SlideShare une entreprise Scribd logo
1  sur  298
COMPTIA
Exam Questions
Which of the following is a standard measure
of signal power?
 A) MhZ
 B) mips
 C) dBm
 D) Gbps
Which of the following is the network topology
in which computers connect in a closed circle?
 A) Bus
 B) Mesh
 C) Ring
 D) Star
The Transport Layer of the TCP/IP model
corresponds to which of the following
layers of the OSI model?
 A) 1
 B) 3
 C) 4
 D) 5
Which of the following is the correct
representation of an IPv6 address?
 A) ::
 B) 0:0:0:0:0:0:0:0:1
 C) 1:2:3:4:AB:CD:EF
 D) 2001::4860:800f::
Which of the following security devices would
MOST likely be used on a network to screen &
prevent malicious traffic?
 A) IDS
 B) VPN
 C) NIPS
 D) HIDS
What is a client?
 A Client is a device an end user uses to
access a network . This device can be
a workstation, laptop, smart phone
with wireless capabilities, or a variety
of other end-user terminal devices.
Users report that their internet connection is slow.
Zach, the network technician, has a suspicion that users
are streaming video music. Which of the following would
BEST confirm Zach’s theory?
 A) Traffic analysis
 B) SNMP
 C) History logs
 D) System logs
A company is about to install a second network
connection with a new ISP. Which of the following
routing protocols is the BEST choice?
 A) IS-IS
 B) BGP
 C) OSPF
 D) RIP
Lisa, a technician, is troubleshooting a problem
with a managed network switch. She determines the
resolution to the problem is beyond her experience
level. Which of the following should Lisa do NEXT?
 A) Question users
 B) Test the theory
 C) Re-establish a theory of probable cause
 D) Escalate the problem
A server technician notices that some changes were
implemented on a server during non-business hours.
Which of the following would allow the technician
to identify the last time an administrator was
remotely connected to the server?
 A) Network sniffer
 B) Traffic analyzer
 C) System log
 D) Security log
Which of the following is an intelligent repeater
that is aware of the MAC addresses of the nodes on
either side of the data link?
 A) Gateway
 B) Hub
 C) Bridge
 D) Router
Which of the following 802.11 standards is
MIMO used in?
 A) a
 B) b
 C) g
 D) n
A technician is troubleshooting a problem
with a network printer. The technician
thinks the network printer is out of paper &
ink. Which of the following should the
technician do NEXT?
 A) Implement the solution
 B) Question users
 C) Test theory
 D) Escalate the problem
Which of the following would be the BEST IDS
topology for monitoring one specific device?
 A) Signature-based
 B) Network-based
 C) Host –based
 D) Behavior-based
Which of the following is the name of the
routing update process involved when a
change occurs in the routing environment?
 A) Supernetting
 B) Dynamic
 C) Subletting
 D) Convergence
Which of the following fiber types is MOST
often used indoors?
 A) Plenum
 B) Modal conditioning
 C) Singlemode
 D) Multimode
Which of the following ports should be
allowed through a firewall to allow DNS
resolution to occur to an outside DNS
server?
 A) 20
 B) 53
 C) 80
 D) 3389
A customer reports a network patch cable was
unplugged from a switch & plugged back into an
available switch port. The switch’s activity lights
have been lit up constantly & network response
times are extremely slow. Which of the following
issues is MOST likely occurring?
 A) Switching loop
 B) DDoS attack
 C) Mismatched MTU
 D) Port mirroring
Which of the following protocols is
used to assign IP addresses to network
devices?
 A) UTP
 B) DHCP
 C) FTP
 D) TCP/IP
Network upgrades have been completed and the WINS
server was shutdown. It was decided that NetBIOS
network traffic will no longer be permitted.
Which of the following will accomplish this
objective?
 A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering
Which of the following allows access to a
network, based on the hardware address of a
network card?
 A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering
Which of the following is true of
NIPS?
 A) Routes traffic to the proper port
 B) Detects malicious host traffic
 C) Detects and prevents harmful traffic
 D) Prevents traffic on network hosts
Which of the following protocols is
used for remote management of devices?
 A) TFTP
 B) SNMP
 C) Syslog
 D) SMTP
Which encryption type uses only a 28
character key?
 A) 40/64 bitWEP
 B) WPA Personal
 C) 104/128 bitWEP
 D) WPA@PSK
At which of the following layers of the
OSI model do frames exist?
 A) Application
 B) Network
 C) Transport
 D) Data link
Which of the following utilities can be used
to list the routing table?
 A) Ipconficj
 B) Nslookup
 C) Dig
 D) Netstat
Which of the following OSI model layers is
between the Network and Session layers?
 A) Presentation
 B) Data link
 C) Physical
 D) Transport
Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?
 A) OTDR
 B) Protocol analyzer
 C) TDR
 D) Toner probe
Which of the following tools would BEST be
used to verify if a network cable is properly
terminated?
 A) Multimeter
 B) Cable certifier
 C) Toner probe
 D) Cable stripper
Which of the following uses port 53 by
default?
 A) RDP
 B) QoS
 C) DHCP
 D) DNS
Network administrators use which of the
following to monitor and map network
availability, performance, and error rates?
 A) SMTP
 B) PPoE
 C) PoE
 D) SNMP
Jeff, a network administrator, needs to
forward HTTP traffic from a SOHO firewall
public IP to the internal web server’s
private IP. Which of the following can Jeff
implement?
 A) DNS
 B) NAT
 C) PKI
 D) RAS
A firewall that examines all the incoming traffic
and decides if the traffic is going to be allowed
through or dumped is a example of which of the
following?
 A) Packet sniffing
 B) Packet filter
 C) Stateful inspection
 D) Content filter
Zach, a client, has a home office and also works
out of a garage on the property located 150 feet
(45 meters) from the house. Zach wants to extend
the Internet connection from the home to the
garage. Which of the following technologies would
MOST likely accommodate this range?
 A) DVI cable
 B) Bluetooth
 C) Wireless
 D) CAT3 cable
A power failure caused a router to reboot.
Now users are not able to reach remote
networks. Which of the following is the MOST
likely cause?
 A) Dynamic NAT tables were erased by the reset
 B) The DNS server settings on the workstations are
incorrect
 C) MAC entries in the ARP table were not saved
 D) The technician did not save the running configuration
Which of the following is a
device directly used by an end
user to access a network?
 A) Server
 B) LAN
 C) Client
 D) Router
What does a Switch do?
 Interconnects network components like a hub
except the switch interrogates the traffic to
find out where its destined and forwards the
traffic thru the right port. It is considered a
Layer 2 device because it makes its
forwarding decisions from the Media Access
Control (MAC) address burned into the NIC
card.
Which device makes traffic-
forwarding decisions based on
the MAC address?
 A) Hub
 B) Router
 C) Switch
 D) Multiplexer
What type of network is a MAN?
 MAN or Metro Ethernet is smaller
than aWAN. a MAN interconnects
locations throughout a metropolitan
area via a service provider’s high
speed network (10 Gbps)
A company has various locations
in a city interconnected using
Metro Ethernet connections. This
is an example of what type of
network?
 A) WAN
 B) CAN
 C) PAN
 D) MAN
What type of network is a PAN?
 PAN is network whose range is only a few
meters and much smaller than a LAN. It
consists of a connection between a PC and a
digital camera via a universal serial bus (USB )
cable. It could also be a PC connected to an
external hard drive via a FireWire
connection, A PAN is not necessarily a wired
connection, it can also be a Bluetooth
connection between a cell phone & a car’s
wireless audio system.
A network formed by interconnecting a
PC to a digital camera via a USB cable
is considered what type of network?
 A) WAN
 B) CAN
 C) PAN
 D) MAN
What are some characteristics of the
star topology?
 Most popular physical LAN topology used today.
The Ethernet switch is in the center of the star
and unshielded twisted pair (UTP) cables run
from the switch ports to the client and back. It
uses more cables than the other topologies
because each device requires its own wiring to
the central device. If one of the cables breaks it
only affects the device its connected to not the
entire group.
Which of the following LAN topologies
requires the most cabling?
 A) Bus
 B) Ring
 C) Star
 D) WLAN
Which of all the Network
Topologies is the least fault
tolerant and why?
 A bus network requires only a single cable per
segment. If any device in the segment
fails, then the whole segment crashes.
What are the characteristics of a Full-
Mesh topology?
 Offers the highest level of redundancy. Each
site is directly connected to every other site
so an optimal route exists between any two
sites. It is also highly fault resistant. It is
difficult and expensive to scale, because to
add a new site requires aWAN link to every
other site.
Which of the following topologies
offers the highest level of
redundancy?
 A) Full Mesh
 B) Hub & Spoke
 C) BUS
 D) Partial Mesh
How to calculate the number of
required WAN connections for a
Full-Mesh topology?
 Example: If you have 5 remote sites
 W= number ofWAN links
 N = number of sites
 W=n * (n-1) / 2
 w = 5 * (5-1) / 2 (4 / 2)
 w = 5 * 2
 w = 10
 Ans: 10WAN links are required 5 there & 5 back
How many WAN links are required to
create a full mesh of connections
between 5 remote sites?
 A) 5
 B) 10
 C) 15
 D) 20
How does the Hub and Spoke
topology differ from the Full-
Mesh topology?
 Costs are reduced because each site is
connected to a central hub, not to each other so
a small amount of links are needed. It’s also
more scalable because to add another site only
requires a connection to the hub. It also lacks
redundancy because every site goes through the
central Hub so it becomes a single point of
failure. If the hub is down so is the network.
Identify two advantages of a hub-and-
spoke WAN topology as compared to a
Full-Mesh WAN topology? (Pick 2)
 A) Lower Cost
 B) Optimal Routes
 C) More scalable
 D) More redundancy
What are the characteristics of a
Peer-to- peer network?
 Used for small or home based
businesses, less than 10 PC’s. It allows all
interconnected devices to share resources
like files, and printers. Inexpensive network
to run, limited scalability. The more PC’s on
the network decreases performance &
increases the burden of managing multiple
clients for the administration.
Which type of network is based on
clients sharing resources with
one another?
 A) Client-server
 B) Client- peer
 C) Peer-to-peer
 D) Peer-to-server
Which of the following is an
advantage of a peer–to-peer
network, as compared with a
client-server network?
 A) More scalable
 B) Less expensive
 C) Better performance
 D) Simplified administration
What is a Server?
 A server, serves up resources to a
network. These resources might
include e-mail access, (as provided by
an e-mail server) web pages (as
provided by a web server) or files
(available on a file server)
What is a Hub?
 It is a device that interconnects network
components, such as clients, and servers.
Hubs vary in their number of available ports.
Hubs can be interconnected to a point. Too
many hubs chained together will result in
network errors. A hub does not perform any
inspection of the traffic it passes. It receives
traffic through a port that’s connected to a
network cable then it repeats that traffic out
of all the other ports.
What are the 7 layers of the OSI Model?
 Layer 1 The Physical Layer
 Layer 2 The Data Link Layer
 Layer 3 The Network Layer
 Layer 4 TheTransport Layer
 Layer 5 The Session Layer
 Layer 6 The Presentation Layer
 Layer 7 TheApplication Layer
What is the difference between the OSI
reference model and the TCP/IP model?
 *The OSI ensures reliable delivery of packets at
the transport layer (4) *TCP/IP Model matches
up to the OSI model as: The Network Interface
(Link) layer compares to the Physical & Data
Link,The Internet layer is comparable to the
Network,Transport is the same in both, &The
Application layer inTCP/IP handles layers 5, 6,& 7
in the OSI model. TCP/IP does not guarantee
reliable delivery of packets at layer 4 (transport).
TCP/IP also offers the UDP (connectionless
transport layer protocol) option.
What is the function of the second layer
know as The Data Link Layer?
 The Data Link Layer
has 2 sub layers
The 1st sub layer is the
Media Access Control
(MAC)This handles the:
 Physical Addressing
 LogicalTopology
 Method of transmitting
on the media.
 The 2nd sub layer is the
Logical Link Control
(LLC)This sub layer
handles the:
 Connection services
 Synchronizing
transmissions.
Which layer of the OSI reference
model contains the MAC and LLC
sub layers?
 A) The Network Layer
 B) TheTransport Layer
 C) The Physical Layer
 D) The Data Link Layer
What is Baseband?
 Baseband resides in the 1st layer of the OSI
Model in the Physical Layer unlike broadband
where it divides the bandwidth over copper
etc.. Baseband uses all available frequencies
on a medium to transmit data. Ethernet is an
example of a network technology that uses
baseband.
Which approach to bandwidth usage
consumes all available frequencies on
a medium to transmit data?
 A) Broadband
 B) Baseband
 C) Time – Division Multiplexing
 D) Simplex
Windowing is provided at what layer of the
OSI reference model?
 A) Data Link Layer
 B) Network Layer
 C) Transport Layer
 D) Physical Layer
Which of the following IP addresses would be
classified as private?
 A) 10.100.200.0
 B) 169.253.5.0
 C) 172.168.5.0
 D) 200.100.25.0
Two duplicate pieces of equipment can be used in
conjunction for which of the following purposes?
(Select TWO)
 A) High availability
 B) Fault tolerance
 C) Reduce latency
 D) Wi-MAX
 E) CARP
PKI is a method of user authentication which
uses which of the following?
 A) Various router commands
 B) Access control lists
 C) Certificate services
 D) A RADIUS server
Kim and Zach, attackers, use which of the
following network scanners to see the protocols
that are being used? (Select TWO).
 A) IDS
 B) Packet sniffer
 C) Port scanner
 D) Malware scanner
 E) Ping sweep
IP addresses reside at which layer of the OSI
reference model?
 A) Network Layer
 B) Session Layer
 C) Data Link Layer
 D) Transport Layer
Which of the following is a connectionless
transport layer protocol?
 A) IP
 B) TCP
 C) UDP
 D) H.323
Identify the 4 layers of the TCP/IP stack
(Choose four)
 A) Session Layer
 B) Transport Layer
 C) Internet Layer
 D) Data Link Layer
 E) Network Layer
 F) Application Layer
 G) Network Control Layer
What is the range of well-known TCP and UDP
ports?
A) Below 2048
 B) Below 1024
 C) 16,384 – 32,768
 D) Above 8192
Which protocol supports a secure connection
to a remote host via terminal emulation
software?
 A) Telnet
 B) SSH
 C) FTP
 D) SFTP
Identify the well known port number for
NTP?
 A) 53
 B) 69
 C) 123
 D) 143
Identify 3 e-mail protocols? (choose 3)
 A) SNMP
 B) SMTP
 C) POP3
 D) IMAP4
What type of coaxial cable was often used for
10Base2 Ethernet networks?
 A) RG – 6
 B) RG – 45
 C) RG – 58
 D) RG - 59
Which of the following categories of UTP
cabling are commonly used for 1000Base-T
networks? (choose 2)
 A) CAT 5
 B) CAT5e
 C) CAT6
 D) CAT6e
Which type of cable might be required for
installation in a drop ceiling, which is
used as an open air return duct?
 A) Riser
 B) Plenum
 C) Multimode
 D) Twin-axial
Which network infrastructure device
primarily makes forwarding decisions based
on MAC addresses?
 A) Router – (Layer 3 device)
 B) Switch (Layer 2 device)
 C) HUB ( Layer 1 device)
 D) Multi-Layer switch (Layers 2 & above)
A router(Layer 3) primarily makes its
forwarding decisions based on what address?
 A) Destination MAC address
 B) Source IP address
 C) Source MAC address
 D) Destination IP address
Identify 2 differences between an Ethernet
bridge and an Ethernet switch (Choose 2)
 A) Switches use ASIC’s to make forwarding
decisions, while bridges make their
forwarding decisions in software.
 B) Bridges typically operate faster than
switches
 C) Switches typically have higher port
densities than bridges
 D) Bridges can base their forwarding
decisions on logical network layer addresses
What layer do Bridges operate
at?
 Bridges operate at the Data Link Layer or
Layer 2
What is the purpose of the SMB
(server message block)
protocol?
 The SMB protocol runs on the UNIX or Linux
server and helps theWindows server see the
UNIX/Linux servers as if they were one of the
Windows servers itself.
What are BNC connectors used
for?
 BNC connectors are used to connect
computers to a 10Base2 (thinnet) cable in the
BUS topology.
A router has 12 ports. How many broadcast
domains does the router have?
 A) None
 B) One
 C) Two
 D) Twelve
A switch has 12 ports. How many collision
domains does the switch have?
 A) None
 B) One
 C) Two
 D) Twelve
What is the first DHCP message sent by a
client attempting to obtain IP address
information from a DHCP server?
 A) DHCPOFFER
 B) DHCPACK
 C) DHCPDISCOVER
 D) DHCPREQUEST
What specialized network device is commonly
used to load balance traffic across multiple
servers in a group?
 A) Content switch
 B) Proxy server
 C) DNS server
 D) Content engine
What is CSMA/CA AND WHAT DOES IT
DO?
 Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA) It is the basic medium
access method for IEEE 802.11(g) wireless
networks. (CSMA/CD is collision
detection, and it’s the basic access method
for Ethernet networks)
What is DNS?
 Domain Name System (DNS) A system that
provides a way to map friendly host names or
URL’s to IP addresses.
What is meant by Default Gateway?
 It is the route taken so that a computer on
one segment can communicate with a
computer on another segment.
What is the Demilitarized Zone
(DMZ) and what does it do?
 The DMZ describes the area in a network
design that is located between the internal
network & the external network. Usually the
internet. It is used for devices accessible to
internet traffic such as the web server, FTP
server, SMTP server, and DNS.
Which of the following describes a DNS
server?
 A) Translates an IP address to a name
 B) Caches commonly viewed web pages
 C) Assigns IP addresses to network devices
 D) Provides port security for a network
After Kim, a new user, moves furniture into a
cubicle, the computer does not connect to the
network any longer. Which of the following would
be the MOST likely reason? (Select TWO).
 A) Bad Ethernet switch port
 B) TX/RX reversed
 C) Bad connectors
 D) Bad patch cable
 E) Mismatched MTU
Which of the following provides the use of a
secure tunnel for telecommuting without manually
installing and configuring encryption software?
 A) RDP
 B) SSLVPN
 C) ISAKMP
 D) TLS2.0
Which of the following can be an
STP cable?
 A) RG-6
 B) CAT5E
 C) Fiber
 D) RG-59
Which of the following wireless
authentication methods provides the GREATEST
amount of security?
 A) WEP
 B) WPA Enterprise
 C) WPA Personal
 D) WPA2 Personal
Which of the following OSI model
layers is used for logical
addressing?
 A) Physical
 B) Transport
 C) Network
 D) Data link
In which of the following layers of the OSI
model does the TCP protocol operate?
 A) Session
 B) Network
 C) Data link
 D) Transport
A new wiring closet is setup to serve users in the east
wing of a campus. Equipment is moved from the old
closet, 50 feet (15 meters) away, and installed in the
new closet. Users immediately begin reporting
intermittent connectivity issues with both corporate and
Internet resources. Which of the following is the MOST
likely cause?
 A) Protocol mismatch
 B) MTU size was not increased for the new distance
 C) IncorrectVLAN assignment
 D) Incorrect cabling
Which of the following protocols is used by
the ping command?
 A) SMTP
 B) ICMP
 C) TFTP
 D) ARP
Which of the following documents will allow
Kim, an administrator, to determine a change from
the standard default system configuration?
 A) Baseline
 B) Physical network diagram
 C) Wiring schematic
 D) Logical diagram
Which of the following
authenticates, allows, and controls the
execution of router commands?
 A) PKI
 B) RADIUS
 C) Kerberos
 D) TACACS+
A section of the building has been having
intermittent connectivity problems lately. An
action plan and solution has been created. Which
of the following steps would an administrator
perform NEXT?
 A) Document the solution and process
 B) Establish the most probable cause
 C) Implement and test the solution
 D) Identify additional symptoms and problems
A firewall that looks at the source IP and
destination IP then routes them accordingly
is an example of which of the following?
 A) Packet filtering
 B) Content filtering
 C) Packet sniffing
 D) Application gateway
Which of the following is a valid IPv6
address?
 A) 1056: 958: E486:: F8:8962
 B) 1596:H593:B5D8::B589
 C) 2048:9584:A6B8::0983
 D) 4820::0985:489D::8761
Zach, a user, cannot access the Internet. A similar problem
occurred several times last week to other users, and the
solution was to reboot each workstation. As the first step, the
technician reboots the workstation and it does not solve the
problem. Which of the following should have been done instead?
 A) Change the DNS server IP on the client
 B) Information gathering
 C) Change the workstation IP address
 D) Establish a plan of action
Logically separating the ports on a switch
without physically separating them can be
done using which of the following?
 A) Routing tables
 B) Hub logic
 C) Spanning tree protocol
 D) VLANs
Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is reachable?
 A) nmap
 B) nbtstat
 C) dig
 D) arp
A customer wants to have several internal
services hosted on multiple servers, all of which
need to be available to the Internet through a
single public IP address. Which of the following
would need to be configured?
 A) QoS
 B) PoE
 C) PAT
 D) VLAN
Which of the following communication modes
has the LOWEST overhead necessary to support
streaming protocols such as RTP?
 A) Connectionless
 B) Stateful
 C) Full duplex
 D) Quality of Service
Lisa, a home user, wishes to confine a
wireless network to devices ONLY inside of
her house. Which of the following will
accomplish this?
 A) Decreasing radio strength
 B) MAC filtering
 C) WEP encryption
 D) SSID broadcast disable
Which of the following security measures is
the LEAST intrusive on an end device?
 A) NIPS
 B) Host-based firewall
 C) Antivirus
 D) HIDS
At which of the following layers of the OSI
model does an unmanaged switch operate?
 A) Layer 1
 B) Layer 2
 C) Layer 3
 D) Layer 4
Jeff, an administrator, has just finished installing a new switch and connected
two servers with IPs of 192.168.105.20 and .30. The servers are able to
communicate with each other, but are unable to reach the Internet. Jeff sees the
following information in the switch configuration: interface VLAN 105
IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at
192.168.105.1 from the switch. Which of the following is the MOST likely cause of
the problem?
 A) The subnet mask is incorrect
 B) A routing loop has occurred
 C) Jeff used a crossover cable to connect the switch to the gateway
 D) The server is missing default-gateway information
An administrator is setting up a secure wireless network. The
administrator decides to support 802.11n and 802.11g with a
WPA2 pre-shared key. Users are given the SSID with the pre-
shared key, but the administrator has disabled the SSID
broadcast and MAC filtering. Some users have reported
connection issues. Which of the following would MOST likely
resolve the users’ connection issues?
 A) Limit the devices to 802.11n only
 B) Enable the SSID broadcast
 C) Enable MAC filtering
 D) UseWEP 128-bit key
When configuring a WAP for a SOHO, which
parameter will BEST limit access to the
office area?
 A) Signal strength
 B) SSID enable
 C) Encryption
 D) Password hardening
Which of the following is an environment where
only a username and password are required for
successful authentication results in access to
multiple resources?
 A) Multiple logins
 B) Multifactor authentication
 C) Two-factor authentication
 D) Single sign-on
Which of the following methods limits access
to a network based on characteristics of the
network card?
 A) IP filtering
 B) MAC filtering
 C) Port filtering
 D) Encryption
Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
 A) DoS
 B) Smurf attack
 C) Virus
 D) Man-in-the-middle
Which of the following Ethernet
technologies has the LONGEST
distance possible?
 A) 1000BaseLX
 B) 1000GBaseSR
 C) 1000BaseSX
 D) 1000BaseT
Which of the following technologies
allows for redundant links within a
layer 2 segment?
 A OSPF
 B RIP
 C Port Mirroring
 D SpanningTree
Which of the following defines access for a
network?
 A) ACL
 B) RDP
 C) RAS
 D) ARP
A network administrator notices that all of the
company switches are running at capacity on a
given day, which is abnormal according to network
baselines taken recently. Which tool would BEST
allow the administrator to inspect what type of
traffic is on the network?
 A) Wire tap
 B) Network sniffer
 C) Load balancing appliance
 D) NIPS
Which of the following problems is MOST likely to
arise when configuring an IPv6 over IPv4 tunnel?
 A) Routing loop
 B) MTU black hole
 C) Framing error
 D) SYN flood
Kim, an administrator, wants to list all the
network connections to and from the server. Which
of the following commands would MOST likely be
used? (Choose 2)
 A) traceroute E) Bandwidth shaper
 B) ping F) Load Balancer
 C) ipconfig G) DNS server
 D) netstat H) IPS
A network device is more than 100 meters (328
feet) from a 24-port copper switch. Which of the
following can be used to connect the device to
the network?
 A) Fiber multiplexer
 B) Repeater
 C) Attenuator
 D) OTDR
A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch will not recognize
the fiber connection. Which of the following is
MOST likely the problem?
 A) DB loss
 B) EMI
 C) TXRX reversed
 D) Open shorts
Which of the following is an example of two
factor authentication?
 A) Password device certificate and PIN
 B) SSL web server certificate and password
 C) User password and administrator
 Password
 D) Password and hardware token OTP
Which of the following is used to restrict
access according to user policies?
 A) Content filter
 B) DHCP server
 C) DNS server
 D) VPN concentrator
Which of the following describes a rationale
for a network with redundant paths?
 A) VPN compatibility
 B) Unified communications implementation
 C) High availability requirement
 D) QoS
Teachers and students at a school currently share
the same bandwidth. The Internet performance for
the teachers in the classroom is becoming
extremely slow. Which of the following is the
BEST method to mitigate the issue?
 A) Increased uptime
 B) Caching engines
 C) Traffic shaping
 D) Load balancing
Zach, a technician, wants to test a laptop’s NIC
for functionality but has no other networking
equipment to attach it to. Which of the following
would allow him to test basic functionality of the
NIC?
 A) Loopback plug
 B) Protocol analyzer
 C) Smart jack
 D) Coupler
A computer on VLAN 10 with the IP address of 192.168.1.45/27
cannot ping a computer on VLAN 20 with the IP address of
192.168.1.65/27. Which configuration change will allow the PING
to be successful?
 A) Replace the router with a layer 2 switch that supportsVLANs
 B) ChangeVLAN 20 computers Default Gateway to 192.168.1.127/27
 C) ChangeVLAN 10 computers Default Gateway to 192.168.1.32/27
 D) Allow ICMP to pass through the router
Identify the distance limitation of a 10BASE5
(thicknet)Ethernet network?
 A) 100m
 B) 185m
 C) 500m
 D) 2km
 m = meters
If 2 devices simultaneously transmit data on an Ethernet network &
a collision occurs, what does each station do in an attempt to
resend the data & avoid another collision?
A) Each device compares the other device’s priority value
(determined by IP address) with its own, & the device with the
highest priority value transmits first
B) Each device waits for a clear to send (CTS) signal from the switch
C) Each device randomly picks a priority value, & the device with the
highest value transmits first
D) Each device sets a random back off timer, & the device will
attempt retransmission after the timer expires
What kind of media is used by 100GBASE-
SR10 Ethernet?
 A) UTP
 B) MMF
 C) STP
 D) SMF
Which of the following statements are true
regarding VLAN’s? (choose 2)
 A) A VLAN has a single broadcast domain
 B) For traffic to pass between 2VLANs, that
traffic must be routed.
 C) Because of a switch’s MAC address
table, traffic does not need to be routed to pass
between 2VLAN’s
 D) A VLAN has a single collision domain

What name is given to a VLAN on an
IEEE 802.1Q trunk whose frames are not
tagged?
 A) NativeVLAN
 B) DefaultVLAN
 C) ManagementVLAN
 D) VLAN 0
In a topology running STP, every network
segment has a single __________ port, which
is the port on that segment that is closest
to the root bridge, in terms of cost?
 A) Root
 B) Designated
 C) Non-Designated
 D) Non-root
What is the IEEE standard for link
aggregation?
 A) 802.1Q
 B) 802.3ad
 C) 802.1d
 D) 802.3af
What is the maximum amount of power a switch
is allowed to provide per port according to
the IEEE 802.3af standard?
 A) 7.7W
 B) 15.4W
 C) 26.4W
 D) 32.4W
What switch feature allows you to connect a network
sniffer to a switch port & tells the switch to send
a copy of frames seen on one port out the port to
which your network sniffer is connected?
 A) Port Interception
 B) Port Duplexing
 C) Port Mirroring
 D) Port Redirect
Which IEEE 802.1X component checks the
credentials of a device wanting to gain
access to the network?
 A) Supplicant
 B) Authentication server
 C) Access point
 D) Authenticator
What is the binary representation of the
decimal number 117?
 A) 10110101
 B) 01110101
 C) 10110110
 D) 01101001
The binary number 10110100 has what decimal
equivalent?
 A) 114
 B) 190
 C) 172
 D) 180
What is the class of IP address 10.1.2.3/24?
 A) Class A
 B) Class B
 C) Class C
 D) Class D
Which of the following are dynamic
approaches to assigning routable IP
addresses to networked devices? (choose 2)
 A) BOOTP
 B) APIPA
 C) Zeroconf
 D) DHCP
How many assignable IP addresses exist in the
172.16.1.10/27 network?
 A) 30
 B) 32
 C) 14
 D) 64
What is the prefix notation for a subnet mask
of 255. 255. 255. 240?
 A) /20
 B) /24
 C) /28
 D) /29
Your company has been assigned the 192.168.30.0/24
network for use at one of its sites. You need to use a
subnet mask that will accommodate 7 subnets while
simultaneously accommodating the maximum number of hosts
per subnet. What subnet mask should you use?
 A) /24
 B) /26
 C) /27
 D) /28
A client with an IP address of 172.16.18.5/18
belongs to what network?
 A) 172.16.0.0/18
 B) 172.16.4.0/18
 C) 172.16.8.0/18
 D) 172.16.16.0/18
How can the following IPv6 address be
condensed?
0AA0:0123:4040:0000:0000:000:000A:100B
 A) AA0::123:404:A:100B
 B) AA::123:404:A:1B
 C) AA0:123:4040::A:100B
 D) 0AA0:0123:4040::0::000A:100Bsection
If a PC on an Ethernet network attempts to
communicate with a host on a different subnet, what
destination IP address & destination MAC address
will be placed in the packet/frame header sent by
the PC?
 A) Dest. IP: IP address of default gateway.
Dest. MAC: MAC address of default gateway
 B) Dest.IP: IP address of remote host.
Dest.MAC: MAC address of default gateway
 C) Dest.IP: IP address of remote host. Dest.
MAC: MAC address of remote host
 D) Dest.IP: IP address of remote host.
Dest.MAC: MAC address of local PC
What protocol is used to request a MAC address
that corresponds to a known IP address?
 A) IGMP
 B) TTL
 C) ICMP
 D) ARP
What is the network address & subnet mask of a
default route?
 A) 255.255.255.255/32
 B) 0.0.0.0/32
 C) 255.255.255.255/0
 D) 0.0.0.0/0
What routing protocol characteristic indicates
the believability of the routing protocol (as
opposed to other routing protocols)?
 A) Weight
 B) Metric
 C) Administrative distance
 D) SPF algorithm
Which of the following are distance vector
routing protocol features that can prevent
routing loops? (choose 2)
 A) Reverse path forwarding (RPF) check
 B) Split Horizon
 C) Poison Reverse
 D) Rendezvous point
Which of the following is a distance-vector
routing protocol with a maximum hop count of
15?
 A) BGP
 B) IS-IS
 C) RIP
 D) OSPF
Which of the following routing protocols is an
EGP?
 A) BGP
 B) IS-IS
 C) RIP
 D) OSPF
What NAT IP address is a public IP address
that references an inside device?
 A) Inside Local
 B) Inside Global
 C) Outside Local
 D) Outside Global
What NAT variation automatically assigns an
inside global address from a pool of available
addresses?
 A) SNAT
 B) DNAT
 C) PAT
 D) GNAT
What multicast protocol is used between clients &
routers to let routers know which of their
interfaces are connected to a multicast receiver?
 A) IGMP
 B) PIM-DM
 C) PIM-SM
 D) SPT switchover
ISDN is considered to be what type of WAN
connection?
 A) Dedicated leased line
 B) Circuit-switched connection
 C) Packet-switched connection
 D) Cell-switched connection
What is the data rate of an OC-3 connection?
 A) 51.84 Mbps
 B) 622 Mbps
 C) 155.52 Mbps
 D) 159.25 Gbps
Which of the following WAN technologies
commonly use unshielded twisted pair (UTP)?
(choose 3)
 A) Cable modem
 B) ISDN
 C) DSL modem
 D) POTS dial-up connection
How many channels on an E1 circuit are
available for voice, video, or data?
 A) 23
 B) 24
 C) 30
 D) 32
Which PPP authentication method provides one-
way authentication & sends credentials in
clear text data?
 A) WEP
 B) MS-CHAP
 C) PAP
 D) CHAP
What DSL variant has a distance limitation of
18,000 ft. between DSL modem & its DSLAM?
 A) HDSL
 B) ADSL
 C) SDSL
 D) VDSL
What kind of network is used by many cable
companies to service their cable modems, &
contains both fiber-optic and coaxial cable?
 A) Head-end
 B) DOCSIS
 C) Composite
 D) HFC
What locally significant identifier is used by
a frame Relay network to reference a virtual
circuit?
 A) VPI/VCI
 B) DLCI
 C) TEI
 D) MAC
How big is the payload portion of an ATM cell?
 A) 5 bytes
 B) 48 bytes
 C) 53 bytes
 D) 64 bytes
What type of antenna, commonly used in wireless AP’s
& wireless routers in SOHO locations, radiates
relatively equal power in all directions?
 A) Unidirectional
 B) Yagi
 C) Parabolic
 D) Omnidirectional
When using the 2.4 GHz band for multiple access points in a WLAN
located in the United States, which nonoverlapping channels should
you select? (choose 3)
 A) 0
 B) 1
 C) 5
 D) 6
 E) 10
 F) 11
 G) 14
What technology do WLAN’s use to determine when
they gain access to the wireless media?
 A) SPF
 B) CSMA/CA
 C) RSTP
 D) DUAL
What IEEE 802.11 variant supports a maximum
speed of 54 Mbps & uses 2.4 GHz band?
 A) 802.11a
 B) 802.11b
 C) 802.11g
 D) 802.11n
Which of the following is used by IEEE 802.11n to
achieve high through-put through the use of multiple
antennas for transmission & reception?
 A) MIMO
 B) DSSS
 C) FHSS
 D) LACP
A WLAN formed directly between wireless clients
(without the use of a wireless AP) is referred to as
what type of WLAN?
 A) Enterprise mode
 B) IBSS
 C) Personal Mode
 D) BSS
When extending the range for a 2.4-GHz WLAN, you can use
nonoverlapping channels for adjacent coverage cells.
However, there should be some overlap in coverage between
those cells (using nonoverlapping channels) to prevent a
connection from dropping as a user roams from one coverage cell
to another. What percentage of coverage overlap is recommended
for these adjacent cells?
 A) 5 – 10 percent
 B) 10 – 15 percent
 C) 15 – 20 percent
 D) 20 – 25 percent
If a WLAN does not require a user to provide any
credentials to associate with a wireless AP &
access the WLAN, what type of authentication is
said to be in use?
 A) WEP
 B) SSID
 C) Open
 D) IV
WEP’s RC4 approach to encryption uses a 24-
bit string of characters added to
transmitted data, such that the same plain
text data frame will never appear as the
same WEP-encrypted data frame. What is
this string of characters called?
 A) Initialization vector
 B) Chips
 C) Orthogonal descriptor
 D) Session key
What standard developed by the Wi-Fi
Alliance implements the requirements of IEEE
802.11i ?
 A) TKIP
 B) MIC
 C) WEP
 D) WPA2
What is the MPLS header?
 A) 4 bits
 B) 8 bits
 C) 16 bits
 D) 32 bits
Which of the following is a social
engineering attack?
 A) Man in the middle
 B) Worms
 C) EvilTwin
 D) Phishing
00:12:34:56:78 can be used in which of
the following?
 A Channel selection
 B WPA-PSK password
 C WEP key
 D MAC filtering
Which of the following devices
will monitor for propagating
worms?
 A IDS
 B Firewall
 C Proxy server
 D Mail server
T568B wiring scheme is typically found on
which of the following components?
 A 66 block
 B Demarc extension
 C Patch Panel
 D Vertical Cross Connect
Something you have, something you
are and something you know are the
three tenets of:
 A) access control
 B) remote access
 C) change management
 D) social engineering
After moving office furniture around a
user can no longer connect to the
network. Which of the following is Most
likely the reason for the problem
 A Split cables
 B Crosstalk
 C TX/RX reversed
 D DB loss
A company wishes to have a wireless signal
broadcast only through a special tunnel.
Which of the following measures will
accomplish this?
 A MAC filtering
 B WPA encryption
 C Changing antenna type
 D Decreasing radio strength
In IPSec, which of the following
is an agreement on how devices
will securely transmit
information?
 A) ESP
 B) SA
 C) AH
 D) ISAKMP
Which of the following could be
used to estimate RTT across a
router?
 A traceroute
 B dig
 C arp
 D uptime
The cable tester displays the
following information
 11
 2------- 2
 3------- 3
 4xxxxx 4
 5xxxxx 5
 6------- 6
 7------- 7
 8------- 8
 What is being reported?
 A) 5 is open, 1|4 are open
 B) 1 is open, 4|5 are
shorted
 C) 4|5 is shorted, 1 is ok
 D) 1 is shorted, 4|5 are open
Which of the following represents
the physical address of a network
access card
 A 00-30-48-83-9B-C8
 B FF01:D2:C4:87::11
 C 08-9D-35-22-L2-34-FF-21
 D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
Which of the following records
would be used for a Reverse
DNS lookup?
 A) MX
 B) PTR
 C) A
 D) AAAA
Which of the following defines access for a
network?
 A) ACL
 B) RDP
 C) RAS
 D) ARP
A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch will not recognize
the fiber connection. Which of the following is
MOST likely the problem?
 A) DB loss
 B) EMI
 C) TXRX reversed
 D) Open shorts
Which of the following is used to restrict
access according to user policies?
 A) Content filter
 B) DHCP server
 C) DNS server
 D) VPN concentrator
Which of the following describes a rationale
for a network with redundant paths?
 A) VPN compatibility
 B) Unified communications implementation
 C) High availability requirement
 D) QoS
Kim, an administrator, would like to inspect
all traffic flowing over the SMTP protocol
on a given network. Which of the following
tools would accomplish this?
(select two)
 A) Packet sniffer
 B) Honeypot
 C) Port mirroring
 D) IPS
 E) Port scanner
 F) IDS
For which of the following reasons could a
single server’s NIC transmit packets from
multiple MAC address sources?
 A) The server contains several virtual machines & the MAC
addresses are from the virtual machines.
 B) The server is hosting a web server & the MAC addresses are from
connected browsers
 C) The server is hosting a proxy server & the MAC addresses are
from the connected clients
 D) The server NIC is starting to fail & should be replaced.
Which of the following does SNMPv3 BEST
provide over previous versions?
 A) Simplified management
 B) Increased security
 C) More data types
 D) Higher productivity
In which of the following would Lisa, a
technician, find the LARGEST number of 110
block patch panels?
 A) MDF
 B) Caching engines
 C) Demarc
 D) IDF
A company’s database software runs the cloud.
The device hosting the software is an example
of which of the following?
 A) Virtual server
 B) Virtual switch
 C) Virtual desktop
 D) Virtual PBX
Kim, a new employee, is unable to get to the department’s
server while other employees are having no issues. The network
administrator has verified that Kim has permission to the
server & the workstation is able to get to other network
resources. Which of the following is the MOST likely cause?
 A) The department server is having network issues
 B) Kim’s workstation is a part of the wrongVLAN
 C) The onboard NIC has outdated drivers installed
 D) The wireless NIC has not been enabled for Kim’s workstation

Kim, a customer, wants to install a wireless network
into a shared office space. There are several other
wireless networks from other companies that can be
detected within the office space. Which of the
following should be configured on Kim’s wireless network
to differentiate it from other wireless networks & still
provide the BEST performance & security? (Choose 2)
 A) SSID
 B) Channel
 C) Antenna type
 D) Wireless standard
 E) NAT
Which of the following allows a central point
to simultaneously address other points without
addressing all of them?
 A) Multicast
 B) Subnetting
 C) Unicast
 D) Broadcast
Zack, a technician, wants to provide the
MOST wireless security on the LAN but does
not have a RADIUS server. Which technology
should be used?
 A) PEAP
 B) WPA Personal
 C) WPA2 Enterprise
 D) WPA2 PSK
Which of the following would a technician plug
into a smartjack?
 A) 25 pair cable
 B) 100 pair cable
 C) Patch cable
 D) Patch panel
A customer wishes to network several computers
throughout a large warehouse containing numerous
metal shelves & concrete walls. The computers are
at least 175 meters (574 feet) apart. Which of the
following media types should be recommended for the
customer using only a single switch?
 A) Fiber optic
 B) Wireless
 C) CAT5e
 D) CAT3
Lisa, an administrator, is unable to route traffic
between VLAN’s on a switch. Communication between
devices within each VLAN is functioning. At which
of the following layers does the problem MOST
likely reside?
 A) Network
 B) Data link
 C) Transport
 D) Session
Which of the following devices is used to
distribute network traffic equally over
multiple links?
 A) Content filler
 B) DNS server
 C) Load balancer
 D) Proxy server
Which of the following would cause signal
interference in a 2.4 GHz WAP? (Choose 2)
 A) Cell phone
 B) Cordless phone
 C) Microwave oven
 D) Printer
 E) Television
Which of the following default services uses
TCP/UDP port 88?
 A) LDAP
 B) IGMP
 C) HTTP
 D) Kerberos
Which of the following TCP/IP & OSI model
layers retransmits a TCP packet if it is not
received successfully at this destination?
 A) The transport OSI model layer & the InternetTCP/IP model layer
 B) The transport OSI model layer & the transportTCP/IP model layer
 C) The network OSI model layer & the transportTCP/IP model layer
 D) The network OSI model layer & the internetTCP/IP model layer
Which of the following limits the number of
devices that can be assigned IP addresses by
DHCP?
 A) A Lease
 B) Reservation
 C) DNS setting
 D) Scope
Kim, a network administrator, should consult
which documentation sources FIRST to
determine the cause of recent network
issues?
 A) Network map
 B) Cable management
 C) Change management
 D) Asset management
When using high bandwidth applications over
multiple WAN connections, which of the
following should be used?
 A) Static IP addressing
 B) Half-duplex
 C) PoE devices
 D) Load balancing
A new user is reporting connectivity issues.
Zach, the network technician, notices that there
is no link light on the user’s NIC. Which of the
following would be used to verify the wiring back
to the patch panel?
 A) Butt set
 B) Cable certifier
 C) Toner probe
 D) Snips
Which of the following ports is
the default telnet port?
 A) 20
 B) 21
 C) 22
 D) 23
In which of the following
wireless standards is MIMO used?
 A) 802.11a
 B) 802.11b
 C) 802.11g
 D) 802.11n
Which of the following address blocks
would MOST likely be blocked from
crossing a border router?
 A) 8.0.0.0/8
 B) 172.16.0.0/12
 C) 122.0.0.0/24
 D) 248.0.0.0/8
Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is reachable?
 A) Nmap
 B) Nbtstat
 C) Dig
 D) Arp
Which of the following ports would have to
be allowed through a firewall to allow SNMP
traffic to pass on its default port? (Select
TWO)
 A) 22
 B) 23
 C) 243
 D) 161
 E) 162
 F) 8080
Lisa, a network technician, needs to
introduce a few more cables to the existing
patch panel. Which of the following tools
would she use?
 A) OTDR
 B) Multimeter
 C) Punch down tool
 D) Temperature monitor
Jeff, a technician is setting up an IDS security
device. Which of the following should be
configured on the switch to utilize the IDS?
 A) PoE
 B) Port mirroring
 C) Convergence
 D) Port speed
Jeff, a network technician, is
installing a wireless router. Which of
the following should Jeff consider to
get the BEST signal strength?
 A) WAP placement
 B) PoE devices
 C) MAC filtering
 D) Encryption type
Zach, a technician suspects a duplicate IP
address assignment on the network. Which
of the following resources can be used to
verify this problem?
 A) Network map
 B) Environmental monitor
 C) Placement map
 D) Syslog
Lisa, a technician, decides to upgrade a router
before leaving for vacation. While away, users
begin to report slow performance. Which of the
following practices allows other technicians to
quickly return the network to normal speeds?
 A) Change management
 B) Baselines
 C) Asset management
 D) Cable management
A VPN concentrator is used for which
of the following purposes?
 A) MAC filtering
 B) Content filtering
 C) Secure network access
 D) Connectivity troubleshooting
Which of the following layers of the OSI
model, maps to the Network Interface
layer of the TCP/IP Protocol stack? (pick
2)
 A) Physical
 B) Session
 C) Data Link
 D) Network
 E) Transport
Which of the following tools would Lisa, a
technician, BEST use to trace a wire
through an area where multiple wires of
the same color are twisted together?
 A) Cable tester
 B) Toner probe
 C) Cable crimper
 D) Punch down tool
Kim, a user, cannot access the network using
wireless. Which of the following is MOST
likely the cause?
 A) TXRX is reversed
 B) Faulty crossover cable
 C) IncorrectWEP key
 D) A short in the cable pairs
Lisa, a user, reports the network is down. While
troubleshooting, a technician walks into a
communications closet and notices a small patch
cable with both ends plugged into interfaces on
the same switch. Which of the following is this
an example of?
 A) Switch loop
 B) Port bonding
 C) Virtual switch
 D) Port mirroring
Jeff, a technician, is charged with setting up
network monitoring for critical devices in the
network. It is important the information be sent
securely to the monitoring station. Which of the
following protocols will support secure
transmission of the data?
 A) SNMPv2
 B) VPN
 C) SYSLOG
 D) SMTP
Which of the following utilities would
Kim, a technician, use to resolve the FQDN
of a web server to its IP address?
 A) Netstat
 B) Route
 C) Nslookup
 D) Arp
Zach, a technician, is installing an 802.11n
network. Which of the following should he
disable to stop broadcasting the network
name?
 A) Channel
 B) WEP
 C) SSID
 D) WEPA
Which of the following can Jeff, a
technician, modify on a 802.11n router that
is not available as an option on an 802.11g
device?
 A) SSID
 B) Encryption
 C) Channels
 D) Spectrum
Jeff, an end user, has plugged in both ends of
the same network cable to two adjacent jacks.
Both ports are connected to the same switch in
the IDF. Which of the following will MOST likely
happen?
 A) VLAN malfunction
 B) Broadcast storm
 C) Quality of Service loss
 D) Duplicate IP addresses
An analog POTS voice line is no longer
working and Kim, the technician, is tasked
to verify if a dial tone is present at the
IDF. Which of the following tools would be
used?
 A) Protocol analyzer
 B) Butt set
 C) OTDR
 D) Toner probe
Lisa, a technician, is troubleshooting a
cable problem. She has checked both ends and
suspects an issue 50 yards (46 meters) from
the location. Which of the following network
tools will confirm this analysis?
 A) TDR
 B) Protocol analyzer
 C) Multimeter
 D) Cable crimper
Which of the following properties of DHCP
would Lisa, a technician, use to ensure an
IP address is not leased out from the active
scope?
 A) Reservations
 B) Lease times
 C) Removing IPs from the active leases
 D) Configuring the DNS options
Zach, a network technician, has been
troubleshooting a connectivity problem in the LAN
room. He has diagnosed the problem and
implemented a solution. Which of the following
would be Zach’s NEXT step?
 A) Test the theory
 B) Establish a plan of action
 C) Establish a theory
 D) Document findings
Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?
 A) OTDR
 B) Protocol analyzer
 C) Toner probe
 D) TDR
Two WAPs are positioned with overlapping
coverage, but seamless roaming across them
is not working. Which of the following
should be checked?
 A) WPA should be enabled
 B) PKI should be turned off
 C) WAP SID’s are matching
 D) WAPs are transmitting on the same channel
Which of the following would Kim, a
technician, do to monitor remote traffic
through an access point?
 A) Enable an SNMP agent
 B) Enable network mapping
 C) Set monitoring SSID
 D) SelectWPA2
Which of the following 802.11n features
allows for the use of multiple
simultaneous frequencies in order to
increase usable bandwidth?
 A) Channel bonding
 B) MIMO
 C) Spatial reuse
 D) 20MHzchannel spacing
Which of the following ports would Zach, a
technician, need to open on a firewall to
allow SSH on the default port?
 A) 20
 B) 21
 C) 22
 D) 23
Which of the following separates
broadcast domains?
 A) Port mirroring
 B) Router
 C) Convergence
 D) Switch
Zach, a technician, needs to terminate a
CAT5e Ethernet cable to a 110 block. Which
of the following tools should be used?
 A) Tone probe
 B) Punch down
 C) Wire tester
 D) Crimper
Kim, a technician, needs to locate a cable
in an unorganized wiring closet. Which of
the following tools will help her locate the
cable?
 A) Protocol analyzer
 B) Cable tester
 C) Toner probe
 D) Punch down tool
Jeff, a technician, has been asked to add a
subnet to the company’s LAN. Which of the
following interfaces on the router will be
modified?
 A) Fast Ethernet 0/0
 B) AUX 0
 C) Console 0
 D) Serial 0/0/0
Lisa, a network technician, is attempting to map a
FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT. Which of the following
is the reason this will ultimately not work?
 A) This is a private address that cannot be seen
by external users
 B) This address does not have the appropriate
subnet mask assigned
 C) This is a public address which can only be
seen by internal users
 D) This is a private address which can only be
seen by external users
Jeff, a user, is having a problem with a
POTS line. Which of the following tools
would Jeff use to make sure the phone
lines have a dial tone?
 A) Loopback plugs
 B) Butt set
 C) Cable certifier
 D) Tone probe
Lisa, a technician, has configured a new switch
that is remotely accessed using SSH. The switch is
working properly, but cannot be accessed remotely.
Which of the following items is MOST likely missing
in the configuration?
 A) Port speed
 B) Cryptokey
 C) DataVLAN
 D) NAT/PAT
Which of the following protocols
is used to securely connect to a
multi-layer switch?
 A) HTTP
 B) SMTP
 C) SSH
 D) Telnet
Which of the following is the prefix for a
link-local IPv6 address?
 A) FE80::/10
 B) FFOO::/8
 C) 2FFE::/16
 D) FEEF::/12
Zach, a technician, is checking newly installed
CAT5 cabling and suspects that some of the ends
were not properly terminated. Which of the
following tools will verify this?
 A) Cable tester
 B) Tone probe
 C) OTDR
 D) Loopback plug
There is suspected virus activity on the
network. Which of the following would
Lisa, a technician, use to study network
traffic?
 A) Protocol analyzer
 B) Cable tester
 C) Cable verifier
 D) Environmental monitor
Which of the following is used to
prevent Layer 2 switching loops
within a local area network?
 A) STP
 B) MTU
 C) EGP
 D) IGP
Which of the following network management
tools can filter information from all data
entering and leaving a specific port on the
switch?
 A) SNMP trap
 B) Bandwidth analyzer
 C) Network sniffer
 D) Syslog server
Which of the following is a method to
prioritize network traffic coming on VoIP
phones?
 A) PAT
 B) DNS
 C) SIP
 D) QoS
Which of the following network
devices hides network nodes
behind one public IP address?
 A) Layer 3 switch
 B) Content filter
 C) VPN server
 D) Proxy server
A mobile user is no longer able to access network resources.
Jeff, the network technician, is unable to ping the user’s
workstation. Which of the following commands would MOST likely
be used on that workstation to verify its current network
settings?
 A) Net share
 B) Hostname
 C) IPconfig
 D) Tracert
Which of the following Ethernet
technologies has the LONGEST
distance possible?
 A) 1000BaseLX
 B) 1000GBaseSR
 C) 1000BaseSX
 D) 1000BaseT
Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
 A) DoS
 B) Smurf attack
 C) Virus
 D) Man-in-the-middle
Which of the following is a terminal
emulator used to manage a network device?
 A) VPN
 B) IDS
 C) PUTTY
 D) IPS
Which of the following DNS record
types is used for IPv6 resolution?
 A) MX
 B) AAAA
 C) A
 D) PTR
A technician has received word that the
telephone company has added another POTS
line to the building. Where will the
technician MOST likely find the new line?
 A) CSU
 B) Demarc
 C) Registered jack
 D) DSU
Which of the following is the MAXIMUM
distance a single 1000BaseT segment can
cover?
 A) 100 kilometers (62 miles)
 B) 10 kilometers (6 miles)
 C) 1000 meters (3281 feet)
 D) 100 meters (328 feet)
Kim, a network technician wants to use a packet analyzer to
troubleshoot a reported problem with a user's workstation with
IP address 192.168.1.45. To identify the workstation's packets
she wants to use the workstation's MAC address. Which of the
following protocols would provide the needed information?
 A) DHCP
 B) ARP
 C) DNS
 D) Ping
An organization currently has CAT5e cabling
throughout its office. Kim, the network
technician, is troubleshooting a new CAT6 run
that supports network traffic but does not meet
specification when tested with a TDR. Which of
the following is MOST likely the cause?
 A) Improper grounding
 B) TXRX reversed
 C) Incorrect termination
 D) Outdated NIC drivers
Which of the following are components of
IPSec? (Select 2)
 A) AH
 B) ESP
 C) SSH
 D) ICA
 E) TLS
Which of the following
authenticates, allows, and controls
the execution of router commands?
 A) PKI
 B) RADIUS
 C) Kerberos
 D) TACACS+
A technician is configuring a wireless
network. To avoid interference from other
wireless networks in the area, the
technician should change which setting?
 A) Channel
 B) SSID
 C) Firewall rule
 D) Encryption
Jeff, a company executive, has noticed that a wireless
network signal from the company's WAP can be seen in the
company's parking lot. Jeff is very worried that this is a
potential security threat.
Which of the following can be done to eliminate this
threat?
 A) Implement WEP encryption
 B) Decrease signal strength
 C) Change wireless channels
 D) Rotate the SSID daily
Which of the following DNS record types
provides the hostname to IP address
mapping?
 A) A record
 B) NS record
 C) CNAME record
 D) MX record
Which of the following would be used to
test out the security of a specific
network by allowing it to receive
security attacks?
 A) Honeynet
 B) Honeypot
 C) Vulnerability scanner
 D) Network based IDS
Which of the following would Kim, a
technician, use in voice over IP
communications?
 A) SNTP
 B) SCP
 C) SMTP
 D) SIP
Which of the following is the best way to
mitigate security threats on a network?
 A) Social engineering
 B) User training
 C) Incident response
 D) Man-in-the-middle
Which of the following subnet masks would
allow for 192.168.0.3 and 192.168.0.240
to be in the same subnet?
 A) 255.255.255.0
 B) 255.255.255.128
 C) 255.255.255.192
 D) 255.255.255.248
Jeff, an administrator, wishes to add a
third network segment to the firewall
where the company’s public web servers
will be placed. Which of the following
BEST describes this new segment?
 A) PKI
 B) VPN
 C) IPS
 D) DMZ
Which of the following would help a new
administrator quickly determine if a
network had a VLAN for its publicly
accessible servers?
 A) Baselines
 B) Regulations
 C) Logical network diagrams
 D) Wiring schematics
Which of the following has the
HIGHEST data rate speed?
 A) T1
 B) ADSL
 C) SDSL
 D) OC-3
Which of the following technologies is
associated with the DOCSIS standard?
 A) Cable
 B) Dialup
 C) Wireless
 D) Cellular
Which of the following MUST be used when
securing a VoIP network consisting of
private IP addresses?
 A) IPS
 B) Application layer firewall
 C) IDS
 D) An unmanaged switch
Which of the following should an
administrator do after running a command
from the console on the perimeter router?
 A) Update the configuration logs
 B) Update the network wiring schematics
 C) Update the network configuration procedures
 D) Compare the configuration with the baseline
Kim, a technician, is connecting a new desktop computer to
a switch. She was only able to locate one cable in the
office for installation. The wires at each end are color
coded as follows: END A orange-white, orange, green-
white, blue, blue-white, green, brown-white, brown. END B
green-white, green, orange-white, blue, blue-
white, orange, brown-white, brown. Which of the following
should Kim do to complete the installation?
 A) Re-end the provided cable, keeping the wiring the
same.
 B) Use the provided cable
 C) Purchase a crossover cable
 D) Purchase a straight-through cable
Which of the following are fiber
connectors? (Select 2)
 A) LC
 B) MTRJ
 C) T1
 D) DB-9
 E) BNC
Which of the following solutions will
detect and disable a rogue access point?
 A) Port scan
 B) packet sniffer
 C) IPS
 D) IDS
Which of the following is the MOST
economical way for Sandy, a
technician, to implement 10-Gigabit
Ethernet at a datacenter?
 A) 10GBaseLR
 B) 10GBaseSR
 C) 10G BaseX
 D) 10GBaseT
Which of the following can be done
to increase a wireless LAN cell
size?
 A) Add a higher gain omni antenna
 B) Add diversity antennas
 C) Add a higher gain yagi antenna
 D) Increase the PoE wattage
Which of the following can be configured
to restrict specific ports and IP
addresses from accessing the internal
network? (select 2)
 A) Layer 2 switch
 B) MAC address filtering
 C) ACLs
 D) IIS server
 E) Port scanner
 F) Firewall
Which of the following is used to
identify active hosts along with their
network addresses?
 A) Port scan
 B) Ping sweep
 C) IDS
 D) NIPS
Which of the following is used to share
traffic between multiple network
connections?
 A) Load balancer
 B) Content filter
 C) VPN concentrator
 D) Proxy server
What layers of the OSI model
does Stateful Inspection
operate at?
It assures the connection (session) between 2
parties is valid and inspects packets from this
connection to assure the packets are not
malicious (application level) and acts as a
circuit level firewall. It operates at the network
3, session 5, & application 7 layers
Which of the following cable types
allows for the LONGEST distance of
a Gigabit Ethernet connection?
 A) Multimode fiber
 B) CAT6a
 C) Single mode fiber
 D) Coaxial
Which of the following mediums is
circuit switched?
 A) PSTN
 B) ATM
 C) Frame relay
 D) MPLS

Contenu connexe

Tendances

Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 examreiryuzaki
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.igede tirtanata
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Dân Chơi
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
Generic network architecture discussion
Generic network architecture discussionGeneric network architecture discussion
Generic network architecture discussionARCFIRE ICT
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES Amira Dolce Farhana
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 
Communication Networks 1
Communication Networks 1Communication Networks 1
Communication Networks 1mahamed Ayesh
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.igede tirtanata
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiTania Ellinidou
 

Tendances (20)

Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 exam
 
Ccna 200-120 Exam Dumps
Ccna 200-120 Exam DumpsCcna 200-120 Exam Dumps
Ccna 200-120 Exam Dumps
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Generic network architecture discussion
Generic network architecture discussionGeneric network architecture discussion
Generic network architecture discussion
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
Communication Networks 1
Communication Networks 1Communication Networks 1
Communication Networks 1
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
 
31, Get more from your IPv4 resources
31, Get more from your IPv4 resources31, Get more from your IPv4 resources
31, Get more from your IPv4 resources
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 

En vedette

Ata 2010 Steve Brubaker Data Analytics
Ata 2010   Steve Brubaker Data AnalyticsAta 2010   Steve Brubaker Data Analytics
Ata 2010 Steve Brubaker Data Analyticsstevebrubaker
 
Thesis Presentation 2009
Thesis Presentation 2009Thesis Presentation 2009
Thesis Presentation 2009joangriff
 
Web Science, SADI, and the Singularity
Web Science, SADI, and the SingularityWeb Science, SADI, and the Singularity
Web Science, SADI, and the SingularityMark Wilkinson
 
Curriculum specification F4
Curriculum specification F4Curriculum specification F4
Curriculum specification F4hajahrokiah
 
Menos errores en finanzas personales
Menos  errores en finanzas personalesMenos  errores en finanzas personales
Menos errores en finanzas personalespipis397
 
The Semantic Web - This time... its Personal
The Semantic Web - This time... its PersonalThe Semantic Web - This time... its Personal
The Semantic Web - This time... its PersonalMark Wilkinson
 
Research - this time it's personal
Research - this time it's personalResearch - this time it's personal
Research - this time it's personalMark Wilkinson
 
Building a Mega Community with PressWork
Building a Mega Community with PressWorkBuilding a Mega Community with PressWork
Building a Mega Community with PressWorkBrendan Sera-Shriar
 
Cs For Mk Brochure[1]
Cs For Mk Brochure[1]Cs For Mk Brochure[1]
Cs For Mk Brochure[1]Jodi1269
 
Tomcat Maven Plugin
Tomcat Maven PluginTomcat Maven Plugin
Tomcat Maven PluginOlivier Lamy
 
Technologies, methods and challenges to data sharing and aggrigation
Technologies, methods and challenges to data sharing and aggrigationTechnologies, methods and challenges to data sharing and aggrigation
Technologies, methods and challenges to data sharing and aggrigationMark Wilkinson
 
Part 1: Lean Clinical Workplace Design
Part 1: Lean Clinical Workplace DesignPart 1: Lean Clinical Workplace Design
Part 1: Lean Clinical Workplace DesignHenryRahn
 
Virtual Event Planning
Virtual Event PlanningVirtual Event Planning
Virtual Event PlanningRayFerreira
 
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015Mark Wilkinson
 
Enhancing Reproducibility and Transparency in Clinical Research through Seman...
Enhancing Reproducibility and Transparency in Clinical Research through Seman...Enhancing Reproducibility and Transparency in Clinical Research through Seman...
Enhancing Reproducibility and Transparency in Clinical Research through Seman...Mark Wilkinson
 

En vedette (20)

PAPER 2 2010
PAPER 2 2010PAPER 2 2010
PAPER 2 2010
 
Ata 2010 Steve Brubaker Data Analytics
Ata 2010   Steve Brubaker Data AnalyticsAta 2010   Steve Brubaker Data Analytics
Ata 2010 Steve Brubaker Data Analytics
 
Thesis Presentation 2009
Thesis Presentation 2009Thesis Presentation 2009
Thesis Presentation 2009
 
Web Science, SADI, and the Singularity
Web Science, SADI, and the SingularityWeb Science, SADI, and the Singularity
Web Science, SADI, and the Singularity
 
Window Activity
Window ActivityWindow Activity
Window Activity
 
Curriculum specification F4
Curriculum specification F4Curriculum specification F4
Curriculum specification F4
 
Menos errores en finanzas personales
Menos  errores en finanzas personalesMenos  errores en finanzas personales
Menos errores en finanzas personales
 
Combine Experiments
Combine ExperimentsCombine Experiments
Combine Experiments
 
The Semantic Web - This time... its Personal
The Semantic Web - This time... its PersonalThe Semantic Web - This time... its Personal
The Semantic Web - This time... its Personal
 
Research - this time it's personal
Research - this time it's personalResearch - this time it's personal
Research - this time it's personal
 
Gene Search
Gene SearchGene Search
Gene Search
 
Parade of books!
Parade of books!Parade of books!
Parade of books!
 
Building a Mega Community with PressWork
Building a Mega Community with PressWorkBuilding a Mega Community with PressWork
Building a Mega Community with PressWork
 
Cs For Mk Brochure[1]
Cs For Mk Brochure[1]Cs For Mk Brochure[1]
Cs For Mk Brochure[1]
 
Tomcat Maven Plugin
Tomcat Maven PluginTomcat Maven Plugin
Tomcat Maven Plugin
 
Technologies, methods and challenges to data sharing and aggrigation
Technologies, methods and challenges to data sharing and aggrigationTechnologies, methods and challenges to data sharing and aggrigation
Technologies, methods and challenges to data sharing and aggrigation
 
Part 1: Lean Clinical Workplace Design
Part 1: Lean Clinical Workplace DesignPart 1: Lean Clinical Workplace Design
Part 1: Lean Clinical Workplace Design
 
Virtual Event Planning
Virtual Event PlanningVirtual Event Planning
Virtual Event Planning
 
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015
Building SADI Services Tutorial - SIB Workshop, Geneva, December 2015
 
Enhancing Reproducibility and Transparency in Clinical Research through Seman...
Enhancing Reproducibility and Transparency in Clinical Research through Seman...Enhancing Reproducibility and Transparency in Clinical Research through Seman...
Enhancing Reproducibility and Transparency in Clinical Research through Seman...
 

Similaire à Test King Virtual Test--Network+

Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networksimacomobio
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptximacomobio
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Networkimacomobio
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptximacomobio
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
 
Computer Networks Mcqs.pdf
Computer Networks Mcqs.pdfComputer Networks Mcqs.pdf
Computer Networks Mcqs.pdfIT Eagers
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsShusil Baral
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodologysandibabcock
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxcravennichole326
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxelbanglis
 

Similaire à Test King Virtual Test--Network+ (20)

Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Network
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptx
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
 
Computer Networks Mcqs.pdf
Computer Networks Mcqs.pdfComputer Networks Mcqs.pdf
Computer Networks Mcqs.pdf
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Wn vt
Wn vtWn vt
Wn vt
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Test King Virtual Test--Network+

  • 2. Which of the following is a standard measure of signal power?  A) MhZ  B) mips  C) dBm  D) Gbps
  • 3. Which of the following is the network topology in which computers connect in a closed circle?  A) Bus  B) Mesh  C) Ring  D) Star
  • 4. The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?  A) 1  B) 3  C) 4  D) 5
  • 5. Which of the following is the correct representation of an IPv6 address?  A) ::  B) 0:0:0:0:0:0:0:0:1  C) 1:2:3:4:AB:CD:EF  D) 2001::4860:800f::
  • 6. Which of the following security devices would MOST likely be used on a network to screen & prevent malicious traffic?  A) IDS  B) VPN  C) NIPS  D) HIDS
  • 7. What is a client?  A Client is a device an end user uses to access a network . This device can be a workstation, laptop, smart phone with wireless capabilities, or a variety of other end-user terminal devices.
  • 8. Users report that their internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video music. Which of the following would BEST confirm Zach’s theory?  A) Traffic analysis  B) SNMP  C) History logs  D) System logs
  • 9. A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?  A) IS-IS  B) BGP  C) OSPF  D) RIP
  • 10. Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?  A) Question users  B) Test the theory  C) Re-establish a theory of probable cause  D) Escalate the problem
  • 11. A server technician notices that some changes were implemented on a server during non-business hours. Which of the following would allow the technician to identify the last time an administrator was remotely connected to the server?  A) Network sniffer  B) Traffic analyzer  C) System log  D) Security log
  • 12. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?  A) Gateway  B) Hub  C) Bridge  D) Router
  • 13. Which of the following 802.11 standards is MIMO used in?  A) a  B) b  C) g  D) n
  • 14. A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper & ink. Which of the following should the technician do NEXT?  A) Implement the solution  B) Question users  C) Test theory  D) Escalate the problem
  • 15. Which of the following would be the BEST IDS topology for monitoring one specific device?  A) Signature-based  B) Network-based  C) Host –based  D) Behavior-based
  • 16. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?  A) Supernetting  B) Dynamic  C) Subletting  D) Convergence
  • 17. Which of the following fiber types is MOST often used indoors?  A) Plenum  B) Modal conditioning  C) Singlemode  D) Multimode
  • 18. Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?  A) 20  B) 53  C) 80  D) 3389
  • 19. A customer reports a network patch cable was unplugged from a switch & plugged back into an available switch port. The switch’s activity lights have been lit up constantly & network response times are extremely slow. Which of the following issues is MOST likely occurring?  A) Switching loop  B) DDoS attack  C) Mismatched MTU  D) Port mirroring
  • 20. Which of the following protocols is used to assign IP addresses to network devices?  A) UTP  B) DHCP  C) FTP  D) TCP/IP
  • 21. Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?  A) Content filtering  B) Port filtering  C) MAC filtering  D) IP filtering
  • 22. Which of the following allows access to a network, based on the hardware address of a network card?  A) Content filtering  B) Port filtering  C) MAC filtering  D) IP filtering
  • 23. Which of the following is true of NIPS?  A) Routes traffic to the proper port  B) Detects malicious host traffic  C) Detects and prevents harmful traffic  D) Prevents traffic on network hosts
  • 24. Which of the following protocols is used for remote management of devices?  A) TFTP  B) SNMP  C) Syslog  D) SMTP
  • 25. Which encryption type uses only a 28 character key?  A) 40/64 bitWEP  B) WPA Personal  C) 104/128 bitWEP  D) WPA@PSK
  • 26. At which of the following layers of the OSI model do frames exist?  A) Application  B) Network  C) Transport  D) Data link
  • 27. Which of the following utilities can be used to list the routing table?  A) Ipconficj  B) Nslookup  C) Dig  D) Netstat
  • 28. Which of the following OSI model layers is between the Network and Session layers?  A) Presentation  B) Data link  C) Physical  D) Transport
  • 29. Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?  A) OTDR  B) Protocol analyzer  C) TDR  D) Toner probe
  • 30. Which of the following tools would BEST be used to verify if a network cable is properly terminated?  A) Multimeter  B) Cable certifier  C) Toner probe  D) Cable stripper
  • 31. Which of the following uses port 53 by default?  A) RDP  B) QoS  C) DHCP  D) DNS
  • 32. Network administrators use which of the following to monitor and map network availability, performance, and error rates?  A) SMTP  B) PPoE  C) PoE  D) SNMP
  • 33. Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Jeff implement?  A) DNS  B) NAT  C) PKI  D) RAS
  • 34. A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed through or dumped is a example of which of the following?  A) Packet sniffing  B) Packet filter  C) Stateful inspection  D) Content filter
  • 35. Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters) from the house. Zach wants to extend the Internet connection from the home to the garage. Which of the following technologies would MOST likely accommodate this range?  A) DVI cable  B) Bluetooth  C) Wireless  D) CAT3 cable
  • 36. A power failure caused a router to reboot. Now users are not able to reach remote networks. Which of the following is the MOST likely cause?  A) Dynamic NAT tables were erased by the reset  B) The DNS server settings on the workstations are incorrect  C) MAC entries in the ARP table were not saved  D) The technician did not save the running configuration
  • 37. Which of the following is a device directly used by an end user to access a network?  A) Server  B) LAN  C) Client  D) Router
  • 38. What does a Switch do?  Interconnects network components like a hub except the switch interrogates the traffic to find out where its destined and forwards the traffic thru the right port. It is considered a Layer 2 device because it makes its forwarding decisions from the Media Access Control (MAC) address burned into the NIC card.
  • 39. Which device makes traffic- forwarding decisions based on the MAC address?  A) Hub  B) Router  C) Switch  D) Multiplexer
  • 40. What type of network is a MAN?  MAN or Metro Ethernet is smaller than aWAN. a MAN interconnects locations throughout a metropolitan area via a service provider’s high speed network (10 Gbps)
  • 41. A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?  A) WAN  B) CAN  C) PAN  D) MAN
  • 42. What type of network is a PAN?  PAN is network whose range is only a few meters and much smaller than a LAN. It consists of a connection between a PC and a digital camera via a universal serial bus (USB ) cable. It could also be a PC connected to an external hard drive via a FireWire connection, A PAN is not necessarily a wired connection, it can also be a Bluetooth connection between a cell phone & a car’s wireless audio system.
  • 43. A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?  A) WAN  B) CAN  C) PAN  D) MAN
  • 44. What are some characteristics of the star topology?  Most popular physical LAN topology used today. The Ethernet switch is in the center of the star and unshielded twisted pair (UTP) cables run from the switch ports to the client and back. It uses more cables than the other topologies because each device requires its own wiring to the central device. If one of the cables breaks it only affects the device its connected to not the entire group.
  • 45. Which of the following LAN topologies requires the most cabling?  A) Bus  B) Ring  C) Star  D) WLAN
  • 46. Which of all the Network Topologies is the least fault tolerant and why?  A bus network requires only a single cable per segment. If any device in the segment fails, then the whole segment crashes.
  • 47. What are the characteristics of a Full- Mesh topology?  Offers the highest level of redundancy. Each site is directly connected to every other site so an optimal route exists between any two sites. It is also highly fault resistant. It is difficult and expensive to scale, because to add a new site requires aWAN link to every other site.
  • 48. Which of the following topologies offers the highest level of redundancy?  A) Full Mesh  B) Hub & Spoke  C) BUS  D) Partial Mesh
  • 49. How to calculate the number of required WAN connections for a Full-Mesh topology?  Example: If you have 5 remote sites  W= number ofWAN links  N = number of sites  W=n * (n-1) / 2  w = 5 * (5-1) / 2 (4 / 2)  w = 5 * 2  w = 10  Ans: 10WAN links are required 5 there & 5 back
  • 50. How many WAN links are required to create a full mesh of connections between 5 remote sites?  A) 5  B) 10  C) 15  D) 20
  • 51. How does the Hub and Spoke topology differ from the Full- Mesh topology?  Costs are reduced because each site is connected to a central hub, not to each other so a small amount of links are needed. It’s also more scalable because to add another site only requires a connection to the hub. It also lacks redundancy because every site goes through the central Hub so it becomes a single point of failure. If the hub is down so is the network.
  • 52. Identify two advantages of a hub-and- spoke WAN topology as compared to a Full-Mesh WAN topology? (Pick 2)  A) Lower Cost  B) Optimal Routes  C) More scalable  D) More redundancy
  • 53. What are the characteristics of a Peer-to- peer network?  Used for small or home based businesses, less than 10 PC’s. It allows all interconnected devices to share resources like files, and printers. Inexpensive network to run, limited scalability. The more PC’s on the network decreases performance & increases the burden of managing multiple clients for the administration.
  • 54. Which type of network is based on clients sharing resources with one another?  A) Client-server  B) Client- peer  C) Peer-to-peer  D) Peer-to-server
  • 55. Which of the following is an advantage of a peer–to-peer network, as compared with a client-server network?  A) More scalable  B) Less expensive  C) Better performance  D) Simplified administration
  • 56. What is a Server?  A server, serves up resources to a network. These resources might include e-mail access, (as provided by an e-mail server) web pages (as provided by a web server) or files (available on a file server)
  • 57. What is a Hub?  It is a device that interconnects network components, such as clients, and servers. Hubs vary in their number of available ports. Hubs can be interconnected to a point. Too many hubs chained together will result in network errors. A hub does not perform any inspection of the traffic it passes. It receives traffic through a port that’s connected to a network cable then it repeats that traffic out of all the other ports.
  • 58. What are the 7 layers of the OSI Model?  Layer 1 The Physical Layer  Layer 2 The Data Link Layer  Layer 3 The Network Layer  Layer 4 TheTransport Layer  Layer 5 The Session Layer  Layer 6 The Presentation Layer  Layer 7 TheApplication Layer
  • 59. What is the difference between the OSI reference model and the TCP/IP model?  *The OSI ensures reliable delivery of packets at the transport layer (4) *TCP/IP Model matches up to the OSI model as: The Network Interface (Link) layer compares to the Physical & Data Link,The Internet layer is comparable to the Network,Transport is the same in both, &The Application layer inTCP/IP handles layers 5, 6,& 7 in the OSI model. TCP/IP does not guarantee reliable delivery of packets at layer 4 (transport). TCP/IP also offers the UDP (connectionless transport layer protocol) option.
  • 60. What is the function of the second layer know as The Data Link Layer?  The Data Link Layer has 2 sub layers The 1st sub layer is the Media Access Control (MAC)This handles the:  Physical Addressing  LogicalTopology  Method of transmitting on the media.  The 2nd sub layer is the Logical Link Control (LLC)This sub layer handles the:  Connection services  Synchronizing transmissions.
  • 61. Which layer of the OSI reference model contains the MAC and LLC sub layers?  A) The Network Layer  B) TheTransport Layer  C) The Physical Layer  D) The Data Link Layer
  • 62. What is Baseband?  Baseband resides in the 1st layer of the OSI Model in the Physical Layer unlike broadband where it divides the bandwidth over copper etc.. Baseband uses all available frequencies on a medium to transmit data. Ethernet is an example of a network technology that uses baseband.
  • 63. Which approach to bandwidth usage consumes all available frequencies on a medium to transmit data?  A) Broadband  B) Baseband  C) Time – Division Multiplexing  D) Simplex
  • 64. Windowing is provided at what layer of the OSI reference model?  A) Data Link Layer  B) Network Layer  C) Transport Layer  D) Physical Layer
  • 65. Which of the following IP addresses would be classified as private?  A) 10.100.200.0  B) 169.253.5.0  C) 172.168.5.0  D) 200.100.25.0
  • 66. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)  A) High availability  B) Fault tolerance  C) Reduce latency  D) Wi-MAX  E) CARP
  • 67. PKI is a method of user authentication which uses which of the following?  A) Various router commands  B) Access control lists  C) Certificate services  D) A RADIUS server
  • 68. Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).  A) IDS  B) Packet sniffer  C) Port scanner  D) Malware scanner  E) Ping sweep
  • 69. IP addresses reside at which layer of the OSI reference model?  A) Network Layer  B) Session Layer  C) Data Link Layer  D) Transport Layer
  • 70. Which of the following is a connectionless transport layer protocol?  A) IP  B) TCP  C) UDP  D) H.323
  • 71. Identify the 4 layers of the TCP/IP stack (Choose four)  A) Session Layer  B) Transport Layer  C) Internet Layer  D) Data Link Layer  E) Network Layer  F) Application Layer  G) Network Control Layer
  • 72. What is the range of well-known TCP and UDP ports? A) Below 2048  B) Below 1024  C) 16,384 – 32,768  D) Above 8192
  • 73. Which protocol supports a secure connection to a remote host via terminal emulation software?  A) Telnet  B) SSH  C) FTP  D) SFTP
  • 74. Identify the well known port number for NTP?  A) 53  B) 69  C) 123  D) 143
  • 75. Identify 3 e-mail protocols? (choose 3)  A) SNMP  B) SMTP  C) POP3  D) IMAP4
  • 76. What type of coaxial cable was often used for 10Base2 Ethernet networks?  A) RG – 6  B) RG – 45  C) RG – 58  D) RG - 59
  • 77. Which of the following categories of UTP cabling are commonly used for 1000Base-T networks? (choose 2)  A) CAT 5  B) CAT5e  C) CAT6  D) CAT6e
  • 78. Which type of cable might be required for installation in a drop ceiling, which is used as an open air return duct?  A) Riser  B) Plenum  C) Multimode  D) Twin-axial
  • 79. Which network infrastructure device primarily makes forwarding decisions based on MAC addresses?  A) Router – (Layer 3 device)  B) Switch (Layer 2 device)  C) HUB ( Layer 1 device)  D) Multi-Layer switch (Layers 2 & above)
  • 80. A router(Layer 3) primarily makes its forwarding decisions based on what address?  A) Destination MAC address  B) Source IP address  C) Source MAC address  D) Destination IP address
  • 81. Identify 2 differences between an Ethernet bridge and an Ethernet switch (Choose 2)  A) Switches use ASIC’s to make forwarding decisions, while bridges make their forwarding decisions in software.  B) Bridges typically operate faster than switches  C) Switches typically have higher port densities than bridges  D) Bridges can base their forwarding decisions on logical network layer addresses
  • 82. What layer do Bridges operate at?  Bridges operate at the Data Link Layer or Layer 2
  • 83. What is the purpose of the SMB (server message block) protocol?  The SMB protocol runs on the UNIX or Linux server and helps theWindows server see the UNIX/Linux servers as if they were one of the Windows servers itself.
  • 84. What are BNC connectors used for?  BNC connectors are used to connect computers to a 10Base2 (thinnet) cable in the BUS topology.
  • 85. A router has 12 ports. How many broadcast domains does the router have?  A) None  B) One  C) Two  D) Twelve
  • 86. A switch has 12 ports. How many collision domains does the switch have?  A) None  B) One  C) Two  D) Twelve
  • 87. What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?  A) DHCPOFFER  B) DHCPACK  C) DHCPDISCOVER  D) DHCPREQUEST
  • 88. What specialized network device is commonly used to load balance traffic across multiple servers in a group?  A) Content switch  B) Proxy server  C) DNS server  D) Content engine
  • 89. What is CSMA/CA AND WHAT DOES IT DO?  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) It is the basic medium access method for IEEE 802.11(g) wireless networks. (CSMA/CD is collision detection, and it’s the basic access method for Ethernet networks)
  • 90. What is DNS?  Domain Name System (DNS) A system that provides a way to map friendly host names or URL’s to IP addresses.
  • 91. What is meant by Default Gateway?  It is the route taken so that a computer on one segment can communicate with a computer on another segment.
  • 92. What is the Demilitarized Zone (DMZ) and what does it do?  The DMZ describes the area in a network design that is located between the internal network & the external network. Usually the internet. It is used for devices accessible to internet traffic such as the web server, FTP server, SMTP server, and DNS.
  • 93. Which of the following describes a DNS server?  A) Translates an IP address to a name  B) Caches commonly viewed web pages  C) Assigns IP addresses to network devices  D) Provides port security for a network
  • 94. After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).  A) Bad Ethernet switch port  B) TX/RX reversed  C) Bad connectors  D) Bad patch cable  E) Mismatched MTU
  • 95. Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?  A) RDP  B) SSLVPN  C) ISAKMP  D) TLS2.0
  • 96. Which of the following can be an STP cable?  A) RG-6  B) CAT5E  C) Fiber  D) RG-59
  • 97. Which of the following wireless authentication methods provides the GREATEST amount of security?  A) WEP  B) WPA Enterprise  C) WPA Personal  D) WPA2 Personal
  • 98. Which of the following OSI model layers is used for logical addressing?  A) Physical  B) Transport  C) Network  D) Data link
  • 99. In which of the following layers of the OSI model does the TCP protocol operate?  A) Session  B) Network  C) Data link  D) Transport
  • 100. A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause?  A) Protocol mismatch  B) MTU size was not increased for the new distance  C) IncorrectVLAN assignment  D) Incorrect cabling
  • 101. Which of the following protocols is used by the ping command?  A) SMTP  B) ICMP  C) TFTP  D) ARP
  • 102. Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration?  A) Baseline  B) Physical network diagram  C) Wiring schematic  D) Logical diagram
  • 103. Which of the following authenticates, allows, and controls the execution of router commands?  A) PKI  B) RADIUS  C) Kerberos  D) TACACS+
  • 104. A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?  A) Document the solution and process  B) Establish the most probable cause  C) Implement and test the solution  D) Identify additional symptoms and problems
  • 105. A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?  A) Packet filtering  B) Content filtering  C) Packet sniffing  D) Application gateway
  • 106. Which of the following is a valid IPv6 address?  A) 1056: 958: E486:: F8:8962  B) 1596:H593:B5D8::B589  C) 2048:9584:A6B8::0983  D) 4820::0985:489D::8761
  • 107. Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?  A) Change the DNS server IP on the client  B) Information gathering  C) Change the workstation IP address  D) Establish a plan of action
  • 108. Logically separating the ports on a switch without physically separating them can be done using which of the following?  A) Routing tables  B) Hub logic  C) Spanning tree protocol  D) VLANs
  • 109. Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?  A) nmap  B) nbtstat  C) dig  D) arp
  • 110. A customer wants to have several internal services hosted on multiple servers, all of which need to be available to the Internet through a single public IP address. Which of the following would need to be configured?  A) QoS  B) PoE  C) PAT  D) VLAN
  • 111. Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?  A) Connectionless  B) Stateful  C) Full duplex  D) Quality of Service
  • 112. Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?  A) Decreasing radio strength  B) MAC filtering  C) WEP encryption  D) SSID broadcast disable
  • 113. Which of the following security measures is the LEAST intrusive on an end device?  A) NIPS  B) Host-based firewall  C) Antivirus  D) HIDS
  • 114. At which of the following layers of the OSI model does an unmanaged switch operate?  A) Layer 1  B) Layer 2  C) Layer 3  D) Layer 4
  • 115. Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?  A) The subnet mask is incorrect  B) A routing loop has occurred  C) Jeff used a crossover cable to connect the switch to the gateway  D) The server is missing default-gateway information
  • 116. An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre- shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues?  A) Limit the devices to 802.11n only  B) Enable the SSID broadcast  C) Enable MAC filtering  D) UseWEP 128-bit key
  • 117. When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?  A) Signal strength  B) SSID enable  C) Encryption  D) Password hardening
  • 118. Which of the following is an environment where only a username and password are required for successful authentication results in access to multiple resources?  A) Multiple logins  B) Multifactor authentication  C) Two-factor authentication  D) Single sign-on
  • 119. Which of the following methods limits access to a network based on characteristics of the network card?  A) IP filtering  B) MAC filtering  C) Port filtering  D) Encryption
  • 120. Which of the following threats is MOST likely to enable an attacker to modify data in transit?  A) DoS  B) Smurf attack  C) Virus  D) Man-in-the-middle
  • 121. Which of the following Ethernet technologies has the LONGEST distance possible?  A) 1000BaseLX  B) 1000GBaseSR  C) 1000BaseSX  D) 1000BaseT
  • 122. Which of the following technologies allows for redundant links within a layer 2 segment?  A OSPF  B RIP  C Port Mirroring  D SpanningTree
  • 123. Which of the following defines access for a network?  A) ACL  B) RDP  C) RAS  D) ARP
  • 124. A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?  A) Wire tap  B) Network sniffer  C) Load balancing appliance  D) NIPS
  • 125. Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?  A) Routing loop  B) MTU black hole  C) Framing error  D) SYN flood
  • 126. Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2)  A) traceroute E) Bandwidth shaper  B) ping F) Load Balancer  C) ipconfig G) DNS server  D) netstat H) IPS
  • 127. A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?  A) Fiber multiplexer  B) Repeater  C) Attenuator  D) OTDR
  • 128. A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?  A) DB loss  B) EMI  C) TXRX reversed  D) Open shorts
  • 129. Which of the following is an example of two factor authentication?  A) Password device certificate and PIN  B) SSL web server certificate and password  C) User password and administrator  Password  D) Password and hardware token OTP
  • 130. Which of the following is used to restrict access according to user policies?  A) Content filter  B) DHCP server  C) DNS server  D) VPN concentrator
  • 131. Which of the following describes a rationale for a network with redundant paths?  A) VPN compatibility  B) Unified communications implementation  C) High availability requirement  D) QoS
  • 132. Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?  A) Increased uptime  B) Caching engines  C) Traffic shaping  D) Load balancing
  • 133. Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?  A) Loopback plug  B) Protocol analyzer  C) Smart jack  D) Coupler
  • 134. A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?  A) Replace the router with a layer 2 switch that supportsVLANs  B) ChangeVLAN 20 computers Default Gateway to 192.168.1.127/27  C) ChangeVLAN 10 computers Default Gateway to 192.168.1.32/27  D) Allow ICMP to pass through the router
  • 135. Identify the distance limitation of a 10BASE5 (thicknet)Ethernet network?  A) 100m  B) 185m  C) 500m  D) 2km  m = meters
  • 136. If 2 devices simultaneously transmit data on an Ethernet network & a collision occurs, what does each station do in an attempt to resend the data & avoid another collision? A) Each device compares the other device’s priority value (determined by IP address) with its own, & the device with the highest priority value transmits first B) Each device waits for a clear to send (CTS) signal from the switch C) Each device randomly picks a priority value, & the device with the highest value transmits first D) Each device sets a random back off timer, & the device will attempt retransmission after the timer expires
  • 137. What kind of media is used by 100GBASE- SR10 Ethernet?  A) UTP  B) MMF  C) STP  D) SMF
  • 138. Which of the following statements are true regarding VLAN’s? (choose 2)  A) A VLAN has a single broadcast domain  B) For traffic to pass between 2VLANs, that traffic must be routed.  C) Because of a switch’s MAC address table, traffic does not need to be routed to pass between 2VLAN’s  D) A VLAN has a single collision domain 
  • 139. What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?  A) NativeVLAN  B) DefaultVLAN  C) ManagementVLAN  D) VLAN 0
  • 140. In a topology running STP, every network segment has a single __________ port, which is the port on that segment that is closest to the root bridge, in terms of cost?  A) Root  B) Designated  C) Non-Designated  D) Non-root
  • 141. What is the IEEE standard for link aggregation?  A) 802.1Q  B) 802.3ad  C) 802.1d  D) 802.3af
  • 142. What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?  A) 7.7W  B) 15.4W  C) 26.4W  D) 32.4W
  • 143. What switch feature allows you to connect a network sniffer to a switch port & tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?  A) Port Interception  B) Port Duplexing  C) Port Mirroring  D) Port Redirect
  • 144. Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?  A) Supplicant  B) Authentication server  C) Access point  D) Authenticator
  • 145. What is the binary representation of the decimal number 117?  A) 10110101  B) 01110101  C) 10110110  D) 01101001
  • 146. The binary number 10110100 has what decimal equivalent?  A) 114  B) 190  C) 172  D) 180
  • 147. What is the class of IP address 10.1.2.3/24?  A) Class A  B) Class B  C) Class C  D) Class D
  • 148. Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (choose 2)  A) BOOTP  B) APIPA  C) Zeroconf  D) DHCP
  • 149. How many assignable IP addresses exist in the 172.16.1.10/27 network?  A) 30  B) 32  C) 14  D) 64
  • 150. What is the prefix notation for a subnet mask of 255. 255. 255. 240?  A) /20  B) /24  C) /28  D) /29
  • 151. Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate 7 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?  A) /24  B) /26  C) /27  D) /28
  • 152. A client with an IP address of 172.16.18.5/18 belongs to what network?  A) 172.16.0.0/18  B) 172.16.4.0/18  C) 172.16.8.0/18  D) 172.16.16.0/18
  • 153. How can the following IPv6 address be condensed? 0AA0:0123:4040:0000:0000:000:000A:100B  A) AA0::123:404:A:100B  B) AA::123:404:A:1B  C) AA0:123:4040::A:100B  D) 0AA0:0123:4040::0::000A:100Bsection
  • 154. If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address & destination MAC address will be placed in the packet/frame header sent by the PC?  A) Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway  B) Dest.IP: IP address of remote host. Dest.MAC: MAC address of default gateway  C) Dest.IP: IP address of remote host. Dest. MAC: MAC address of remote host  D) Dest.IP: IP address of remote host. Dest.MAC: MAC address of local PC
  • 155. What protocol is used to request a MAC address that corresponds to a known IP address?  A) IGMP  B) TTL  C) ICMP  D) ARP
  • 156. What is the network address & subnet mask of a default route?  A) 255.255.255.255/32  B) 0.0.0.0/32  C) 255.255.255.255/0  D) 0.0.0.0/0
  • 157. What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?  A) Weight  B) Metric  C) Administrative distance  D) SPF algorithm
  • 158. Which of the following are distance vector routing protocol features that can prevent routing loops? (choose 2)  A) Reverse path forwarding (RPF) check  B) Split Horizon  C) Poison Reverse  D) Rendezvous point
  • 159. Which of the following is a distance-vector routing protocol with a maximum hop count of 15?  A) BGP  B) IS-IS  C) RIP  D) OSPF
  • 160. Which of the following routing protocols is an EGP?  A) BGP  B) IS-IS  C) RIP  D) OSPF
  • 161. What NAT IP address is a public IP address that references an inside device?  A) Inside Local  B) Inside Global  C) Outside Local  D) Outside Global
  • 162. What NAT variation automatically assigns an inside global address from a pool of available addresses?  A) SNAT  B) DNAT  C) PAT  D) GNAT
  • 163. What multicast protocol is used between clients & routers to let routers know which of their interfaces are connected to a multicast receiver?  A) IGMP  B) PIM-DM  C) PIM-SM  D) SPT switchover
  • 164. ISDN is considered to be what type of WAN connection?  A) Dedicated leased line  B) Circuit-switched connection  C) Packet-switched connection  D) Cell-switched connection
  • 165. What is the data rate of an OC-3 connection?  A) 51.84 Mbps  B) 622 Mbps  C) 155.52 Mbps  D) 159.25 Gbps
  • 166. Which of the following WAN technologies commonly use unshielded twisted pair (UTP)? (choose 3)  A) Cable modem  B) ISDN  C) DSL modem  D) POTS dial-up connection
  • 167. How many channels on an E1 circuit are available for voice, video, or data?  A) 23  B) 24  C) 30  D) 32
  • 168. Which PPP authentication method provides one- way authentication & sends credentials in clear text data?  A) WEP  B) MS-CHAP  C) PAP  D) CHAP
  • 169. What DSL variant has a distance limitation of 18,000 ft. between DSL modem & its DSLAM?  A) HDSL  B) ADSL  C) SDSL  D) VDSL
  • 170. What kind of network is used by many cable companies to service their cable modems, & contains both fiber-optic and coaxial cable?  A) Head-end  B) DOCSIS  C) Composite  D) HFC
  • 171. What locally significant identifier is used by a frame Relay network to reference a virtual circuit?  A) VPI/VCI  B) DLCI  C) TEI  D) MAC
  • 172. How big is the payload portion of an ATM cell?  A) 5 bytes  B) 48 bytes  C) 53 bytes  D) 64 bytes
  • 173. What type of antenna, commonly used in wireless AP’s & wireless routers in SOHO locations, radiates relatively equal power in all directions?  A) Unidirectional  B) Yagi  C) Parabolic  D) Omnidirectional
  • 174. When using the 2.4 GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (choose 3)  A) 0  B) 1  C) 5  D) 6  E) 10  F) 11  G) 14
  • 175. What technology do WLAN’s use to determine when they gain access to the wireless media?  A) SPF  B) CSMA/CA  C) RSTP  D) DUAL
  • 176. What IEEE 802.11 variant supports a maximum speed of 54 Mbps & uses 2.4 GHz band?  A) 802.11a  B) 802.11b  C) 802.11g  D) 802.11n
  • 177. Which of the following is used by IEEE 802.11n to achieve high through-put through the use of multiple antennas for transmission & reception?  A) MIMO  B) DSSS  C) FHSS  D) LACP
  • 178. A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?  A) Enterprise mode  B) IBSS  C) Personal Mode  D) BSS
  • 179. When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?  A) 5 – 10 percent  B) 10 – 15 percent  C) 15 – 20 percent  D) 20 – 25 percent
  • 180. If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentication is said to be in use?  A) WEP  B) SSID  C) Open  D) IV
  • 181. WEP’s RC4 approach to encryption uses a 24- bit string of characters added to transmitted data, such that the same plain text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?  A) Initialization vector  B) Chips  C) Orthogonal descriptor  D) Session key
  • 182. What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i ?  A) TKIP  B) MIC  C) WEP  D) WPA2
  • 183. What is the MPLS header?  A) 4 bits  B) 8 bits  C) 16 bits  D) 32 bits
  • 184. Which of the following is a social engineering attack?  A) Man in the middle  B) Worms  C) EvilTwin  D) Phishing
  • 185. 00:12:34:56:78 can be used in which of the following?  A Channel selection  B WPA-PSK password  C WEP key  D MAC filtering
  • 186. Which of the following devices will monitor for propagating worms?  A IDS  B Firewall  C Proxy server  D Mail server
  • 187. T568B wiring scheme is typically found on which of the following components?  A 66 block  B Demarc extension  C Patch Panel  D Vertical Cross Connect
  • 188. Something you have, something you are and something you know are the three tenets of:  A) access control  B) remote access  C) change management  D) social engineering
  • 189. After moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem  A Split cables  B Crosstalk  C TX/RX reversed  D DB loss
  • 190. A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this?  A MAC filtering  B WPA encryption  C Changing antenna type  D Decreasing radio strength
  • 191. In IPSec, which of the following is an agreement on how devices will securely transmit information?  A) ESP  B) SA  C) AH  D) ISAKMP
  • 192. Which of the following could be used to estimate RTT across a router?  A traceroute  B dig  C arp  D uptime
  • 193. The cable tester displays the following information  11  2------- 2  3------- 3  4xxxxx 4  5xxxxx 5  6------- 6  7------- 7  8------- 8  What is being reported?  A) 5 is open, 1|4 are open  B) 1 is open, 4|5 are shorted  C) 4|5 is shorted, 1 is ok  D) 1 is shorted, 4|5 are open
  • 194. Which of the following represents the physical address of a network access card  A 00-30-48-83-9B-C8  B FF01:D2:C4:87::11  C 08-9D-35-22-L2-34-FF-21  D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
  • 195. Which of the following records would be used for a Reverse DNS lookup?  A) MX  B) PTR  C) A  D) AAAA
  • 196. Which of the following defines access for a network?  A) ACL  B) RDP  C) RAS  D) ARP
  • 197. A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?  A) DB loss  B) EMI  C) TXRX reversed  D) Open shorts
  • 198. Which of the following is used to restrict access according to user policies?  A) Content filter  B) DHCP server  C) DNS server  D) VPN concentrator
  • 199. Which of the following describes a rationale for a network with redundant paths?  A) VPN compatibility  B) Unified communications implementation  C) High availability requirement  D) QoS
  • 200. Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (select two)  A) Packet sniffer  B) Honeypot  C) Port mirroring  D) IPS  E) Port scanner  F) IDS
  • 201. For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?  A) The server contains several virtual machines & the MAC addresses are from the virtual machines.  B) The server is hosting a web server & the MAC addresses are from connected browsers  C) The server is hosting a proxy server & the MAC addresses are from the connected clients  D) The server NIC is starting to fail & should be replaced.
  • 202. Which of the following does SNMPv3 BEST provide over previous versions?  A) Simplified management  B) Increased security  C) More data types  D) Higher productivity
  • 203. In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?  A) MDF  B) Caching engines  C) Demarc  D) IDF
  • 204. A company’s database software runs the cloud. The device hosting the software is an example of which of the following?  A) Virtual server  B) Virtual switch  C) Virtual desktop  D) Virtual PBX
  • 205. Kim, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Kim has permission to the server & the workstation is able to get to other network resources. Which of the following is the MOST likely cause?  A) The department server is having network issues  B) Kim’s workstation is a part of the wrongVLAN  C) The onboard NIC has outdated drivers installed  D) The wireless NIC has not been enabled for Kim’s workstation 
  • 206. Kim, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Kim’s wireless network to differentiate it from other wireless networks & still provide the BEST performance & security? (Choose 2)  A) SSID  B) Channel  C) Antenna type  D) Wireless standard  E) NAT
  • 207. Which of the following allows a central point to simultaneously address other points without addressing all of them?  A) Multicast  B) Subnetting  C) Unicast  D) Broadcast
  • 208. Zack, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?  A) PEAP  B) WPA Personal  C) WPA2 Enterprise  D) WPA2 PSK
  • 209. Which of the following would a technician plug into a smartjack?  A) 25 pair cable  B) 100 pair cable  C) Patch cable  D) Patch panel
  • 210. A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves & concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?  A) Fiber optic  B) Wireless  C) CAT5e  D) CAT3
  • 211. Lisa, an administrator, is unable to route traffic between VLAN’s on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside?  A) Network  B) Data link  C) Transport  D) Session
  • 212. Which of the following devices is used to distribute network traffic equally over multiple links?  A) Content filler  B) DNS server  C) Load balancer  D) Proxy server
  • 213. Which of the following would cause signal interference in a 2.4 GHz WAP? (Choose 2)  A) Cell phone  B) Cordless phone  C) Microwave oven  D) Printer  E) Television
  • 214. Which of the following default services uses TCP/UDP port 88?  A) LDAP  B) IGMP  C) HTTP  D) Kerberos
  • 215. Which of the following TCP/IP & OSI model layers retransmits a TCP packet if it is not received successfully at this destination?  A) The transport OSI model layer & the InternetTCP/IP model layer  B) The transport OSI model layer & the transportTCP/IP model layer  C) The network OSI model layer & the transportTCP/IP model layer  D) The network OSI model layer & the internetTCP/IP model layer
  • 216. Which of the following limits the number of devices that can be assigned IP addresses by DHCP?  A) A Lease  B) Reservation  C) DNS setting  D) Scope
  • 217. Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?  A) Network map  B) Cable management  C) Change management  D) Asset management
  • 218. When using high bandwidth applications over multiple WAN connections, which of the following should be used?  A) Static IP addressing  B) Half-duplex  C) PoE devices  D) Load balancing
  • 219. A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?  A) Butt set  B) Cable certifier  C) Toner probe  D) Snips
  • 220. Which of the following ports is the default telnet port?  A) 20  B) 21  C) 22  D) 23
  • 221. In which of the following wireless standards is MIMO used?  A) 802.11a  B) 802.11b  C) 802.11g  D) 802.11n
  • 222. Which of the following address blocks would MOST likely be blocked from crossing a border router?  A) 8.0.0.0/8  B) 172.16.0.0/12  C) 122.0.0.0/24  D) 248.0.0.0/8
  • 223. Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?  A) Nmap  B) Nbtstat  C) Dig  D) Arp
  • 224. Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO)  A) 22  B) 23  C) 243  D) 161  E) 162  F) 8080
  • 225. Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?  A) OTDR  B) Multimeter  C) Punch down tool  D) Temperature monitor
  • 226. Jeff, a technician is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?  A) PoE  B) Port mirroring  C) Convergence  D) Port speed
  • 227. Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?  A) WAP placement  B) PoE devices  C) MAC filtering  D) Encryption type
  • 228. Zach, a technician suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?  A) Network map  B) Environmental monitor  C) Placement map  D) Syslog
  • 229. Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?  A) Change management  B) Baselines  C) Asset management  D) Cable management
  • 230. A VPN concentrator is used for which of the following purposes?  A) MAC filtering  B) Content filtering  C) Secure network access  D) Connectivity troubleshooting
  • 231. Which of the following layers of the OSI model, maps to the Network Interface layer of the TCP/IP Protocol stack? (pick 2)  A) Physical  B) Session  C) Data Link  D) Network  E) Transport
  • 232. Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?  A) Cable tester  B) Toner probe  C) Cable crimper  D) Punch down tool
  • 233. Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?  A) TXRX is reversed  B) Faulty crossover cable  C) IncorrectWEP key  D) A short in the cable pairs
  • 234. Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?  A) Switch loop  B) Port bonding  C) Virtual switch  D) Port mirroring
  • 235. Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?  A) SNMPv2  B) VPN  C) SYSLOG  D) SMTP
  • 236. Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?  A) Netstat  B) Route  C) Nslookup  D) Arp
  • 237. Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?  A) Channel  B) WEP  C) SSID  D) WEPA
  • 238. Which of the following can Jeff, a technician, modify on a 802.11n router that is not available as an option on an 802.11g device?  A) SSID  B) Encryption  C) Channels  D) Spectrum
  • 239. Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?  A) VLAN malfunction  B) Broadcast storm  C) Quality of Service loss  D) Duplicate IP addresses
  • 240. An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?  A) Protocol analyzer  B) Butt set  C) OTDR  D) Toner probe
  • 241. Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?  A) TDR  B) Protocol analyzer  C) Multimeter  D) Cable crimper
  • 242. Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?  A) Reservations  B) Lease times  C) Removing IPs from the active leases  D) Configuring the DNS options
  • 243. Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach’s NEXT step?  A) Test the theory  B) Establish a plan of action  C) Establish a theory  D) Document findings
  • 244. Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?  A) OTDR  B) Protocol analyzer  C) Toner probe  D) TDR
  • 245. Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?  A) WPA should be enabled  B) PKI should be turned off  C) WAP SID’s are matching  D) WAPs are transmitting on the same channel
  • 246. Which of the following would Kim, a technician, do to monitor remote traffic through an access point?  A) Enable an SNMP agent  B) Enable network mapping  C) Set monitoring SSID  D) SelectWPA2
  • 247. Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?  A) Channel bonding  B) MIMO  C) Spatial reuse  D) 20MHzchannel spacing
  • 248. Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?  A) 20  B) 21  C) 22  D) 23
  • 249. Which of the following separates broadcast domains?  A) Port mirroring  B) Router  C) Convergence  D) Switch
  • 250. Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should be used?  A) Tone probe  B) Punch down  C) Wire tester  D) Crimper
  • 251. Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?  A) Protocol analyzer  B) Cable tester  C) Toner probe  D) Punch down tool
  • 252. Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified?  A) Fast Ethernet 0/0  B) AUX 0  C) Console 0  D) Serial 0/0/0
  • 253. Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?  A) This is a private address that cannot be seen by external users  B) This address does not have the appropriate subnet mask assigned  C) This is a public address which can only be seen by internal users  D) This is a private address which can only be seen by external users
  • 254. Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?  A) Loopback plugs  B) Butt set  C) Cable certifier  D) Tone probe
  • 255. Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly, but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?  A) Port speed  B) Cryptokey  C) DataVLAN  D) NAT/PAT
  • 256. Which of the following protocols is used to securely connect to a multi-layer switch?  A) HTTP  B) SMTP  C) SSH  D) Telnet
  • 257. Which of the following is the prefix for a link-local IPv6 address?  A) FE80::/10  B) FFOO::/8  C) 2FFE::/16  D) FEEF::/12
  • 258. Zach, a technician, is checking newly installed CAT5 cabling and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?  A) Cable tester  B) Tone probe  C) OTDR  D) Loopback plug
  • 259. There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?  A) Protocol analyzer  B) Cable tester  C) Cable verifier  D) Environmental monitor
  • 260. Which of the following is used to prevent Layer 2 switching loops within a local area network?  A) STP  B) MTU  C) EGP  D) IGP
  • 261. Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch?  A) SNMP trap  B) Bandwidth analyzer  C) Network sniffer  D) Syslog server
  • 262. Which of the following is a method to prioritize network traffic coming on VoIP phones?  A) PAT  B) DNS  C) SIP  D) QoS
  • 263. Which of the following network devices hides network nodes behind one public IP address?  A) Layer 3 switch  B) Content filter  C) VPN server  D) Proxy server
  • 264. A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?  A) Net share  B) Hostname  C) IPconfig  D) Tracert
  • 265. Which of the following Ethernet technologies has the LONGEST distance possible?  A) 1000BaseLX  B) 1000GBaseSR  C) 1000BaseSX  D) 1000BaseT
  • 266. Which of the following threats is MOST likely to enable an attacker to modify data in transit?  A) DoS  B) Smurf attack  C) Virus  D) Man-in-the-middle
  • 267. Which of the following is a terminal emulator used to manage a network device?  A) VPN  B) IDS  C) PUTTY  D) IPS
  • 268. Which of the following DNS record types is used for IPv6 resolution?  A) MX  B) AAAA  C) A  D) PTR
  • 269. A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?  A) CSU  B) Demarc  C) Registered jack  D) DSU
  • 270. Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?  A) 100 kilometers (62 miles)  B) 10 kilometers (6 miles)  C) 1000 meters (3281 feet)  D) 100 meters (328 feet)
  • 271. Kim, a network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets she wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?  A) DHCP  B) ARP  C) DNS  D) Ping
  • 272. An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?  A) Improper grounding  B) TXRX reversed  C) Incorrect termination  D) Outdated NIC drivers
  • 273. Which of the following are components of IPSec? (Select 2)  A) AH  B) ESP  C) SSH  D) ICA  E) TLS
  • 274. Which of the following authenticates, allows, and controls the execution of router commands?  A) PKI  B) RADIUS  C) Kerberos  D) TACACS+
  • 275. A technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?  A) Channel  B) SSID  C) Firewall rule  D) Encryption
  • 276. Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?  A) Implement WEP encryption  B) Decrease signal strength  C) Change wireless channels  D) Rotate the SSID daily
  • 277. Which of the following DNS record types provides the hostname to IP address mapping?  A) A record  B) NS record  C) CNAME record  D) MX record
  • 278. Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?  A) Honeynet  B) Honeypot  C) Vulnerability scanner  D) Network based IDS
  • 279. Which of the following would Kim, a technician, use in voice over IP communications?  A) SNTP  B) SCP  C) SMTP  D) SIP
  • 280. Which of the following is the best way to mitigate security threats on a network?  A) Social engineering  B) User training  C) Incident response  D) Man-in-the-middle
  • 281. Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?  A) 255.255.255.0  B) 255.255.255.128  C) 255.255.255.192  D) 255.255.255.248
  • 282. Jeff, an administrator, wishes to add a third network segment to the firewall where the company’s public web servers will be placed. Which of the following BEST describes this new segment?  A) PKI  B) VPN  C) IPS  D) DMZ
  • 283. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?  A) Baselines  B) Regulations  C) Logical network diagrams  D) Wiring schematics
  • 284. Which of the following has the HIGHEST data rate speed?  A) T1  B) ADSL  C) SDSL  D) OC-3
  • 285. Which of the following technologies is associated with the DOCSIS standard?  A) Cable  B) Dialup  C) Wireless  D) Cellular
  • 286. Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?  A) IPS  B) Application layer firewall  C) IDS  D) An unmanaged switch
  • 287. Which of the following should an administrator do after running a command from the console on the perimeter router?  A) Update the configuration logs  B) Update the network wiring schematics  C) Update the network configuration procedures  D) Compare the configuration with the baseline
  • 288. Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for installation. The wires at each end are color coded as follows: END A orange-white, orange, green- white, blue, blue-white, green, brown-white, brown. END B green-white, green, orange-white, blue, blue- white, orange, brown-white, brown. Which of the following should Kim do to complete the installation?  A) Re-end the provided cable, keeping the wiring the same.  B) Use the provided cable  C) Purchase a crossover cable  D) Purchase a straight-through cable
  • 289. Which of the following are fiber connectors? (Select 2)  A) LC  B) MTRJ  C) T1  D) DB-9  E) BNC
  • 290. Which of the following solutions will detect and disable a rogue access point?  A) Port scan  B) packet sniffer  C) IPS  D) IDS
  • 291. Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter?  A) 10GBaseLR  B) 10GBaseSR  C) 10G BaseX  D) 10GBaseT
  • 292. Which of the following can be done to increase a wireless LAN cell size?  A) Add a higher gain omni antenna  B) Add diversity antennas  C) Add a higher gain yagi antenna  D) Increase the PoE wattage
  • 293. Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (select 2)  A) Layer 2 switch  B) MAC address filtering  C) ACLs  D) IIS server  E) Port scanner  F) Firewall
  • 294. Which of the following is used to identify active hosts along with their network addresses?  A) Port scan  B) Ping sweep  C) IDS  D) NIPS
  • 295. Which of the following is used to share traffic between multiple network connections?  A) Load balancer  B) Content filter  C) VPN concentrator  D) Proxy server
  • 296. What layers of the OSI model does Stateful Inspection operate at? It assures the connection (session) between 2 parties is valid and inspects packets from this connection to assure the packets are not malicious (application level) and acts as a circuit level firewall. It operates at the network 3, session 5, & application 7 layers
  • 297. Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?  A) Multimode fiber  B) CAT6a  C) Single mode fiber  D) Coaxial
  • 298. Which of the following mediums is circuit switched?  A) PSTN  B) ATM  C) Frame relay  D) MPLS