1.
What is an example of a Layer 3 device that connects multiple computers and networks?
Correct Answer
A. Packet
2.
If a router cannot determine the next hop for a packet, the router will:
Correct Answer
A. Forward the packet to the default route.
Explanation
When a router cannot determine the next hop for a packet, it means that it does not have a specific route in its routing table for that packet's destination. In this case, the router will forward the packet to the default route. The default route is a pre-configured route that the router uses when it doesn't have a specific route for a destination. By forwarding the packet to the default route, the router ensures that the packet is not dropped and has a chance to reach its intended destination.
3.
You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33
meters.
An interference exists along the path of each drop.
You need to ensure that interference is reduced.
Which cable type should you use?
Correct Answer
A. STP Cat5e
Explanation
STP Cat5e should be used because it is a shielded twisted pair cable that provides protection against interference. The shielding helps to reduce the impact of external electromagnetic interference, ensuring a more reliable and stable network connection over longer distances. This makes it the ideal choice for running Ethernet network drops in an environment where interference is present along the path.
4.
One purpose of a perimeter network is to:
Correct Answer
D. Make resources available to the Internet.
Explanation
A perimeter network, also known as a DMZ (demilitarized zone), is designed to provide a secure buffer zone between an organization's internal network (intranet) and the external public network (Internet). It allows the organization to make certain resources, such as web servers, email servers, or application servers, accessible to the Internet while protecting the internal network from direct exposure to potential threats. By placing these resources in the perimeter network, organizations can control and monitor incoming and outgoing traffic, ensuring that only authorized access is granted and minimizing the risk of unauthorized access to their internal network.
5.
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Correct Answer
E. Address Resolution Protocol (ARP).
Explanation
ARP is the protocol that maps IP addresses to MAC addresses. It is used to find the MAC address of a device on the same network when only its IP address is known. By sending an ARP request, the device can obtain the MAC address from the ARP table or by broadcasting the request to all devices on the network. Once the MAC address is obtained, it can be used to establish a direct communication link between devices. IMAP, DHCP, RIP, and UDP are all different protocols used for other purposes in computer networks.
6.
Ou are home for vacation, and a family member wants your help to purchase and install
network cable for a home office.
The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?
Correct Answer
C. Cat5e
Explanation
Cat5e is the least expensive option that meets the requirement of supporting at least 300 Mbps. Cat3 and CAT5 are older and slower versions of Ethernet cables, while Cat6 is a higher performance and more expensive option. Cat5e provides a good balance between cost and performance, making it the most suitable choice in this scenario.
7.
You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items:
? A public facing web server
? A Wi-Fi network for customers
? A private network for the point of sale terminals
? An office PC
? A file/print server
? A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
Correct Answer(s)
A. Network printer
B. Web server
Explanation
The network printer and web server should be included in the perimeter network because they are public-facing items that need to be accessible from the internet. Placing them in the perimeter network helps to protect the internal network by creating a barrier between the internet and the internal devices. This ensures that any potential threats or attacks are isolated and do not directly impact the internal network.
8.
What are three advantages of VLANs? (Choose three.)
Correct Answer(s)
C. They compartmentalize a network and isolate traffic.
D. They are efficient because a single switch can implement only a single VLAN.
E. They act as though they are on the same LAN regardless of physical location.
Explanation
VLANs have several advantages. Firstly, they compartmentalize a network and isolate traffic, which enhances security and reduces the risk of unauthorized access. Secondly, they are efficient as a single switch can implement multiple VLANs, allowing for better network management and resource allocation. Lastly, VLANs act as though they are on the same LAN regardless of physical location, enabling seamless communication and connectivity between devices in different locations.
9.
Which of the following uses pointer records and A records?ou like?
Correct Answer
B. DNS Server
Explanation
A DNS Server uses pointer records and A records. A pointer record (PTR) is used to map an IP address to a hostname, while an A record is used to map a hostname to an IP address. This allows the DNS server to translate domain names into IP addresses and vice versa, enabling the proper routing of network traffic on the internet.
10.
Which of these addresses is a multicast address?
Correct Answer
D. 224.0.0.1
Explanation
224.0.0.1 is a multicast address. In IP networking, multicast addresses are used to send data packets to a group of hosts rather than a single host. The range of multicast addresses is from 224.0.0.0 to 239.255.255.255. 224.0.0.1 is a special multicast address known as the "all-hosts" multicast group, which is used to send packets to all hosts on a network segment.
11.
What is the bit rate for a North American T3 circuit?
Correct Answer
B. 44.736 Mbit/s
Explanation
A North American T3 circuit has a bit rate of 44.736 Mbit/s.
12.
Which of the following is a public IP address?
Correct Answer
B. 68.24.78.221
Explanation
The IP address 68.24.78.221 is a public IP address because it falls within the range of IP addresses that are assigned to devices connected to the internet. Public IP addresses are unique and can be accessed from anywhere on the internet. The other three IP addresses (10.156.89.1, 172.16.152.48, and 192.168.25.101) are private IP addresses, which are used for internal networks and cannot be directly accessed from the internet.
13.
Which metric does Routing Information Protocol (RJP) use to determine the least costly
route?
Correct Answer
A. Delay
Explanation
The metric used by Routing Information Protocol (RIP) to determine the least costly route is Delay. Delay refers to the amount of time it takes for a packet to travel from the source to the destination. RIP uses this metric to calculate the total delay along a particular route and chooses the route with the least delay as the preferred route. By selecting the route with the lowest delay, RIP aims to minimize the time it takes for packets to reach their destination, ensuring efficient and effective routing.
14.
What is a similarity between Layer 2 and Layer 3 switches?
Correct Answer
C. Both forward packets onto the network.
Explanation
Both Layer 2 and Layer 3 switches forward packets onto the network. Layer 2 switches operate at the Data Link layer of the OSI model and forward packets based on MAC addresses, while Layer 3 switches operate at the Network layer and forward packets based on IP addresses. Regardless of the layer they operate on, both switches are responsible for forwarding packets to their intended destinations.
15.
What are two characteristics of fiber optic cable? (Choose two.)
Correct Answer(s)
A. Conducts electricity
C. Supports splicing
Explanation
Fiber optic cables do not conduct electricity as they use light to transmit data instead. However, they do support splicing, which is the process of joining two fiber optic cables together.
16.
VPNs are implemented to provide:
Correct Answer
B. A secure connection through public networks.
Explanation
VPNs are implemented to provide a secure connection through public networks. This is because public networks, such as the internet, are inherently insecure and can be susceptible to eavesdropping and data theft. By using a VPN, all data transmitted between the user's device and the destination server is encrypted, ensuring that it cannot be intercepted or accessed by unauthorized individuals. This allows users to safely access private network resources or browse the internet while maintaining their privacy and security.
17.
What happens when an 802.11b node starts broadcasting within the range of an 802.llg
access point?
Correct Answer
B. A connection will be established,
Explanation
When an 802.11b node starts broadcasting within the range of an 802.llg access point, a connection will be established. This means that the node and the access point will be able to communicate with each other. The access point will transmit data to the node, and the node will be able to receive it. Similarly, the node will also be able to transmit data to the access point, and the access point will be able to receive it. This allows for communication between the node and the access point, establishing a connection between them.
18.
This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the transport layer.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
Correct Answer
A. Presentation
Explanation
According to the OSI model, encryption takes place on the Presentation layer.
19.
Connecting to a private network address from a public network requires:
Correct Answer
A. Network address translation (NAT).
Explanation
When connecting to a private network address from a public network, Network Address Translation (NAT) is required. NAT is a method that allows multiple devices on a private network to share a single public IP address. It translates the private IP addresses of devices on the private network into a single public IP address that can be recognized and communicated with on the public network. This enables communication between devices on the private network and the public network, ensuring secure and efficient connectivity.
20.
What type of record does DNS use to find a mail service?
Correct Answer
C. Mail Exchanger (MX) DNS record
Explanation
DNS uses the Mail Exchanger (MX) DNS record to find a mail service. This record specifies the mail server responsible for accepting incoming email messages on behalf of a domain. When someone sends an email to a specific domain, the MX record is used to determine which mail server should receive the email. The MX record contains the hostname of the mail server and its priority, allowing multiple mail servers to be designated for redundancy or load balancing purposes.
21.
In local area network (LAN) topologies, the primary media access methods are: (Choose
two.)
Correct Answer(s)
A. Contention
D. Token passing
Explanation
In local area network (LAN) topologies, contention is a primary media access method where devices compete for access to the network by transmitting data whenever the network is available. Token passing is another primary media access method where a token is passed between devices, allowing them to take turns transmitting data. Both contention and token passing are commonly used in LANs to regulate access to the network and ensure fair transmission of data.
22.
What are two differences between switches and hubs? (Choose two.)
Correct Answer(s)
B. Switches send data to all of the computers that are connected to them for efficiency.
C. Switches are capable of sending and receiving data at the same time.
Explanation
Switches send data to all of the computers that are connected to them for efficiency because they use a technique called "packet switching" to transmit data only to the intended recipient, reducing network congestion. Switches are also capable of sending and receiving data at the same time, which improves network performance and allows for simultaneous communication between devices.
23.
This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use
on the Internet and for local addressing.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
Correct Answer
D. No change is needed
Explanation
The underlined text correctly states that every router today is TCP/IP enabled, which is an industry-standard protocol used for both the Internet and local addressing. No change is needed because the underlined text makes the statement correct.
24.
Which feature of Category 5e STP cable reduces external interference?
Correct Answer
C. Length
25.
How many bits are there in an Internet Protocol version 6 (IPv6) address?
Correct Answer
C. 128
Explanation
An Internet Protocol version 6 (IPv6) address consists of 128 bits. IPv6 was developed to address the limitations of IPv4, which had a limited number of available addresses. The increased number of bits in IPv6 allows for a significantly larger address space, ensuring that there are enough unique addresses to accommodate the growing number of devices connected to the internet.
26.
A Layer 2 device that connects multiple computers within a network is a:
Correct Answer
B. Switch
Explanation
A switch is a Layer 2 device that connects multiple computers within a network. It operates by receiving data packets, examining the destination MAC address, and forwarding the packets only to the appropriate port where the destination device is connected. This allows for efficient communication and prevents unnecessary traffic on the network. Switches are commonly used in local area networks (LANs) to provide fast and reliable connections between devices.
27.
In addition to switching, multilayer switches also:
Correct Answer
A. Provide Layer 3 routing functions.
Explanation
Multilayer switches are capable of providing Layer 3 routing functions, which means they can route traffic between different networks based on IP addresses. This allows them to make intelligent forwarding decisions based on network layer information. The other options mentioned in the question, such as interfacing with different types of cables and supporting different LAN port speeds, are also features of multilayer switches, but the most significant capability that sets them apart from regular switches is their ability to perform Layer 3 routing.
28.
Which one do This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.you like?
Correct Answer
A. 802.1X
29.
Which of these cable types transmits data the greatest distance?
Correct Answer
B. Single-mode fiber
Explanation
Single-mode fiber transmits data the greatest distance compared to the other cable types listed. This is because single-mode fiber has a smaller core size and uses a single beam of light to transmit data, allowing for less signal loss and higher bandwidth. In contrast, multi-mode fiber has a larger core size and uses multiple beams of light, resulting in more signal dispersion and limited distance. Cat5e and Cat6 cables are copper-based and have even shorter distance limitations compared to fiber optics.
30.
What is the maximum cable length for a single Cat5 UTP cable run?
Correct Answer
B. 328 feet/99.97 meters
Explanation
The correct answer is 328 feet/99.97 meters. This is the maximum cable length for a single Cat5 UTP cable run. This length is determined by the limitations of the cable's signal strength and quality. Going beyond this length can result in signal degradation and loss of data transmission.
31.
The default gateway address identifies the:
Correct Answer
B. Device that will connect the computer to a remote network.
Explanation
The default gateway address identifies the device that will connect the computer to a remote network. This device acts as an intermediary between the computer and the remote network, allowing the computer to send and receive data to and from devices on that network. The default gateway is responsible for routing the network traffic between the computer and the remote network, enabling the computer to access resources and services on the remote network.
32.
Which of the following are features of DHCP? (Choose two.)
Correct Answer(s)
A. IP address resolution to canonical names
C. Address reservation
E. IP address exclusion
Explanation
DHCP, or Dynamic Host Configuration Protocol, is responsible for automatically assigning IP addresses to devices on a network. It simplifies network administration by eliminating the need for manual IP address configuration. Two features of DHCP are IP address resolution to canonical names, which allows devices to be identified by their hostnames rather than IP addresses, and address reservation, which assigns a specific IP address to a device based on its MAC address. IP address exclusion is another feature that allows certain IP addresses to be excluded from the DHCP pool, ensuring they are not assigned to any device.
33.
Which command is used to verify that a server is connected to the network?
Correct Answer
C. PING
Explanation
The PING command is used to verify that a server is connected to the network. It sends a small packet of data to the server and waits for a response. If the server is connected and functioning properly, it will respond to the PING request. This command is commonly used to troubleshoot network connectivity issues and to check if a server is reachable over the network.
34.
In which physical network topology is each computer connected to a central point?
Correct Answer
D. 54 Mbps
Explanation
The correct answer is 54 Mbps. This answer refers to the data transfer rate, not the physical network topology. The question is incomplete and does not provide any information about the physical network topology options. Therefore, an explanation for the correct answer cannot be provided.
35.
In which physical network topology is each computer connected to a central point?
Correct Answer
A. Star
Explanation
In a star network topology, each computer is connected to a central point, typically a switch or hub. This central point acts as a communication hub, allowing all the computers in the network to send and receive data. This type of topology is commonly used in local area networks (LANs) as it provides a centralized and efficient way of managing network connections.
36.
This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed'' if the underlined text makes the statement correct
Correct Answer
D. No change is needed
Explanation
The underlined text states that "WEP wireless encryption is the most susceptible to interception and decryption." This statement is correct because WEP (Wired Equivalent Privacy) is known to be the least secure encryption protocol for wireless networks. It has several vulnerabilities that make it relatively easy for attackers to intercept and decrypt the data being transmitted. Therefore, no change is needed in the underlined text.
37.
This question requires that you evaluate the underlined text to determine if it is correct.
When a client computer is unable to reach a DHCP server, it will automatically assign an IP
address in the 10.0.0.0 -10.0.0.255 range.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
Correct Answer
B. 169.254.0.0-169.254.255.255
Explanation
When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the 169.254.0.0-169.254.255.255 range.
38.
The type of connector used on a 100BaseT Ethernet cable is:
Correct Answer
B. RJ-45.
Explanation
The correct answer is RJ-45. RJ-45 is the type of connector used on a 100BaseT Ethernet cable. RJ-45 connectors have 8 pins and are commonly used for Ethernet networking, including for 100BaseT connections. RJ-11 connectors, on the other hand, have 6 pins and are typically used for telephone connections. TNC and BNC connectors are used for different types of coaxial cables and are not commonly used for Ethernet connections.
39.
At what layer in the OSI model are hardware addresses referenced?
Correct Answer
C. Data link
Explanation
Hardware addresses, also known as MAC addresses, are referenced at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between two directly connected nodes on a network. It defines the format of the data being transmitted and handles error detection and correction. The data link layer uses hardware addresses to uniquely identify devices on a local network, allowing for the proper delivery of data packets.
40.
What are two characteristics of a mesh network topology? (Choose two.)
Correct Answer(s)
A. It is fault tolerant because of redundant connections.
C. It works best for networks with a large number of nodes.
Explanation
A mesh network topology is characterized by its fault tolerance due to redundant connections. This means that if one connection fails, there are alternative paths for data to flow, ensuring the network remains operational. Additionally, a mesh network works best for networks with a large number of nodes because every node connects to every other node. This allows for efficient communication and distribution of data across the network.
41.
To protect a network when it is connected to the Internet, you should use a:
Correct Answer
B. Firewall
Explanation
A firewall is used to protect a network when it is connected to the Internet. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, blocks malicious traffic, and safeguards the network from potential threats and attacks. A firewall is an essential security measure to ensure the safety and integrity of a network when connected to the Internet.
42.
This question requires that you evaluate the underlined text to determine if it is correct.
The NTP value in a resource record indicates a length of time that other DNS servers use
to determine how long to cache information for a record before expiring and discarding it.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed'' if the underlined text makes the statement correct.
Correct Answer
A. TTL
Explanation
The underlined text, "The NTP value," should be changed to "TTL" to make the statement correct. TTL stands for Time to Live and it indicates the length of time that other DNS servers should cache information for a record before expiring and discarding it. NTP, on the other hand, stands for Network Time Protocol and is used for synchronizing the time on computer systems.
43.
This question requires that you evaluate the underlined text to determine if it is correct.
The loopback address of your computer is 127.0.0.1.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
Correct Answer
D. No change is needed
Explanation
The loopback address of a computer is indeed 127.0.0.1, so no change is needed.
44.
A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday.
You verify that the user's computer is properly physically connected to the network. You
discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
Correct Answer
D. Verify that the DHCP service is available.
Explanation
The correct answer is to verify that the DHCP service is available. The IP address 169.254.48.97 is an Automatic Private IP Address (APIPA) which is assigned when a device is unable to obtain an IP address from a DHCP server. This suggests that the user's computer is not receiving a valid IP address from the DHCP server. By verifying the availability of the DHCP service, any issues with the server can be identified and resolved, allowing the user to obtain a valid IP address and restore access to network resources.
45.
This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called zone replication,
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
Correct Answer
A. Zone transfer
Explanation
The underlined text "Zone transfer" makes the statement correct. Zone transfer refers to the process of replicating a zone file to multiple DNS servers, which aligns with the given statement. Therefore, no change is needed.
46.
Which protocol can be used to encrypt packets on the Internet?
Correct Answer
B. HTTPS
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it is a protocol that provides secure communication over a computer network. It uses encryption to protect the data transmitted between a web browser and a website, ensuring that the packets cannot be intercepted or tampered with by unauthorized parties. This is particularly important for sensitive information such as passwords, credit card numbers, and personal data, as it prevents potential attackers from accessing or manipulating the data while it is in transit.
47.
A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?
Correct Answer
C. DHCP
Explanation
If a computer with an IP address of 169.254.0.1 cannot access the network, it suggests that it is not receiving a valid IP address from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. Therefore, to confirm network access, you should ensure that the DHCP service is available and functioning properly.
48.
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Correct Answer
B. Domain Name Service (DNS).
Explanation
The correct answer is Domain Name Service (DNS). DNS is responsible for resolving fully qualified domain names (FQDN) to IP addresses. It translates human-readable domain names into IP addresses that computers can understand and use to communicate with each other on the internet. DNS plays a crucial role in ensuring that users can access websites and other online resources by translating the domain names they enter into the corresponding IP addresses.
49.
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
Correct Answer(s)
A. Establishing network speed parameters
B. Verifying the client's patch level
Explanation
IKE, or Internet Key Exchange, is a protocol used for establishing secure communication channels in IPsec VPNs. It is responsible for negotiating and establishing the security parameters and algorithms to be used for encryption and authentication. It also facilitates the exchange of key information between the communicating parties. However, IKE is not responsible for establishing network speed parameters or verifying the client's patch level. These functions are typically handled by other protocols or mechanisms.
50.
What happens when an 802.11a node broadcasts within the range of an 802.11g access
point?
Correct Answer
C. Both the node and the access point are unable to transmit.
Explanation
When an 802.11a node broadcasts within the range of an 802.11g access point, both the node and the access point are unable to transmit. This is because 802.11a and 802.11g operate on different frequency bands and are not compatible with each other. The 802.11g access point will not be able to understand the signals sent by the 802.11a node, and vice versa. As a result, both the node and the access point will be unable to establish a connection and transmit data.