Topic 6: Mixed Set (14) Flashcards
1
Q
Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN
A
Answer: D
2
Q
A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block? A. Protocol analyzer B. Multimeter C. Punch down tool D. Toner probe
A
Answer: D
3
Q
Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to the corresponding switch's SFP at the MDF. Which of the following is the MOST likely cause? A. A crossover cable is being used. B. DB loss is too high on all strands. C. Only TX or RX strand is working. D. TX and RX are reversed.
A
Answer: C
4
Q
Which of the following is the correct representation of an IPv6 address? A. :: B. 0:0:0:0:0:0:0:0:1 C. 1:2:3:4:AB:CD:EF D. 2001::4860:800f::
A
Answer: A
5
Q
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spartial reuse D. 20MHz channel spacing
A
Answer: A
6
Q
Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues? A. Network map B. Cable management C. Change management D. Asset management
A
Answer: C
7
Q
The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called: A. CARP B. QoS C. Traffic shaping. D. Fault tolerance.
A
Answer: B
8
Q
A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to? A. Bad connectors B. Cross-talk C. EMI / Interference D. dB loss
A
Answer: D
9
Q
An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used? A. Protocol analyzer B. Butt set C. OTDR D. Toner probe
A
Answer: B
10
Q
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following? A. LLDP B. VLAN tagging C. QoS D. SIP trunking
A
Answer: C
11
Q
Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation? A. nslookup B. route C. nbtstat D. arp
A
Answer: A
12
Q
Which of the following utilities would a technician use to determine the location of lost packets on a routed network? A. 450 ping B. nslookup C. route D. tracert
A
Answer: D
13
Q
A DSL modem connects to the provider's network using which of the following authentication techniques? A. PoE B. MS-CHAP C. PPPoE D. EAP
A
Answer: C
14
Q
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? A. Loopback plugs B. Butt set C. Cable certifier D. Toner probe
A
Answer: B
15
Q
169.254.0.100 is an IP address which would MOST likely come from which of the following? A. CIDR B. DHCP C. APIPA D. DNS
A
Answer: C
16
Q
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this? A. Cable tester B. Toner probe C. OTDR D. Loopback plug
A
Answer: A