What is the default subnet mask for a Class B network?
How many bits is an IPv6 address?
To protect a network when it is connected to the Internet, you should...
Which of the following does a switch use for increased performance?
Which topology is the most redundant and the most expensive?
How many bits are there in an Internet Protocol version 6 (IPv6)...
If you are making a crossover cable and one end is 568A, what should...
The ____________ is the largest WAN in the world.
What is the most common adapter or connector used to connect a...
What type of communication is sent to a single designated host?
When a signal degrades as it runs through a wire, you have ________.
In Europe, what circuit would be similar to the T1 found in the United...
What model is used to describe how data communication occurs between...
You need to connect a twisted-pair cable to the back of a patch panel....
What do you call a smaller network that is part of a larger network?
A node within a local area network (LAN) must have a network interface...
What model promises the most processing power?
What type of record does DNS use to find a mail service?
What do you call it when electrical signals jump to another set of...
What is the minimum cabling requirement for a 100BaseTx network?
The query protocol used to locate resources on a network is:
Which protocol can be used to encrypt packets on the Internet?
Which is the most secure encryption used in wireless networks?
You have a computer with an address of 169.254.32.23 and a subnet mask...
In which physical network topology is each computer connected to a...
What is the primary disadvantage of X.25?
What is the minimum category of twisted-pair cable you need to support...
To test a cable, you would use a _____________.
What type of address is 169.254.32.23?
What command displays the IP address, subnet mask, and default gateway...
What technology takes data and breaks them into packets and sends them...
What type of address is 202.23.2.255?
What topology does FDDI use?
What do you use to isolate a group of computers within your...
What is used to uniquely identify a host on a TCP/IP network?
Which protocol do you use as the transport protocol for a video...
How many layers does the TCP/IP model have?
What are the seven layers found in the OSI model, in order?
You have a computer that cannot connect to a server. When you look at...
What IPv6 address incorporates IPv4?
What standard describes CSMA/CD?
What type of communication is sent to a group of designated host?
What option do you use to ping constantly until you stop it?
What feature within Windows allows the server to act as a router?
What command displays Ethernet statistics?
Which DMZ configuration uses one firewall with three interfaces?
What stage is the World Wide Web in?
Which type of port is used to support VLAN traffic between two...
What allows a user to connect to a corporate network using the...
Which layer in the OSI model includes the cable and network adapters?
If you want to connect a computer directly to another computer without...
Which two of the following are connectivity options for wide area...
What layer in the OSI model is responsible for logging on and off?
When you pick up your wireless phone, your computer drops network...
What speed does a T1 run at?
Which of the following is a characteristic of single-mode fibre?
What is used to identify a wireless network?
What protocol is used with L2TP to encrypt data?
What name does Windows Server 2008 R2 use for Terminal Services?
What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?
What command do you use to register the computer’s name and IP...
A _________ is a single computer or device that connects to a TCP/IP...
What is the most common cable used today?
What command do you use to connect to a FTP server to download a file?
You have a subnet mask of 255.255.240.0. What would the CIDR notation...
Which of these factors has the biggest impact on data transmission...
What is the advantage of UDP over TCP?
What type of cable should be used as part of a fire code for a...
What of the following is not a characteristic of 802.11n?
What type of address is used to send a single set of packets to...
What defines the nearest router for a host?
What command do you use to display the routing table on a local...
Tracert is used to:
What command do you use to release the IP configuration handed out by...
A characteristic of the mesh topology is that it:
What is the maximum speed supported by 802.11b?
In which OSI layer does routing occur?
_________ is used to send packets from one network to another network.
After you install DHCP servers and configure and activate a scope,...
What is the maximum number of hosts you can use for each subnet that...
What type of device is used to detect malicious network activities and...
When a packet traverses a network, each router is a _____.
What replaced X.25?
What zone is used to publish external websites for an organization?
Which port categories include inbound ports of HTTP, HTTPS, FTP, and...
A layer 3 switch is similar to a __________
What protocol is used with L2TP to provide encryption?
A user reports that she cannot connect to network resources from a...
What command do you use to test a system’s IPv4 protocol stack?
What type of firewall do you use to block access to certain websites...
What part of the network is the point where the responsibility of the...
At what speed does a T3 line run?
What speed does FDDI use?
What ports are defined above 49,152?
A router’s static route is set by the:
For IPv4, what class is used for multicasting?
What would you use to create VPN tunnels so that users can connect to...
What technology can you use temporarily to connect networks from two...
List the four steps for a client to get an IP address from a DHCP...
Which protocol is used to translate IP addresses to MAC addresses?
TCP/IP and IPX/SPX are known as _________ stacks
How fast is a DS0 circuit?
What command do you use to retrieve or update your DHCP assigned...
Which of these addresses is a multicast address?
What do you use to create VLANs?
Which layer in the OSI model covers routing between networks?
What technology uses wires from the telephone company to provide...
What mode users a wireless access point?
Which VPN technology is the most common and the easiest to set up?
What command do you use to test the TCP/IP stack on a computer?...
You use the ________ to connect to a terminal server.
What command do you use to display the MAC address on a system?
What acts as a middleman that translates between internal and external...
What command do you use to reacquire IP configuration from a DHCP...
A private network that allows members of an organization to exchange...
Which model users a central database for authentication?
What type of server does Active Directory run on?
Which model has each host have their own security database?
Which component of IPSec is generates the encryption and...
A service that resolves NetBIOS names to IP addresses is:
What command do you use to clear the DNS cache on a local system?
What command clears the NetBIOS name cache table?
What device is used to protect one network from another by using...
Which layer in the OSI model covers HTTP, FTP, and RDC?
For organizations, using ___________ authentication for wireless...
What is the loopback IP address? (Check all that apply)
Security is a concern on wireless networks due to:
You are setting up a network within a warehouse using Category 6 UTP....
The protocol maps IP addresses to a Media Access Control (MAC) address...
What command is used to add static routes to a Windows computer?
What type of device is designed to inspect traffic, detect malicious...
What routing protocol is the most popular link-state protocol used...
What command tests network connectivity while showing you each hop...
What port does L2TP use?
X.25 and Frame Relay are examples of what type of WAN technology?
When you have multiple circuits connected to a site, the entire...
Which layer in the OSI model do MAC addresses and switches use?
One reason to incorporate VLANs in a network is to:
A __________ address is assigned by a DHCP server.
Which of the following services masks internal IP addresses from...
You need to divide a network into three subnets. Which Device should...
_________ is a route that must be manually defined on each router.
What is the maximum speed supported by 802.11g?
What port does DNS use?
What command do you use to connect to a remote computer so that you...
An _________ is the internal network for an organization.
What is the most common central device used today to connect computers...
Which layer in the OSI model is included in the TCP/IP model?
What protocol automatically configures IP configuration for a client?
What port does Remote Desktop Services use?
Which of the following is not a private address?
The service that resolves fully qualified domain name (FQDN) to IP...
What does X.25 use as its DTE device?
How many B channels does an ISDN PRI support?
Which layer of the OSI model is used to create a connection so that a...
What is used to remap private addresses to public addresses and back?
What command is used to display NetBIOS over TCP/IP statistics?
What is the central device used in wireless LANs?
Connecting to a private Network address from a public network...
The default gateway address identifies the:
What provides name resolution between domain names and IP addresses?
What device acts as a high-speed modem for a LAN?
What layer in the OSI model is used to encrypt data?
Which of these ports does DHCP use?
You have a host with the address of 180.24.45.120. To what class would...
What service on a Windows network is used to translate between NetBIOS...
A ________ is the guaranteed certain amount of information provided by...
What type of network can you set up that is another company’s...
If a router is installed so that it separates DHCP server from its...
What type of configuration creates a DMZ between two firewalls?...
One purpose of a perimeter network is to:
Which type of firewall blocks packets based on rules that are based on...
Which layer of the OSI model includes VLANs?
Which of the following is a public IP address?
Which of the following is not a fibre connector? (Choose two)
What command can you use to connect to a mail server so that you can...
When trying to protect your network, you should create your secure...
What port does PPTP use?
Which IPSec component provides connectionless integrity and data...
What command do you use to display active TCP or UDP connections?
What mechanism do wireless networks use to access the network?
_________ uses a clocking circuit to control the timing of...
What technology used in firewalls keeps tracks of conversations so...
What routing protocol is the most popular distance-vector routing...
What command do you use to display and modify the network...
Which layer in the OSI model is used to verify that data was delivered...
What protocol does the ping command use to test network connectivity?
What server is used to translate host names to IP addresses?
Which IPSec component includes the most security, including...
What type of firewall works on the Session layer that creates a...
What command tests network connectivity while showing you each hop...