Test 2 Flashcards

1
Q

Which of the following is the common port used for IMAP?

A. 25
B. 53
C. 143
D. 443

A

C. 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Before installing a wireless network, which of the following should Kim, a network technician, take into consideration to reduce signal exposure for war drivers? 
A. Device placement
B. MAC address filtering
C. User authentication
D. Encryption protocols
A

A. Device placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following OSI model layers is between the data link and transport layers?
A. Presentation
B. Physical
C. Session
D. Network
A

D. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following subnet masks would allow for 192.168.0.3 abd 192.168.0.240 to be in the same subnet?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.248
A

A. 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of he following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
A. 20
B. 53
C. 80
D. 3389
A

B. 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is a Class A private IP address?
A. 4.2.2.2
B. 10.1.1.45
C. 169.254.9.15
D. 192.168.0.100
A

B. 10.1.1.45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following services would have assigned the IP address 169.254.1.89?
A. DHCP
B. APIPA
C. IDS
D. DNS
A

B. APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following BEST describes the point at which an ISP's responsibility for an internet conenction ends?
A. Router
B. MDF
C. IDF
D. Demarc
A

D. Demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following defines the range of IP addresses a DHCP server can assign?
A. Scope
B. Lease
C. Reservation
D. Subnet
A

A. Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:

End A: Orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?
A. Re-end the provided cable, keeping the wiring the same
B. Use the provided cable
C. Purchase a crossover cable
D. Purchase a straight-through cable.

A

D. Purchase a straight-through cable.

Straight through- A network cabling that connects a computer to a network device. For example, straight through cables are cables that connect a computer to a network hub, network switch, and network routers. These are the standard network cables you would find at the store, unless labeled as a cross-over cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following command can Zach use to BEST troubleshoot this issue?
A. netsh
B. nslookup
C. ipconfig
D. tracert
A

A. netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
After a brownout, Zach, a user, can connect to the internal network, but not the internet. Which of the following is the company's DSL router experiencing that is causing the issue? 
A. Switching loop
B. Power failure
C. Broadcast storm
D. Duplicate IP address
A

B. Power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lisa, a technician, is asked to install a wireless router in a company’s public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point.

A

C. Block traffic from the wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Lisa, and administrator, attempts to open a web page and sees the following error: 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside? 
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
A

A. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
At which of the following layers does HTML operate?
A. Layer 2
B. Layer 3
C. Layer 5
D. Layer 7
A

D. Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLANs is functioning. At which of the following layers does the problem MOST likely reside?
A. Network
B. Data link
C. Transport
D. Session
A

A. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company has decided to increase wireless infrastructure security by moving WEP encryption to the WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem.
A. The users who cannot are using older NICs without WPA2 support
B. The users who cannot connect are in areas without wireless coverage
C. The users who cannot connect have not been placed in the correct VLAN
D. The users who cannot connect have not specified the correct signal strength.

A

A. The users who cannot are using older NICs without WPA2 support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lisa, a technician, installs a new WAP and users are able to connect, however, users cannot access the internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.

A

B. An incorrect subnet mask has been entered in the WAP configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicated with each other, but are unable to reach the internet. Jeff sees the following information in he switch configuration:

interface VLAN 105
IP address 192.168.105.5 255.255.255.0

Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?
A. The subnet mask is incorrect
B. A routing loop has occurred
C. Jeff used a crossover cable to connect the switch to the gateway
D. The server is missing default-gateway information

A

D. The server is missing default-gateway information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

show run interface GigabitEthernet0/10

Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Zach checks the port connecting the new switch to the core switch and sees the following information:

Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10

Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.

A

B. Speed and duplex have not been set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (238 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
A

B. 100 meters (238 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following DNS record types provides the hostname to IP address mapping?
A. A record
B. NS record
C. CNAME record
D. MX record
A

A. A record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Kim, a user, took a laptop on a vacation and made changes to the configuration in order to use the device at the hotel. She can reach the internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?
A. incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
A

A. incorrect DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?
A. A 110 block
B. A demarc
C. A DB-9
D. A smart jack
A

A. A 110 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Teachers and students at a school currently the same bandwidth. The internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?
A. Increased uptime
B. Caching engines
C. Traffic shaping
D. Load balancing
A

C. Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
A. MS-CHAP
B. Kerberos
C. TACACS+
D. PKI
A

C. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following uses copper wiring?
A. 10GBaseER
B. 10GBaseLW
C. !00BaseFX
D. 1000BaseT
A

D. 1000BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
The location where Telco wiring stops and the clients wiring starts is known as the:
A. MDF
B. demarc
C. IDF
D. 6 block
A

B. demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Which of the following cables cover the LONGEST distance? 
A. 10GBaseT
B. 10GBaseFR
C. 100BaseTX
D. 1000BaseX
A

B. 10GBaseFR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Users report that their internet connection is slow. Zach, the network technician, has suspicion that users are streaming video and music. Which of the following would BEST confirm Zach's theory?
A. Traffic analysis
B. SNMP
C. History Logs
D. System Logs
A

A. Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
A. IP filtering
B. Application filtering
C. MAC filtering
D. Port filtering
A

A. IP filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
A. Packet sniffing
B. Packet filter
C. Stateful inspection
D. Content filter
A

C. Stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (SELECT TWO) 
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
A

A. High availability

B. Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?
A. CAT5e
B. CAT6
C. Coaxial
D. Multimode fiber
A

D. Multimode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
A. CSMA/CA
B. CSMA/CD
C. Wireless encryption
D. Wireless bonding
A

A. CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario?
A. Event logs
B. Baselines
C. Change management
D. Syslog
A

D. Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Kim, a network technician, is installing a new managed 10/100 Mbps switch on the network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer?
A. MAC filtering
B. IP address
C. PoE
D. Port speed
A

D. Port speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?
A. Network maps
B. Cable management documentation
C. Wire schemes
D. Baseline
A

D. Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Jeff, a network technician, arrives to worl and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documentations should Jeff use to attempt to discover the problem?
A. Network maps
B. Change management
C. Baselines
D. Cable management
A

B. Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Lisa, a network technician, needs to push changes out to network devices and also monitor the devices on each device's MIB. Which of the following should she use?
A. SNMP
B. Traffic analysis
C. Syslog
D. Asset management
A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information?
A. History logs
B. Network sniffer
C. Network maps
D. Traffic shaping
A

B. Network sniffer

42
Q
Users have reported slow access time information from a server on the company's network.Which of the following tools would provide access time information on each segment of the network to reach the server?
A. arp
B. route
C. ipconfig
D. tracert
A

D. tracert

43
Q
Jeff, a network technician, is concerned about the environment effects of power consumption and heat from network resources. Limited space is also a concern. Which of the following technologies should be implemented?
A. Circuit switching
B. Network address translation
C. Power over Ethernet
D. Virtual servers
A

D. Virtual servers

44
Q
For security reasons Zach, a network technician, wants to install a Linux based email server, Microsoft web services, and a directory on different servers. Which of the following technologies would be BEST to reduce hardware cost?
A. VPN concentrator
B. Virtual servers
C. Wireless
D. Multimode fiber
A

B. Virtual servers

45
Q
Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets Kim wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?
A. DHCP
B. ARP
C. DNS
D. PING
A

B. ARP- Address Resolution Protocol: is responsible for resolving IP addresses to
Media Access Control (MAC) addresses. When a system attempts to contact
another host, IP first determines whether the other host is on the same network
it is on by looking at the IP address. If IP determines that the destination is on the local network, it consults the ARP cache to see whether it has a corresponding entry. The ARP cache is a table on the local system that stores mappings between data link layer addresses (the MAC address or physical address) and network layer addresses (IP addresses). Following is a sample of the ARP cache:

46
Q
Which of the following OSI layers performs error detection using a Frame Check Sequence?
A. Session
B. Transport
C. Physical
D. Data Link
A

D. Data Link

47
Q
Which of the following VPN methods is BEST used for connecting a remote office to the main company office?
A. WEP-to-WPA
B. RDP-to-RAS
C. CLient-to-site
D. Site-to-site
A

D. Site-to-site

48
Q
Which of the following network optimization methods would be BEST to implement to increase bandwidth for an internal streaming video server?
A. ISDN
B. QoS
C. Upgrade 10baseT
Buffer overflow
A

B. QoS

49
Q
The ISP need to terminate the WANT connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
A. Smartjack
B. MDF
C. VPN
D. 66 block
A

B. MDF

50
Q
Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?
A. Honeypots
B. Virtual switches
C. Virtual PBX
D. Virtual Desktops
A

D. Virtual Desktops

51
Q
Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach's own country. Which of the following security measures could he use to set up this functionality?
A. MAC filtering
B. Port filtering
C. IP filtering
D. TLS
A

C. IP filtering

52
Q
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check for an IP address conflict on the server. Which of the following commands should Lisa use?
A. traceroute
B. tracert
C. ifconfig
D. ipconfig
A

C. ifconfig

53
Q
Network upgrades have been completed and the WINS server was shutdown. It was decided that NETBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
A. Content filtering
B. Port filtering
C. MAC filtering
D. IP filtering
A

B. Port filtering

54
Q
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for the business purposes. Which of the following ports need to be enabled on the firewall? (SELECT TWO)
A. 23
B. 25
C. 53
D. 80
E. 443
A

D. 80

E. 443

55
Q
Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of the following would be the NEXT step in the troubleshooting process?
A. Implement the solution
B. Establish a plan
C. Document findings
D. Escalate the issue
A

D. Escalate the issue

56
Q
Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?
A. 1
B. 5
C. 10
D. 15
A

D. 15

57
Q
Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (SELECT TWO)
A. Cable certifier
B. Multimeter
C. Crimper
D. Punch down tool
E. Loopback plug
A

A. Cable certifier

C. Crimper

58
Q
Which of the following protocols is Kim, a user, utilizing if no handshake or data are required?
A. TCP
B. FTP
C. TFTP
D. UDP
A

D. UDP

59
Q
Jeff, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolve the problem. Jeff, however, does not appear to have the rights to make the needed changes. Which of the following should he do NEXT? 
A. Re-establish a new theory
B. Gather more information
C. Establish a plan of action
D. Escalate the problem
A

D. Escalate the problem

60
Q
A new business' web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?
A. Caching 
B. Asset management
C. Traffic shaping
D. High availability
A

D. High availability

61
Q
A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Lisa, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fir this requirement? 
A. Syslog
B. RADIUS
C. IPSEC
D. Network sniffer
A

A. Syslog

62
Q

Jeff, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement?
A. Set a separate VLAN on each WAP with the same encryption type.
B. Set the SSID on each WAP and set contiguous WAPs to different channels
C. Set the SSID on each WAP and set contiguous WAPs to the same channel.
D. Set a separate VLAN on each WAP with the same frequency.

A

B. Set the SSID on each WAP and set contiguous WAPs to different channels

63
Q
Which of the following should Kim, a technician, update when new computers are purchased?
A. Asset management
B. Change management
C. Cable management
D. Baselines
A

A. Asset management

64
Q
Which of the following would provide Zach, a technician, with a performance reference point to refer back to after hardware repair?
A. Baseline
B. Network map
C. Wire scheme
D. Asset management
A

A. Baseline

65
Q
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
A. 21
B. 22
C. 23
D. 25
A

A. 21

66
Q

Lisa, a network consultant, is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every corner of the house. Which of the following additional information will Lisa need to determine the equipment for the installation? (SELECT TWO)
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house

A

A. The length of the house

D. The building material of the house

67
Q
Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (SELECT TWO)
A. arp
B. dig
C. route
D. nslookup
E. netstat
A

B. dig

D. nslookup

68
Q
Which of the following OSI model layers is between the Network and Session layers?
A. Presentation
B. Data link
C. Transport
D. Physical
A

C. Transport

69
Q
Which of the following DNS records would be required to locate a company's mail server?
A. A
B. MX
C. AAAA
D. CNAME
A

B. MX

70
Q
Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops?
A. RIP
B. OSPF
C. STP
D. EGP
A

C. STP

71
Q

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (SELECT TWO)
A. Change the encryption method to WPA
B. Limit the DHCP scope to only have three addresses total
C. Enable the SSID broadcast
D. Enable and configure MAC filtering
E. Change the broadcast channel to a less commonly used channel

A

A. Change the encryption method to WPA

D. Enable and configure MAC filtering

72
Q
Which of the following network appliances can BEST be described as allowing multiple servers to share requests for a website through the same public IP address?
A. VPN concentrator
B. Content filter
C. Load balancer
D. Proxy server
A

C. Load balancer

73
Q
Which of the following network performance methods would Lisa, a technician, use with SIP phones?
A. CARP
B. Load balancing
C. QoS
D. Caching engines
A

C. QoS

74
Q
Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a poetential security threat. Which of the following can be done to eliminate this threat?
A. Implement WEP encryption
B. Decrease signal strength
C. Change wireless channels
D. Rotate the SSID daily
A

B. Decrease signal strength

75
Q
Which of the following connectors would Kim, A technician, use only for RG-6 cables?
A. F-connector
B. MTRJ
C. RJ-45
D. RS-232
A

A. F-connector

76
Q
Jeff, a network adminstrator, is installing an 802.11n network. Which of the following should he consider FIRST?
A. Placement
B. MAC filtering
C. Channel
D. VTP configuration
A

A. Placement

77
Q
Which of the following technologies implement authentication headers and encapsulating security payloads?
A. IPSec
B. ISAKMP
C. TLS
D. SSL VPN
A

A. IPSec: The IP Security (IPSec) protocol is designed to provide secure communications
between systems. This includes system-to-system communication in the
same network, as well as communication to systems on external networks.
IPSec is an IP layer security protocol that can both encrypt and authenticate
network transmissions. In a nutshell, IPSec is composed of two separate protocols:
Authentication Header (AH) and Encapsulating Security Payload
(ESP). AH provides the authentication and integrity checking for data packets,
and ESP provides encryption services.

78
Q
Jeff, a network administrator, needs to forward HTTP traffic from a firewall public IP to the internal web server's private. IP Which of the following can Jeff implement?
A. DNS
B. NAT
C. PKI
D. RAS
A

B. NAT: The basic principle of NAT is that many computers can “hide” behind a single
IP address. The main reason you need to do this (as pointed out earlier in the section “IP Addressing”) is because there simply aren’t enough IPv4 addresses to go around. Using NAT means that only one registered IP address is needed on the system’s external interface, acting as the gateway between the internal and external networks.

79
Q
Which of the following implements two-factors authentication?
A. Username and password
B. Fingerprint and facial recognition
C. Check card and PIN
D. PIN and password
A

C. Check card and PIN: When two or more access methods are included as part of the authentication
process, you’re implementing a multifactor system. A system that uses any two
items—such as smart cards and passwords—is referred to as a two-factor
authentication system.

80
Q
Which of the following protocols works at the LOWEST layer of the OSI model?
A. L2TP
B. PPTP
C. ISAKMP
D. IPSec
A

A. L2TP

81
Q
Which of the following  protocols security through encryption? (SELECT TWO)
A. PPPoE
B. L2TP
C. IPSec
D. PPP
E. TLS
A

C. IPSec

E. TLS

82
Q
Which of the following records would be used for a Revers DNS lookup?
A. AAAA
B. MX
C. PTR
D. A
A

C. PTR: Pointer (PTR): A pointer to the canonical name, which is used to perform
a reverse DNS lookup, in which case the name is returned when
the query originates with an IP address.

83
Q
Which of the following ports are MOST commonly used to to interactively configure a networking device? (SELECT TWO?
A. 21
B. 22
C. 23
D. 53
E. 67
A

B. 22

C. 23

84
Q
Which of the following protocols is used to resolve FQDNs to IP addresses?
A. SSH
B. FTP
C. DNS
D. HTTP
A

C. DNS

85
Q
IP Address based routing occurs on which of the following layers of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
A

B. Layer 3

86
Q
Data arranged into packets wold be on which of the following layers of the OSI model?
A. Datagram
B. Transport
C. Presentation
D. Network
A

D. Network

87
Q
Which of the following DNS record types is used for IPv6 resolution?
A. MX
B. AAAA
C. A
D. PTR
A

B. AAAA

88
Q
Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
A. Decreasing radio strength
B. MAC filtering
C. WEP encryption
D. SSID broadcast disable
A

A. Decreasing radio strength

89
Q
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?
A. WPA encryption
B. MAC filter
C. Changing antenna type
D. Decreasing radio strength
A

C. Changing antenna type

90
Q
Which of the following protocols has the LEAST overhead and does not use three-way handshake?
A. HTTP
B. FTP
C. HTTPS
D. UDP
A

D. UDP

91
Q
Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a high value of NEXT. Which of the following represent the cause? 
A. Crosstalk
B. TX/RX reversed
C. Split cables
D. DB loss
A

A. Crosstalk

92
Q
Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the clients to the server is successful. Which of the following software tools is used to check if NetBIOS enabled? 
A. netstat
B. arp
C. nbstat
D. nslookup
A

C. nbstat

93
Q
A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (SELECT TWO)
A. Router
B. WiFi Access point
C. Cable Modem
D. Ten WiMAX
E
A

A. Router

B. WiFi Access point

94
Q
In order to reduce spam email. Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?
A. 20
B. 21
C. 23
D. 25
A

D. 25

95
Q
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this?
A. 20
B. 80
C. 143
D. 443
A

B. 80

96
Q
As a best practice, which of the following should be assigned to a network's main server?
A. Lease
B. Dynamic IP address
C. Static IP address
D. Scope
A

C. Static IP address

97
Q

A company’s network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building, which are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?
A. Verify VLAN assignment
B. Verify there is not a duplicate IP address
C. Verify subnet mask
D. Verify the switch has power

A

D. Verify the switch has power

98
Q
A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of he following port numbers should be the only allowed open ports on the firewall to accomplish this? (SELECT TWO)
A. 20
B. 80
C. 143
D. 443
E. 8080
A

B. 80

D. 443

99
Q
An office would like to set up an unsecured wireless network for their customers in their lounge area. Which of the following firewall capabilities should be configured to prevent the wireless traffice from communicating with the office's LAN traffic?
A. NAT
B. Stateful inspection
C. Packet filtering
D. Port security
A

C. Packet filtering

100
Q
Kim, an employee, connects to a work computer from home via built-in Windows remote desktop connection. Which of the following is she MOST likely using to establish the connection?
A. RDP
B. RTP
C. RIP
D. RAS
A

A. RDP

101
Q
A new office's wireless network is causing interference with the medical office's wireless network located next door. Which of the following should be changed to BEST prevent the interference? 
A. Signal strength
B. WEP key 
C. MAC address filtering 
D. WPA encryption
A

A. Signal strength