Topic 4: Network Management Flashcards

1
Q
Which of the following would a technician do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable?
A. nmap
B. nbtstat
C. dig
D. arp
A

Answer: C
Explanation:
The command dig is a tool for querying DNS name servers for information about host addresses, mail exchanges, nameservers, and related information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?
A. ipconfig
B. nslookup
C. dig
D. tracert
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
A. nbstat
B. arp
C. nslookup
D. ipconfig
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
A. Change management
B. System logs
C. Asset management
D. Baselining
A

Answer: A
Explanation: Change management is the request for to change any configuration which is documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
A. Implement preventative measures.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement the solution or escalate as necessary.

A

Answer: C
Explanation:
By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?
A. Redundancy
B. Fault tolerance
C. Unified communications
D. Uptime requirements
A

Answer: C
Explanation: In unified communication video,voice,data have only one end gateway so to given priority to avoid delay in voice and video we use Qos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?
A. Test the theory
B. Establish a plan of action
C. Establish a theory
D. Document findings
A

Answer: D
Explanation:
As to prove the cause of problem documents need to be attached so document finding is the first step after we implemented and diagnosed that problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
A. Verify full system functionality
B. Identify the problem
C. Establish a theory
D. Implement the solution
A

Answer: C
Explanation:
Establish a theory means to correlate the finding and cause of a problem in order to fix the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?
A. Load balancing
B. Quality of service
C. Fault tolerance
D. Traffic shaping
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
A. Change management
B. Baselines
C. Asset management
D. Cable management
A

Answer: A
Explanation:
As soon as technician found a problem he generates a change management request to make changes to fast up the speed of router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?
A. VLAN tags
B. SNMP
C. Packet sniffer
D. Syslog
A

Answer: C
Explanation:
Mirror port just send the packet to the port which is selected to grab the packet of any destination port to capture that packets we need packet sniffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter?
A. Multimode fiber
B. Setting up a new hot site
C. Central KVM system
D. Central UPS system
A

Answer: D
Explanation:
For uninterrupted power supply we need ups as from this no power issue will come and our systems will remain safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
A. dig
B. ipconfig
C. netstat
D. nbtstat
A

Answer: A
Explanation:
The command dig is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?
A. MAC spoofing
B. Dynamic IPs
C. MAC filtering
D. Static IPs
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?
A. Protocol analyzer
B. ipconfig
C. nslookup
D. tracert
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).
A. WEP
B. PoE
C. VLANs
D. SSL VPN
E. IDS
F. QoS
A

Answer: B,C,F
Explanation:
As customer don’t want to use Ac adapter so Power over Ethernet is best option (PoE) as in this switch provide power to phones.Phones will transfer their power requirement via cdp to vlan assigned.And Qos provide the voice packet priority over the data packets to avoid jitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?
A. WINS
B. QoS
C. NAT
D. DHCP
A

Answer: B
Explanation:
Qos provide the voice packet priority over the data packets to avoid jitter and delay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following network protocols is used for a secure command line interface for
management of network devices?
A. SSH
B. TELNET
C. IGMP
D. HTTP
A

Answer: A
Explanation:
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Test the theory to determine a cause.
C. Re-establish a new theory or escalate.
D. Implement the solution or escalate as necessary.

A

Answer: C
Explanation:
As first theorey doesn’t work he will establish a new theorey or escalate it to the vendor hardware company to work on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?
A. SMTP
B. SSH
C. DNS
D. TELNET
A

Answer: A
Explanation: Port no. 25 is assigned to smtp as documented by iana.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following should be used when throughput to the destination network is a priority?
A. MTU
B. Hop count
C. Reliability of the path
D. Bandwidth
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
A. System log
B. History log
C. Network sniffer
D. Nslookup
A

Answer: C
Explanation:
Network sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet’s raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A. Reduce the power input on the replacement servers.
B. Cover the servers with plastic tarps.
C. Purchase twice as many servers to create high availability clusters.
D. Transfer the replacement servers offsite to a data center.

A

Answer: D
Explanation:
As we replace replacement servers offsite to datacenter this will cause lower traffic on over lan and will not cause failure of these server also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?
A. arp
B. ipconfig
C. tracert
D. route
A

Answer: B
Explanation:
As from ipconfig command technician will come to know wheather he has assigned right ip address to NIC or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers?
A. TACACS+
B. SNMP
C. Syslog
D. DOCSIS
A

Explanation:

SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
A. NMAP
B. ping
C. nslookup
D. tracert
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
A. The network cable connecting the NAS to the network switch is bad.
B. The network port that the appliance is connected to is assigned to the wrong VLAN.
C. Port security on the Ethernet switch has disabled the port.
D. Firewall needs to be updated for the new NAS device.

A

Answer: C
Explanation:
As by port security switch find the changes in mac address because nic is replaced so due to security reason switch shut that port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A. Network maps
B. Traffic analysis
C. Syslog
D. ICMP
A

Answer: B
Explanation:
By traffic analysis administrator will come to whether user are using bandwidth for right purpose or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?
A. SMTP
B. SNTP
C. SNMP
D. SNAT
A

Answer: C
Explanation:
SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?
A. ping
B. nbtstat
C. arp
D. msconfig
A

Answer: B
Explanation:
The Nbtstat command is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. The Nbtstat command can also be used to display NetBIOS name tables for both local and remote computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?
A. netstat
B. tracert
C. nbtstat
D. nslookup
A

Answer: A
Explanation:
Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?
A. dig
B. nbtstat
C. netstat
D. ping
A

Answer: D
Explanation:
The Nbstat command is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. The Nbstat command can also be used to display NetBIOS name tables for both local and remote computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
A. Caching
B. VoIP
C. QoS
D. SMTP
A

Answer: C
Explanation:
By Qos we can prioritize the voice packets over data network.So delay and latency will get reduce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).
A. OC3 line with built-in firewall
B. DS3 line with a separate firewall
C. Cable modem with a separate firewall
D. Dial-up modem with separate firewall
E. DSL router with firewall capabilities
A

Answer: C,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based
server?
A. nbtstat
B. ipconfig
C. dig
D. netstat
A

Answer: C
Explanation:
By dig command technician will come to know whether name resolution is happening in correct way or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?
A. netstat
B. ipconfig
C. ping
D. traceroute
A

Answer: B
Explanation:
As ipconfig command will give the information which is assigned to nic for communication so that technician will contact joe with his ip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
A user’s workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors?
A. History Log
B. Application Log
C. System Log
D. Security Log
A

Answer: B
Explanation:
As application logs provide the user wheather application is compatible with system or not.Or what is the cuase which is making trouble.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network?
A. Wire schemes
B. Change management
C. Network diagrams
D. System baselines
A

Answer: D
Explanation:
System baseline is the record line or changes record that administrator keep to match the effect after new configuration with previous configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
A. Access control list
B. Load balancer
C. Content filter
D. Proxy server
A

Answer: B
Explanation:
Load balancing is a computer networking method for distributing workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any one of the resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Which of the following devices can be utilized to monitor and block websites accessible by a company?
A. WINS server
B. DNS server
C. Content filter
D. Reverse proxy
A

Answer: C
Explanation:
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
A. tracert
B. QoS
C. ipconfig
D. MAC filtering
A

Answer: D
Explanation:
By doing MAC filtering technician can block the data coming from a specific mac address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
A. Load balancing internal web servers
B. Redundant network resources
C. Implement fault tolerance on the WAN
D. Implement caching engines
A

Answer: D
Explanation:
A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise’s bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
A. Traffic shaping
B. Proxy server
C. VPN concentrator
D. High availability
A

Answer: A
Explanation:
As traffic shaping will prioritize the video packets over another packets and then video packets will travel fast on bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?
A. Create an ACL on the switches and routers that are dropping SIP and RTP packets.
B. Create a QoS policy prioritizing users over RTP and SIP traffic.
C. Create another VLAN for SIP and RTP traffic.
D. Create a rule to throttle SIP and RTP to 10Kbps or less.

A

Answer: C
Explanation:
As if we will create a vlan for sip and rtp traffic only this traffic will flow from the ports then

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Which of the following is the control when observing network bandwidth patterns over time?
A. Network log
B. Baseline
C. Flow data
D. Interface statistics
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
A. Multimeter
B. OTDR
C. Link state
D. Protocol analyzer
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of the following tools allows an administrator to identify a cable?
A. Multimeter
B. Cable stripper
C. Toner
D. Punch down tool
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed?
A. Load balancing
B. VPN concentrator
C. Caching server
D. Fault tolerance
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue?
A. nslookup
B. ipconfig
C. ping
D. nbtstat
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?
A. Load balancer
B. VPN concentrator
C. Proxy server
D. DNS server
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?
A. nslookup
B. ifconfig
C. dig
D. ipconfig
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future?
A. Change management
B. Cable management
C. Asset management
D. Setting baselines
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
Which of the following syslog severity codes indicates an emergency and that the system is unusable?
A. 0
B. 1
C. 6
D. 7
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
An administrator is attempting to troubleshoot a program that is unable to resolve IP addresses from FQDNs. Which of the following commands is used to check reverse DNS settings?
A. dig
B. ifconfig
C. nbtstat
D. route
A

Answer: A

56
Q
Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?
A. Network intrusion detection
B. Traffic analysis tool
C. Syslog server
D. Network sniffer
A

Answer: C

57
Q
A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance?
A. Caching engine
B. Traffic shaper
C. Network based firewall
D. Packet sniffer
A

Answer: B

58
Q
A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose?
A. QoS
B. PPPoE
C. RADIUS
D. VPN
A

Answer: A

59
Q

Which of the following BEST describes a load balancer?
A. A device that splits traffic between multiple nodes of a clustered service.
B. A device that allows multiple computers to access the internet through a single public IP address.
C. A device that filters internet content based on rules and ACLs.
D. A device that separates users onto separate WAPs for even distribution.

A

Answer: A

60
Q
An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?
A. Run netstat
B. Run dig
C. Run nbtstat
D. Run tracert
A

Answer: A

61
Q
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A. Network maps
B. Traffic analysis
C. Syslog
D. ICMP
A

Answer: B

62
Q
Which of the following should be installed to prevent inappropriate websites from being viewed?
A. Load balancer
B. VPN concentrator
C. Content filter
D. Proxy server
A

Answer: C

63
Q
Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?
A. Content filter
B. VPN concentrator
C. Load balancer
D. Proxy server
A

Answer: A

64
Q
A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address?
A. arp
B. nslookup
C. ipconfig
D. netstat
A

Answer: B

65
Q
A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?
A. nslookup
B. netstat
C. traceroute
D. nbtstat
A

Answer: A

66
Q
A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
A. Change management
B. Asset management
C. Access log
D. Baselines
A

Answer: A

67
Q
Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?
A. QoS
B. CARP
C. VLAN
D. DHCP server
A

Answer: B

68
Q
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
A. DNS server
B. Content filter
C. Proxy server
D. Load balancer
A

Answer: D

69
Q

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?
Querying active state…
TCP Global Parameters
———————————————-
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled
A. net
B. netstat
C. nbtstat
D. netsh

A

Answer: D
Explanation: netsh, or network shell, is a command-line utility included in Microsoft’s Windows NT line of operating systems beginning with Windows 2000. It allows local or remote configuration of network devices such as the interface.

70
Q
Which of the following is used to explain guidelines for users while using network resources?
A. Network cut sheet
B. Baselines
C. Acceptable use policy
D. Regulations
A

Answer: C

71
Q
Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?
A. route
B. netstat
C. traceroute
D. ping 127.0.0.1
A

Answer: C

72
Q
A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?
A. Content filter
B. Packet filter
C. IPS
D. IDS
A

Answer: A

73
Q
Which of the following commands can be used on a server to display IP information for a given interface?
A. nbtstat
B. dig
C. ifconfig
D. msconfig
A

Answer: C

74
Q
Which of the following can determine the last time an address lease was renewed on a network device?
A. System log
B. Packet sniffer
C. Time domain reflectometer
D. Stateful packet filter
A

Answer: A

75
Q
Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?
A. Protocol analyzer
B. Syslog server
C. Packet sniffer
D. IPS logs
A

Answer: B

76
Q
Which of the following switches is used with ARP to display the cache entry for a specific IP
address?
A. -a
B. -d
C. -g
D. -s
A

Answer: A

77
Q
An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used?
A. ifconfig
B. nslookup
C. netstat
D. ipconfig
A

Answer: B

78
Q
A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?
A. Event viewer
B. History logs
C. Network sniffer
D. System logs
A

Answer: B

79
Q
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
A. Port analyzer
B. Multimeter
C. Network sniffer
D. Cable certifier
A

Answer: C

80
Q
A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue?
A. NET USE
B. IPCONFIG
C. TRACEROUTE
D. TELNET
A

Answer: D

81
Q
Which of the following can a technician use when a company implements redundant WAN links?
A. Content filter
B. Load balancer
C. Proxy server
D. VPN concentrator
A

Answer: B

82
Q
Which of the following requires congestion to occur before enabling traffic prioritization?
A. Quality of Service
B. IGMP snooping
C. Flow control
D. WAN optimization
A

Answer: A

83
Q
An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?
A. Phone communications
B. Web site downloads
C. Streaming video clients
D. Client bittorrent abilities
A

Answer: A

84
Q
Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?
A. Load balancing
B. Traffic policing
C. Caching engines
D. Traffic shaping
A

Answer: C

85
Q
A network technician suspects that there is an issue with the routing table on a Windows-based server. Which of the following commands will enable the technician to validate this hypothesis?
A. route print
B. route
C. ipconfig
D. tracert
A

Answer: A

86
Q
The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?
A. Asset management
B. System baselines
C. System logging
D. Change management
A

Answer: D

87
Q
A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?
A. Network maps
B. Change management
C. Log analysis
D. Protocol analyzer
A

Answer: C

88
Q
Which of the following devices acts as a gateway between clients and servers?
A. WINS server
B. Proxy server
C. Content filter
D. DNS server
A

Answer: B

89
Q
An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?
A. Layer 3 managed switch
B. VPN concentrator
C. Load balancer
D. Content filter
A

Answer: D

90
Q
When dealing with high bandwidth applications such as VoIP and VTC, which of the following network performance optimization tools should be implemented to ensure BEST performance?
A. Fault tolerance
B. Load balancing
C. Caching engines
D. QoS
A

Answer: D

91
Q
A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?
A. Traffic shaping
B. QoS
C. Caching engines
D. High availability
A

Answer: D

92
Q
A technician is troubleshooting a network connectivity issue on a laptop. The technician wants to verify the NIC is functioning on the laptop. Which of the following commands should the technician use?
A. ping 127.0.0.1
B. ping 169.254.0.1
C. tracert 192.168.0.1
D. nslookup 10.4.0.1
A

Answer: A

93
Q
A technician is upgrading the wiring in an older office building. The building currently contains some CAT3, CAT5, and CAT6 cables. The technician cannot visually distinguish between the cables because they are all the same color. Which of the following tools would help the technician determine which wires are the CAT3 and CAT5 cables needing to be replaced with CAT6 ones?
A. Cable certifier
B. Toner probe
C. Cable tester
D. Crimper
A

Answer: A

94
Q
A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?
A. Protocol analyzer
B. Punch down tool
C. Multimeter
D. Toner probe
A

Answer: D

95
Q
Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).
A. Cable certifier
B. Ping command
C. Punch down tool
D. Crimper
E. Toner probe
A

Answer: A,C

96
Q
Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?
A. Toner probe
B. Cable tester
C. Punch down
D. Crimper
A

Answer: C

97
Q
The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?
A. Cable tester
B. Buttset
C. Toner probe
D. Cable certifier
A

Answer: B

98
Q
A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?
A. Multimeter
B. Cable tester
C. Lineman's handset
D. Toner probe
A

Answer: C

99
Q
Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted?
A. Environmental monitor
B. OTDR
C. Cable tester
D. Punch down tool
A

Answer: A

100
Q
Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?
A. Cable tester
B. Punch down tool
C. Crimper
D. Multimeter
A

Answer: A

101
Q
An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?
A. Toner probe
B. Loopback plug
C. Protocol analyzer
D. Multimeter
A

Answer: D

102
Q
A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
A. Honeypot
B. Butt set
C. Spyware
D. Blue jacking
A

Answer: B

103
Q
A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO).
A. Toner probe
B. Cable certifier
C. Butt set
D. Crimper
E. Network analyzer
A

Answer: B,D

104
Q
A technician has noticed that the RJ-45 connector on the end of a user’s patch cable was stripped too far back from the connector allowing for cross talk. Which of the following tools would a technician use to attach a new connector to eliminate this issue?
A. Crimper
B. Cable certifier
C. Loopback plug
D. Punch down tool
A

Answer: A

105
Q
A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?
A. Loopback plug
B. Crimper tool
C. Punch down tool
D. Cable tester
A

Answer: C

106
Q
A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?
A. Cable certifier
B. Throughput tester
C. Loopback plug
D. Multimeter
A

Answer: C

107
Q
A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?
(1) 1000 foot CAT6 spool
(1) crimper
(1) 16 port gigabit switch
(20) RJ-45 connectors
(12) RJ-45 wall jacks
(1) \_\_\_\_\_\_\_\_\_\_\_\_
A. Compression tool
B. Punch down tool
C. Network map
D. Multimeter
A

Answer: B

108
Q
There has been an increase in Help Desk tickets related to web portal user accounts being locked out. Which of the following resources would be used to analyze the issue?
A. Router logs
B. Protocol analyzer
C. Firewall logs
D. Application logs
A

Answer: D

109
Q
Which of the following tools would a technician use to determine if a CAT6 patch cable has an open or short?
A. OTDR
B. Cable tester
C. Toner probe
D. Protocol analyzer
A

Answer: B

110
Q
A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?
A. Toner Probe
B. Punch Down Tool
C. Protocol Analyzer
D. Butt Set
A

Answer: D

111
Q
An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed?
A. Proxy Server
B. Load Balancer
C. VPN Concentrator
D. Web-Application Firewall
A

Answer: C

112
Q
A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use?
A. Loopback plug
B. Multimeter
C. Punch down
D. Crimper
A

Answer: C

113
Q
Which of the following configuration management documents is used to describe how a computer performs after initial installation onto a network?
A. Baseline
B. Network map
C. Asset management
D. Installation guide
A

Answer: A

114
Q
When implementing video streaming from the Internet to an always on device, it is best to employ which of the following services to minimize latency issues?
A. QoS
B. EIGRP
C. PPTP
D. OSPF
A

Answer: A

115
Q
A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use?
A. ipconfig /a
B. ping -t
C. ping -a
D. netstat
A

Answer: C

116
Q
A public website using round robin DNS is an example of:
A. load balancing
B. QoS
C. Caching engines
D. Traffic shaping
A

Answer: A

117
Q
The company’s main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following?
A. VPN concentrator
B. Content filter
C. Proxy server
D. Load balancer
A

Answer: D

118
Q
A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?
A. QoS
B. Caching engines
C. Traffic shaping
D. Load balancing
A

Answer: D

119
Q
A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method?
A. Load balancing
B. High availability
C. Caching engines
D. Quality of Service
A

Answer: B

120
Q
An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?
A. Asset management
B. Baselines
C. Network maps
D. Change management
A

Answer: D

121
Q
A workstation on the third floor of the company building is having connectivity issues. The NIC and patch cable have been tested and found to be working properly. Which of the following would MOST likely have the information the administrator would need to locate and test the remaining cabling and connections?
A. Network maps
B. Network baseline
C. Asset management
D. Change management
A

Answer: A

122
Q
Which of the following devices allows for multiple web servers to host the same web page and for traffic to be distributed between them according to some metric?
A. Proxy server
B. VPN concentrator
C. Load balancer
D. Content filter
A

Answer: C

123
Q
An administrator can use packet tags to configure which of the following?
A. VLAN
B. NAT
C. PoE
D. QoS
A

Answer: D

124
Q
An administrator has been experiencing slower than normal performance on a server. The administrator suspects that a developer is currently uploading large files to it from an internal network PC. Which of the following will display established connections to the server on the FTP port?
A. ifconfig
B. nslookup
C. netstat
D. arp
A

Answer: C

125
Q
A content filter is MOST likely installed on which of the following servers?
A. Proxy server
B. TACACS+ server
C. DNS server
D. DHCP server
A

Answer: A

126
Q
Which of the following can be used to prioritize network streams to optimize performance for certain traffic types?
A. VLAN
B. VPN
C. QoS
D. PoE
A

Answer: C

127
Q
A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?
A. Router firewall
B. Ping and traceroute
C. Throughput tester
D. Protocol analyzer
A

Answer: D

128
Q
Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?
A. ipconfig
B. ping
C. sniffer
D. route
A

Answer: C

129
Q
Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?
A. Proxy server
B. Content filter
C. Load balancer
D. VPN concentrator
A

Answer: D

130
Q
A company has a server with redundant power supplies. Which of the following is this an example of?
A. Traffic shaping
B. Caching engines
C. Fault tolerance
D. Load balancing
A

Answer: C

131
Q
A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?
A. Network baseline
B. Tracert
C. System logs
D. Protocol analyzer
A

Answer: C

132
Q
A server that filters traffic between a WAN and a LAN is which of the following?
A. Proxy server
B. RAS server
C. Default gateway
D. Email server
A

Answer: A

133
Q

A technician is troubleshooting a host name being directed to the wrong system. The ‘arp –a’ command line utility is used to identify and display which of the following?
A. All TCP/IP connections and listening ports
B. Internet-to-adapter translation tables
C. Information to help diagnose DNS issues
D. Active sockets and connections

A

Answer: B

134
Q
A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST?
A. Traffic analyzer
B. Network sniffer
C. SNMPv3
D. System logs
A

Answer: A

135
Q
An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?
A. SNMPv3
B. VTP
C. CDP
D. IPSec
A

Answer: A

136
Q

A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host?
A. The network administrator should install and configure a traffic analysis server.
B. The network administrator should install and configure a DMZ server.
C. The network administrator should install and configure a syslog server.
D. The network administrator should install and configure a network sniffer.

A

Answer: C

137
Q
Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?
A. QoS
B. Fault tolerance
C. Load balancing
D. Traffic shaping
A

Answer: D