Test 3 Flashcards

1
Q
A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen areas by the microwave. Employees have been reporting intermittent connectivity wen using the wireless network. Which of the following would BEST improve connectivity?
A. Disable SSID broadcast
B. Increase the signal strength
C. Move the access point
D. Change the broadcast channel
A

C. Move the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim?
A. Web server
B. Syslog
C. Network sniffer
D. SNMP
A

C. Network sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is the default subnet mask for a Class B address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
A

B. 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following default ports would need to be disabled to block TFTP traffic?
A. 20
B. 21
C. 69
D. 123
A

C. 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a list of host names connected to the network?
A. ping
B. nbstat
C. arp
D. msconfig
A

B. nbstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?
A. Multimode fiber
B. CAT6a
C. Single mode fiber
D. Coaxial
A

C. Single mode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following wireless technologies has the LARGEST cell size?
A. 802.11a
B. 802.3af
C. 802.11g
D. 802.11i
A

C. 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is similar to MIMO?
A. WPA
B. SSID
C. PoE
D. Diversity
A

D. Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following are available speeds when using 802.11b? (SELECT TWO)
A. 1Mb/s
B. 5.5 Mb/s
C. 6 Mb/s
D. 12 Mb/s
E. 54 Mb/s
A

A. 1Mb/s

B. 5.5 Mb/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
RADAR avoidance technologies are built into which of the following technologies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11i
A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following technologies can cause interference for 802.11g?
A. RADAR
B. 802.11a
C. IrDA
D. Bluetooth
A

D. Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following technologies would be used in a large office area that has a lot of the 2.4GHz noise?
A. 802.3af
B. 802.1q
C. 802.11a
D. MIMO
A

C. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following occurs when an antenna gain is increased on an access point?
A. Connection speed decrease
B. Throughput decreases
C. Cell size increases
D. Attenuation increases
A

C. Cell size increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which encryption type uses only a 28 character key?
A. 40/64 bit WEP
B. 104/128 bit WEP
C. SPA2 PSK
D. WPA Personal
A

B. 104/128 bit WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST used with remote access?
A. PKI
B. VPN
C. MS-CHAP
D. RADIUS
A

D. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following uses a Management Information Base (MIB) to monitor the network?
A. History Logs
B. Syslog
C. SMTP
D. SNMP
A

D. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following does SNMPv3 BEST provide over previous versions?
A. Increased security
B. Simplified management
C. More data types
D. Higher productivity
A

A. Increased security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following is a terminal emulator used to manage a network device?
A. VPN
B. IDS
C. PuTTY
D. IPS
A

C. PuTTY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this?
A. History logs
B. Event logs
C. Syslog server
D. Traffic analyzer
A

C. Syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem?
A. TX/RX reversed
B. Interference
C. Cable length
D. Bad connectors
A

A. TX/RX reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Users are reporting that internet performance is slow. Jeff, the technician, has determined that the internet connection is saturated. Which of the following is BEST used to detrmine the source, destination, and type of the traffic?
A. Netflow
B. Protocol analyzer
C. Network sniffer
D. SNMP
A

A. Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following is a valid IPv6 address?
A. 4056:958:E486::F8:8962
B. 1596:H593:B5D8::B859
C. 2048::9584:A6B8::0983
D. 4820::0985:489D::8761
A

A. 4056:958:E486::F8:8962

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which of the following OSI model layers is responsible for the transmission of bits?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

A. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Frames ate the protocol Data Unit for which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Lisa, a network administrator, wants to automatically sign 168.254.1.0/24 addresses to computers of the network. Which of the following will need to be configured?
A. DHCP addressing
B. Private addressing
C.DNS addressing
D. APIPA addressing
A

A. DHCP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution wold provide the BEST solution?
A. Private IP Addressing
B. Wireless Access Points
C. Wide Area Networking
D. Virtual Local Area Networks
A

B. Wireless Access Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
An oranization is considering migrating a data center to a different operating system. Which of the following could the organization use to try out the new OS before making a wide-scale deployment?
A. Virtual PBXs
B. Virtual Switches
C. Virtual Servers
D. Virtual Desktops
A

C. Virtual Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which of the following servers would MOST likely be placed in a DMZ?
A. Proxy Server
B. Web Server
C. Filer Server
D. Intranet Server
A

B. Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Zach, a user, logs into a system and automatically has access to other network resources without having to log in again. Which of the following is MOST likely implemented at Zach's location?
A. Biometric authentication
B. Single sign-on
C. 802.1x access control
D. Two-factor authentication
A

B. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
IPSec relies on which of the following protocols? (SELECT TWO)
A. ESP
B. EAP
C. AH
D. PKI
E. RDP
A

A. ESP

C. AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following commands displays the routing table on a server or workstation?
A. nbstat
B. route
C. traceroute
D. nmap
A

B. route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
A new firewall was recently installed blocking SMTP traffic. AS a result, no one has internet access. Which of the following has MOST likely occurred?
A. Port security is blocking all traffic
B. An IDS is blocking all traffic
C. Implicit deny is blocking all traffic
D. SMTP is blocking all traffic
A

C. Implicit deny is blocking all traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (SELECT TWO)
A. Allow UDP port 21 outbound
B. Allow UDP port 22 outbound
C. Allow UDP port 80 outbound
D. Allow TCP port 21 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound
A

E. Allow TCP port 22 outbound

F. Allow TCP port 80 outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Lisa, an administrator, must connect o a remote UNIX server security. Which of the following would be the MOST secure connection method?
A. FTP
B. PPP
C. Telnet
D. SSH
A

D. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How many collision domains and broadcast domains are present on a 24-port switch with no VLAN assignments?
A. 1 collision domain, 1 broadcast domain
B. 1 collision domain, 24 broadcast domains
C. 24 collision domains, 1 broadcast domain
D. 24 collision domains, 24 broadcast domains

A

C. 24 collision domains, 1 broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following commands could Lisa, a network administrator, use to determine the IP address of a UNIX server?
A. ifconfig
B. nbstat
C. ipconfig
D. netstat
A

A. ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Users report that an internal web server is not responding. Which of the following commands could be used on the servers to confirm that the web service is running?
A. nbstat
B. traceroute
C. nslookup
D. netstat
A

D. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following commands would assistKim in determining the computer name of the workstation? (SELECT TWO)
A. nbstat
B. net statistics
C. traceroute
D. netstat
E. nslookup
A

A. nbstat

B. net statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
When configuring a wireless access point, Zach, a network administrator. needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?
A. ping
B. arp
C. route
D. dig
A

B. arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
After a router upgrade, Jeff, the network administrator, needs to determine if the workstations still have the correct default gateway. Which of the following commands would he use? (Select TWO)
A. netstat
B. ipconfig
C. dig
D. traceroute
E. nbstat
A

A. netstat

B. ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack?
A. Drop 19:21:68:10:20:00
B. Permit ::1/32
C. Permit A0:H1:B0:90:1D:6C
D. Drop 192.168.10.20
A

A. Drop 19:21:68:10:20:00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?
A. Kerberos
B. Two factor authentication
C. CHAP
D. PKI
A

D. PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an internet web server as coming from he router's public interface IP address. Which of the following must Jeff implement to assign a different public IP from the router's public interface IP address to one of the workstations in the office?
A. NAT
B. PAT
C. DMZ
D. ACL
A

A. NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following OSI layers is responsible for encrypting HTTPS traffic?
A. 3
B. 4
C. 5
D. 6
A

D. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause?
A. Cable placement
B. Crosstalk
C. Bad wiring
D. Cable length
A

D. Cable length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
00:12:34:56:78 can be used in which of the following?
A. WPA-PSK password
B. Channel section
C. WEP key
D. MAC filtering
A

A. WPA-PSK password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Lisa, a network administrator, must be implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented?
A. WEP
B. TKIP
C. WPA2
D. WPA Enterprise
A

C. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason?
A. Bad connectors
B. TX/RX reversed
C. Packet loss
D. Distance
A

D. Distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Kim, a technician, is stalling network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following s MOST likely the cause?
A. Port speed mismatch
B. Faulty F-connectors
C. Bad wiring
D. Bad switch
A

C. Bad wiring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
When running cable in an office building, which of the following should Zach, a technician, consider to help reduce EMI? 
A. Cable distance
B. Cable placement
C. Connector types
D. PoE devices
A

B. Cable placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
Lisa, a technician, would like to look at the current configuration of a NIC. Which of the following would she use to view this information?
A. ping
B. msconfig
C. route
D. ipconfig
A

D. ipconfig

52
Q
Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the following did she MOST likely setup?
A. Deep packet inspection
B. DDNS
C. Port forwarding
D. DMZ
A

C. Port forwarding

53
Q
Which of the following protocols is used bu the ping command?
A. SMTP
B. ICMP
C. TFTP
D. ARP
A

B. ICMP

54
Q
Which of the following could be BEST described as a multiple operating systems environments running at the same time on a single physical server?
A. Traffic Shaping
B. Virtualization
C. Load Balancing
D. VPN tunneling
A

B. Virtualization

55
Q
Which of the following wiring components is used to move the point of entry from a Telco service provider to a different location in a building?
A. CSU
B. MDF
C. Smart jack
D. Demarc extension
A

D. Demarc extension

56
Q
Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable from Jeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the wire. Which of the following is the MOST probable cause of the intermittent connectivity problems? 
A. Split cables
B. DB loss
C. EMI
D. TX/RX reversed
A

A. Split cables

57
Q

Zach, a user, cannot access the internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?
A. Change the DNS server IP on the client
B. Information gathering
C. Change the workstation IP address
D. Establish a plan of action

A

B. Information gathering

58
Q
Kim, a user, has an important video conference at her cubicle in 30 minutes and Wi-Fi is not working on a dedicated laptop. There is an available RJ-45 jack at Kim's cubicle. Which of the following is the FASTEST solution to implement to get Kim working at her cubicle?
A. Disable SSID broadcasting
B. Move the WAP closer to the user
C. Use WEP instead of WPA
D. Use a wired connection
A

D. Use a wired connection

59
Q
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?
A. MDF
B. Caching engines
C. Demarc
D. IDF
A

A. MDF

60
Q
Which of the following is the BEST encryption to use to allow customers to access a secure website from the internet without using VPNs?
A. IPSec
B. TLS
C. SSL version 1
D. SSL version 2
A

B. TLS

61
Q
Which of the following wireless security measures, although widely implemented, does not provide strong security? 
A. IPSec
B. WPA2
C. MAC address filtering
D. 802.1x
A

C. MAC address filtering

62
Q
After Kim, a new user, moves furniture into a cubicle, the computer does not connect any longer. Which of the following would be the MOST likely reason? (Select TWO).
A. Bad Ethernet switch port
B. TX/RX reversed
C. Bad connectors
D. Bad patch cable
E. Mismatched MTU
A

C. Bad connectors

D. Bad patch cable

63
Q

Lisa, a tachnician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?
A. Question users
B. Test the theory
C. Re-establish a theory of probable cause
D. Escalate the problem

A

D. Escalate the problem

64
Q
Which of the following connector types would MOST likely be found with an analog phone system utilizing CAT3 cabling?
A. BNC
B. Sc
C. RJ-45
D. RJ-11
A

D. RJ-11

65
Q
Kim, a technician, suspects an attacker has accessed he network. Which of the following would BEST hel confirm her theory?
A. SNMP
B. Traffic analysis
C. Network sniffer
D. System logs
A

D. System logs

66
Q
Zach, a technician, notices a newly installed CAT5 cable if longer than the standard maximum length. Which of the following problems wold this MOST likely cause? 
A. Split cable
B. EMI
C. DB loss
D. Crosstalk
A

C. DB loss

67
Q
Which of the following wiring standards has both ends colored as follows: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown?
A. T568A
B. T568B
C. Multimode fiber
D. Crossover
A

B. T568B

68
Q
Zach, a technician, working remotely cannot connect to the database server. The server does not respond when he tries to ping it. Zach wants to determine which network device is preventing ping from responding. Which of the following commands should he use to determine this? 
A. tracert
B. nslookup
C. dig
D. ipconfig
A

A. tracert

69
Q
Which of the following could be installed to allow a home user with one desktop computer to economically have internet access in every room in the house?
A. Fiber optic
B. CAT6
C. Broadband over powerline
D. CAT5
A

C. Broadband over powerline

70
Q
Which of the following connectors push and twist on?
A. ST
B. LC
C. MTRJ
D. SC
A

A. ST

71
Q
Which of the following would be used to supply internet to a cable modem? 
A. RJ-11 connector
B. RJ-45 connector
C. F-connector
D. BNC connector
A

C. F-connector

72
Q
Which of the following 802.11 standards transmits the signals the GREATEST distance?
A. a
B. b
C. g
D. n
A

D. n

73
Q
Which of the following 802.11 standards is MIMO used in?
A. a
B. b
C. g
D. n
A

D. n

74
Q
After moving office furniture around the user can no longer connect. Which of the following is MOST likely the reason for the problem?
A. TX/RX reversed
B. Split cables
C. Crosstalk
D. DB loss
A

B. Split cables

75
Q
Which of the following wireless encryption methods provides the LEAST amount of security?
A. WEP
B. WPA
C. WPA2 Enterprise
D. WPA PSK
A

A. WEP

76
Q
Which of the following wireless authentication methods provides the GREATEST amount of security?
A. WEP
B. WPA Enterprise
WPA Personal
D. WPA2 Personal
A

B. WPA Enterprise

77
Q
STP prevents which of the following problems?
A. Collision domains
B. Switching loops
C. Broadcast storms
D. Routing loops
A

B. Switching loops

78
Q
Antenna gain is measured in which of the following units?
A. dBi
B. GHz
C. mW
D. MHz
A

A. dBi

79
Q
Which of the following fiber types is MOST often used indoors?
A. Plenum
B. Modal conditioning
C. Multimode
D. Singlemode
A

C. Multimode

80
Q
Which of the following types of fiber connectors is used on SFP?
A. MTRJ
B. LC
C. SC
D. ST
A

B. LC

81
Q
Horizontal cable is terminated on which device in the wiring closet?
A. Demarc
B. Switch
C. Punch down tool
D. Patch panel
A

D. Patch panel

82
Q
Which of the following are fiber connectors? (SELECT TWO)
A. LC
B. MTRJ
C. BNC
D. T1
E. DB-9
A

A. LC

B. MTRJ

83
Q
Which of the following is the standard 802.11g channel separation?
A. 11 MHz
B. 20 MHz
C. 54MHz
D. 20 GHz
A

B. 20 MHz

84
Q
Which of the following devices is installed by a telecommunications company to deliver a T1 or E1?
A. smart jack
B. CSU/DSU
C. 66 block
D. Modem
A

A. smart jack

85
Q
Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?
A. PEAP
B. WPA Personal
C. WPA2 Enterprise
D. WPA2 PSK
A

D. WPA2 PSK

86
Q
802.3 defines which of the following LAN access methods?
A. CSMA/CA
B. CSMA/CD
C. DSL
D. MPLS
A

B. CSMA/CD

87
Q
Which of the following technologies allows more than two transceivers with an access point?
A. MIMO
B. FIFO
C. 802.1x
D. WPA
A

A. MIMO

88
Q
A patch cable terminated with one end as T568A will create which of the following cable types? 
A. Crossover
B. Serial
C. Roll over
D. Straight through
A

A. Crossover

89
Q
Which of the following will a firewall NOT protect the network from?
A. Intrusion
B. DDoS
C. Denial of Service
D. Spam e-mails
A

D. Spam e-mails

90
Q
Which of the following provides an audit trail of user actions?
A. Authorization
B. Identification
C. Accounting
D. Authentication
A

C. Accounting

91
Q
Which of the following is a standard measure of signal power?
A. MHz
B. mips
C. dBm
D. Gbps
A

C. dBm

92
Q
Which of the following would Jeff, a technician, use for service that needs fast communication and is unaffected by packet loss?
A. UDP
B. ARP
C. ICMP
D. TCP
A

A. UDP

93
Q
Which of the following connectors would be found on a fiber optic cable?
A. BNC
B. RJ-11
C. RS-232
D. MTRJ
A

D. MTRJ

94
Q
Which of the following circuits provides the MOST bandwidth?
A. T3
B. OC3
C. T1
D. PRI
A

B. OC3

95
Q
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router interfaces. Which of the following is MOST likely used as a source for creating the charts?
A. SNMP
B. Port scanner
C. Traffic sniffer
D. SYSLOG
A

A. SNMP

96
Q
Which of the following technologies is associated with the DOCSIS standard?
A. Cable 
B. Dialup
C. Wireless
D. Cellular
A

A. Cable

97
Q
Jeff, a network technician, has been asked to add a web server and email server to the company's network. The cmpany's statefull firewall must remain in place to prevent any external originating traffic from entering the internal network segment. Which of the following is the BEST solution to ensure protecting the internal network and implementing the new servers?
A. Black all TCP Port 80 traffic
B. Enable WPA encryption
C. Create DMZ
D. Add an implicit deny to the firewall
A

C. Create DMZ

98
Q
Which of the following is a contention based broadcast technology used for wireless networking?
A. CSMA/CA
B. CSMA/CD
C. CSU/DSU
D. TCP/IP
A

A. CSMA/CA

99
Q
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use?
A. 100BaseFX
B. 10GBaseT
C. MPLS
D. Coaxial
A

A. 100BaseFX

100
Q
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the networks issue?
A. ipconfig
B. arp
C. tracert
D. netstat
A

C. tracert

101
Q
Which of the following wireless authentication methods provides the GREATEST amount of security?
A. WEP
B. WPA Enterprise
WPA Personal
D. WPA2 Personal
A

B. WPA Enterprise

102
Q
STP prevents which of the following problems?
A. Collision domains
B. Switching loops
C. Broadcast storms
D. Routing loops
A

B. Switching loops

103
Q
Antenna gain is measured in which of the following units?
A. dBi
B. GHz
C. mW
D. MHz
A

A. dBi

104
Q
Which of the following fiber types is MOST often used indoors?
A. Plenum
B. Modal conditioning
C. Multimode
D. Singlemode
A

C. Multimode

105
Q
Which of the following types of fiber connectors is used on SFP?
A. MTRJ
B. LC
C. SC
D. ST
A

B. LC

106
Q
Horizontal cable is terminated on which device in the wiring closet?
A. Demarc
B. Switch
C. Punch down tool
D. Patch panel
A

D. Patch panel

107
Q
Which of the following are fiber connectors?
A. LC
B. MTRJ
C. BNC
D. T1
E. DB-9
A

A. LC

B. MTRJ

108
Q
Which of the following is the standard 802.11g channel separation?
A. 11 MHz
B. 20 MHz
C. 54MHz
D. 20 GHz
A

B. 20 MHz

109
Q
Which of the following devices is installed by a telecommunications company to deliver a T1 or E1?
A. smart jack
B. CSU/DSU
C. 66 block
D. Modem
A

A. smart jack

110
Q
Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?
A. PEAP
B. WPA Personal
C. WPA2 Enterprise
D. WPA2 PSK
A

D. WPA2 PSK

111
Q
802.3 defines which of the following LAN access methods?
A. CSMA/CA
B. CSMA/CD
C. DSL
D. MPLS
A

B. CSMA/CD

112
Q
Which of the following technologies allows more than two transceivers with an access point?
A. MIMO
B. FIFO
C. 802.1x
D. WPA
A

A. MIMO

113
Q
A patch cable terminated with one end as T568A will create which of the following cable types? 
A. Crossover
B. Serial
C. Roll over
D. Straight through
A

A. Crossover

114
Q
Which of the following will a firewall NOT protect the network from?
A. Intrusion
B. DDoS
C. Denial of Service
D. Spam e-mails
A

D. Spam e-mails

115
Q
Which of the following provides an audit trail of user actions?
A. Authorization
B. Identification
C. Accounting
D. Authentication
A

C. Accounting

116
Q
Which of the following is a standard measure of signal power?
A. MHz
B. mips
C. dBm
D. Gbps
A

C. dBm

117
Q
Which of the following would Jeff, a technician, use for service that needs fast communication and is unaffected by packet loss?
A. UDP
B. ARP
C. ICMP
D. TCP
A

A. UDP

118
Q
Which of the following connectors would be found on a fiber optic cable?
A. BNC
B. RJ-11
C. RS-232
D. MTRJ
A

D. MTRJ

119
Q
Which of the following circuits provides the MOST bandwidth?
A. T3
B. OC3
C. T1
D. PRI
A

B. OC3

120
Q
Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and router interfaces. Which of the following is MOST likely used as a source for creating the charts?
A. SNMP
B. Port scanner
C. Traffic sniffer
D. SYSLOG
A

A. SNMP

121
Q
Which of the following technologies is associated with the DOCSIS standard?
A. Cable 
B. Dialup
C. Wireless
D. Cellular
A

A. Cable

122
Q
Jeff, a network technician, has been asked to add a web server and email server to the company's network. The cmpany's statefull firewall must remain in place to prevent any external originating traffic from entering the internal network segment. Which of the following is the BEST solution to ensure protecting the internal network and implementing the new servers?
A. Black all TCP Port 80 traffic
B. Enable WPA encryption
C. Create DMZ
D. Add an implicit deny to the firewall
A

C. Create DMZ

123
Q
Which of the following is a contention based broadcast technology used for wireless networking?
A. CSMA/CA
B. CSMA/CD
C. CSU/DSU
D. TCP/IP
A

A. CSMA/CA

124
Q
Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) from the IDF. Which of the following LAN technologies would be BEST to use?
A. 100BaseFX
B. 10GBaseT
C. MPLS
D. Coaxial
A

A. 100BaseFX

125
Q
Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the networks issue?
A. ipconfig
B. arp
C. tracert
D. netstat
A

C. tracert