Test 2 Flashcards
Which of the following is the common port used for IMAP?
A. 25
B. 53
C. 143
D. 443
C. 143
Before installing a wireless network, which of the following should Kim, a network technician, take into consideration to reduce signal exposure for war drivers? A. Device placement B. MAC address filtering C. User authentication D. Encryption protocols
A. Device placement
Which of the following OSI model layers is between the data link and transport layers? A. Presentation B. Physical C. Session D. Network
D. Network
Which of the following subnet masks would allow for 192.168.0.3 abd 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248
A. 255.255.255.0
Which of he following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389
B. 53
Which of the following is a Class A private IP address? A. 4.2.2.2 B. 10.1.1.45 C. 169.254.9.15 D. 192.168.0.100
B. 10.1.1.45
Which of the following services would have assigned the IP address 169.254.1.89? A. DHCP B. APIPA C. IDS D. DNS
B. APIPA
Which of the following BEST describes the point at which an ISP's responsibility for an internet conenction ends? A. Router B. MDF C. IDF D. Demarc
D. Demarc
Which of the following defines the range of IP addresses a DHCP server can assign? A. Scope B. Lease C. Reservation D. Subnet
A. Scope
Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: Orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
Which of the following should Kim do to complete the installation?
A. Re-end the provided cable, keeping the wiring the same
B. Use the provided cable
C. Purchase a crossover cable
D. Purchase a straight-through cable.
D. Purchase a straight-through cable.
Straight through- A network cabling that connects a computer to a network device. For example, straight through cables are cables that connect a computer to a network hub, network switch, and network routers. These are the standard network cables you would find at the store, unless labeled as a cross-over cable.
Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following command can Zach use to BEST troubleshoot this issue? A. netsh B. nslookup C. ipconfig D. tracert
A. netsh
After a brownout, Zach, a user, can connect to the internal network, but not the internet. Which of the following is the company's DSL router experiencing that is causing the issue? A. Switching loop B. Power failure C. Broadcast storm D. Duplicate IP address
B. Power failure
Lisa, a technician, is asked to install a wireless router in a company’s public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point.
C. Block traffic from the wireless access point
Lisa, and administrator, attempts to open a web page and sees the following error: 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? A. Layer 1 B. Layer 4 C. Layer 5 D. Layer 7
A. Layer 1
At which of the following layers does HTML operate? A. Layer 2 B. Layer 3 C. Layer 5 D. Layer 7
D. Layer 7
Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLANs is functioning. At which of the following layers does the problem MOST likely reside? A. Network B. Data link C. Transport D. Session
A. Network
A company has decided to increase wireless infrastructure security by moving WEP encryption to the WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem.
A. The users who cannot are using older NICs without WPA2 support
B. The users who cannot connect are in areas without wireless coverage
C. The users who cannot connect have not been placed in the correct VLAN
D. The users who cannot connect have not specified the correct signal strength.
A. The users who cannot are using older NICs without WPA2 support
Lisa, a technician, installs a new WAP and users are able to connect, however, users cannot access the internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
B. An incorrect subnet mask has been entered in the WAP configuration.
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicated with each other, but are unable to reach the internet. Jeff sees the following information in he switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?
A. The subnet mask is incorrect
B. A routing loop has occurred
C. Jeff used a crossover cable to connect the switch to the gateway
D. The server is missing default-gateway information
D. The server is missing default-gateway information
show run interface GigabitEthernet0/10
Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Zach checks the port connecting the new switch to the core switch and sees the following information:
Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
B. Speed and duplex have not been set.
1000BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet) B. 100 meters (238 feet) C. 500 meters (1640 feet) D. 1000 meters (3280 feet)
B. 100 meters (238 feet)
Which of the following DNS record types provides the hostname to IP address mapping? A. A record B. NS record C. CNAME record D. MX record
A. A record
Kim, a user, took a laptop on a vacation and made changes to the configuration in order to use the device at the hotel. She can reach the internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID
A. incorrect DNS
Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting? A. A 110 block B. A demarc C. A DB-9 D. A smart jack
A. A 110 block
Teachers and students at a school currently the same bandwidth. The internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue? A. Increased uptime B. Caching engines C. Traffic shaping D. Load balancing
C. Traffic shaping
Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement? A. MS-CHAP B. Kerberos C. TACACS+ D. PKI
C. TACACS+
Which of the following uses copper wiring? A. 10GBaseER B. 10GBaseLW C. !00BaseFX D. 1000BaseT
D. 1000BaseT
The location where Telco wiring stops and the clients wiring starts is known as the: A. MDF B. demarc C. IDF D. 6 block
B. demarc
Which of the following cables cover the LONGEST distance? A. 10GBaseT B. 10GBaseFR C. 100BaseTX D. 1000BaseX
B. 10GBaseFR
Users report that their internet connection is slow. Zach, the network technician, has suspicion that users are streaming video and music. Which of the following would BEST confirm Zach's theory? A. Traffic analysis B. SNMP C. History Logs D. System Logs
A. Traffic analysis
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following? A. IP filtering B. Application filtering C. MAC filtering D. Port filtering
A. IP filtering
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following? A. Packet sniffing B. Packet filter C. Stateful inspection D. Content filter
C. Stateful inspection
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (SELECT TWO) A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP
A. High availability
B. Fault tolerance
Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use? A. CAT5e B. CAT6 C. Coaxial D. Multimode fiber
D. Multimode fiber
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding
A. CSMA/CA
Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario? A. Event logs B. Baselines C. Change management D. Syslog
D. Syslog
Kim, a network technician, is installing a new managed 10/100 Mbps switch on the network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer? A. MAC filtering B. IP address C. PoE D. Port speed
D. Port speed
Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use? A. Network maps B. Cable management documentation C. Wire schemes D. Baseline
D. Baseline
Jeff, a network technician, arrives to worl and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documentations should Jeff use to attempt to discover the problem? A. Network maps B. Change management C. Baselines D. Cable management
B. Change management
Lisa, a network technician, needs to push changes out to network devices and also monitor the devices on each device's MIB. Which of the following should she use? A. SNMP B. Traffic analysis C. Syslog D. Asset management
A. SNMP