1.
After adding a new cable segment to the network, the technician should:
Correct Answer
C. Update the wiring schematics.
2.
Which of the following devices can be used to breakup a broadcast domain?
Correct Answer
B. Router
3.
Which of the following is a secure way to transfer files from one device to another?
Correct Answer
A. SFTP
4.
An administrator has a networking closet on the first floor of a building with all of the network and communication equipment. However, the telephony provider installed the communications line in the basement. Which of the following needs to be extended to connect the line to the networking closet?
Correct Answer
C. Patch panel
5.
Which of the following methods is used to provide access to a VPN?
Correct Answer
B. PPTP
6.
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response?
Correct Answer
C. 3 and 6
Explanation
The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and 100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.
7.
Which of the following network access security methods involves the analysis of a physical hardware addresses?
Correct Answer
C. MAC filtering
8.
Which of the following is a direct advantage of having wireless standards?
Correct Answer
C. Interoperability between devices
9.
Which of the following is a best practice when implementing a basic wireless network?
Correct Answer
A. Disabling ESSID broadcast
10.
Which of the following wiring standards would MOST likely be used to connect a single network node to a switch?
Correct Answer
B. Straight
11.
Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss?
Correct Answer
C. 328 feet (100 meters)
12.
A media converter is also known as a:
Correct Answer
A. Transceiver.
13.
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed?
Correct Answer
A. Bandwidth shaper
14.
A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps should be done FIRST to diagnose the problem?
Correct Answer
C. Identify symptoms and draw a network diagram.
15.
Which of the following commands can be used to find the MAC address of a connecting router?
Correct Answer
A. Arp
16.
Which of the following describes an email that is sent to users with web links that direct them to malicious websites?
Correct Answer
B. Phishing
17.
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a cubicle corresponds to a given RJ-45 jack in a patch panel?
Correct Answer
D. Multimeter
18.
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs?
Correct Answer
B. 10GBase-SR
19.
An administrator is troubleshooting network connectivity and would like to view the path that packets are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use?
Correct Answer
C. Traceroute
20.
Which of the following is the MOST appropriate policy for updating physical network diagrams?
Correct Answer
A. Update whenever a connection is changed.
21.
After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass. Which of the following terms BEST describes this firewall behavior?
Correct Answer
A. Stateful inspection
22.
Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly together?
Correct Answer
C. Crosstalk
23.
Which of the following ports does IPSec use, by default?
Correct Answer
B. 500
24.
Which of the following can be used to find the location of a cable short?
Correct Answer
D. TDR
Explanation
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
25.
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?
Correct Answer
C. RADIUS
26.
Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user?
Correct Answer
B. Broadband
27.
A company needs to perform stateful packet filtering on the core network. Which of the following network devices would BEST be suited to match this equipment?
Correct Answer
A. Firewall
28.
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).
Correct Answer
A. SFTP
29.
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used?
Correct Answer
C. Crossover
30.
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?
Correct Answer
D. 802.1x
31.
Which of the following is a commonly used protocol for VoIP network communication?
Correct Answer
D. RTP
32.
Which of the following protocols uses port 143 by default?
Correct Answer
D. IMAP4
33.
A user calls network support and reports that email is not working. Which of the following should the technician do FIRST?
Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent.
Correct Answer
A. Ask the user what operation was performed, what the expected result was, and what the actual result was, and what the actual result was.
34.
Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and broadcast addresses on network clients and workstations?
Correct Answer
C. DHCP server
35.
Which of the following exchanges routing information between two autonomous systems?
Correct Answer
A. EGP
36.
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
Correct Answer
B. Latency
37.
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following could be used to accomplish this connection?
Correct Answer
D. Media converter
38.
VLANs occur at which of the following layers of the OSI model?
Correct Answer
B. 2
39.
Which of the following is the metric used for OSPF?
Correct Answer
C. Bandwidth
40.
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem?
Internet Address Physical Address Type
172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic
Correct Answer
C. MAC spoofing
41.
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution?
Correct Answer
C. Change the subnet mask to 255.255.254.0.
42.
An administrator suspects that packets to an IP address are being dropped over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets?
Correct Answer
C. Traceroute
43.
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the internet. Other hosts on the same network can connect to the internet. Which of the following should the technician check?
Correct Answer
C. The default gateway
44.
Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80?
Correct Answer
E. Netstat -p tcp
45.
An administrator would like to evaluate network traffic. Which of the following tools should the administrator use?
Correct Answer
B. Protocol analyzer
46.
Which of the following ports would be commonly used for FTP traffic?
Correct Answer
A. 20
47.
Which of the following device can connect multiple workstations, support VLANs, and function as a router?
Correct Answer
D. Multilayer switch
48.
Which of the following classes is the address 208.177.23.1?
Correct Answer
C. Class C
49.
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
Correct Answer
D. 802.11n
50.
Which of the following protocols could be used in a peer-to-peer topology?
Correct Answer
B. IGMP