Test 3 Flashcards
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen areas by the microwave. Employees have been reporting intermittent connectivity wen using the wireless network. Which of the following would BEST improve connectivity? A. Disable SSID broadcast B. Increase the signal strength C. Move the access point D. Change the broadcast channel
C. Move the access point
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim? A. Web server B. Syslog C. Network sniffer D. SNMP
C. Network sniffer
Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
B. 255.255.0.0
Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123
C. 69
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a list of host names connected to the network? A. ping B. nbstat C. arp D. msconfig
B. nbstat
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A. Multimode fiber B. CAT6a C. Single mode fiber D. Coaxial
C. Single mode fiber
Which of the following wireless technologies has the LARGEST cell size? A. 802.11a B. 802.3af C. 802.11g D. 802.11i
C. 802.11g
Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity
D. Diversity
Which of the following are available speeds when using 802.11b? (SELECT TWO) A. 1Mb/s B. 5.5 Mb/s C. 6 Mb/s D. 12 Mb/s E. 54 Mb/s
A. 1Mb/s
B. 5.5 Mb/s
RADAR avoidance technologies are built into which of the following technologies? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
A. 802.11a
Which of the following technologies can cause interference for 802.11g? A. RADAR B. 802.11a C. IrDA D. Bluetooth
D. Bluetooth
Which of the following technologies would be used in a large office area that has a lot of the 2.4GHz noise? A. 802.3af B. 802.1q C. 802.11a D. MIMO
C. 802.11a
Which of the following occurs when an antenna gain is increased on an access point? A. Connection speed decrease B. Throughput decreases C. Cell size increases D. Attenuation increases
C. Cell size increases
Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. SPA2 PSK D. WPA Personal
B. 104/128 bit WEP
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST used with remote access? A. PKI B. VPN C. MS-CHAP D. RADIUS
D. RADIUS
Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP
D. SNMP
Which of the following does SNMPv3 BEST provide over previous versions? A. Increased security B. Simplified management C. More data types D. Higher productivity
A. Increased security
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
C. PuTTY
Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this? A. History logs B. Event logs C. Syslog server D. Traffic analyzer
C. Syslog server
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem? A. TX/RX reversed B. Interference C. Cable length D. Bad connectors
A. TX/RX reversed
Users are reporting that internet performance is slow. Jeff, the technician, has determined that the internet connection is saturated. Which of the following is BEST used to detrmine the source, destination, and type of the traffic? A. Netflow B. Protocol analyzer C. Network sniffer D. SNMP
A. Netflow
Which of the following is a valid IPv6 address? A. 4056:958:E486::F8:8962 B. 1596:H593:B5D8::B859 C. 2048::9584:A6B8::0983 D. 4820::0985:489D::8761
A. 4056:958:E486::F8:8962
Which of the following OSI model layers is responsible for the transmission of bits? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
A. Layer 1
Frames ate the protocol Data Unit for which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
Lisa, a network administrator, wants to automatically sign 168.254.1.0/24 addresses to computers of the network. Which of the following will need to be configured? A. DHCP addressing B. Private addressing C.DNS addressing D. APIPA addressing
A. DHCP addressing
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution wold provide the BEST solution? A. Private IP Addressing B. Wireless Access Points C. Wide Area Networking D. Virtual Local Area Networks
B. Wireless Access Points
An oranization is considering migrating a data center to a different operating system. Which of the following could the organization use to try out the new OS before making a wide-scale deployment? A. Virtual PBXs B. Virtual Switches C. Virtual Servers D. Virtual Desktops
C. Virtual Servers
Which of the following servers would MOST likely be placed in a DMZ? A. Proxy Server B. Web Server C. Filer Server D. Intranet Server
B. Web Server
Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zach's location? A. Biometric authentication B. Single sign-on C. 802.1x access control D. Two-factor authentication
B. Single sign-on
IPSec relies on which of the following protocols? (SELECT TWO) A. ESP B. EAP C. AH D. PKI E. RDP
A. ESP
C. AH
Which of the following commands displays the routing table on a server or workstation? A. nbstat B. route C. traceroute D. nmap
B. route
A new firewall was recently installed blocking SMTP traffic. AS a result, no one has internet access. Which of the following has MOST likely occurred? A. Port security is blocking all traffic B. An IDS is blocking all traffic C. Implicit deny is blocking all traffic D. SMTP is blocking all traffic
C. Implicit deny is blocking all traffic
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (SELECT TWO) A. Allow UDP port 21 outbound B. Allow UDP port 22 outbound C. Allow UDP port 80 outbound D. Allow TCP port 21 outbound E. Allow TCP port 22 outbound F. Allow TCP port 80 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound
Lisa, an administrator, must connect o a remote UNIX server security. Which of the following would be the MOST secure connection method? A. FTP B. PPP C. Telnet D. SSH
D. SSH
How many collision domains and broadcast domains are present on a 24-port switch with no VLAN assignments?
A. 1 collision domain, 1 broadcast domain
B. 1 collision domain, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
D. 24 collision domains, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
Which of the following commands could Lisa, a network administrator, use to determine the IP address of a UNIX server? A. ifconfig B. nbstat C. ipconfig D. netstat
A. ifconfig
Users report that an internal web server is not responding. Which of the following commands could be used on the servers to confirm that the web service is running? A. nbstat B. traceroute C. nslookup D. netstat
D. netstat
Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following commands would assistKim in determining the computer name of the workstation? (SELECT TWO) A. nbstat B. net statistics C. traceroute D. netstat E. nslookup
A. nbstat
B. net statistics
When configuring a wireless access point, Zach, a network administrator. needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A. ping B. arp C. route D. dig
B. arp
After a router upgrade, Jeff, the network administrator, needs to determine if the workstations still have the correct default gateway. Which of the following commands would he use? (Select TWO) A. netstat B. ipconfig C. dig D. traceroute E. nbstat
A. netstat
B. ipconfig
Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack? A. Drop 19:21:68:10:20:00 B. Permit ::1/32 C. Permit A0:H1:B0:90:1D:6C D. Drop 192.168.10.20
A. Drop 19:21:68:10:20:00
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS? A. Kerberos B. Two factor authentication C. CHAP D. PKI
D. PKI
After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an internet web server as coming from he router's public interface IP address. Which of the following must Jeff implement to assign a different public IP from the router's public interface IP address to one of the workstations in the office? A. NAT B. PAT C. DMZ D. ACL
A. NAT
Which of the following OSI layers is responsible for encrypting HTTPS traffic? A. 3 B. 4 C. 5 D. 6
D. 6
After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause? A. Cable placement B. Crosstalk C. Bad wiring D. Cable length
D. Cable length
00:12:34:56:78 can be used in which of the following? A. WPA-PSK password B. Channel section C. WEP key D. MAC filtering
A. WPA-PSK password
Lisa, a network administrator, must be implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented? A. WEP B. TKIP C. WPA2 D. WPA Enterprise
C. WPA2
Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason? A. Bad connectors B. TX/RX reversed C. Packet loss D. Distance
D. Distance
Kim, a technician, is stalling network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following s MOST likely the cause? A. Port speed mismatch B. Faulty F-connectors C. Bad wiring D. Bad switch
C. Bad wiring
When running cable in an office building, which of the following should Zach, a technician, consider to help reduce EMI? A. Cable distance B. Cable placement C. Connector types D. PoE devices
B. Cable placement
Lisa, a technician, would like to look at the current configuration of a NIC. Which of the following would she use to view this information? A. ping B. msconfig C. route D. ipconfig
D. ipconfig
Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the following did she MOST likely setup? A. Deep packet inspection B. DDNS C. Port forwarding D. DMZ
C. Port forwarding
Which of the following protocols is used bu the ping command? A. SMTP B. ICMP C. TFTP D. ARP
B. ICMP
Which of the following could be BEST described as a multiple operating systems environments running at the same time on a single physical server? A. Traffic Shaping B. Virtualization C. Load Balancing D. VPN tunneling
B. Virtualization
Which of the following wiring components is used to move the point of entry from a Telco service provider to a different location in a building? A. CSU B. MDF C. Smart jack D. Demarc extension
D. Demarc extension
Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable from Jeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the wire. Which of the following is the MOST probable cause of the intermittent connectivity problems? A. Split cables B. DB loss C. EMI D. TX/RX reversed
A. Split cables
Zach, a user, cannot access the internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?
A. Change the DNS server IP on the client
B. Information gathering
C. Change the workstation IP address
D. Establish a plan of action
B. Information gathering
Kim, a user, has an important video conference at her cubicle in 30 minutes and Wi-Fi is not working on a dedicated laptop. There is an available RJ-45 jack at Kim's cubicle. Which of the following is the FASTEST solution to implement to get Kim working at her cubicle? A. Disable SSID broadcasting B. Move the WAP closer to the user C. Use WEP instead of WPA D. Use a wired connection
D. Use a wired connection
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels? A. MDF B. Caching engines C. Demarc D. IDF
A. MDF
Which of the following is the BEST encryption to use to allow customers to access a secure website from the internet without using VPNs? A. IPSec B. TLS C. SSL version 1 D. SSL version 2
B. TLS
Which of the following wireless security measures, although widely implemented, does not provide strong security? A. IPSec B. WPA2 C. MAC address filtering D. 802.1x
C. MAC address filtering
After Kim, a new user, moves furniture into a cubicle, the computer does not connect any longer. Which of the following would be the MOST likely reason? (Select TWO). A. Bad Ethernet switch port B. TX/RX reversed C. Bad connectors D. Bad patch cable E. Mismatched MTU
C. Bad connectors
D. Bad patch cable
Lisa, a tachnician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?
A. Question users
B. Test the theory
C. Re-establish a theory of probable cause
D. Escalate the problem
D. Escalate the problem
Which of the following connector types would MOST likely be found with an analog phone system utilizing CAT3 cabling? A. BNC B. Sc C. RJ-45 D. RJ-11
D. RJ-11
Kim, a technician, suspects an attacker has accessed he network. Which of the following would BEST hel confirm her theory? A. SNMP B. Traffic analysis C. Network sniffer D. System logs
D. System logs
Zach, a technician, notices a newly installed CAT5 cable if longer than the standard maximum length. Which of the following problems wold this MOST likely cause? A. Split cable B. EMI C. DB loss D. Crosstalk
C. DB loss
Which of the following wiring standards has both ends colored as follows: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown? A. T568A B. T568B C. Multimode fiber D. Crossover
B. T568B
Zach, a technician, working remotely cannot connect to the database server. The server does not respond when he tries to ping it. Zach wants to determine which network device is preventing ping from responding. Which of the following commands should he use to determine this? A. tracert B. nslookup C. dig D. ipconfig
A. tracert
Which of the following could be installed to allow a home user with one desktop computer to economically have internet access in every room in the house? A. Fiber optic B. CAT6 C. Broadband over powerline D. CAT5
C. Broadband over powerline
Which of the following connectors push and twist on? A. ST B. LC C. MTRJ D. SC
A. ST
Which of the following would be used to supply internet to a cable modem? A. RJ-11 connector B. RJ-45 connector C. F-connector D. BNC connector
C. F-connector
Which of the following 802.11 standards transmits the signals the GREATEST distance? A. a B. b C. g D. n
D. n
Which of the following 802.11 standards is MIMO used in? A. a B. b C. g D. n
D. n
After moving office furniture around the user can no longer connect. Which of the following is MOST likely the reason for the problem? A. TX/RX reversed B. Split cables C. Crosstalk D. DB loss
B. Split cables
Which of the following wireless encryption methods provides the LEAST amount of security? A. WEP B. WPA C. WPA2 Enterprise D. WPA PSK
A. WEP
Which of the following wireless authentication methods provides the GREATEST amount of security? A. WEP B. WPA Enterprise WPA Personal D. WPA2 Personal
B. WPA Enterprise
STP prevents which of the following problems? A. Collision domains B. Switching loops C. Broadcast storms D. Routing loops
B. Switching loops
Antenna gain is measured in which of the following units? A. dBi B. GHz C. mW D. MHz
A. dBi
Which of the following fiber types is MOST often used indoors? A. Plenum B. Modal conditioning C. Multimode D. Singlemode
C. Multimode
Which of the following types of fiber connectors is used on SFP? A. MTRJ B. LC C. SC D. ST
B. LC
Horizontal cable is terminated on which device in the wiring closet? A. Demarc B. Switch C. Punch down tool D. Patch panel
D. Patch panel
Which of the following are fiber connectors? (SELECT TWO) A. LC B. MTRJ C. BNC D. T1 E. DB-9
A. LC
B. MTRJ
Which of the following is the standard 802.11g channel separation? A. 11 MHz B. 20 MHz C. 54MHz D. 20 GHz
B. 20 MHz
Which of the following devices is installed by a telecommunications company to deliver a T1 or E1? A. smart jack B. CSU/DSU C. 66 block D. Modem
A. smart jack
Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used? A. PEAP B. WPA Personal C. WPA2 Enterprise D. WPA2 PSK
D. WPA2 PSK
802.3 defines which of the following LAN access methods? A. CSMA/CA B. CSMA/CD C. DSL D. MPLS
B. CSMA/CD
Which of the following technologies allows more than two transceivers with an access point? A. MIMO B. FIFO C. 802.1x D. WPA
A. MIMO
A patch cable terminated with one end as T568A will create which of the following cable types? A. Crossover B. Serial C. Roll over D. Straight through
A. Crossover
Which of the following will a firewall NOT protect the network from? A. Intrusion B. DDoS C. Denial of Service D. Spam e-mails
D. Spam e-mails
Which of the following provides an audit trail of user actions? A. Authorization B. Identification C. Accounting D. Authentication
C. Accounting
Which of the following is a standard measure of signal power? A. MHz B. mips C. dBm D. Gbps
C. dBm
Which of the following would Jeff, a technician, use for service that needs fast communication and is unaffected by packet loss? A. UDP B. ARP C. ICMP D. TCP
A. UDP
Which of the following connectors would be found on a fiber optic cable? A. BNC B. RJ-11 C. RS-232 D. MTRJ
D. MTRJ
Which of the following circuits provides the MOST bandwidth? A. T3 B. OC3 C. T1 D. PRI
B. OC3
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router interfaces. Which of the following is MOST likely used as a source for creating the charts? A. SNMP B. Port scanner C. Traffic sniffer D. SYSLOG
A. SNMP
Which of the following technologies is associated with the DOCSIS standard? A. Cable B. Dialup C. Wireless D. Cellular
A. Cable
Jeff, a network technician, has been asked to add a web server and email server to the company's network. The cmpany's statefull firewall must remain in place to prevent any external originating traffic from entering the internal network segment. Which of the following is the BEST solution to ensure protecting the internal network and implementing the new servers? A. Black all TCP Port 80 traffic B. Enable WPA encryption C. Create DMZ D. Add an implicit deny to the firewall
C. Create DMZ
Which of the following is a contention based broadcast technology used for wireless networking? A. CSMA/CA B. CSMA/CD C. CSU/DSU D. TCP/IP
A. CSMA/CA
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use? A. 100BaseFX B. 10GBaseT C. MPLS D. Coaxial
A. 100BaseFX
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the networks issue? A. ipconfig B. arp C. tracert D. netstat
C. tracert
Which of the following wireless authentication methods provides the GREATEST amount of security? A. WEP B. WPA Enterprise WPA Personal D. WPA2 Personal
B. WPA Enterprise
STP prevents which of the following problems? A. Collision domains B. Switching loops C. Broadcast storms D. Routing loops
B. Switching loops
Antenna gain is measured in which of the following units? A. dBi B. GHz C. mW D. MHz
A. dBi
Which of the following fiber types is MOST often used indoors? A. Plenum B. Modal conditioning C. Multimode D. Singlemode
C. Multimode
Which of the following types of fiber connectors is used on SFP? A. MTRJ B. LC C. SC D. ST
B. LC
Horizontal cable is terminated on which device in the wiring closet? A. Demarc B. Switch C. Punch down tool D. Patch panel
D. Patch panel
Which of the following are fiber connectors? A. LC B. MTRJ C. BNC D. T1 E. DB-9
A. LC
B. MTRJ
Which of the following is the standard 802.11g channel separation? A. 11 MHz B. 20 MHz C. 54MHz D. 20 GHz
B. 20 MHz
Which of the following devices is installed by a telecommunications company to deliver a T1 or E1? A. smart jack B. CSU/DSU C. 66 block D. Modem
A. smart jack
Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used? A. PEAP B. WPA Personal C. WPA2 Enterprise D. WPA2 PSK
D. WPA2 PSK
802.3 defines which of the following LAN access methods? A. CSMA/CA B. CSMA/CD C. DSL D. MPLS
B. CSMA/CD
Which of the following technologies allows more than two transceivers with an access point? A. MIMO B. FIFO C. 802.1x D. WPA
A. MIMO
A patch cable terminated with one end as T568A will create which of the following cable types? A. Crossover B. Serial C. Roll over D. Straight through
A. Crossover
Which of the following will a firewall NOT protect the network from? A. Intrusion B. DDoS C. Denial of Service D. Spam e-mails
D. Spam e-mails
Which of the following provides an audit trail of user actions? A. Authorization B. Identification C. Accounting D. Authentication
C. Accounting
Which of the following is a standard measure of signal power? A. MHz B. mips C. dBm D. Gbps
C. dBm
Which of the following would Jeff, a technician, use for service that needs fast communication and is unaffected by packet loss? A. UDP B. ARP C. ICMP D. TCP
A. UDP
Which of the following connectors would be found on a fiber optic cable? A. BNC B. RJ-11 C. RS-232 D. MTRJ
D. MTRJ
Which of the following circuits provides the MOST bandwidth? A. T3 B. OC3 C. T1 D. PRI
B. OC3
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router interfaces. Which of the following is MOST likely used as a source for creating the charts? A. SNMP B. Port scanner C. Traffic sniffer D. SYSLOG
A. SNMP
Which of the following technologies is associated with the DOCSIS standard? A. Cable B. Dialup C. Wireless D. Cellular
A. Cable
Jeff, a network technician, has been asked to add a web server and email server to the company's network. The cmpany's statefull firewall must remain in place to prevent any external originating traffic from entering the internal network segment. Which of the following is the BEST solution to ensure protecting the internal network and implementing the new servers? A. Black all TCP Port 80 traffic B. Enable WPA encryption C. Create DMZ D. Add an implicit deny to the firewall
C. Create DMZ
Which of the following is a contention based broadcast technology used for wireless networking? A. CSMA/CA B. CSMA/CD C. CSU/DSU D. TCP/IP
A. CSMA/CA
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use? A. 100BaseFX B. 10GBaseT C. MPLS D. Coaxial
A. 100BaseFX
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the networks issue? A. ipconfig B. arp C. tracert D. netstat
C. tracert