1.
Which of the following can be configured to restrict ports and IP address from Accessing The internal network?
Correct Answer
C. ACL's
2.
Which of the following authentication solutions provides AAA and uses TCP?
Correct Answer
A. TACACS+
3.
Which of the following would be used to test out the security of a specific security attacks?
Correct Answer
A. Honeynet
4.
The protocols that uses a three way handshake to transfer information can be found within which layer of the OSI Model
Correct Answer
C. Layer 4
Explanation
TCP 3-Way Handshake (SYN,SYN-ACK,ACK)
5.
Which of the following separates broadcast domains?
Correct Answer
B. Router
Explanation
Router separates internal/external networks and therefor broadcast domains
6.
Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
Correct Answer
A. Enable an SNMP agent
7.
Which of the following commands can Lisa, a technician, use on a server to display the default router settings?
Correct Answer
C. Route
8.
Which of the following commands can Lisa, a technician, use to check whether the DNS server for the given domain is reachable?
Correct Answer
C. Dig
9.
Which of the following could KIM, a network technician , use to find the approximate location of a break in a long network cable?
Correct Answer
B. Time domain reflectometer
10.
Which of the following protocols is commonly used for VoIP technology?
Correct Answer
C. SIP
11.
Which of the following can Jeff, a technician , modify on an 802.11n router that is not available as an option on an 802.11g device?
Correct Answer
D. Spectrum
12.
Which of the following technologies could be implemented to improve call clarity when using VoIP technology?
Correct Answer
C. QoS
Explanation
QoS (Quality of Service) is a major issue in VOIP implementations. The issue is how to guarantee that packet traffic for a voice or other media connection will not be delayed or dropped due interference from other lower priority traffic.
Things to consider are
Latency: Delay for packet delivery
Jitter: Variations in delay of packet delivery
Packet loss: Too much traffic in the network causes the network to drop packets
Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts
For the end user, large delays are burdensome and can cause bad echos. It's hard to have a working conversation with too large delays. You keep interrupting each other. Jitter causes strange sound effects, but can be handled to some degree with "jitter buffers" in the software. Packet loss causes interrupts. Some degree of packet loss won't be noticeable, but lots of packet loss will make sound lousy.
13.
When using high bandwidth applications over WAN connections, which of the following should be used?
Correct Answer
D. Load balancing
Explanation
Most commonly, the term load balancing refers to distributing incoming HTTP requests across Web servers in a server farm, to avoid overloading any one server. Because load balancing distributes the requests based on the actual load at each server, it is excellent for ensuring availability and defending against denial of service attacks.
14.
When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying system functionality?
Correct Answer
D. Document findings, actions and outcomes
Explanation
Table 1-1. The Six-Step CompTIA A+ Troubleshooting Methodology
Step Description
Step 1 Identify the problem
Step 2 Establish a theory of probable cause (question the obvious)
Step 3 Test the theory to determine the cause
Step 4 Establish a plan of action to resolve the problem and implement the solution
Step 5 Verify full system functionality and, if applicable, implement preventative measures
Step 6 Document findings, actions, and outcomes
15.
Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology
Correct Answer
B. Implement the solution or escalate as necessary
16.
Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
Correct Answer
A. TDR
Explanation
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).[1] It can also be used to locate discontinuities in a connector, printed circuit board, or any other electrical path. The equivalent device for optical fiber is an optical time-domain reflectometer.
17.
A switch in IDF3 has shutdown at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot the problem?
Correct Answer
A. Environmental monitor
18.
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
Correct Answer
C. 22
Explanation
FTP= Port 20(data) / 21(cmd)
Telnet= Port 23
19.
Which of the following ports is the default telnet port?
Correct Answer
D. 23
Explanation
FTP = Port 20(data) / 21(cmd)
SSH= 22
20.
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together
Correct Answer
B. Tone probe
21.
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?
Correct Answer
B. A
Explanation
CNAME: record is an abbreviation for Canonical Name record and is a type of resource record in the Domain Name System (DNS) that specifies that the domain name is an alias of another, canonical domain name
MX: mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).
PTR: The reverse DNS database of the Internet is rooted in the Address and Routing Parameter Area (arpa) top-level domain of the Internet. IPv4 uses the in-addr.arpa domain and the ip6.arpa domain is delegated for IPv6. The process of reverse resolving an IP address uses the pointer DNS record type (PTR record).
22.
Which of the following is used to prevent Layer 2 switching loops within a local area network?
Correct Answer
A. STP
Explanation
Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links.
Maximum Transmission Unit (MTU) of a communications protocol of a layer is the size (in bytes) of the largest protocol data unit that the layer can pass onwards.
Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
IGP (Interior Gateway Protocol) is a protocol for exchanging routing information betweengateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks). The routing information can then be used by the Internet Protocol (IP) or other network protocols to specify how to route transmissions.
23.
A bridge handles frame at which of the following layers of the OSI model?
Correct Answer
D. Data Link
Explanation
Network bridging - describes the action taken by network equipment to allow two or more communication networks, or two or more network segments,[1] to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.[2] A network bridge is a network device that connects more than one network segment. In the OSI model bridging acts in the first two layers.
24.
Which of the following is a method to prioritize network traffic coming from VoIP phones?
Correct Answer
D. Qos
Explanation
Quality of Service (QoS) refers to several related aspects of telephony and computer networks that allow the transport of traffic with special requirements. In particular, much technology has been developed to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter service demands.
Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.
Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
Session Initiation Protocol (SIP) is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol (IP). The protocol can be used for creating, modifying and terminating two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of one or several media streams.
25.
Kim, a technician, is installing a switch that not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (select TWO)
Correct Answer
B. IP addressing
Explanation
Port speed and Duplex
26.
Zach, a technician, is checking a newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?
Correct Answer
A. Cable Tester
27.
Which of the following technologies allows for redundant links within a Layer 2 segment?
Correct Answer
D. Spanning Tree
28.
A Company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
Correct Answer
B. BGP
Explanation
Border Gateway Protocol (BGP) is the protocol which is used to make core routing decisions on the Internet; it involves a table of IP networks or "prefixes" which designate network reachability among autonomous systems (AS). BGP is a path vector protocol or a variant of a Distance-vector routing protocol. BGP does not involve traditional Interior Gateway Protocol (IGP) metrics, but routing decisions are made based on path, network policies and/or rule-sets. For this reason, it is more appropriately termed a reachability protocol rather than routing protocol.
29.
Which of the following BEST describes a switch port?
Correct Answer
D. Collision domain
Explanation
A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, in particular, when using early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. Collisions are resolved using carrier sense multiple access with collision detection in which the competing packets are discarded and re-sent one at a time. This becomes a source of inefficiency in the network.[1]
30.
Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?
Correct Answer
B. Butt set
31.
Which of the following can Jeff, a network technician, change to help limit war driving?
Correct Answer
A. Signal strenght
32.
In which of the following wireless standards is MIMO used?
Correct Answer
D. 802.11n
33.
Which of the following utilities would Kim, a technician, use to resolve the FQDN of web servers to its IP address?
Correct Answer
C. Nslookup
Explanation
nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record. The Internet Systems Consortium has deprecated[1][2] nslookup in favor of host and dig.
34.
Two WAP's are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?
Correct Answer
C. WAP SSID's are matching
35.
Which of the following is usual number of the host identifier part an IPv6 address
Correct Answer
D. 64
36.
Which of the following is the prefix for a link-local IPv6 address?
Correct Answer
A. FE80::/10
37.
Which of the following layers of the OSI model maps to the Network Interface Layer of the TCP stack? (select TWO)?
Correct Answer
A. Physical
Explanation
Physical and Data Link
38.
Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for connecting to web server?
Correct Answer
D. Protocol analyzer
Explanation
A "Protocol analyzer" is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Each type of communication protocol has a different tool to collect and analyze signals and data.
39.
DNS lookups for a given host are intermittently failing. Which of the following would Jim, a technician, MOST likely use to verify this problem?
Correct Answer
D. Dig