.2
A) 2600:dddd:1111:1::1
A valid IPv6 address contains eight separate groups, with groups of zeros replaced with a double colon.
Which DNS record type is most commonly associated with IPv6 addressing?
A) AAAA
B) MX
C) SRV
D) CNAME
A) AAAA
The AAAA record is the designation for an IPv6 address DNS entry.
A network administrator is replacing wires in a punch down block that only supports analog voice. Which of the following would describe this equipment?
A) Fiber distribution panel
B) 110 block
C) 802.11n
D) 66 block
D) 66 block
A 66 block is commonly used for analog voice connections. Ethernet links are commonly associated with a 110 block.
A computer on a 1000BASE-T link is connecting at 100 mbps. Which of the following would be the MOST likely reason for this issue?
A) Attenuation
B) Incorrect pin-out
C) Duplex mismatch
D) Invalid network driver
B) Incorrect pin-out
A network administrator has identified a number of errors associated with a WAN link. Which of the following would be the BEST way to test the router interface for potential problems?
A) ping
B) Punch-down tool
C) Tone generator
D) Loopback plug
D) Loopback plug
How does a network device determine if a specific packet is the start of a new traffic flow?
A) TCP flags
B) MTU size
C) SSID broadcasts
D) DNS record
A) TCP flags
Which link-state routing protocol would be the best choice for a large internal network?
A) OSPF
B) BGP
C) EIGRP
D) RIP
A) OSPF
Which of the following would be the BEST way to block file transfers containing sensitive customer information?
A) AUP
B) DLP
C) BYOD
D) IPS
B) DLP (Data Loss Prevention)
Which security strategy involves the use of physical, technical, and administrative controls?
A) CIA Triad
B) Role-based access control
C) Zero trust
D) Defense in depth
D) Defense in depth
A network administrator would like to be informed each time a network link is disabled. Which of the following would provide this functionality?
A) Top of rack switching
B) Trap
C) LDAP
D) TCP flag
B) Trap
An administrator is designing a network for applications to communicate directly to their associated cloud services. Which of the following would be the BEST choice for this requirement?
A) CAN
B) SD-WAN
C) mGRE
D) MPLS
B) SD-WAN
A network administrator is configuring LACP on a switch port. Which of the following would BEST describe this setting?
A) Link aggregation
B) Port mirroring
C) Loop prevention
D) Flow control
A) Link aggregation
An organization is consolidating log files from Windows servers, Linux servers, switches, routers, and firewalls. Which of the following is used to consolidate this information?
A) NetFlow
B) Environmental sensors
C) Syslog
D) SNMP
C) Syslog
A user connecting through a VPN to the corporate office is not able to use their printer at home. Which of the following could be used to resolve this issue?
A) VDI
B) 802.1X
C) Split tunnel
D) Clientless VPN
C) Split tunnel
A network administrator is building a network to connect industrial equipment. Which of the following would BEST describe this network type?
A) SAN
B) SCADA
C) SDWAN
D) SOHO
B) SCADA
A user connecting to the VPN receives a message on the screen with instructions for downloading the corporate anti-virus utility. Which of the following is the MOST likely reason for this issue?
A) Invalid certificate
B) Incorrect VLAN
C) Failed posture assessment
D) Wrong date and time
C) Failed posture assessment
Construction work in the area has severed a fiber connection between buildings. Which of the following should be used to reconnect this network?
A) Fusion splicer
B) OTDR
C) Tone generator
D) Port mirror
A) Fusion splicer
A firewall is blocking all traffic using tcp/3389. Which OSI layer is associated with this process?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
D) Layer 4
A user moves seamlessly between access points when walking between campus buildings. Which of the following provides this functionality?
A) ESSID
B) Cellular roaming
C) MU-MIMO
D) CSMA/CAF
A) ESSID
A network administrator would like to enable authentication for wireless network users. Which of the following would be the BEST choice?
A) ACL
B) IPsec
C) MAC filtering
D) 802.1X
D) 802.1X
A company is connecting two locations across the city using 100 megabit per second Ethernet links. Which of the following would BEST describe this connection?
A) WAN
B) PAN
C) CAN
D) MAN
D) MAN
Which of these would support a 40 Gbit/sec Ethernet network link?
A) QSFP
B) SFP
C) QSFP+
D) SFP+
C) QSFP+
A company is changing the FQDN of their SMTP server. Which of the following DNS records should be updated?
A) AAAA
B) MX
C) A
D) NS
B) MX
A company is designing a network that will provide the highest amount of availability to a web server. Which of the following should be included in this design?
A) Load balancer
B) VPN concentrator
C) IPS
D) Layer 3 switch
A) Load balancer
Which of the following should be used if a disaster causes a long-term outage to normal online processes?
A) COOP
B) SLA
C) EULA
D) STP
A) COOP
Which of the following would be required to use a clientless VPN?
A) Dynamic routing protocol
B) MFA
C) HTML5 compliant browser
D) 802.1X
C) HTML5 compliant browser
A(n) ________________ organizes and protects the horizontal cabling in the telecommunications room.
A) rack
B) patch panel
C) outlet
D) 110 jack
B) patch panel
What are patch cables used for? (Select two.)
A) To connect different telecommunications rooms.
B) To connect the patch panel to the switch.
C) They are used as crossover cables.
D) To connect PCs to outlet boxes.
B) To connect the patch panel to the switch.
&
D) To connect PCs to outlet boxes.
What does IANA stand for?
A) International Association Numbers Authority
B) International Association Numbering Authority
C) Internet Assigned Numbering Authority
D) Internet Assigned Numbers Authority
D) Internet Assigned Numbers Authority
What is Area 0 called in OSPF?
A) Local Area
B) Primary Zone
C) Trunk
D) Backbone
D) Backbone
The traceroute utility is useful for?
A) Configuring routers remotely
B) Showing the physical location of the route between you and the destination
C) Discovering information about the routers between you and the destination address
D) Fixing the computer’s local routing table
C) Discovering information about the routers between you and the destination address
An SSL/TLS URL connection start with which prefix?
A) http
B) www
C) ftp
D) https
D) https
Why might you use the netstat utility?
A) To see the route an IP packet takes across multiple routers
B) To see your IP address and configuration details
C) To see the endpoints of your sessions
D) To issue commands to a remote server
C) To see the endpoints of your sessions
Which statements about netstat switches (in Windows) are true? (Select three.)
A) -a shows all used ports.
B) -n shows raw port numbers and IP addresses.
C) -o shows the process ID.
D) -s shows the application name.
A) -a shows all used ports.
B) -n shows raw port numbers and IP addresses.
C) -o shows the process ID.
The DNS root directory is represented by what symbol?
A) . (dot)
B) / (forward slash)
C) \ (back slash)
D) $ (dollar sign)
A) . (dot)
Running which command enables you to query the functions of a DNS server?
A) ipconfig
B) nslookup
C) ping
D) xdns
B) nslookup
Where does a DNS server store the IP addresses and FQDNs for the computers within a domain?
A) Forward lookup zone
B) Canonical zone
C) MX record
D) SMTP record
A) Forward lookup zone
Any encryption that uses the same key for encryption and decryption is called?
A) Encoded key
B) Symmetric key
C) Single key
D) Synthetic key
B) Symmetric key
The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be is called___________.
A) PKI
B) authentication
C) locking
D) nonrepudiation
D) nonrepudiation
If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?
A) PPP
B) RADIUS
C) MS-CHAP
D) TACACS+
B) RADIUS
Which VPN technology enables direct connections between satellite locations?
A) PPTP VPN
B) IPsec VPN
C) SSL VPN
D) DMVPN
D) DMVPN
A static VLAN assigns VLANs to_____________.
A) IP addresses
B) MAC addresses
C) ports
D) trunks
C) ports
A content switch always works at least at which layer of the OSI model?
A) 2
B) 3
C) 4
D) 7
D) 7
DHCP is required to receive an IPv6 address automatically.
A) True
B) False
B) False
What is the /16 prefix for all 6to4 address?
A) 2001
B) 2003
C) 2002
D) 2021
C) 2002
What service do tunnel brokers provide?
A) A way for users to jump the gap between their computers and the IPv6 Internet routers.
B) They provide no useful service.
C) Access to IPv6 DNS records.
D) A second connection for multihoming.
A) A way for users to jump the gap between their computers and the IPv6 Internet routers.
Which of the following is the valid reduced version of the address 2001:0489:000f:0000:0000:1f00:0000:000d?
A) 2001:489:f::1f:0:d
B) 2001:489:f::1f00::d
C) 2001:0489:000f::1f00:0000:000d
D) 2001:489:f::1f00:0:d
D) 2001:489:f::1f00:0:d
What is the popular Microsoft remote access server program called?
A) RRAS
B) Dial-Up Networking
C) Dial-Up Server
D) Microsoft Client for Networks
A) RRAS
The V.90 standard defines a modem speed of _______________.
A) 56 Kbps
B) 33.6 K baud
C) 28.8 Kbps
D) 2400 baud
A) 56 Kbps
What is SONET used for?
A) Short-distance, high-speed, fiber-optic transmission
B) Long-distance, high-speed, fiber-optic transmission
C) Long-distance, low-speed, copper cable transmission
D) Short-distance, low-speed, copper cable transmission
B) Long-distance, high-speed, fiber-optic transmission
Which technology enables use of a WAP without directly connecting the WAP to an AC power outlet?
A) AES
B) PoE
C) Powered Wi-Fi
D) TKIP
B) PoE
Which of the following is known as a Basic Service Set in infrastructure mode?
A) A WAP
B) A WPA
C) A RADIUS server
D) A TKIP
A) A WAP
What do you call a wireless network in infrastructure mode with more than one access point?
A) BSS
B) EBSS
C) WBSS
D) ExNet
B) EBSS
Which of the following is the most secure method of wireless encryption?
A) WEP
B) WEP2
C) WPA
D) WPA2
D) WPA2
Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously?
A) CPU
B) Hard Drive
C) RAM
D) Windows
C) RAM
What enables two VMs hosted on the same physical machine to communicate without leaving the machine itself?
A) Virtual firewall
B) Virtual LAN
C) Virtual PBX
D) Virtual switch
D) Virtual switch
John has two groups of virtual machines that each need to be on their own subnet. Which of the following should he use to subnet each group of virtual machines without moving or re-cabling hardware?
A) Virtual NIC
B) Virtual switch
C) Virtual router
D) Virtual firewall
C) Virtual router
GSM, EDGE, and LTE all use which of the following? (Select two.)
A) SIM cards
B) CDMA
C) TDMA
D) NFC
A) SIM cards
&
C) TDMA
Which of the following does a classic hotspot require? (Select two.)
A) Bluetooth
B) 802.11
C) Cellular WAN
D) NFC
B) 802.11
&
C) Cellular WAN
All tap-to-pay services use which networking technology?A) 802.11B) BluetoothC) ANT+D) NFC
D) NFC
Which of the following probably uses the least power?A) ANT+B) RFIDC) BluetoothD) 802.11
A) ANT+
Which of the following is a unique server function?A) Network loginB) High graphics speedC) Large amounts of RAMD) Network authentication
D) Network authentication
What standard is used by most NAS devices, enabling them to connect easily to almost any network?A) VLANB) SIPC) RTUD) CIFS
D) CIFS
H.323 uses which TCP port number?A) 5004B) 5060C) 2427D) 1720
D) 1720
The RTP protocol runs on top of which protocol?A) UC serverB) SIPC) MGCPD) H.323
B) SIP
What is a medianet’s primary tool to ensure bandwidth for VTC?A) MPLSB) RTUC) QoSD) ISDN
C) QoS
Which item should be found in a security policy?A) Acceptable use policyB) Emergency exit planC) Service level agreementD) Instruction on how to fill out a change request form
A) Acceptable use policy
The best way to know the vulnerabilities of an IT infrastructure is to run what?A) A system-wide antivirus scannerB) Cable certifierC) Critical asset scannerD) Vulnerability scanner
D) Vulnerability scanner
During and after a change to the IT infrastructure, what must be done?A) Downtime must be scheduled.B) New equipment must be installed.C) Operating systems must be patched.D) The changes must be documented.
D) The changes must be documented.
When working inside equipment, what should Jane do?A) Ensure that the equipment is secured to the rack with four screws.B) Wear a properly connected anti-ESD wrist strap.C) Have a fire extinguisher nearby and review its proper use.D) Wear safety goggles and fire retardant gloves.
B) Wear a properly connected anti-ESD wrist strap.
A computer compromised with malware to support a bot net is called a __________?A) zombieB) reflectionC) DDoSD) locked node
A) zombie
Which of the following protocols are notorious for cleartext passwords? (Select two.)A) SSHB) TelnetC) HTTPSD) POP3
B) Telnet&D) POP3
In an SNMP managed network, which software does a managed device run?A) AgentB) NMSC) SNMP managerD) MIB
A) Agent
What should you create when a network is running correctly?A) Answer fileB) Capture fileC) MIBD) Baseline
D) Baseline
When should you use a cable tester to troubleshoot a network cable?A) When you have a host experiencing a very slow connectionB) When you have an intermittent connection problemC) When you have a dead connection and you suspect a broken cableD) When you are trying to find the correct cable up in the plenum
C) When you have a dead connection and you suspect a broken cable
What will the command route print return on a Windows system?A) The results of the last tracertB) The gateway’s router tableC) The routes taken by a concurrent connectionD) The current system’s route table
D) The current system’s route table
Which command shows you detailed IP information, including DNS server addresses and MAC addresses?A) ipconfigB) ipconfig -aC) ipconfig /allD) ipconfig /dns
C) ipconfig /all
Which best describes a model?A) A duplicate of a real object or processB) A representation of a real object or processC) Multiple steps of a process converted into a single stepD) The expansion of a single process step into multiple steps
B) A representation of a real object or process
The OSI model has ____ layers and the TCP/IP model has ____ layers.A) 4 and 4B) 7 and 7C) 7 and 4D) 4 and 7
C) 7 and 4
What is a chunk of data that has been sent out of a NIC called?A) PacketB) SegmentC) FrameD) MAC
C) Frame
An organization is building out its offices. Initially, computer connections will be 1 gigabit Ethernet but the company plans to upgrade to 10 gigabit connections in the near future. What category of wiring should be installed so that the company will not have to re-wire the facility when they upgrade their Ethernet speed?A) Cat 5B) Cat 5eC) Cat 6aD) Thicknet
C) Cat 6a
Which of the following is NOT a characteristic of serial ports?A) Sends out 8 bits at the same time on different pinsB) Uses RS-232 signalingC) Uses DB-9 connectorD) Uses DB-25 connector
A) Sends out 8 bits at the same time on different pins
Which statement is NOT true about 10BaseT?A) 10BaseT runs at 10 megabits per secondB) Maximum distance between the switch and the node is 100 metersC) 10BaseT requires Cat 5a UTP cableD) 10BaseT supports a maximum of 1024 nodes per switch
C) 10BaseT requires Cat 5a UTP cable
Why can straight-through cables be used to connect modern switches together?A) Straight-through cables cannot be used to connect modern switches togetherB) Straight-through cables can be used to connect modern switches together, but autosensing sets the switch port to half-duplex, reducing performance by halfC) The switch will re-wire the cable termination so that it becomes a crossover cableD) Autosensing in the switch will cause the switch port to re-wire itself into a crossover configuration.
D) Autosensing in the switch will cause the switch port to re-wire itself into a crossover configuration.
Which of the following is NOT an element of structured cabling?A) Telecommunication closetB) Table-top rackC) Horizontal runD) Work area
B) Table-top rack
Which of the following is NOT a distribution panel?A) 166 Punch-down blockB) 110 Punch-down blockC) 66 Punch-down blockD) Fiber distribution panel
A) 166 Punch-down block
Which of the following is not a cable test?A) WiremapB) ContinuityC) Cable lengthD) Ping
D) Ping
A Fox and Hound are also known as what?A) Time Domain Reflectometer (TDR)B) WiremapC) A tone generator and a tone probeD) Continuity tester
C) A tone generator and a tone probe
Which of the following is NOT a common wired network problem?A) AttenuationB) UTP cables < 100MC) JitterD) Wrong cable type
B) UTP cables < 100M
Which decimal number is represented by the binary number 1 0 1 1 0 1 1 0?A) 182B) 176C) 73D) 182.176.73.0
A) 182
Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)?A) C, B, CB) B, A, CC) C, A, BD) A, C, A
A) C, B, C
An organization has five campus buildings. They want each building to be on its own subnet. Each campus will need a minimum of twenty-five IP addresses. The organization has the Class C network address 217.105. 2.0 assigned to it. Using CIDR, what subnet mask will yield the minimum number of subnetworks with the maximum number of hosts per network that will meet the requirements of the organization?A) /26B) /27C) /28D) /29
B) /27
Which choice is true of a rogue DHCP server?A) A rogue DHCP server increases the speed of the DHCP serviceB) A rogue DHCP server increases the pool of available IP addressesC) A rogue DHCP server can assign incompatible IP addresses to hostsD) A rogue DHCP server ensures that hosts will get compatible APIPA addresses
C) A rogue DHCP server can assign incompatible IP addresses to hosts
Which of the following is not a “special” IP address?A) 10.255.1.1B) 169.253.4.185C) 192.168.70.70D) 127.0.0.1
B) 169.253.4.185
Which symptom is NOT a result of an IP addressing problem?A) Duplicate IP addressB) Static IP addressC) Duplicate MAC addresses D) Incorrect gateway
B) Static IP address
Port forwarding allows which of the following?A) Public addresses to be assigned to the LAN side of a NAT routerB) One host on the LAN side of a NAT router to be assigned with the same public address of the router’s WAN interfaceC) Registers a LAN side host with a portable DNS addressD) Outside access to hosts on the LAN side of a NAT router
D) Outside access to hosts on the LAN side of a NAT router
A tech has just installed a new SOHO router for a client. Which security task should the tech perform first?A) Change the administrator name and passwordB) Disable port forwardingC) Disable the DHCP serverD) Enable MAC address cloning
A) Change the administrator name and password
Which of the following is NOT a characteristic of the OSPF routing protocol?A) OSPF is a link state protocolB) OSPF is a distance vector protocolC) OSPF routers are grouped into areasD) OSPF routers in an area elect a designated router and a backup designated router
B) OSPF is a distance vector protocol
Which of the following is NOT a characteristic of the BGP routing protocol?A) BGP is a hybrid of distance vector and link state routing protocolsB) BGP is broken up into divisions called Autonomous Systems (AS)C) The primary job of BGP is to route between ASesD) OSPF is the primary routing protocol between ASes
D) OSPF is the primary routing protocol between ASes
Ping uses which IP layer protocol?A) ICMPB) ARPC) RIPD) FTP
A) ICMP
What is the primary purpose of netstat?A) Captures frames and packets for later reviewB) Shows your computer’s connection(s) to any web server(s)C) Graphical utility that charts amount of network data entering and leaving a hostD) Displays all connections to and from a host computer
D) Displays all connections to and from a host computer
Which of the following is a secure email protocol?A) STMPB) STLSC) POPD) IMAP
B) STLS
Which is the default port for NTP?A) 321B) 123C) 132D) 231
B) 123
In what folder is the HOSTS file located in a Windows computer?A) C:\etcB) C:\Windows\System32\Drivers\etcC) C:\Windows\etcD) C:\Windows\System32\etc
B) C:\Windows\System32\Drivers\etc
The primary command-line tool to troubleshoot Windows naming issues is what?A) NbtstatB) NetstatC) IpconfigD) Net
A) Nbtstat
In terms of network security, what is the purpose of hashing?A) Hash is a great side dish with eggsB) Hashing encrypts dataC) Hashes are used to verify data integrityD) Hashing decrypts data that was encrypted by hashing
C) Hashes are used to verify data integrity
What is a digital signature?A) A hashed web pageB) An encrypted web pageC) A hash of an encrypted data chunk that sender and receiver both haveD) A web page that has been hashed with a private key
C) A hash of an encrypted data chunk that sender and receiver both have
Which statement is true of VLANs?A) VLANs enable remote stations to connect to the LAN from across the InternetB) VLANs break up broadcast domains into multiple, smaller broadcast domainsC) VLANs use SSH tunnels for cross-VLAN trafficD) VLANs can only be implemented on specified ports on a router
B) VLANs break up broadcast domains into multiple, smaller broadcast domains
When operating multiple, duplicate servers such as web servers, which method is best to to take advantage of the full power of all of the servers?A) HSRPB) DNS ServerC) Round Robin ServerD) Server Side Load Balancer
D) Server Side Load Balancer
What does QoS provide?A) Higher performance of selected trafficB) Blocking of specified traffic typesC) Redirection of low priority traffic to slower router interfacesD) Prioritized throughput of different traffic types
D) Prioritized throughput of different traffic types
Which statement is true of IPS and IDS systems?A) Passive IDS is the same as IPSB) IPS responds to threats with a notification to specified staffC) IPS detects then attempts to defend against a threatD) Passive IPS is the same as IDS
C) IPS detects then attempts to defend against a threat
Which statement is NOT true of a forward proxy?A) Forward proxy servers are connected in-line between the front-end router and the LAN, and they do not require hosts to be configuredB) Forward proxy servers function between the local network and the front-end routerC) Forward proxy servers are application specificD) Hosts must be configured to access the forward proxy server
A) Forward proxy servers are connected in-line between the front-end router and the LAN, and they do not require hosts to be configured
Dial-up connections require which piece of equipment?A) ModemB) Cable modemC) NICD) Multi-speed switch
A) Modem
The primary technical disadvantage to satellite Internet is what?A) Slow uploadB) Slow downloadC) LatencyD) Expense
C) Latency
SCADA differs from ICS/DCS for what major reason?A) SCADA uses conventional computers while ICS/DCS uses highly specialized computersB) ICS/DCS uses conventional computers while SCADA uses highly specialized computersC) ICS/DCS operates over long distances while SCADA is localD) SCADA operates over long distances while ICS/DCS is local
D) SCADA operates over long distances while ICS/DCS is local
Which choice is NOT a typical Wi-Fi problem?A) InterferenceB) WPS failureC) Wrong WAP passwordD) WAP configuration has changed
B) WPS failure
Which element does NOT need to be configured when installing a virtual machine on a host?A) The number of CPU coresB) The type and size of storage systemC) The input voltage of the power supplyD) The amount of RAM
C) The input voltage of the power supply
Which of the following is NOT an element that is exclusive to Mobile NAC?A) Two-factor authenticationB) OnboardingC) Captive PortalD) Geofencing
A) Two-factor authentication
Which choice is NOT an element of unified communication (UC)?A) CollaborationB) Presence informationC) Video conferencingD) Virtualization
D) Virtualization
Which of the following is NOT an element of risk management?A) Secure infrastructure from threatsB) Security policiesC) Security controlsD) Security procedures
A) Secure infrastructure from threats
Which choice is NOT found in a change request?A) Type of changeB) Configuration proceduresC) Rollback processD) Cost of implementation
D) Cost of implementation
Which choice is NOT a type of firewall?A) UMTB) Network-basedC) Host-basedD) Software
A) UMT
Troubleshooting networks add which element to the general troubleshooting model?A) Gather basic informationB) Network model top-to-bottom approachC) Form a theoryD) Test the theory
B) Network model top-to-bottom approach
Which of the following would be MOST commonly associated with out-of-band management?A) IPsec concentratorB) Load balancerC) Comm serverD) Repeater
C) Comm server
An organization has connected two sites over a secure encrypted tunnel. Which of the following would MOST likely be in use?A) SSHB) RDPC) IPsecD) SFTP
C) IPsec
Which of the following attack types would describe the process of identifying a password based on a stored hash?A) PhishingB) Brute forceC) Logic bombD) Denial of service
B) Brute force
Describe fully shielded cabling.
Copper wiring that has a braded outer screen and foil-shielded pairs. There are also variants that have a foil outer shield.
Which cable type consists of a single core made of solid copper surrounded by insulation, a braided metal shielding, and an outer cover?
Coax.
A user has configured a wireless network to communicate directly between two devices without using an access point. Which of the following would BEST describe this configuration?A) SSIDB) MU-MIMOC) ESSIDD) IBSS
D) IBSS(Independent Basic Service Set)Two devices communicate directly to each other using 802.11, no access point required. This used to be called ‘Ad hoc’.
An attacker is attempting to obtain user credentials by using a list of the most common passwords. Which of the following would BEST describe this attack?A) VLAN hoppingB) On-path attackC) Social engineeringD) Dictionary attack
D) Dictionary attack
Which network topology connected nodes with a ring of cable?A) StarB) BusC) RingD) Mesh
C) Ring
What type of topology does 10BaseT use?A) BusB) RingC) Star busD) Bus ring
C) Star bus
Which of the following is NOT true of crossover cables?A) They are a type of twisted-pair cabling.B) They reverse the sending and receiving wire pairs.C) They are used to connect hubs.D) Both ends of a crossover cable are wired according to the TIA/EIA 568B standard.
D) Both ends of a crossover cable are wired according to the TIA/EIA 568B standard.
What standard does IEEE 802.3ab describe?A) 1000BaseLXB) 1000BaseTC) 100BaseTD) 1000BaseSX
B) 1000BaseT
What is a big advantage to using fiber-optic cable?A) Fiber is common glass; therefore, it’s less expensive.B) Fiber is not affected by EMI.C) Making custom cable lengths is easier with fiber.D) All that orange fiber looks impressive in the network closet.
B) Fiber is not affected by EMI.
Identify the network ID section of the following IP address and subnet mask: 10.14.12.43 - 255.255.255.0A) 10.14B) 43C) 10.14.12D) 14.12.43
C) 10.14.12
Which of the following is a valid loopback address?A) 128.0.0.1B) 127.0.0.0C) 128.0.0.255D) 127.24.0.1
D) 127.24.0.1
Which statements about SSH and Telnet are true? (Select two.)A) Windows comes with preinstalled SSH and Telnet clients.B) SSH is more secure than Telnet because it encrypts data.C) Telnet is a command-line tool, whereas SSH is a GUI tool.D) SSH uses port 22, and Telnet uses port 23.
B) SSH is more secure than Telnet because it encrypts data.&D) SSH uses port 22, and Telnet uses port 23.
A user calls to say she can’t see other systems on the network when she looks in My Network Places. You are not using NetBIOS. What are your first two troubleshooting steps? (Select two.)A) Ping the address of a known Web site.B) Ping the loopback address to test her NIC.C) Ping several neighboring systems using both DNS names and IP addresses.D) Ping the IP addresses of the router.
B) Ping the loopback address to test her NIC.&C) Ping several neighboring systems using both DNS names and IP addresses.
A hash function is by definition a ________.A) complex functionB) PKI functionC) one-way functionD) systematic function
C) one-way function
What’s the most common method used to configure a VLAN-capable switch?A) Log into the switch using SSH and use the command-line interface.B) Plug into the switch with a console cable and use the command-line interface.C) Log into the switch via a Web browser and use the GUI.D) Plug into the switch with a VLAN cable and use the command-line interface.
A) Log into the switch using SSH and use the command-line interface.
Which of the following operating systems have Teredo built in? (Select two).A) Windows 7B) macOSC) Windows 10D) Linux
A) Windows 7&C) Windows 10
An Ethernet cable has become disconnected from a 110 block patch panel. Which of the following would repair this issue?A) MultimeterB) Inductive probeC) Punch-down toolD) Loopback plug
C) Punch-down tool
A firewall needs to be configured to allow clock synchronization. Which of the following ports should be opened?A) udp/123B) tcp/3389C) tcp/22D) udp/53
A) udp/123
An ISP has guaranteed a company that an on-site equipment failures will be repaired within four hours. Which of the following would BEST describe this guarantee?A) MTBFB) RAIDC) Full backupD) SLA
D) SLA
Each time a user attempts to login to an application server, the authentication is denied. Which of the following would provide more information about this issue?A) MIB browserB) Port scannerC) Protocol analyzerD) TDR
C) Protocol analyzer
A computer in the shipping department is receiving an IP address during startup, but the assigned address is for the marketing department network. Which of the following would be the MOST likely reason for this issue?A) VLAN mismatchB) Incorrect duplexC) Near-end crosstalkD) Dual stack
A) VLAN mismatch
Which OSI layer is responsible for managing the encryption and decryption of application data?A) Layer 7B) Layer 6C) Layer 5D) Layer 4
B) Layer 6
Which of the following would be the MOST common choice for the console on a switch?A) RJ11B) MT-RJC) F-connectorD) DB9
D) DB9
A server administrator has received a notification from the help desk that a server is experiencing a high number of CRC errors. Which of the following would be the MOST likely reason for this issue?A) Bad network cableB) Invalid routing tableC) Failed default gatewayD) Duplicate IP address
A) Bad network cable
A network administrator has configured MAC address filtering on a WAP, but unauthorized traffic continues to appear on the network. Which of the following would be the most likely reason for this?A) Man-in-the-middleB) SpoofingC) DDoSD) Phishing
B) Spoofing
A network engineer would like to configure a switch to prevent any network loops. Which of the following should be enabled on the switch?A) VLANB) Half-duplexC) STPD) QoS
C) STP
Which of these would BEST describe the location of a CSU/DSU?A) Between a fiber network and a copper networkB) At the power supply of a routerC) Between a WAP and the wired networkD) Between a router and a WAN circuit
D) Between a router and a WAN circuit
A user in the accounting department uses a phone app to generate a random number during the login process. What factor of authentication is in use?A) Somewhere you areB) Something you knowC) Something you doD) Something you have
D) Something you have
You are configuring a firewall to allow VoIP signaling with the H.323 protocol. Which of these should you configure on your firewall?A) Enable outbound ICMPB) Enable tcp port 5060 and tcp port 5061C) Disable inbound udpD) Allow tcp port 1720
D) Allow tcp port 1720The H.323 VoIP signaling protocol uses tcp/1720 to communicate.
How does a switch know which devices are connected to a switch interface?A) The switch sends ARP requests based on IP traffic traversing the switchB) The switch examines the destination MAC address of every frameC) The switch examines the source MAC addresses of every frame.D) All devices must be initially configured in the switch settings
C) The switch examines the source MAC addresses of every frame.A switch examines the source MAC address of every frame to determine where a device may be located. This information is stored in a MAC address table for use during the normal frame forwarding process.
Your network has grown larger over time, and you’re concerned about the number of broadcasts on the network. Which of these would be the best way to limit the number of broadcasts?A) Use a switch to separate the networkB) Use a firewall to filter broadcastsC) Use a router to separate the networkD) Enable QoS on your switches
C) Use a router to separate the networkA router can separate a network into different broadcast domains. A switch or hub will not restrict broadcasts, and firewalls and QoS are not useful for controlling broadcasts.
Which of the following would be the most obvious advantage to optimizing an MTU?A) Guaranteed encryption for all network trafficB) Network prioritization of the most important applicationsC) End-to-end traffic flows without fragmentation overheadD) Data is routed with the fewest hops between networks
C) End-to-end traffic flows without fragmentation overheadConfiguring the correct size of an MTU (Maximum Transmission Unit) provides the ability to communicate between devices without fragmentation of the data.