1.
QUESTION NO: 201
A technician can successfully remote into the company's server? However, the technician cannot connect to any of the other servers directories from the server itself, but can ping them via an IP address.
Which of the following could be the problem?
Correct Answer
B. DNS is not correctly configured.
Explanation
The technician is able to remote into the company's server, indicating that the network connection is functioning properly. However, they are unable to connect to any of the other servers directories from the server itself. This suggests that there may be an issue with the server's ability to resolve domain names to IP addresses, which is the function of the DNS (Domain Name System). Therefore, the problem is likely that DNS is not correctly configured.
2.
QUESTION NO: 202
Which of the following characteristics BEST describe SMF? (Select TWO).
Correct Answer(s)
A. Can be used for distances exceeding 2 kilometers (1.24 miles).
C. Uses laser light for transmission.
Explanation
SMF, or Single Mode Fiber, is a type of optical fiber that can be used for distances exceeding 2 kilometers (1.24 miles). It uses laser light for transmission, which allows for higher bandwidth and longer transmission distances compared to multimode fiber. SMF is typically more expensive than multimode fiber, but it offers better performance and is commonly used in long-distance telecommunications and data networking applications.
3.
QUESTION NO: 203
A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network.
Which of the following is a probable cause?
Correct Answer
D. Port is misconfigured on the switch.
Explanation
A probable cause for the user being unable to connect to the network while all other users on the same switch can connect successfully is that the port on the switch that the user is connected to is misconfigured. This misconfiguration could be causing the port to be disabled or not properly configured to allow the user's device to connect to the network.
4.
QUESTION NO: 204
Which of the following would be used to connect a vertical cross connect when using data connections?
Correct Answer
C. Patch panel
Explanation
A patch panel would be used to connect a vertical cross connect when using data connections. A patch panel is a device that allows multiple data cables to be terminated and connected in a central location. It provides a convenient and organized way to manage and route data connections. Patch panels typically have ports that can be easily connected to and disconnected from, allowing for flexibility and easy maintenance of the network.
5.
QUESTION NO: 205
Which of the following tools would be used to test the break in a fiber connection on the network?
Correct Answer
D. OTDR
Explanation
An OTDR (Optical Time Domain Reflectometer) is used to test the break in a fiber connection on the network. It works by sending a pulse of light into the fiber and measuring the time and strength of the reflections that come back. This allows it to pinpoint the location of any breaks or faults in the fiber connection.
6.
QUESTION NO: 206
Which of the following network devices would be responsible for translating canonical names into IP addresses?
Correct Answer
C. A DNS server
Explanation
A DNS server is responsible for translating canonical names into IP addresses. It acts as a directory that maps domain names to their corresponding IP addresses, allowing users to access websites and resources on the internet using easy-to-remember domain names instead of complex IP addresses. The DNS server receives requests for domain name resolution and responds with the corresponding IP address, enabling communication between devices on the network.
7.
QUESTION NO: 207
When all routers in a network agree about the path from one point to another, the network is said to be which of the following?
Correct Answer
B. Converged
Explanation
When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the points in the network.
8.
QUESTION NO: 208
Which of the following would be used to relocate a Tl closer to the switch for connectivity?
Correct Answer
D. Smart jack
Explanation
A smart jack would be used to relocate a T1 closer to the switch for connectivity. A smart jack is a device that provides a termination point for a T1 line and can be located closer to the switch for improved connectivity. It allows for easy access and troubleshooting of the T1 line.
9.
QUESTION NO: 209
An organization with 2,500 users has exhausted their Intemet bandwidth. After some investigation, the network administrator discovers that 95% of the traffic is coming from web browsing. Which off the following network devices could be added to BEST reduce the amount of Intemet bandwidth the company is using?
Correct Answer
C. Proxy server
Explanation
A proxy server can be added to the network to reduce the amount of Internet bandwidth being used by the organization. A proxy server acts as an intermediary between the users and the Internet, caching web content and serving it to users from the cache instead of fetching it from the Internet every time. This reduces the amount of data that needs to be transferred over the Internet, thus reducing the bandwidth usage. By caching frequently accessed web content, the proxy server can also improve the browsing speed for users.
10.
QUESTION NO: 210
Which of the following subnet masks will produce the smallest subnet size for a point-to-point network link?
Correct Answer
C. 255.255.255.252
Explanation
The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This subnet mask allows for only 2 usable IP addresses, which is the minimum required for a point-to-point link. The other subnet masks listed provide larger subnet sizes and more usable IP addresses.
11.
QUESTION NO: 211
Which of the following documentation would a network administrator refer to discover a rogue WAP?
Correct Answer
C. Baseline
Explanation
A network administrator would refer to a baseline documentation to discover a rogue WAP. Baseline documentation typically includes information about the standard configuration and performance of the network. By comparing the baseline with the current state of the network, the administrator can identify any deviations, including the presence of a rogue WAP that is not part of the authorized network infrastructure.
12.
QUESTION NO: 212
Which of the following Will allow an administrator to restrict communication between network devices?
Correct Answer
D. ACL
Explanation
ACL stands for Access Control List. It is a security feature that allows an administrator to control and restrict communication between network devices. By using ACLs, the administrator can specify which devices are allowed to communicate with each other and which devices are not. This helps in enhancing the security of the network by preventing unauthorized access and controlling the flow of network traffic. DHCP, NAT, and CIDR are not directly related to restricting communication between network devices.
13.
QUESTION NO: 213
For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:
Correct Answer
A. Their IT department.
Explanation
When an enterprise wants to use one of the reserved private IP address ranges, it is best practice for them to coordinate with their IT department. The IT department is responsible for managing the network infrastructure and ensuring that the IP address ranges are properly assigned and utilized within the organization. They have the technical knowledge and expertise to handle IP address allocation and can ensure that there are no conflicts or issues with the existing network. Coordinating with the IT department also helps in maintaining proper documentation and tracking of IP address usage within the organization.
14.
QUESTION NO: 214
Which of the following is the maximum transmission distance of l0GBase-LR?
Correct Answer
A. 6 miles (9.7 kilometers)
Explanation
The maximum transmission distance of l0GBase-LR is 6 miles (9.7 kilometers).
15.
QUESTION NO: 215
A company has many traveling sales employees that need secure access to corporate resources from non-trusted devices (e.g. computers at client sites and/or public computers). Which VPN solution is MOST appropriate for this company?
Correct Answer
A. SSL
Explanation
SSL (Secure Sockets Layer) is the most appropriate VPN solution for a company with traveling sales employees who need secure access to corporate resources from non-trusted devices. SSL VPN allows users to establish a secure connection to the corporate network through a web browser, without the need for additional software or client configuration. This makes it ideal for accessing resources from public computers or client sites where installing VPN client software may not be feasible or allowed. SSL VPNs also provide strong encryption and authentication, ensuring the security of the connection and protecting sensitive corporate data.
16.
QUESTION NO: 216
Which of the following commands would provide the following output?
DNS request timed out. timeout was 2 seconds.
*** Cant find server name for address 172.30.0.5: Timed out
*** Default servers are not available
Server: UnKnown Address: 172.30.0.5
DNS request timed out. timeout was 2 seconds.
*** Request to UnKnown timed-out
Correct Answer
B. Nslookup
Explanation
The correct answer is nslookup because the output provided is typical of the nslookup command. Nslookup is a command-line tool used for querying the Domain Name System (DNS) to obtain domain name or IP address information. The output shown indicates that a DNS request timed out, the default servers are not available, and it provides information about the server being used for the lookup.
17.
QUESTION NO: 217
A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?
Correct Answer
B. Determine the scope of the problem.
Explanation
The technician should determine the scope of the problem next because this will help in understanding the extent of the issue and what areas are affected. By determining the scope, the technician can narrow down the possible causes and determine the appropriate solution. This step is crucial in troubleshooting as it provides a clear understanding of the problem before moving forward with implementing and testing the solution.
18.
QUESTION NO: 218
Which of the following transfers data at a maximum rate of 44. 7Mbps?
Correct Answer
A. T3
Explanation
T3 is the correct answer because it is a high-speed digital transmission line that can transfer data at a maximum rate of 44.7Mbps. T2, T5, and T1 are not capable of transferring data at this speed.
19.
QUESTION NO: 219
A technician is asked to re-terminate a wall jack that has become loose. Upon looking at the wiring, the technician notices that it was Originally wired as 568A. The company implemented a policy stating that all cable terminations should adhere to the 568B standard. With this in mind the technician should:
Correct Answer
A. Re-terminate both ends of the cable to the 568B standard.
Explanation
The technician should re-terminate both ends of the cable to the 568B standard because the company implemented a policy stating that all cable terminations should adhere to the 568B standard. This means that both ends of the cable should be re-terminated to ensure compliance with the company's policy.
20.
QUESTION NO: 220
When using the ping utility, which switch pings a network device until stopped?
Correct Answer
A. Ping-t
Explanation
The correct answer is "ping -t". This switch is used with the ping utility to continuously ping a network device until it is manually stopped. It is commonly used to test the stability and connectivity of a network device or to troubleshoot network issues.
21.
QUESTION NO: 221
Which of the following cables would a technician make in order to identify a physical interface problem?
Correct Answer
D. Loopback
Explanation
A technician would use a loopback cable to identify a physical interface problem. A loopback cable is a special type of cable that connects a device back to itself, allowing the technician to test the integrity of the device's interface. By using a loopback cable, the technician can determine if the problem lies within the physical interface of the device, rather than with external factors such as cables or network connections.
22.
QUESTION NO: 222
A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technician use to determine where the fault is?
Correct Answer
C. Traceroute
Explanation
The technician would use the traceroute utility to determine where the fault is. Traceroute is a network diagnostic tool that shows the path a packet takes from the client to the remote host, highlighting each hop along the way. By examining the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue between the client and the remote host.
23.
QUESTION NO: 223
Which of the following is an example of secure tunneling?
Correct Answer
B. SSL VPN
Explanation
SSL VPN is an example of secure tunneling because it allows for secure remote access to a private network by encrypting the data transmitted between the user's device and the network. This ensures that the data remains confidential and protected from unauthorized access or interception. SSL VPN uses the SSL/TLS protocol to establish a secure connection, providing authentication and encryption to ensure the privacy and integrity of the data being transmitted.
24.
QUESTION NO: 224
Which of the following cable types is used in a l00Base-FX network?
Correct Answer
D. Fiber
Explanation
Fiber optic cables are used in a 100Base-FX network. Fiber optic cables use light to transmit data, allowing for faster and more reliable communication compared to other cable types such as UTP, coaxial, and STP. Fiber optic cables are also capable of transmitting data over longer distances without signal degradation.
25.
QUESTION NO: 225
A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?
Correct Answer
D. DHCP is not functioning.
Explanation
The most likely source of the problem is that DHCP is not functioning. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address, resulting in their inability to connect to the network. The fact that the computers left on over the weekend are functional suggests that the network itself is functioning properly, but the issue lies with the DHCP server.
26.
QUESTION NO: 226
To forward traffic from a host with the IP address of 10.0.0.100/25 to l0.0.0.200/25 which of the following devices will be required?
Correct Answer
A. A router
Explanation
To forward traffic from one network to another network, a router is required. A router is a networking device that connects multiple networks together and forwards data packets between them. In this scenario, the host with the IP address of 10.0.0.100/25 needs to communicate with the host at 10.0.0.200/25, which are on different networks. Therefore, a router is needed to route the traffic between these two networks. A layer 2 switch, a hub, and a DNS server do not have the capability to perform this routing function.
27.
QUESTION NO: 227
Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?
Correct Answer
D. CSMA/CA
Explanation
802.11 networks utilize the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) technology to prevent packet collisions. CSMA/CA is a protocol that allows devices to check the wireless medium for other transmissions before sending data. If the medium is clear, the device can transmit its data. If the medium is busy, the device waits for a random amount of time before attempting to transmit again. This helps to avoid collisions and ensures efficient use of the wireless network.
28.
QUESTION NO: 228
Which of the following protocols uses port 22 by default?
Correct Answer
D. SSH
Explanation
SSH (Secure Shell) is the correct answer because it is a network protocol that provides a secure way to access and manage remote devices. It uses port 22 by default for communication between the client and the server. FTP (File Transfer Protocol) uses port 21, DNS (Domain Name System) uses port 53, and Telnet uses port 23 for communication.
29.
QUESTION NO: 229
Which of the following protocols permits secure polling of network devices?
Correct Answer
C. SNMPv3
Explanation
SNMPv3 is the correct answer because it is an updated version of SNMP (Simple Network Management Protocol) that includes security features. SNMPv3 provides authentication and encryption, allowing for secure polling of network devices. This ensures that the data transmitted between the devices and the management system is protected from unauthorized access and tampering. SCP (Secure Copy Protocol) and SSH (Secure Shell) are also secure protocols, but they are not specifically designed for polling network devices like SNMPv3. SNMPv2, on the other hand, lacks the security features provided by SNMPv3.
30.
QUESTION NO: 230
Which of the following commands is used to provide the output below in a Windows environment?
1 *** Request timed out.
2 *** Request timed out.
3 *** Request timed out.
Correct Answer
C. Tracert
Explanation
The correct answer is "tracert". Tracert is a command used in Windows environment to trace the route that packets take to reach a destination. It provides the output shown in the question, which includes the number of timed out requests along the route.
31.
QUESTION NO: 231
Which of the following traffic types would a network layer firewall be unable to filter?
Correct Answer
D. Email sender verification
Explanation
A network layer firewall is unable to filter email sender verification because it operates at the network layer of the OSI model, which primarily focuses on filtering based on IP addresses, ports, and protocols. Email sender verification involves checking the authenticity of the sender's email address, which requires application layer inspection and processing. Therefore, a network layer firewall lacks the capability to analyze the content of email messages and perform sender verification.
32.
QUESTION NO: 232
Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?
Correct Answer
A. ARP
Explanation
A multilayer switch would use the Address Resolution Protocol (ARP) to learn the IP address of a directly connected device. ARP is used to map an IP address to a MAC address in order to facilitate communication between devices on a local network. By sending out an ARP request, the switch can determine the MAC address of the device and associate it with its IP address. This information is then used to forward network traffic to the correct destination.
33.
QUESTION NO: 233
Two servers and five workstations are connected using a lOOBASE-T network. Which of the following physical topologies is used?
Correct Answer
D. Star
Explanation
The correct answer is "Star". In a star topology, all devices are connected to a central hub or switch. In this case, the two servers and five workstations are connected to a central hub or switch using a lOOBASE-T network. This topology allows for easy management and troubleshooting, as each device has its own connection to the central hub. It also provides better performance and scalability compared to other topologies like bus or ring.
34.
QUESTION NO: 234
A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?
Correct Answer
C. Check the cable connections.
Explanation
The first step in the troubleshooting process for a computer unable to access the network in a bus topology is to check the cable connections. This is because a loose or disconnected cable could be causing the issue, and it is a simple and easy step to take before moving on to more complex troubleshooting steps such as reinstalling the NIC driver or replacing the cable or NIC. By checking the cable connections, it can be determined if there is a physical issue with the connection that needs to be addressed.
35.
QUESTION NO: 235
Which of the following network segments is located outside the firewall?
Correct Answer
C. DMZ
Explanation
A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It is a separate network that sits between the internal network and the external network (usually the internet). The purpose of a DMZ is to provide an additional layer of security by placing servers or services that need to be accessed from the internet in this separate network segment. This helps to protect the internal network from potential attacks or compromises.
36.
QUESTION NO: 236
To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?
Correct Answer
C. The same SSID
Explanation
To support roaming across a wireless 802.11g network, each access point should be configured to use the same SSID. The SSID (Service Set Identifier) is a unique identifier that allows devices to connect to a specific wireless network. By configuring all access points with the same SSID, devices can seamlessly roam between access points without losing connectivity. This ensures a smooth and uninterrupted wireless experience for users as they move throughout the network coverage area.
37.
QUESTION NO: 237
Which of the following would a technician use a punch down tool on?
Correct Answer
C. 110 block
Explanation
A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used in telecommunications and networking to terminate and connect wires. The punch down tool is used to insert the wires into the appropriate slots on the 110 block, ensuring a secure and reliable connection.
38.
QUESTION NO: 238
Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?
Correct Answer
D. VLAN
Explanation
Two small companies sharing a switch would most likely benefit from VLAN (Virtual Local Area Network) because it allows them to segment their network into multiple virtual networks, providing increased security and efficiency. Each company can have its own VLAN, ensuring that their network traffic is isolated from each other. VLANs also allow for easier management and troubleshooting of the network, as changes and updates can be made to specific VLANs without affecting the entire network.
39.
QUESTION NO: 239
Which of the following is the maximum speed available from a full T1 line?
Correct Answer
A. 1.544Mbps
Explanation
A full T1 line has a maximum speed of 1.544Mbps.
40.
QUESTION NO: 240
A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?
Correct Answer
A. Fiber optic cable
Explanation
Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus. Fiber optic cables are capable of transmitting data at high speeds, such as 1Gbps, and they provide a secure and reliable connection. They are also immune to electromagnetic interference and have a higher bandwidth capacity compared to other types of cables like CAT6 or RG-58. Therefore, using fiber optic cable would ensure a fast and secure link between the two buildings.
41.
QUESTION NO: 241
An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?
Correct Answer
D. I00Base-FX
Explanation
I00Base-FX should be used to avoid interference in an Ethernet LAN that has trunk links passing near heavy machinery resulting in EMI. I00Base-FX uses fiber optic cables, which are immune to electromagnetic interference. This makes it a suitable choice for environments with high levels of EMI, such as areas near heavy machinery. I0Base5 and I0Base2 use coaxial cables, which are more susceptible to EMI. I00Base-T uses twisted-pair copper cables, which can also be affected by EMI.
42.
QUESTION NO: 242
Which of the following software types would BEST be used for identifying an attack?
Correct Answer
A. IDS
Explanation
An IDS (Intrusion Detection System) is a software type that is specifically designed to identify and monitor for potential attacks or unauthorized access attempts on a network. It analyzes network traffic and system logs to detect any suspicious or malicious activity and alerts the system administrator. Unlike a packet sniffer, which simply captures and analyzes network packets, an IDS is proactive in identifying and responding to potential threats. Similarly, an IPS (Intrusion Prevention System) is also designed to identify and prevent attacks, but it actively blocks or mitigates the threats instead of just alerting the administrator. A port scanner, on the other hand, is used to identify open ports on a network, but it does not have the capability to detect attacks.
43.
QUESTION NO: 243
A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?
Correct Answer
B. SYN-ACK
Explanation
When a client sends a TCP SYN packet to a server, it is initiating a connection request. In response to this, the server should send a SYN-ACK packet. This packet confirms the receipt of the client's SYN packet and also includes a SYN flag to establish a connection. The client will then respond with an ACK packet to acknowledge the server's SYN-ACK packet, completing the three-way handshake process and establishing a TCP connection between the client and the server.
44.
QUESTION NO: 244
Which of the following Ethemet technologies has the shortest transmission distance?
Correct Answer
B. I0GBase-T
Explanation
The correct answer is I0GBase-T. I0GBase-T is an Ethernet technology that supports data transmission at a rate of 10 gigabits per second (Gbps) over twisted-pair copper cables. However, it has a shorter transmission distance compared to other Ethernet technologies like I0GBase-SR, which supports transmission over fiber optic cables.
45.
QUESTION NO: 245
A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?
Correct Answer
C. AES
Explanation
AES (Advanced Encryption Standard) is a symmetric encryption method that is commonly used in wireless networks. It provides a high level of security and is compatible with most wireless access points. TKIP (Temporal Key Integrity Protocol) is an older encryption method that is not as secure as AES and may not be compatible with newer access points. 3DES (Triple Data Encryption Standard) is a symmetric encryption algorithm that is also compatible with most access points. CHAP (Challenge-Handshake Authentication Protocol) is an authentication protocol and is not directly related to encryption compatibility.
46.
QUESTION NO: 246
In a Class C subnet, a network ID may occupy a maximum of:
Correct Answer
A. 24bits.
Explanation
In a Class C subnet, the network ID may occupy a maximum of 24 bits. This is because a Class C subnet uses a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network ID and the remaining 8 bits are used for host addresses. This allows for a maximum of 2^24 or 16,777,216 possible network IDs in a Class C subnet.
47.
QUESTION NO: 247
A 100 pair cable is typically used to connect:
Correct Answer
A. Telephony distribution.
Explanation
A 100 pair cable is typically used to connect telephony distribution. This type of cable is designed to handle a large number of telephone lines, which is necessary for telephony distribution. It is not typically used for connecting computer labs with more than 20 computers, security cameras, or businesses with more than 75 computers.
48.
QUESTION NO: 248
Which of the following utilities will produce the results printed below?
TCP Celrts03 : 1072 172.3 1.0.78:3389 Established
Correct Answer
A. Netstat
Explanation
The correct answer is netstat. Netstat is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol used, local and remote IP addresses, and the status of the connection. In this case, netstat would display the TCP connection established with the destination IP address 1.0.78:3389.
49.
QUESTION NO: 249
A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?
Correct Answer
B. Change the antenna placement.
Explanation
To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. By adjusting the position and orientation of the antennas, the technician can optimize the signal coverage and minimize signal interference or dead zones. This can help ensure a more consistent and reliable wireless Internet access throughout the warehouse.
50.
QUESTION NO: 250
Which of the following actions should the administrator do FIRST to help access a gigabit connection?
Correct Answer
C. Change the CAT5 cable to a CAT6 cable.
Explanation
The administrator should change the CAT5 cable to a CAT6 cable in order to help access a gigabit connection. CAT6 cables are designed to support higher data transfer speeds and have better performance compared to CAT5 cables. Upgrading to a CAT6 cable will ensure that the network can handle the increased bandwidth required for a gigabit connection.