Topic 6: Mixed Set (11) Flashcards

1
Q
Which of the following is used to assign an IP address to a device?
A. DHCP
B. NTP
C. DNS
D. RADIUS
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following protocols is used to transmit outgoing email?
A. RDP
B. NTP
C. POP3
D. SMTP
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?
A. Channel
B. SSID
C. Firewall rule
D. Encryption
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?
A. Identify the problem.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement preventative measures.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following would Sandy, a technician, find in a network map?
A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following protocols would be used to send email to an email server?
A. NTP
B. FTP
C. SNMP
D. SMTP
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following default ports would need to be open on a firewall to allow remote desktop access?
A. 143
B. 443
C. 3389
D. 8080
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?
A. Punch down tool
B. Cable certifier
C. Loopback plug
D. Toner probe
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?
A. PoE
B. Layer 3 switching
C. STP
D. VLAN
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?
A. The channels are overlapping with other wireless networks and should be changed.
B. The SSIDs are incompatible and should be renamed.
C. The users have incompatible wireless network cards and should upgrade.
D. The default idle period for logoff is too short and should be changed to a longer limit.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets between different subnets based on MAC addresses

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue?
A. Incorrect VLAN tagging
B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?
A. 255.255.255.0
B. 255 255.255.128
C. 255.255.255.192
D. 255.255.255.248
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?
A. The subnet mask is incorrect.
B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.

A

Answer: D

18
Q
Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
A

Answer: A

19
Q
Which of the following is the default subnet mask for a Class B address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
A

Answer: B

20
Q
Which of the following default ports would need to be disabled to block TFTP traffic?
A. 20
B. 21
C. 69
D. 123
A

Answer: C

21
Q
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20
B. 21
C. 22
D. 23
A

Answer: C

22
Q
Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
A

Answer: D

23
Q
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080
A

Answer: D,E

24
Q
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: A

25
Q

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption

A

Answer: C

26
Q
Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?
A. Channel
B. WEP
C. SSID
D. WPA
A

Answer: C

27
Q
Which of the following default services uses TCP/UDP port 88?
A. LDAP
B. IGMP
C. HTTP
D. Kerberos
A

Answer: D

28
Q
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
A. 20
B. 53
C. 80
D. 3389
A

Answer: B

29
Q
Which of the following uses port 53 by default?
A. RDP
B. QoS
C. DHCP
D. DNS
A

Answer: D

30
Q
Which of the following ports does DHCP use? (Select TWO).
A. 22
B. 23
C. 67
D. 68
E. 69
A

Answer: C,D

31
Q
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
A. 23
B. 25
C. 53
D. 80
E. 443
A

Answer: D,E

32
Q
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
A. 21
B. 22
C. 23
D. 25
A

Answer: A

33
Q
Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).
A. 21
B. 22
C. 23
D. 53
E. 67
A

Answer: B,C

34
Q
In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?
A. 20
B. 21
C. 23
D. 25
A

Answer: D

35
Q
A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this?
A. 20
B. 80
C. 143
D. 443
A

Answer: B

36
Q
A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO).
A. 20
B. 80
C. 143
D. 443
E. 8080
A

Answer: B,D

37
Q
An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (Select TWO).
A. Allow UDP port 21 outbound
B. Allow UDP port 22 outbound
C. Allow UDP port 80 outbound
D. Allow TCP port 21 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound
A

Answer: E,F

38
Q
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
A

Answer: D

39
Q
An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).
A. Allow TCP port 23
B. Allow TCP port 25
C. Allow TCP port 110
D. Allow UDP port 25
E. Allow UDP port 110
A

Answer: B,C

40
Q
Which of the following protocols uses port 3389?
A. IMAP
B. DHCP
C. SSH
D. RDP
A

Answer: D