Test 1 Flashcards
Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (SELECT TWO)
A. Layer 2 Switch B. MAC Address Filtering C. ACLs D. IIS Server E. Port Scanner F. Firewall
C,F
Which of the following authentication solutions also provides AAA and TCP?
A. TACACS+
B. Kerberos
C. RADIUS
D. RAS
A. TACACS+
Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks? A. Honeynet B. Honeypot C. VUlnerability D. Network based IDS
B. Honeypot
Protocol that uses a three way handshake to transfer information can be found within which layer of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5
C. Layer 4
Which of the following separates broadcast domains? A. Port mirroring B. Router C. Convergence D. Switch
B. Router
Which of the following would Kim, a technician, do to monitor traffice through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2
A. Enable an SNMP agent
Which of the following command can Lisa, a technician, use on a server to display the default router setting? A. Ping B. nslookup C. route D. arp
C. route
Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable? A. nmap B. nbstat C. dig D. arp
C. dig
Which of the following could Kim, a network technician, use to find the approsimate location of a break in a long network cable? A. Protocol analyzer B. Time Domain Reflectometer C. Toner Probe D. Multimeter
B. Time Domain Reflectometer (TDR)
Which of the following protocols is commonly used for VoIP technology? A. Telnet B. SMTP C. SIP D. SNMP
C. SIP
Which of the following can Jeff, a technician, modify on an 802.11n router that is not avialable as an option on an 802.11g device? A. SSID B. Encryption C. Channels D. Spectrum
D. Spectrum
Which of the following technologies could be implemented to improve call clarity when using VoIP technology? A. Static IP Addressing B. Caching engines C. QoS D. Port forwarding
C. QoS
When using high bandwidth applications over multiple WAN connections, which of the following should be used? A Static IP Addressing B. Half-duplex C. PoE devices D. Load balancing
D. Load balancing
When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution
C. Establish a theory of probable cause
D. Document findings, actions, and outcomes.
D. Document findings, actions, and outcomes
Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
A. Verify full system functionality and if applicable implement preventive measures
B. Implement the solution or escalate as necessary
C. Document findings, actions, and outcomes
D. Establish a theory of probable cause (e.g. question the obvious)
B. Implement the solution or escalate as necessary
Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis? A. TDR B. Protocol analyzer C. Multimeter D. Cable crimper
A. TDR
A switch in IDF 3 has shut down at 3 P.M. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem? A. Environmental monitor B. Cable tester C. TDR D. Loopback plug
A. Environmental monitor
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? A. 20 B. 21 C. 22 D. 23
C. 22
Which of the following ports is the default telnet port? A. 20 B. 21 C. 22 D. 23
D. 23
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together? A. Cable tester B. Toner probe C. Cable crimper D. Punch down tool
B. toner probe
Which of the following DNS records would a web browser access to determine the IP address of an internet web page? A. CNAME B. A C. MX D. PTR
B. A
Which of the following is used to prevent Layer 2 switching loops within a local area network? A. STP B. MTU C. EGP D. IGP
A. STP
A bridge handles frames at which of the following layers of the OSI model? A. Network B. Session C. Transport D. Data Link
D. Data Link
Which of the following is a method to prioritize network traffic coming from VoIP phones? A. PAT B. DNS C. SIP D. QoS
D. QoS
Kim, a technician, is installing a switch that does not feature auto-negotiation. WHich of the following characteristics would need to be manually configured? (SELECT TWO) A. MAC addressing B. IP Addressing C. Port speed D. IPv6 addressing E. Duplex
C. Port speed
E. Duplex
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. WHich of the following tools will verify this? A. Cable tester B. Toner probe C. OTDR D. Loopback plug
A. Cable tester
Which of the follwoing technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port mirroring D. Spanning Tree
D. Spanning Tree
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice? A. IS-IS B. BGP C. OSPF D. RIP
B. BGP (border gateway protocol)
Which of the following BEST describes a switch port? A. Broadcast domain B. Distance vector C. Link state D. Collision domain
D. Collision domain
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? A. Loopback plug B. Butt set C. Cable certifier D. Toner probe
D. Butt set
Which of the following can jeff, a network technician, change to help limit war driving? A. Signal strength B. SSID C, Frequency D. Channel
A. Signal strength
In which of the following wireless standars is MIMO used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
D. 802.11n
Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address? A. netstat B. route C. nslookup D. arp
C. nslookup
Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? A. WPA should be enabled B. PKI should be turned off C. WAP SSIDs are matching D. WAPs are transmitting on same channel
C. WAP SSIDs are matching
Which or the following is the usual number of bits for the host identifier part of an IPv6 address? A. 16 B. 32 C. 48 C. 64
C. 64
Which of the following is the prefix for link-local IPv6 address? A. FE80::/10 B. FF000::/8 C. 2FFE::/16 D. FEEF:/12
A. FE80::/10
Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (SELECT TWO) A. Physical B. Session C. Data link D. Network E. Transport
A. Physical
C. Data link
Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server? A. nbstat B. dig command C. ipconfig D. Protocol analyzer
D. Protocol analyzer
DNS lookups for a given host are intermittently failing. Which of the following would KIM, a technician, MOST likely use to verify this problem? A. arp B. nbstat C. traceroute D. dig
D. dig
Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?? A. OTDR B. Protocol analyzer C. Toner probe D. TDR
C. Toner probe