1.
In order to permit 64 servers access, a new segment will be created, which subnet can achieve
this goal while conserving IP addresses?
Correct Answer
D. 192.168.1.0/25
Explanation
The subnet 192.168.1.0/25 can achieve the goal of permitting 64 servers access while conserving IP addresses. This subnet has a network address of 192.168.1.0 and a subnet mask of /25, which means it can accommodate 128 IP addresses. Since we need to permit 64 servers, this subnet provides enough IP addresses to meet the requirement while conserving IP addresses.
2.
Which dotted decimal address is the correct conversion of the following binary string?
11000000.10101000.01100011.00011010
Correct Answer
A. 192.168.99.26
Explanation
The given binary string represents an IP address in the format of four sets of eight bits each. Converting each set of eight bits to decimal gives us 192.168.99.26.
3.
If you are asked to reduce the multicast flooding on the layer2 switch, which protocol will you
use?
Correct Answer
C. IGMP
Explanation
IGMP (Internet Group Management Protocol) is the correct protocol to use in order to reduce multicast flooding on a layer 2 switch. IGMP is used by hosts to report their multicast group memberships to any neighboring multicast routers. By using IGMP, the switch can efficiently manage and control multicast traffic, allowing it to only send multicast packets to the ports where the interested receivers are located, reducing unnecessary flooding and optimizing network performance.
4.
What do the first three sets of hexadecimal digits of a MAC represent?
Correct Answer
A. Organizationally Unique Identifier (OUI)
Explanation
The first three sets of hexadecimal digits of a MAC address represent the Organizationally Unique Identifier (OUI). This identifier is assigned by the Institute of Electrical and Electronics Engineers (IEEE) and is used to identify the manufacturer or organization that owns the MAC address. The OUI helps in distinguishing different devices and their manufacturers in a network.
5.
Refer to the following protocols, which one is a link-state routing protocol using area0?
Correct Answer
A. OSPF
Explanation
OSPF (Open Shortest Path First) is a link-state routing protocol that is commonly used in large networks. It uses a hierarchical structure with areas, and Area 0 is the backbone area. OSPF routers within the same area exchange information about their directly connected links, allowing them to build a complete map of the network. This information is used to calculate the shortest path to each destination. Therefore, OSPF is the correct answer as it is a link-state routing protocol that uses Area 0.
6.
Which type of notation contains 221.17.101.223/28?
Correct Answer
B. CIDR
Explanation
CIDR (Classless Inter-Domain Routing) notation is used to represent IP addresses and their associated subnet masks. In this notation, the IP address 221.17.101.223 is followed by a forward slash (/) and the number 28, which represents the number of bits in the subnet mask. This notation is commonly used in networking to specify the network and host portions of an IP address.
7.
Computer A can connect with computers on Network A, but cannot connect with computers on
Network b. Which of the following solutions will allow communication between Network A and
Network B?
Computer A: Computer B:
IP: 123.132.192.50 IP: 200.201.202.52
Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0
Default Gateway: 200.201.202.1 Default Gateway: 200.201.202.1
Network A: Network B:
Network: 123.132.192.0 Network: 200.201.202.0
Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0
Router A: Router B:
IP: 123.132.192.1 IP: 200.201.202.1
Correct Answer
B. Change the default gateway on Computer A to 123.132.192.1
Explanation
Changing the default gateway on Computer A to 123.132.192.1 will allow communication between Network A and Network B. The default gateway is the IP address of the router that connects the local network to other networks. By changing the default gateway on Computer A to the IP address of Router A (which is 123.132.192.1), Computer A will be able to connect with computers on Network B through the router.
8.
Which of the following commands can display the number of server connections open on a client?
Correct Answer
A. Netstat
Explanation
Netstat is a command-line tool that can display the active network connections on a computer. It provides information about the protocol, local and remote addresses, and the state of the connection. By using netstat, one can easily see the number of server connections open on a client machine. Therefore, netstat is the correct answer to the question.
9.
For a new wireless network, which wireless encryption is the highest level that can be run?
Correct Answer
C. WPA2 AES
Explanation
WPA2 AES is the highest level of wireless encryption that can be run for a new wireless network. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security. WPA2 (Wi-Fi Protected Access 2) is the current industry standard for wireless security, and it supports both AES and TKIP (Temporal Key Integrity Protocol) encryption methods. However, TKIP is considered less secure and is being phased out in favor of AES. Therefore, WPA2 AES is the recommended and highest level of encryption for a new wireless network.
10.
Which one of the following communication protocols does a UNIX system primarily rely on?
Correct Answer
C. TCP / IP (Transmission Control Protocol / Internet Protocol)
Explanation
A UNIX system primarily relies on the TCP/IP (Transmission Control Protocol / Internet Protocol) communication protocol. TCP/IP is a set of protocols that allows computers to communicate over the internet or a local network. It provides reliable and secure communication between devices, ensuring that data packets are delivered accurately and in the correct order. TCP/IP is widely used in UNIX systems for various network-related tasks, such as connecting to remote servers, transferring files, and accessing the internet.
11.
An access point in a wireless network receives link margin values from associated access points.
A wireless access points beacon frame contains which data below?
Correct Answer
D. SSID and MAC address
Explanation
A wireless access point's beacon frame contains the SSID (Service Set Identifier) and MAC address. The SSID is a unique identifier for the wireless network, allowing devices to connect to the correct network. The MAC address is the unique identifier for the access point itself, enabling devices to communicate with it.
12.
Which protocol combines the PPTP?.
Correct Answer
A. PPP
Explanation
PPP (Point-to-Point Protocol) is the protocol that combines with PPTP (Point-to-Point Tunneling Protocol). PPP is a data link layer protocol that is used to establish a direct connection between two nodes in a network. PPTP, on the other hand, is a protocol that allows the secure transfer of data over a public network, such as the internet. By combining PPP with PPTP, users can establish secure and private connections over the internet using the PPP protocol.
13.
Given that wireless Internet access is located in an open warehouse environment. And you
discover that different locations have different signal strengths. How to increase the signal
strength consistency?
Correct Answer
A. Change the antenna placement.
Explanation
Changing the antenna placement can help increase the signal strength consistency in a wireless Internet access environment. By strategically positioning the antenna, it can receive and transmit signals more effectively, reducing signal loss and interference. This can result in a more consistent and stable signal strength across different locations in the open warehouse environment.
14.
A company has a hybrid network composed of Mac and Windows servers accessed by Mac,
Linux and Windows clients. A department wants to use their Windows XP desktops to access the
Macintosh printer. Which action should be taken by the administrator to allow the Windows XP
clients to access that printer?
Correct Answer
C. The AppleTalk protocol must be installed on the Windows machine.
Explanation
To allow Windows XP clients to access the Macintosh printer in a hybrid network, the administrator should install the AppleTalk protocol on the Windows machine. This protocol allows communication between Mac and Windows devices, enabling the Windows XP desktops to connect to the Macintosh printer.
15.
As a network administrator, you are tasked with hooking three desktop computers to a current
network. However, only one network connection is applicable. Which of the following items will
help you complete this task?
Correct Answer
B. Switch
Explanation
A switch would help in completing this task because it allows multiple devices to connect to a network using a single network connection. It acts as a central hub, enabling communication between the connected devices and managing the flow of data between them.
16.
You have a small network with five computers, all of which are connected to a central switch and
access shared file and print on a single server. However, one computer can't connect to the
network, while the other four can connect properly. Why?
Correct Answer
A. The NIC has failed.
Explanation
The most likely explanation for one computer being unable to connect to the network while the other four can is that the Network Interface Card (NIC) of the non-connecting computer has failed. The NIC is responsible for connecting the computer to the network, and if it is not functioning properly, the computer will not be able to establish a connection. This is a common issue in network troubleshooting, and replacing the faulty NIC should resolve the problem.
17.
Which of the following is a valid MAC address?
Correct Answer
D. 00-04-23-D2-EE-F4
Explanation
A MAC address is a unique identifier assigned to network interfaces for communications on a network. It consists of six pairs of hexadecimal digits separated by hyphens or colons. In the given options, only "00-04-23-D2-EE-F4" follows the correct format of a MAC address. The other options are an IP address (192.168.1.32), a page number (45 of 142), and an invalid MAC address with an invalid hexadecimal digit (H4).
18.
A printer which is connected to the network is placed in a SOHO environment. The computers
can ping the printer directly using TCP/IP and they could print the day before. However, today the
computers are unable to print. Do you know which configuration can solve this problem?
Correct Answer
C. Place the printer on a static IP address.
Explanation
Placing the printer on a static IP address can solve the problem because it ensures that the printer will always have the same IP address on the network. This allows the computers to consistently communicate with the printer using TCP/IP. If the printer were set to use a dynamic IP address (such as through DHCP), it is possible that the IP address assigned to the printer may have changed, causing the computers to lose connection with the printer and resulting in the inability to print.
19.
Given that the IP address and default gateway are both on the 192.168.1.0/24. The computer can
transmit files locally to other devices, but it can't use a wireless access point to connect to the
Internet. Why?
Correct Answer
A. The computers gateway is not routing to a public IP address.
Explanation
The computer is unable to connect to the Internet because its gateway is not routing to a public IP address. A gateway is responsible for forwarding network traffic between different networks, and in this case, the gateway is not configured to route traffic to the public IP address range. Therefore, the computer can transmit files locally to other devices within the same network, but it cannot access the Internet through the wireless access point.
20.
Which of the following commands does a network administrator use to verify the mail server
addresses for a remote domain?
Correct Answer
A. Nslookup/dig
Explanation
A network administrator would use the nslookup or dig command to verify the mail server addresses for a remote domain. These commands allow the administrator to query the DNS (Domain Name System) to retrieve information about the mail server associated with the domain. By using nslookup or dig, the administrator can ensure that the correct mail server addresses are being used for sending and receiving emails for the remote domain.
21.
Which type of LAN will use CAT5 UTP?
Correct Answer
B. 100Base-TX
Explanation
CAT5 UTP is a type of Ethernet cable that is commonly used for local area networks (LANs). It is capable of supporting data transfer speeds of up to 1000 Mbps. Among the given options, 100Base-TX is the only one that uses CAT5 UTP. Therefore, 100Base-TX is the correct answer.
22.
If you want to combine multiple connections into one logical connection to increase the bandwidth
for network transmission, which technology will you use?
Correct Answer
C. Bonding
Explanation
Bonding is the technology used to combine multiple connections into one logical connection in order to increase the bandwidth for network transmission. This allows for improved data transfer speeds and increased network capacity. By bonding multiple connections, the overall bandwidth is effectively multiplied, providing a more efficient and faster network connection.
23.
You are working as a technician at certways .com. A Mac OS X 10.3 user has requested some
assistance with a network connectivity issue that he has. The Mac OS uses Kerberos to access a
kerberized service provided by a Mac OS X server 10.3 but the user experiences an
authentication failure when he tries to do this. Which of the following steps might resolve the
issue?
Correct Answer
B. Synchronize all Kerberos principal's clocks using a network time server.
Explanation
Synchronizing all Kerberos principal's clocks using a network time server might resolve the authentication failure issue. This is because Kerberos relies on accurate time synchronization between the client and server for authentication to work properly. If the clocks are not synchronized, the authentication request may fail. By using a network time server to synchronize the clocks, the user's computer and the server will have the same time, allowing the authentication process to proceed successfully.
24.
You work as the network administrator at certways.com. You are sent to one of certways's branch
offices to investigate a network problem. The network at the branch office consists of twenty
Windows XP workstations that are wired to a switch. The switch is connected to a router for
Internet access. One of the users at the branch office reports that she is unable to access the
Internet. All other users can access the Internet. Which of the following items should you check to
solve the problem?
Correct Answer
C. The network card of the problematic machine, the port on the switch that the problematic
machine is plugged into, and the patch cable from the problematic machine to the switch.
Explanation
To solve the problem of the user being unable to access the Internet, the network administrator should check the network card of the problematic machine, the port on the switch that the machine is plugged into, and the patch cable connecting the machine to the switch. These three components are crucial for network connectivity, and any issues with them could be causing the problem. By checking these components, the administrator can identify and resolve any potential issues, such as a faulty network card, a misconfigured port, or a damaged patch cable.
25.
The MAC address F2-A1-23-BC-D3-41 consist of a manufacturer ID and a station Id. Which 3
bytes represents the station identifier?
Correct Answer
D. BC-D3-41
Explanation
The MAC address F2-A1-23-BC-D3-41 consists of a manufacturer ID and a station ID. In this address, the bytes BC-D3-41 represent the station identifier.
26.
In the process of troubleshooting network data transmission issue, which command can
determine the location of the packet loss?
Correct Answer
C. Traceroute
Explanation
Traceroute is a command used to track the route taken by packets across an IP network. It sends out a series of packets with increasing Time to Live (TTL) values, allowing it to determine the path taken by the packets and identify any routers or network devices causing packet loss. By analyzing the output of the traceroute command, network administrators can pinpoint the location of the packet loss and troubleshoot the issue accordingly.
27.
Which tool will be used when placing a RJ-45 connector on a CAT5 cable?
Correct Answer
D. Snips
Explanation
Snips will be used when placing a RJ-45 connector on a CAT5 cable. Snips are a type of cutting tool that can be used to cut, strip, and trim wires. In this case, they would be used to cut the CAT5 cable to the desired length before attaching the RJ-45 connector. Pliers are not suitable for this task as they are not designed for cutting wires. A razor knife may be used to strip the outer insulation of the cable, but it is not the primary tool for attaching the connector. A polishing kit is not relevant to this task.
28.
Which table will be used by a router to determine the next hop IP address while forwarding a
packet?
Correct Answer
B. The routing table
Explanation
The routing table will be used by a router to determine the next hop IP address while forwarding a packet. The routing table contains information about the network topology and the best paths to reach different destinations. It is used by the router to make decisions on how to forward packets based on the destination IP address. The router looks up the destination IP address in the routing table and determines the next hop IP address, which is the address of the next router or network interface that the packet should be forwarded to.
29.
In computer networking, a Media Access Control address (MAC address) is a unique identifier
assigned to most network adapters or network interface cards (NICs) by the manufacturer for
identification. Which of the following MAC address is valid for a workstation?
Correct Answer
B. 00:08:38:05:B5:F4
Explanation
A MAC address is a 48-bit address represented in hexadecimal format, separated by colons or hyphens. The given MAC address "00:08:38:05:B5:F4" follows the correct format and is valid for a workstation.
30.
What is the objective of IDS?
Correct Answer
A. Monitors inbound and outbound network connections in order to identify suspicious activity.
Explanation
The objective of IDS (Intrusion Detection System) is to monitor both inbound and outbound network connections to identify any suspicious activity. By analyzing network traffic and patterns, an IDS can detect potential threats or attacks and alert the system administrator. This helps in maintaining the security of the network and preventing any unauthorized access or malicious activity.
31.
If an authentication protocol is being implemented that uses a private key and a session key, the
protocol is:
Correct Answer
B. Kerberos
Explanation
Kerberos is the correct answer because it is an authentication protocol that uses both a private key and a session key. It is commonly used in network environments to provide secure authentication for users and services. Kerberos uses a trusted third-party server, known as the Key Distribution Center (KDC), to issue tickets that contain the session key for authentication. The private key is used to encrypt and decrypt these tickets, ensuring secure communication between entities in the network.
32.
How to differ dynamic routing from static routing?
Correct Answer
D. Dynamic routes are added automatically.
Explanation
Dynamic routing is a type of routing where the routing tables are updated automatically based on network changes and updates. It is typically used in smaller networks or networks with changing topologies. On the other hand, static routing is manually configured by network administrators and is best suited for large scalable networks where the network topology remains relatively stable. Therefore, the statement "Dynamic routes are added automatically" correctly explains the difference between dynamic and static routing.
33.
Which statement best describes the routing convergence time?
Correct Answer
B. Time required by protocols to update their forwarding tables after changes have occurred
Explanation
The routing convergence time refers to the time required by protocols to update their forwarding tables after changes have occurred. This means that when there are changes in the network, such as a link failure or a new route being added, the routing protocols need to update their tables to reflect these changes and ensure that packets are forwarded correctly. The convergence time is the time it takes for these updates to propagate through the network and for the forwarding tables to be updated.
34.
At which layer of the OSI reference model does data encryption occur?
Correct Answer
C. The Presentation Layer
Explanation
Data encryption occurs at the Presentation Layer of the OSI reference model. This layer is responsible for formatting, encrypting, and decrypting data for presentation to the application layer. Encryption ensures the confidentiality and integrity of the data being transmitted over the network.
35.
During network issue troubleshooting, which action will be taken first?
Correct Answer
C. Ask the user who reported the issue to explain the symptoms in detail.
Explanation
The first action to be taken during network issue troubleshooting is to ask the user who reported the issue to explain the symptoms in detail. This step is crucial as it helps in understanding the problem more accurately and gathering relevant information about the issue. By asking the user to explain the symptoms, it becomes easier to diagnose and identify the root cause of the problem. This information can then be used to determine the appropriate steps to resolve the issue effectively.
36.
Layer 2 is the data link layer of the OSI model. Observe the following items carefully, which one
will be discovered in a layer2 switch?
Correct Answer
D. VLAN settings
Explanation
In a layer 2 switch, VLAN settings can be discovered. VLANs (Virtual Local Area Networks) are used to segment a network into multiple virtual networks, allowing for better control and management of network traffic. Layer 2 switches operate at the data link layer of the OSI model, which is responsible for the reliable transmission of data between adjacent network nodes. VLAN settings determine how devices are grouped and isolated within the network, improving security, performance, and scalability. Therefore, a layer 2 switch would be able to discover and configure VLAN settings.
37.
Dynamic Host Configuration Protocol (DHCP) is a network application protocol used by devices
(DHCP clients) to obtain configuration information for operation in an Internet Protocol network.
Which characteristic belongs to a DHCP server?
Correct Answer
C. Static IP address reservations
Explanation
A DHCP server is responsible for assigning IP addresses to devices on a network. However, in certain cases, it may be necessary to assign a specific IP address to a device permanently. This is known as a static IP address reservation. By reserving a specific IP address for a device, the DHCP server ensures that the device always receives the same IP address whenever it connects to the network. This is useful for devices that require a consistent IP address for specific network functions or services.
38.
Your company has a secure network room with restricted access to a workstation that is located
in the room. Which policy can identify intrusions?
Correct Answer
B. Audit policy
Explanation
An audit policy is designed to monitor and record activities within a network or system. By implementing an audit policy in the secure network room, any unauthorized access or intrusion attempts can be detected and recorded. This policy can help identify intrusions by providing a trail of evidence, such as log files, that can be analyzed to determine if any unauthorized access or suspicious activities have occurred. It allows for the monitoring and tracking of user actions, helping to maintain the security and integrity of the network room.
39.
Select one protocol from the following to describe a connectionless state without using
acknowledgements?
Correct Answer
B. UDP
Explanation
UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. It is a simple and lightweight protocol that allows data to be sent from one device to another without establishing a connection or verifying if the data has been received. UDP is commonly used for applications that require fast and efficient data transmission, such as streaming media, online gaming, and DNS. Unlike TCP, UDP does not guarantee delivery or order of packets, making it suitable for situations where occasional packet loss is acceptable.
40.
The command ping uses which of the following protocols?
Correct Answer
C. ICMP
Explanation
The command "ping" uses the ICMP (Internet Control Message Protocol) protocol. ICMP is used to send control messages and error reporting between network devices. The ping command is used to test the reachability of a network host by sending ICMP echo request packets and waiting for the corresponding echo reply packets. It is commonly used to troubleshoot network connectivity issues and measure round-trip time for packets.
41.
Which of the following statements regarding the OSI reference model is TRUE?
Correct Answer
B. The Session Layer of the OSI model is responsible for establishing, maintaining, and breaking
sessions.
Explanation
The statement that the Session Layer of the OSI model is responsible for establishing, maintaining, and breaking sessions is true. The Session Layer is responsible for managing the communication sessions between applications. It establishes and terminates connections between applications, manages the synchronization of data exchange, and ensures that data is delivered in the correct order. This layer also handles session checkpoints and recovery in case of failures.
42.
Computer networks use a tunneling protocol when one network protocol (the delivery protocol)
encapsulates a different payload protocol. Encryption is especially important in wireless
communications. Refer to the following protocols, which one is applicable to tunneling and
encryption purposes?.
Correct Answer
A. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) is applicable to tunneling and encryption purposes. It is commonly used to create virtual private networks (VPNs) by encapsulating data from one network protocol and transmitting it over another network. L2TP provides a secure and encrypted connection, making it suitable for tunneling and protecting data during transmission.
43.
A customer is complaining about the disconnection to the Internet, but all other users can connect
to the network. Which action will be taken next after obtaining all the information about the users
workstation?
Correct Answer
B. Ping the users workstation to verify network connectivity.
Explanation
The next action to be taken after obtaining all the information about the user's workstation would be to ping the user's workstation to verify network connectivity. By pinging the workstation, it can be determined if there is a network connection issue between the user's workstation and the rest of the network. This will help in identifying if the problem lies with the workstation itself or with the network connection.
44.
On a switched Ethernet network that is operating perfectly, what is the state in which a user will
find the activity LED (Light Emitting Diode) ?
Correct Answer
D. Periodically blinking
Explanation
The activity LED on a switched Ethernet network will periodically blink when the network is operating perfectly. This indicates that there is regular data transmission happening on the network.
45.
You are reported that a user can't access any website, but he can access the network shares and
their email. How to resolve this problem?
Correct Answer
A. Trace route to any website to see where the disconnection is occurring.
Explanation
The correct answer suggests using the trace route command to identify where the disconnection is occurring. By tracing the route to a website, it can help determine if there is a problem with the network connection or if there are any issues with the network infrastructure. This can provide valuable information for troubleshooting and resolving the problem.
46.
In order to present the active routes on a workstation, which tool will be deployed?
Correct Answer
D. Netstat -r
Explanation
The correct answer is netstat -r. The netstat -r command is used to display the routing table on a workstation. It shows the active routes that the workstation is currently using. The other options, arp ping, nbstat, and arp -a, are not specifically used for displaying active routes.
47.
All users are unable to access the network. In order to solve this issue, which action will you take
first?
Correct Answer
A. Use the ping command to verify connection to the DHCP server.
Explanation
To solve the issue of all users being unable to access the network, the first action would be to use the ping command to verify the connection to the DHCP server. By using the ping command, it can be determined if there is a connection between the users and the DHCP server. If the ping is successful, it indicates that the network connection is working properly. If the ping fails, it suggests that there may be an issue with the DHCP server or the network connection between the users and the server. Hence, using the ping command is the appropriate first step in troubleshooting the network access problem.
48.
Identify the Windows utility being used given the following output:
Proto Local Address Foreign Address State
TCP JDoe:epmap JDoe.jdoe.com:0 Listening
Correct Answer
D. Netstat
Explanation
The correct answer is netstat. The given output is a list of active TCP connections and listening ports on the local machine. Netstat is a Windows utility that displays network statistics and active connections. It provides information about the protocol, local and foreign addresses, and the state of each connection.
49.
Two network devices are connected by a crossover cable. Which pins below are different
between them?
Correct Answer
A. Pin1, Pin2, Pin3, Pin6
Explanation
The correct answer is Pin1, Pin2, Pin3, Pin6. A crossover cable is used to directly connect two devices of the same type, such as two computers or two switches, without the need for a network hub or switch. In a crossover cable, the transmit and receive pins are crossed over, so that the transmit pins on one device connect to the receive pins on the other device, and vice versa. Therefore, the pins that are different between the two devices connected by a crossover cable are Pin1 (transmit on one device, receive on the other), Pin2 (receive on one device, transmit on the other), Pin3 (transmit on one device, receive on the other), and Pin6 (receive on one device, transmit on the other).
50.
After creating a connection, which TCP connect scanner is always
configured for normal data traffic?
Correct Answer
A. ACK
Explanation
After creating a connection, the TCP connect scanner is always configured for normal data traffic using the ACK flag. The ACK flag is used to acknowledge the receipt of data packets and to request the next data packet in a sequence. It is an essential part of the TCP handshake process and is used to establish reliable communication between the sender and receiver.