Topic 2: Network Installation & Configuration Flashcards

1
Q
Which of the following standards can operate at either 20MHz or 40MHz channel spacing?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: D
Explanation:
The 2.4 GHz ISM band is fairly congested. With 802.11n, there is the option to double the bandwidth per channel to 40 MHz which results in slightly more than double the data rate. However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band, which in many areas may prove to be infeasible. The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacent channel spaced ±20 MHz away. The primary channel is used for communications with clients incapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean of
the primary and secondary channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
A. The proxy server is set incorrectly.
B. The Ethernet cable is pinched.
C. The network gateway is set incorrectly.
D. The IP address is set incorrectly.

A

Answer: C
Explanation:
When user is able to ping everything in its own subnet that means that all the hosts are reachable however when you are not able to ping anything outside of this subnet then please check if the device is sending traffic to the correct host who should forward it to the further devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
A. Wide Area Network
B. NAT
C. Virtual PBX
D. Virtual LAN
A

Answer: C
Explanation:
Virtual PBX, a business phone system providing call routing, follow-me calling, voice-mail, faxmail, and ACD queues with no customer installed equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
A. Proxy server
B. Traffic shaping
C. Caching engines
D. Load balancing
E. Quality of service
A

Answer: B,E
Explanation:
Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate. QoS (Quality of Service) is a major issue in VOIP implementations. The issue is how to guarantee that packet traffic for a voice or other media connection will not be delayed or dropped due interference from other lower priority traffic.
Things to consider are:
Latency: Delay for packet delivery
Jitter: Variations in delay of packet delivery
Packet loss: Too much traffic in the network causes the network to drop packets
Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?
A. Firewalls
B. VLANs
C. Channels
D. Antenna types
A

Answer: C
Explanation:
Protocol requires 16.25 to 22 MHz of channel separation (as shown above), adjacent channels overlap and will interfere with each other.
Channels 1, 6, and 11 are the most common channels to choose, and most routers will use one of them as the default channel—but the general idea is to be as far away from everybody else as you can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A
Answer: B
Explanation:
The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.)
Hypothetical speed
Range(indoors)
Range(outdoors)
11 Mbits/s
50 m
200 m
5.5 Mbits/s
75 m
300 m
2 Mbits/s
100 m
400 m
1 Mbit/s
150 m
500 m
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
A. STP
B. PoE
C. VTP trunking
D. Port forwarding
A

Answer: B
Explanation:
Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?
A. Incorrect service set identifier
B. Low signal strength or interference
C. Incorrect encryption scheme
D. Incorrect IP address or subnet mask
A

Answer: B
Explanation:
This generally happens when the signals are weak in any particular area and any movement can make you lose connectivity to the internet. In his case you can try to increase the radio power so that the signal strength can be increased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANs
A

Answer: C,E
Explanation:
Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion detection system, passive probe or real user monitoring (RUM) technology that is used to support application performance management (APM).

In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
A. VLAN tag mismatch
B. Wrong subnet mask
C. Smurf attack
D. Faulty routing rule
A

Answer: D
Explanation:
This happens when the DNS server is able to resolve the URL but there can be a conflicting route pointing to somewhere else rather than to the correct device who is responsible for routing traffic to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

During a disaster recovery test, several billing representatives need to be temporarily setup to take
payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.

A

Answer: D
Explanation:
WPA2 is a security technology commonly used on Wi-Fi wireless networks. WPA2 (Wireless Protected Access 2) replaced the original WPA technology on all certified Wi-Fi hardware since 2006 and is based on the IEEE 802.11i technology standard for data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wiring distribution types, often found in company closets, is used to connect
wiring from individual offices to the main LAN cabling?
A. MDF
B. 66 block
C. IDF
D. Patch panel

A

Answer: D
Explanation:
A patch panel, patch bay, patch field or jack field is a number of circuits, usually of the same or similar type, which appear on jacks for monitoring, interconnecting, and testing circuits in a convenient, flexible manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following is the difference between 802.11b and 802.11g?
A. Distance
B. Frequency
C. Speed
D. Transmission power
A

Answer: C
Explanation:
802.11b has a maximum speed of 11Mbps whereas 802.11g has a speed of 54Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following connectors is usable in SFP modules?
A. ST
B. LC
C. LX
D. SX
A

Answer: B
Explanation:
LC connector is used in SFP modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?
A. Incompatible network card
B. Channel overlap
C. Latency
D. WEP encryption
A

Answer: B
Explanation:
To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer’s wireless network to improve connectivity to the wireless network?
A. Change the SSID to match other wireless networks for increased throughput.
B. Change the encryption type to a different mechanism to avoid interference.
C. Change the channel to a different channel than the other wireless networks.
D. Change the WAP to a different manufacturer than the other wireless networks.

A

Answer: C
Explanation:
To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. You can use any other channel instead of the one that you are using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
A. NetBIOS name filtering
B. IP address filtering
C. MAC address filtering
D. Computer name filtering
A

Answer: C
Explanation:
MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
A. Create a MAC filter containing the current users.
B. Turn off SSID broadcast.
C. Change the encryption type to AES 256-bit for current users.
D. Reduce the signal strength to 0 percent.

A

Answer: A
Explanation:
MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
A. WAP placement
B. TX/RX channel
C. Signal strength
D. Transmission power
A

Answer: A
Explanation:
Before going ahead with the deployment, the first thing that need to be check is where you are going to place your wireless router so that you can have internet connectivity from every location that you need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
A. SNMP
B. Network sniffer
C. Syslog
D. System log
E. History log
A

Answer: A,C
Explanation:
Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Syslog is a standard for computer message logging. It permits separation of the software that
generates messages from the system that stores them and the software that reports and analyzes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
A. EAP-PEAP
B. MAC ACL
C. EAP-TTLS
D. MS-CHAPv2
A

Answer: C
Explanation:
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. EAP is an authentication framework providing for the transport and usage of keying material and parameters generated by EAP methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?
A. Low PoE wattage
B. Opposing antenna polarizations
C. Short distance between antennas
D. WPA 2 encryption
A

Answer: B
Explanation:
The polarization of an antenna is the orientation of the electric field (E-plane) of the radio wave with respect to the Earth’s surface and is determined by the physical structure of the antenna and by its orientation. It has nothing in common with antenna directionality terms: “horizontal”, “vertical”, and “circular”. Thus, a simple straight wire antenna will have one polarization when mounted vertically, and a different polarization when mounted horizontally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which of the following is a terminal emulator used to manage a network device?
A. VPN
B. IDS
C. PuTTY
D. IPS
A

Answer: C
Explanation:
PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet and rlogin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?
A. Environmental monitor
B. Multimeter
C. Toner probe
D. Protocol analyzer
A

Answer: D
Explanation:
A “Protocol analyzer” is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
A. Port speed mismatch
B. Faulty F-connectors
C. Bad wiring
D. Bad switch
A

Answer: C
Explanation:
Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

After a new user moves furniture into a cubicle, the computer does not connect to the network any
longer. Which of the following would be the MOST likely reason? (Select TWO).
A. Bad Ethernet switch port
B. TX/RX reversed
C. Bad connectors
D. Bad patch cable
E. Mismatched MTU

A

Answer: C,D
Explanation:
It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following performance benefits would multiple domain controllers BEST provide?
A. Fault tolerance
B. Caching engine
C. Proxy server
D. Quality of service
A

Answer: A
Explanation:
Fault-tolerant design is a design that enables a system to continue its intended operation, possibly at a reduced level, rather than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in response time in the event of some partial failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?
A. The new user is downloading large files.
B. The router failed, flooding the network with beacons.
C. The new user’s IP address is a duplicate.
D. A switching loop was created.

A

Answer: D
Explanation:
A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?
A. ISDN
B. Cable modem
C. DSL
D. Dial-up networking
A

Answer: C
Explanation:
Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
A. Encryption set to Open in all Buildings
B. Encryption set to Open in Building B
C. Encryption set to WEP in Building B
D. Channel set to 11 in Building B

A

Answer: B
Explanation:
Because the building B is in the middle, the wireless access router will have reachability to the building A and C. Now, the only thing that we need to do is to open the Wireless access on B for the guest users for the WAP in B so that the users coming to building A and C can get access to internet using the open connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?
Building ABuilding BBuilding C
Channel: 1Channel: 6Channel: 11
Encryption: WPA2Encryption: OpenEncryption: WPA2
SSID. CorpSSID. GuestSSID. Sales

A. Change Channel in Building B to 7
B. Change Encryption in Building B to match A and C
C. Change Channel in Building C to 1
D. Change SSID in Building C to match Building A

A

Answer: D
Explanation:
The configuration difference between users in building A and C is that they have same encryption however the SSID is different so the user has to manually authenticate and connect to the network whenever he will move between buildings. If the SSID’s are same then he will not have to authenticate himself again and he will get automatic connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).
A. That there is strong encryption enabled and configured on the access point.
B. The user’s home network has a correctly completed WHOIS entry.
C. The access point is broadcasting the SSID based upon manufacturer’s standards.
D. There are no conflicts of channels in use by neighboring wireless networks.
E. There are redundant internal DNS names set in the access point’s settings.
F. That the access point’s MAC address is properly set in its configuration settings.

A

Answer: A,D
Explanation:
Strong encryption is required to keep the user’s internet safe and secure so as to avoid misuse of the internet connection and to ensure that channel conflicts are not there so that the signals do not compete with each other and user start to face intermittent connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
A. man-in-the-middle attack
B. rogue access point
C. evil twin
D. packet sniffer
A

Answer: B
Explanation:
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?
A. VLAN settings
B. History logs
C. Patch cable
D. Port security
A

Answer: C
Explanation:
A patch cable or patch cord or patch lead is an electrical or optical cable used to connect (“patchin”) one electronic or optical device to another for signal routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which of the following can be used to limit wireless network access to a single computer?
A. Configure PPP
B. Packet sniffing
C. MAC address filtering
D. Omni-directional antennas
A

Answer: C
Explanation:
Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your wireless network. You can either permit or prevent specific wireless computers and devices access to your wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions?
A. A VPN concentrator
B. A switch
C. A router
D. A firewall
A

Answer: C
Explanation:
A router is a device which is capable of performing entire task required by the business owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?
A. Run the dig command on the workstation.
B. Run the nslookup command on the workstation.
C. Run the ipconfig command on the workstation.
D. Run the ifconfig command on the workstation.

A

Answer: D
Explanation:
The “ifconfig” command allows the linux/unix operating system to setup network interfaces and allow the user to view information about the configured network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?
A. Alter the domain account login policies to reflect the most common application rule sets.
B. Ensure that the user accounts are properly configured in domain services.
C. Implement a software solution that facilitates single sign-on authentication.
D. Increase the time between mandatory password changes by a factor of three.

A

Answer: C
Explanation:
A single signon permits a user to enter one name and password in order to access multiple applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?
A. Document findings
B. Identify the problem
C. Escalate the problem
D. Establish a plan of action
A

Answer: C
Explanation:
It is better to escalate the problem if you are not aware of the situation as it saves downtime and keeps customer happy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
A. 96W
B. 168W
C. 240W
D. 369.6W
A

Answer: B
Explanation:
The switch supports 168W to power all the phones at full power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?
A. Decrease signal strength on the antenna
B. Change the wireless channel on the WAP
C. Change the device placement to further obfuscate the signal
D. Set up encryption on the WAP and clients

A

Answer: D
Explanation:
The encryption will help the clients and server to uniquely identify themselves in an interfering environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
A. 802.1q
B. Collision avoidance
C. Port mirroring
D. STP
A

Answer: A
Explanation:
Encapsulation is the term associated with 802.1q which is enabled by default on many devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT?
A. Ask the users for more information, such as which applications were not functioning.
B. Power-cycle the switch that the users share to clear out cached DNS records.
C. Escalate the issue to the network administrator to have their domain credentials reset.
D. Close and document the service call, as there was no actual issue affecting the users.

A

Answer: A
Explanation:
Because the system was up and running when the technician reached there, he can ask for applications that were not working or can ask for more information so that he can isolate the problem. Power cycling will not help because the system is already up and recycling can wipe out logs. Escalation will also not help because the system is now up and running. Closing the call will be unfair because the same instance can occur again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?
A. Power-cycle the computers and switches to re-establish the network connection.
B. Re-run the network cabling through the ceiling alongside the lights to prevent interference.
C. Test the wiring in the network jacks for faults using a cable verifier.
D. Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

A

Answer: D
Explanation:
The electric cables create electric field around them and can interrupt in internet connectivity as well. It is quite possible that this is the cause which is creating the connectivity issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
A. MPLS
B. Caching engines
C. QoS
D. Load balancing
A

Answer: C
Explanation:
QoS is the service where you can prioritize traffic running over one protocol as compared to the other. It is very similar to the term where you are opening a VIP queue for allowing that traffic to pass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?
A. Wrong encryption type
B. SSID mismatch
C. Signal bounce
D. Incorrect channel
A

Answer: C
Explanation:
Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Which of the following protocols is MOST commonly associated with VoIP?
A. LDAP
B. HTTPS
C. SIP
D. SCP
A

Answer: C
Explanation:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?
A. nslookup
B. ping
C. traceroute
D. route
A

Answer: C
Explanation:
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Which of the following is needed when using WPA2-Enterprise wireless encryption?
A. TFTP
B. RADIUS
C. LDAP
D. IPSec
A

Answer: B
Explanation:
The WPA2 standard supports two different authentication mechanisms: one using standard RADIUS servers and the other with a shared key, similar to how WEP works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex?
A. Transmission speed
B. Frequency
C. Auto-negotiate
D. Distance
A

Answer: C
Explanation:
Autonegotiation is an Ethernet procedure by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. In this process, the connected devices first share their capabilities regarding these parameters and then choose the highest performance transmission mode they both support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
The DHCP server leases IP addresses 10.162.233.158 to WBAC11 for a period of 14 days. At which of the following times would WBAC11 send an initial request to the DHCP server to renew the IP address lease?
A. Day 4
B. Day 6
C. Day 8
D. Day 10
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
A technician is trying to add another switch to the network with multiple VLANs. Which of the following should the technician configure on the interface to allow multiple VLANs?
A. Mirroring
B. Trunking
C. Authenticating
D. Bonding
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?
A. SSID mismatch
B. Incorrect WPA key
C. Signal bounce
D. Antenna placement
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause?
A. Incorrect VLAN
B. MTU mismatch
C. Hijacked HOSTS file
D. Missing routes
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A consultant is installing new WAPs for an office using wall mounts. Which of the following is the BEST location for the new boxes for signal strength and coverage?
A. Above the suspended ceiling with antennas positioned upward.
B. Close to the floor level to allow the signal to traverse the floor laterally.
C. Close to the suspended ceiling, but not above.
D. Above the suspended ceiling with antennas positioned downward.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A company has multiple WAPs within close proximity to each other to allow users to move about seamlessly through the building with their laptops, without losing any connection. However, this has had the opposite effect, causing any user that is close to two of the access points to constantly reconnect to the wireless network. Which of the following should be changed on all the WAPs to allow this to work as the customer intended?
A. Change the SSID to be unique for each WAP.
B. Change the antenna direction to be unique for each WAP.
C. Change the encryption method to be unique for each WAP.
D. Change the channel to be unique for each WAP.

A

Answer: D

57
Q
A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?
A. Signal strength
B. Interference
C. AP placement
D. Incorrect SSID
A

Answer: D

58
Q

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
A. The spanning tree protocol is preventing the traffic.
B. Port Mirroring is set up incorrectly.
C. The switch needs to be a layer 3 switch.
D. The traffic is in a classless IP range and not classful IP range.

A

Answer: B

59
Q
A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?
A. Disable the SSID.
B. Change the broadcast channel.
C. Lower the signal strength.
D. Change the antennas.
A

Answer: D

60
Q
Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?
A. Reservations
B. Suffixes
C. Leases
D. Gateways
A

Answer: A

61
Q
A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem?
A. Latency
B. Incorrect encryption type
C. EUI-64
D. Incompatible hardware
A

Answer: D

62
Q
An IP address assigned from a DHCP server is said to be which of the following?
A. Hybrid
B. Dynamic
C. Secure
D. Static
A

Answer: B

63
Q

A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?
A. Adjust the signal strength of the access points with minimal coverage overlap.
B. Increase the pool in each of the access points to avoid running out of IPs.
C. Configure each access point to use a different method of encryption than the others.
D. Reconfigure each of the access points so that they broadcast different SSIDs.

A

Answer: A

64
Q

After deploying a network switch, the network administrator is unable to remotely administer the device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue?
Management LAN: 192.168.10.0/24
Management interfacE. 192.168.10.2 255.255.255.0
Default gateway: 192.168.11.1
STP is enabled

A. VLAN assignment
B. Wrong subnet mask
C. Switching loop
D. Wrong gateway

A

Answer: D

65
Q

Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point,
drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this?
A. Reconfigure the access points from 802.11b to 802.11g.
B. Establish procedures which limit user connections during peak hours.
C. Configure the access points so that they all use different SSIDs.
D. Move one or more access points, minimizing signal overlap.

A

Answer: D

66
Q
A technician has set up a wired network IP scheme with the following specifications:
DHCP: 192.168.1.100-150
Gateway: 192.168.1.1
DNS: 192.168.1.1
Which of the following is represented by this addressing scheme?
A. Static
B. QoS
C. Dynamic
D. Dynamic with static reservation
A

Answer: C

67
Q
If a technician does not assign an IP address to a device, the DHCP server will assign the device a:
A. static IP address.
B. reservation.
C. dynamic IP address.
D. MAC address.
A

Answer: C

68
Q

A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users’ PCs with issues all have IP addresses that start with 169.254.x.x. The technician completes the replacement and powers on the new DHCP server. Which of the following is the BEST way to provide the PCs with issues a new IP address?
A. Statically assign a legitimate IP address, and then set the PCs’ NICs to DHCP
B. Inform each user to replace 169.254 with 192.168
C. Wait five minutes until the PC resends a DHCP request
D. Run netstat on each PC and then reboot into safe mode

A

Answer: C

69
Q

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann’s problem?
Computer_ASwitch_A
IP: 10.0.0.60Int VLAN10
SM: 255.255.255.0IP address 10.0.0.1/28
GW: 10.0.0.1Speed 100 Duplex Full
A. Change the duplex on the switch interface to half
B. Change the speed on the switch interface to 10Mbps
C. Change the subnet mask of the computer to 255.255.255.240
D. Change the IP address of the computer to 10.0.0.12

A

Answer: D

70
Q
A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?
A. WPA encryption key selection
B. Channel selection
C. Antenna types
D. Disable SSID
A

Answer: B

71
Q

Which of the following is the reason why a company’s network may contain a DHCP server?
A. To assign IP addresses to devices on the network
B. To convert IP addresses to fully qualified domain names
C. To provide POP3 and IMAP email functionality
D. To allow secure remote access

A

Answer: A

72
Q

Ann, a technician, installs a wireless router in a network closet in a large office. She then
configures all workstations in various offices on that floor to use the wireless connection. Maximum connection speed at each workstation is 54 Mbps. Some users complain that their network connection is very slow. Which of the following is MOST likely the problem?
A. Workstations were configured with the wrong connection speed on the wireless adapter.
B. Users with a slow connection are too far away from the wireless router.
C. Users that cannot connect are configured on the wrong channel.
D. Wireless network SSID is incorrect.

A

Answer: B

73
Q

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?
A. Use two combined Internet/router/wireless devices, one in each house.
B. Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.
C. Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.
D. Use a single combined Internet/router/wireless device at the guest house.

A

Answer: C

74
Q
Which of the following would allow for a specific device to receive the same IP address from a DHCP server?
A. Scope
B. Reservation
C. Suffix
D. Lease
A

Answer: B

75
Q
A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO).
A. Channel
B. Encryption
C. Diversity
D. SSID broadcast
E. Frequency
A

Answer: B,D

76
Q

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed?
A. The network address translation IP range.
B. The signal strength of the router.
C. The DCHP lease time.
D. The number of allowable MAC addresses.

A

Answer: D

77
Q
A technician would like to connect two separate LAN networks at a small business for a short period of time, to share files. The connection needs to be temporary, and is physically impossible using standard network cabling. Which of the following is the BEST way to connect the networks in this situation?
A. Wireless repeater
B. Wireless bridge
C. Bluetooth
D. RADIUS server
A

Answer: B

78
Q
The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?
A. Switch the channel
B. Change frequencies
C. Channel bonding
D. Increase the signal
A

Answer: C

79
Q
A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?
A. Turn down the signal strength
B. Replace the WAP and enable WEP
C. Change both the SSID and WEP key
D. Enable WPA2 encryption
A

Answer: D

80
Q
During a blizzard, a technician decides to work from home but is unable to connect to the company’s network. Which of the following is MOST likely taking place at the office?
A. Switching loop
B. Wrong DNS
C. Power failure
D. Duplicate IP address
A

Answer: C

81
Q
A network administrator needs to deploy seven equally spaced WAPs along an underground tunnel. Which of the following is the BEST channel design to avoid interference?
A. 1, 3, 5, 7, 9, 11, 1
B. 1, 6, 11, 1, 1, 6, 11
C. 1, 11, 1, 11, 1, 11, 1
D. 11, 1, 6, 11, 1, 6, 11
A

Answer: D

82
Q
A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?
A. Scope
B. Reservation
C. Option
D. Lease
A

Answer: C

83
Q
During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?
A. Wrong gateway
B. Failed router
C. Bad switch module
D. Incorrect VLAN
A

Answer: B

84
Q
A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?
A. Duplicate IP addresses
B. Bad GBIC
C. Wrong gateway
D. Switching loop
A

Answer: C

85
Q
Which of the following antenna types has a flat circular radiation pattern?
A. Diversity
B. Yagi
C. Omni
D. Patch
A

Answer: C

86
Q

A new employee was given the following information to connect to the corporate wireless network for the first time:
SSID:CorporateWiFi
Encryption:WPA2
Password:SuperSecret!

The user enters the correct SSID and notices that encryption type or password are not required when configuring the laptop in the office, and the laptop successfully connects to the Internet. When the user brings the laptop to the conference room, a pop-up asks for the CorporateWiFi password. Which of the following is the MOST likely cause of this behavior?

A. The laptop wireless network card is incompatible with the conference room WAP.
B. The office walls prevent the employee from making a full connection.
C. A rogue access point was installed by a company employee.
D. MAC filtering is only enabled in the conference room.

A

Answer: C

87
Q
A network administrator needs to configure a port on the switch that will enable all packets on a particular switch to be monitored. Which of the following would BEST complete this objective?
A. Traffic shaping
B. MAC filtering
C. Port mirroring
D. VLAN trunking
A

Answer: C

88
Q
Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?
A. Wrong default gateway
B. Wrong DNS
C. Switching loop
D. Power failure
A

Answer: D

89
Q
In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).
A. VLAN configuration error
B. Cables too short
C. Cable crosstalk
D. Incorrect channel
E. EMI
F. Wrong subnet mask
A

Answer: C,E

90
Q
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
A. Encryption type
B. SSID
C. IP address
D. Channel
A

Answer: D

91
Q
A network administrator is planning to install wireless access points across the enterprise. Which of the following should be considered when installing at remote locations?
A. PoE
B. BSSID
C. MAC filtering
D. NAT
A

Answer: A

92
Q
A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?
A. Port filtering
B. WEP
C. MAC address filtering
D. PoE
A

Answer: C

93
Q
An office has an 802.11a access point. A technician has been asked to identify devices that are compatible with this AP. Which of the following devices is MOST likely compatible?
A. An 802.1q SOHO router
B. An 802.11b tablet computer
C. An 802.11g laptop
D. An 802.11n smartphone
A

Answer: D

94
Q
Which of the following transmission methods do DHCP enabled devices use to request an IP address?
A. Broadcast
B. Directed broadcast
C. Unicast
D. Multicast
A

Answer: A

95
Q

An administrator notices that a computer on the network is unable to reach any of the servers by hostname. The computer has connectivity to the network and is able to ping all the devices by IP address. Which of the following can cause the error?
A. The workstation has a duplicate IP address.
B. The workstation has been assigned to the wrong VLAN.
C. The workstation has the wrong gateway configured.
D. The workstation has the wrong DNS configured.

A

Answer: D

96
Q

Users are contacting the internal helpdesk, stating that they are having difficulty staying connected to the wireless network. When the technician investigates, it is discovered that the users are having a problem using the wireless network in the company break rooms. Which of the following should the technician do FIRST?
A. Install a new access point in each break room to provide adequate coverage.
B. Remount the access points to a place on the ceiling closer to the break rooms.
C. Unplug appliances (e.g. microwaves) to see if they are causing interference.
D. Change the encryption on the access points from WPA2 to WEP.

A

Answer: C

97
Q
A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?
Access Point 1Access Point 2
802.11g802.11b
Encryption: WPA2Encryption: WEP
Channel: 1Channel: 7
SSID. CompanyWiFiSSID. Visitor

A. Change the SSID on Access Point 2 to OPEN.
B. Disable SSID broadcasting on Access Point 1.
C. Change the encryption on Access Point 2 to WPA2.
D. Remove the WEP encryption from Access Point 2.

A

Answer: D

98
Q

A technician is attempting to set up a new laptop for a user. The user’s old laptop connects to the corporate wireless network “CompanyWiFi” automatically. However, when the technician looks for the “CompanyWiFi” network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user’s desk. Which of the following would MOST likely be the reason that the new laptop cannot see the “CompanyWiFi” network?
A. Loss of signal strength
B. Incorrect WEP key was input
C. RFID interference from other electronic devices
D. SSID broadcasting is disabled on the WAP

A

Answer: D

99
Q
A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?
A. Dipole
B. Parabolic
C. Directional
D. Omni-directional
A

Answer: C

100
Q
A computer configured by DHCP has a listed DNS server and gateway. Which of the following allows these settings to be configured?
A. Reservations
B. Leases
C. Scopes
D. Options
A

Answer: D

101
Q
Which of the following do DHCP servers provide to requesting devices on the network? (Select TWO).
A. Encryption
B. Leases
C. SSID
D. Channels
E. Suffixes
F. VLAN assignments
A

Answer: B,E

102
Q
Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?
A. STP
B. Port Mirroring
C. VLANs
D. PoE
A

Answer: B

103
Q

Joe, a vendor, walks into a customer’s site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site’s wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem?
A. The customer’s wireless router uses WPA encryption.
B. The wireless router at the customer’s site is configured with MAC filtering.
C. The customer’s WAP uses WEP encryption.
D. The customer’s IT department blocks all visitors from connecting to their network.

A

Answer: B

104
Q

Joe, a technician, is attempting to connect two hubs to add a new segment to his local network. He uses one of his CAT5 patch cables to connect them; however, he is unable to reach the new network segment from his workstation. He can only connect to it from a workstation within that segment. Which of the following is MOST likely the problem?
A. One of the hubs is defective.
B. The new hub is powered down.
C. The patch cable needs to be a CAT6 patch cable.
D. The technician used a straight-through cable.

A

Answer: D

105
Q

A technician is troubleshooting a printing issue where some users in an office are unable to print. Which of the following should be the FIRST step in troubleshooting this issue?
A. Reboot each of the workstations
B. Ask users if anything changed in their environment recently
C. Advise users to move to a different office
D. Power cycle the printer

A

Answer: B

106
Q

A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of 802.11g and 802.11n WAPs. Users are not able to view or connect to the 802.11n WAPs. Which of the following is MOST likely the cause?
A. The 802.11g WAPs are not setup for backwards compatibility.
B. The 802.11n WAPs are using a 2.4 GHz frequency channel.
C. The 802.11n WAPs are using a 5 GHz frequency channel.
D. The 802.11g WAPs all have disabled SSID broadcast.

A

Answer: C

107
Q
A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition?
A. Incorrect VLAN assignment
B. Bad or missing routes
C. Switching loop
D. Wrong subnet mask
A

Answer: B

108
Q
Which of the following is a value that can be received from a DHCP server?
A. Bootp server address
B. SMTP server address
C. WWW server address
D. VPN server address
A

Answer: A

109
Q

Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?
A. Conduct a wireless survey of the back warehouse.
B. Ask the vendor that provided the WAP’s for the main warehouse for recommendations.
C. Ask the systems administrator which WAP’s are preferred.
D. Only order WAP’s that support 5GHz channels.

A

Answer: A

110
Q

Joe, a network technician, is tasked with setting up a new wireless network in an office for office
laptops and desktops only. The surrounding offices already have many wireless networks. Joe discovered that over 30 wireless networks were showing up as he completed a wireless survey of the office. Every single one of the networks that Joe was able to see while conducting the wireless survey were 802.11b/g networks. Which of the following should Joe consider before purchasing/installing the new wireless access points?
A. Move the WAP so that it is close to the interior walls.
B. Determine which wireless channels and bands to use to mitigate as much interference as
possible.
C. Turn the SSID broadcasts off to decrease interference.
D. Determine if the business should relocate to a building with a lot less surrounding wireless
networks.

A

Answer: B

111
Q
A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?
A. Increase the number of reservations
B. Increase exclude list
C. Decrease lease times
D. Decrease the scope
A

Answer: C

112
Q
A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?
A. 802.11a with WPA2-Enterprise
B. 802.11n with WPA-PSK
C. 802.11n with WPA2-PSK
D. 802.11g with WPA-Enterprise
A

Answer: D

113
Q

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?
A. Set the VLAN preferences on the host’s NIC
B. Create each VLAN on the host’s virtual switch
C. Change the virtual machine NIC settings from private to bridged
D. Create each VLAN on the host’s gateway router

A

Answer: B

114
Q

A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred?
A. The public IP address of the network has changed.
B. The camera has received a new firmware update.
C. The camera’s secure shell has been disabled.
D. The router has changed the IP of the mobile device.

A

Answer: A

115
Q
A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?
A. Signal strength
B. SSID mismatch
C. Channel mismatch
D. Encryption mismatch
A

Answer: A

116
Q
A technician has determined that calls placed over a wireless connection are breaking up and the speaker’s voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues?
A. Latency
B. Bad GBIC
C. Bad SFP
D. SSID mismatch
A

Answer: A

117
Q
A technician wants to configure multiple switches to support all of the corporate VLANs. Which of the following will allow configuration of the switches and have the information propagate automatically to the other switches?
A. FTP server
B. VTP server
C. Virtual PBX
D. NTP server
A

Answer: B

118
Q
A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?
A. Signal strength latency
B. Bouncing signal
C. Interference
D. Crosstalk
A

Answer: C

119
Q
A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
A. Broadcast storm
B. TX/RX cables reversed
C. Mismatched MTU
D. Incorrect routing table
A

Answer: B

120
Q
A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user’s office. Which of the following would MOST likely cause them to lose their connection?
A. Encryption type
B. Disabled wireless adapter
C. SSID mismatch
D. Interference
A

Answer: D

121
Q
A new SOHO wireless network is set up using two access points with separate SSIDs on the same frequency. However, the users are experiencing intermittent connectivity on both SSIDs. Which of the following is the problem?
A. Wrong DNS
B. SSID mismatch
C. Encryption type
D. Incorrect channel
A

Answer: D

122
Q
A user at a small business states that they cannot connect to the Internet via the company’s wireless network every time their cordless phone rings. Which of the following is MOST likely occurring?
A. Interference
B. Incorrect encryption type
C. Latency
D. SSID mismatch
A

Answer: A

123
Q

A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT?
A. Question users to determine if anything has changed
B. Re-establish theory of probable cause
C. Escalate problem to upper management
D. Document replacement of power supply

A

Answer: B

124
Q

A technician grabs a network cable and connects two switches together. However, the ports fail to come up as indicated by the link lights. Which of the following is MOST likely the issue?
A. Wrong subnet mask on the interfaces
B. Mismatched MTU size
C. Straight through instead of cross over cable
D. SSID mismatch between the switches

A

Answer: C

125
Q
A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?
A. Interference
B. Configuration
C. Incorrect MTU size
D. Incorrect IP
A

Answer: A

126
Q
An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?
A. MIMO
B. AP isolation
C. Channel bonding
D. Burst mode
A

Answer: C

127
Q
A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch?
A. VLAN
B. PoE
C. VTP
D. QoS
A

Answer: D

128
Q
A technician is installing a PoE switch for VoIP phones. Which of the following is the technician MOST likely going to configure on the switch?
A. NAT
B. QoS
C. PAT
D. DHCP
A

Answer: B

129
Q
Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause?
A. Encryption strength
B. SSID mismatch
C. Interference
D. Incompatible NIC
A

Answer: C

130
Q
When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?
A. Denial of service attack
B. MTU black hole
C. Switching loop
D. Defective patch cable
A

Answer: C

131
Q

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue?
A. Configure the main network to Class C
B. Allow for duplicate IP addresses
C. Allow the main network to handle DHCP
D. Create a spanning tree to prevent switching loops

A

Answer: C

132
Q
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review? 
A. Signal strength
B. SSID name
C. WPA2 encryption
D. WEP encryption
A

Answer: A

133
Q
A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?
A. PoE
B. STP
C. NAT
D. VTP
A

Answer: A

134
Q

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?
A. A 12 port unmanaged switch.
B. A wired router with an 8 port switch and a WAN port.
C. A wireless router with an 8 port switch, and a WAN port.
D. A 8 port firewall with one console port.

A

Answer: A

135
Q

A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause?
A. The workstation has been removed from the domain and needs to be re-added in directory services.
B. The workstation is configured to use the IPv4 protocol instead of IPv6.
C. The workstation is configured with an incorrect IP address of the DNS server.
D. The workstation’s DHCP IP address has expired and has assigned itself an APIPA address.

A

Answer: C

136
Q
Linking two or more switches together so that they can share VLAN information is known as which of the following?
A. Port replicating
B. Filtering
C. Trunking
D. Spoofing
A

Answer: C

137
Q

All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When
physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue?
A. STP convergence
B. Power failure
C. Excessive bandwidth usage
D. Broadcast storm

A

Answer: D

138
Q
After a power failure, several users are unable to connect to network devices at the remote office. Which of the following is the MOST likely cause of the issue?
A. Bad cable
B. Missing route
C. Duplicate IP address
D. Switching loop
A

Answer: B