# Net+ 2009 Practice Test

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
| Written by Dpclark
D
Dpclark
Community Contributor
Quizzes Created: 1 | Total Attempts: 60
Questions: 50 | Attempts: 60

Settings

This is the first 50 questions of 700 I will be posting. These questions were given to us in my Net+ II class and I was told that many of the questions are pretty much identical to those on the Net+ exam. Sorry for some of the formatting and language issues - don't have the time to go through all 700 questions and re-type the ones that are a little off.

• 1.

### In order to permit 64 servers access, a new segment will be created, which subnet can achieve this goal while conserving IP addresses?

• A.

192.168.1.0/24

• B.

192.168.1.0/26

• C.

192.168.1.0/23

• D.

192.168.1.0/25

D. 192.168.1.0/25
Explanation
The subnet 192.168.1.0/25 can achieve the goal of permitting 64 servers access while conserving IP addresses. This subnet has a network address of 192.168.1.0 and a subnet mask of /25, which means it can accommodate 128 IP addresses. Since we need to permit 64 servers, this subnet provides enough IP addresses to meet the requirement while conserving IP addresses.

Rate this question:

• 2.

### Which dotted decimal address is the correct conversion of the following binary string? 11000000.10101000.01100011.00011010

• A.

192.168.99.26

• B.

192.168.99.34

• C.

192.168.101.26

• D.

192.168.101.34

A. 192.168.99.26
Explanation
The given binary string represents an IP address in the format of four sets of eight bits each. Converting each set of eight bits to decimal gives us 192.168.99.26.

Rate this question:

• 3.

### If you are asked to reduce the multicast flooding on the layer2 switch, which protocol will you use?

• A.

ICMP

• B.

SNMP

• C.

IGMP

• D.

ARP

C. IGMP
Explanation
IGMP (Internet Group Management Protocol) is the correct protocol to use in order to reduce multicast flooding on a layer 2 switch. IGMP is used by hosts to report their multicast group memberships to any neighboring multicast routers. By using IGMP, the switch can efficiently manage and control multicast traffic, allowing it to only send multicast packets to the ports where the interested receivers are located, reducing unnecessary flooding and optimizing network performance.

Rate this question:

• 4.

### What do the first three sets of hexadecimal digits of a MAC represent?

• A.

Organizationally Unique Identifier (OUI)

• B.

Security Set Identifier (SSID)

• C.

• D.

The Device ID

A. Organizationally Unique Identifier (OUI)
Explanation
The first three sets of hexadecimal digits of a MAC address represent the Organizationally Unique Identifier (OUI). This identifier is assigned by the Institute of Electrical and Electronics Engineers (IEEE) and is used to identify the manufacturer or organization that owns the MAC address. The OUI helps in distinguishing different devices and their manufacturers in a network.

Rate this question:

• 5.

### Refer to the following protocols, which one is a link-state routing protocol using area0?

• A.

OSPF

• B.

IS-IS

• C.

EIGRP

• D.

BGP

A. OSPF
Explanation
OSPF (Open Shortest Path First) is a link-state routing protocol that is commonly used in large networks. It uses a hierarchical structure with areas, and Area 0 is the backbone area. OSPF routers within the same area exchange information about their directly connected links, allowing them to build a complete map of the network. This information is used to calculate the shortest path to each destination. Therefore, OSPF is the correct answer as it is a link-state routing protocol that uses Area 0.

Rate this question:

• 6.

### Which type of notation contains 221.17.101.223/28?

• A.

Port Number

• B.

CIDR

• C.

ARP

• D.

DNS

B. CIDR
Explanation
CIDR (Classless Inter-Domain Routing) notation is used to represent IP addresses and their associated subnet masks. In this notation, the IP address 221.17.101.223 is followed by a forward slash (/) and the number 28, which represents the number of bits in the subnet mask. This notation is commonly used in networking to specify the network and host portions of an IP address.

Rate this question:

• 7.

### Computer A can connect with computers on Network A, but cannot connect with computers on Network b. Which of the following solutions will allow communication between Network A and Network B? Computer A: Computer B: IP: 123.132.192.50 IP: 200.201.202.52 Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0 Default Gateway: 200.201.202.1 Default Gateway: 200.201.202.1 Network A: Network B: Network: 123.132.192.0 Network: 200.201.202.0 Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0 Router A: Router B: IP: 123.132.192.1 IP: 200.201.202.1

• A.

Change the default gateway of Computer B to 123.132.192.1 Page 43 of 142

• B.

Change the default gateway on Computer A to 123.132.192.1

• C.

Change the subnet mask for Computer A to 255.255.255.0

• D.

Change the subnet mask for Computer B to 255.255.240.0

B. Change the default gateway on Computer A to 123.132.192.1
Explanation
Changing the default gateway on Computer A to 123.132.192.1 will allow communication between Network A and Network B. The default gateway is the IP address of the router that connects the local network to other networks. By changing the default gateway on Computer A to the IP address of Router A (which is 123.132.192.1), Computer A will be able to connect with computers on Network B through the router.

Rate this question:

• 8.

### Which of the following commands can display the number of server connections open on a client?

• A.

Netstat

• B.

Arp

• C.

Dig

• D.

Nslookup

A. Netstat
Explanation
Netstat is a command-line tool that can display the active network connections on a computer. It provides information about the protocol, local and remote addresses, and the state of the connection. By using netstat, one can easily see the number of server connections open on a client machine. Therefore, netstat is the correct answer to the question.

Rate this question:

• 9.

### For a new wireless network, which wireless encryption is the highest level that can be run?

• A.

TTL

• B.

WPA2 TKIP

• C.

WPA2 AES

• D.

WEP

C. WPA2 AES
Explanation
WPA2 AES is the highest level of wireless encryption that can be run for a new wireless network. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security. WPA2 (Wi-Fi Protected Access 2) is the current industry standard for wireless security, and it supports both AES and TKIP (Temporal Key Integrity Protocol) encryption methods. However, TKIP is considered less secure and is being phased out in favor of AES. Therefore, WPA2 AES is the recommended and highest level of encryption for a new wireless network.

Rate this question:

• 10.

### Which one of the following communication protocols does a UNIX system primarily rely on?

• A.

IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)

• B.

Kerberos

• C.

TCP / IP (Transmission Control Protocol / Internet Protocol)

• D.

NetBEUI (Network Basic Input / Output Extended User Interface)

C. TCP / IP (Transmission Control Protocol / Internet Protocol)
Explanation
A UNIX system primarily relies on the TCP/IP (Transmission Control Protocol / Internet Protocol) communication protocol. TCP/IP is a set of protocols that allows computers to communicate over the internet or a local network. It provides reliable and secure communication between devices, ensuring that data packets are delivered accurately and in the correct order. TCP/IP is widely used in UNIX systems for various network-related tasks, such as connecting to remote servers, transferring files, and accessing the internet.

Rate this question:

• 11.

### An access point in a wireless network receives link margin values from associated access points. A wireless access points beacon frame contains which data below?

• A.

Channel and WEP key

• B.

• C.

SID and WEP key

• D.

Explanation
A wireless access point's beacon frame contains the SSID (Service Set Identifier) and MAC address. The SSID is a unique identifier for the wireless network, allowing devices to connect to the correct network. The MAC address is the unique identifier for the access point itself, enabling devices to communicate with it.

Rate this question:

• 12.

### Which protocol combines the PPTP?.

• A.

PPP

• B.

TGIF

• C.

PPPoE

• D.

TCP

A. PPP
Explanation
PPP (Point-to-Point Protocol) is the protocol that combines with PPTP (Point-to-Point Tunneling Protocol). PPP is a data link layer protocol that is used to establish a direct connection between two nodes in a network. PPTP, on the other hand, is a protocol that allows the secure transfer of data over a public network, such as the internet. By combining PPP with PPTP, users can establish secure and private connections over the internet using the PPP protocol.

Rate this question:

• 13.

### Given that wireless Internet access is located in an open warehouse environment. And you discover that different locations have different signal strengths. How to increase the signal strength consistency?

• A.

Change the antenna placement.

• B.

Enable traffic shaping.

• C.

• D.

Change the encryption method.

A. Change the antenna placement.
Explanation
Changing the antenna placement can help increase the signal strength consistency in a wireless Internet access environment. By strategically positioning the antenna, it can receive and transmit signals more effectively, reducing signal loss and interference. This can result in a more consistent and stable signal strength across different locations in the open warehouse environment.

Rate this question:

• 14.

### A company has a hybrid network composed of Mac and Windows servers accessed by Mac, Linux and Windows clients. A department wants to use their Windows XP desktops to access the Macintosh printer. Which action should be taken by the administrator to allow the Windows XP clients to access that printer?

• A.

Install services for Macintosh Gateway on Windows server

• B.

Install the NetBIOS protocol on the Mac server.

• C.

The AppleTalk protocol must be installed on the Windows machine.

• D.

Install TCP/IP on the Macintosh Printer.

C. The AppleTalk protocol must be installed on the Windows machine.
Explanation
To allow Windows XP clients to access the Macintosh printer in a hybrid network, the administrator should install the AppleTalk protocol on the Windows machine. This protocol allows communication between Mac and Windows devices, enabling the Windows XP desktops to connect to the Macintosh printer.

Rate this question:

• 15.

### As a network administrator, you are tasked with hooking three desktop computers to a current network. However, only one network connection is applicable. Which of the following items will help you complete this task?

• A.

Smart jack

• B.

Switch

• C.

Modem

• D.

Repeater

B. Switch
Explanation
A switch would help in completing this task because it allows multiple devices to connect to a network using a single network connection. It acts as a central hub, enabling communication between the connected devices and managing the flow of data between them.

Rate this question:

• 16.

### You have a small network with five computers, all of which are connected to a central switch and access shared file and print on a single server. However, one computer can't connect to the network, while the other four can connect properly. Why?

• A.

The NIC has failed.

• B.

The switch has failed.

• C.

The server has failed.

• D.

The computers OS needs to be updated.

A. The NIC has failed.
Explanation
The most likely explanation for one computer being unable to connect to the network while the other four can is that the Network Interface Card (NIC) of the non-connecting computer has failed. The NIC is responsible for connecting the computer to the network, and if it is not functioning properly, the computer will not be able to establish a connection. This is a common issue in network troubleshooting, and replacing the faulty NIC should resolve the problem.

Rate this question:

• 17.

### Which of the following is a valid MAC address?

• A.

192.168.1.32 Page 45 of 142

• B.

225.225.225.224

• C.

00-04-23-D2-EE-H4

• D.

00-04-23-D2-EE-F4

D. 00-04-23-D2-EE-F4
Explanation
A MAC address is a unique identifier assigned to network interfaces for communications on a network. It consists of six pairs of hexadecimal digits separated by hyphens or colons. In the given options, only "00-04-23-D2-EE-F4" follows the correct format of a MAC address. The other options are an IP address (192.168.1.32), a page number (45 of 142), and an invalid MAC address with an invalid hexadecimal digit (H4).

Rate this question:

• 18.

### A printer which is connected to the network is placed in a SOHO environment. The computers can ping the printer directly using TCP/IP and they could print the day before. However, today the computers are unable to print. Do you know which configuration can solve this problem?

• A.

Set up the printer on a public IP address.

• B.

Configure the printer to use an APIPa.

• C.

Place the printer on a static IP address.

• D.

Change the printer setting to use multicast.

C. Place the printer on a static IP address.
Explanation
Placing the printer on a static IP address can solve the problem because it ensures that the printer will always have the same IP address on the network. This allows the computers to consistently communicate with the printer using TCP/IP. If the printer were set to use a dynamic IP address (such as through DHCP), it is possible that the IP address assigned to the printer may have changed, causing the computers to lose connection with the printer and resulting in the inability to print.

Rate this question:

• 19.

### Given that the IP address and default gateway are both on the 192.168.1.0/24. The computer can transmit files locally to other devices, but it can't use a wireless access point to connect to the Internet. Why?

• A.

The computers gateway is not routing to a public IP address.

• B.

The computer is using an invalid IP address.

• C.

The computer is not using a private IP address.

• D.

The computer and the gateway are not on the same network.

A. The computers gateway is not routing to a public IP address.
Explanation
The computer is unable to connect to the Internet because its gateway is not routing to a public IP address. A gateway is responsible for forwarding network traffic between different networks, and in this case, the gateway is not configured to route traffic to the public IP address range. Therefore, the computer can transmit files locally to other devices within the same network, but it cannot access the Internet through the wireless access point.

Rate this question:

• 20.

### Which of the following commands does a network administrator use to verify the mail server addresses for a remote domain?

• A.

Nslookup/dig

• B.

Nbtstat

• C.

Tracert/traceroute

• D.

Netstat

A. Nslookup/dig
Explanation
A network administrator would use the nslookup or dig command to verify the mail server addresses for a remote domain. These commands allow the administrator to query the DNS (Domain Name System) to retrieve information about the mail server associated with the domain. By using nslookup or dig, the administrator can ensure that the correct mail server addresses are being used for sending and receiving emails for the remote domain.

Rate this question:

• 21.

### Which type of LAN will use CAT5 UTP?

• A.

10GBase-SR

• B.

100Base-TX

• C.

100Base-FX

• D.

1000Base-T

B. 100Base-TX
Explanation
CAT5 UTP is a type of Ethernet cable that is commonly used for local area networks (LANs). It is capable of supporting data transfer speeds of up to 1000 Mbps. Among the given options, 100Base-TX is the only one that uses CAT5 UTP. Therefore, 100Base-TX is the correct answer.

Rate this question:

• 22.

### If you want to combine multiple connections into one logical connection to increase the bandwidth for network transmission, which technology will you use?

• A.

Supernetting

• B.

• C.

Bonding

• D.

Traffic shaping

C. Bonding
Explanation
Bonding is the technology used to combine multiple connections into one logical connection in order to increase the bandwidth for network transmission. This allows for improved data transfer speeds and increased network capacity. By bonding multiple connections, the overall bandwidth is effectively multiplied, providing a more efficient and faster network connection.

Rate this question:

• 23.

### You are working as a technician at certways .com. A Mac OS X 10.3 user has requested some assistance with a network connectivity issue that he has. The Mac OS uses Kerberos to access a kerberized service provided by a Mac OS X server 10.3 but the user experiences an authentication failure when he tries to do this. Which of the following steps might resolve the issue?

• A.

Install Kerberos client software for Mac OS X 10.3 on the user's computer.

• B.

Synchronize all Kerberos principal's clocks using a network time server.

• C.

Ensure that the IP address of the user's computer to allow the user to access the service.

• D.

All of the above.

B. Synchronize all Kerberos principal's clocks using a network time server.
Explanation
Synchronizing all Kerberos principal's clocks using a network time server might resolve the authentication failure issue. This is because Kerberos relies on accurate time synchronization between the client and server for authentication to work properly. If the clocks are not synchronized, the authentication request may fail. By using a network time server to synchronize the clocks, the user's computer and the server will have the same time, allowing the authentication process to proceed successfully.

Rate this question:

• 24.

### You work as the network administrator at certways.com. You are sent to one of certways's branch offices to investigate a network problem. The network at the branch office consists of twenty Windows XP workstations that are wired to a switch. The switch is connected to a router for Internet access. One of the users at the branch office reports that she is unable to access the Internet. All other users can access the Internet. Which of the following items should you check to solve the problem?

• A.

The network card of the problematic machine, the port on the switch that uplinks to router, and the patch cable from the problematic machine to the switch.

• B.

The patch cable from the problematic machine to the switch, the port on switch that the problematic machine is plugged into, and the external interface on the router.

• C.

The network card of the problematic machine, the port on the switch that the problematic machine is plugged into, and the patch cable from the problematic machine to the switch.

• D.

The port on the switch that the problematic machine is plugged into, the network card of the problematic machine, and the uplink port on the switch.

C. The network card of the problematic machine, the port on the switch that the problematic machine is plugged into, and the patch cable from the problematic machine to the switch.
Explanation
To solve the problem of the user being unable to access the Internet, the network administrator should check the network card of the problematic machine, the port on the switch that the machine is plugged into, and the patch cable connecting the machine to the switch. These three components are crucial for network connectivity, and any issues with them could be causing the problem. By checking these components, the administrator can identify and resolve any potential issues, such as a faulty network card, a misconfigured port, or a damaged patch cable.

Rate this question:

• 25.

### The MAC address F2-A1-23-BC-D3-41 consist of a manufacturer ID and a station Id. Which 3 bytes represents the station identifier?

• A.

F2-A1-23

• B.

A1-23-BC

• C.

23-BC-D3

• D.

BC-D3-41

D. BC-D3-41
Explanation
The MAC address F2-A1-23-BC-D3-41 consists of a manufacturer ID and a station ID. In this address, the bytes BC-D3-41 represent the station identifier.

Rate this question:

• 26.

### In the process of troubleshooting network data transmission issue, which command can determine the location of the packet loss?

• A.

Arp

• B.

Ipconfig

• C.

Traceroute

• D.

Ping

C. Traceroute
Explanation
Traceroute is a command used to track the route taken by packets across an IP network. It sends out a series of packets with increasing Time to Live (TTL) values, allowing it to determine the path taken by the packets and identify any routers or network devices causing packet loss. By analyzing the output of the traceroute command, network administrators can pinpoint the location of the packet loss and troubleshoot the issue accordingly.

Rate this question:

• 27.

### Which tool will be used when placing a RJ-45 connector on a CAT5 cable?

• A.

Razor knife

• B.

Pliers

• C.

Polishing kit

• D.

Snips

D. Snips
Explanation
Snips will be used when placing a RJ-45 connector on a CAT5 cable. Snips are a type of cutting tool that can be used to cut, strip, and trim wires. In this case, they would be used to cut the CAT5 cable to the desired length before attaching the RJ-45 connector. Pliers are not suitable for this task as they are not designed for cutting wires. A razor knife may be used to strip the outer insulation of the cable, but it is not the primary tool for attaching the connector. A polishing kit is not relevant to this task.

Rate this question:

• 28.

### Which table will be used by a router to determine the next hop IP address while forwarding a packet?

• A.

The BGP table

• B.

The routing table

• C.

The ARP table

• D.

B. The routing table
Explanation
The routing table will be used by a router to determine the next hop IP address while forwarding a packet. The routing table contains information about the network topology and the best paths to reach different destinations. It is used by the router to make decisions on how to forward packets based on the destination IP address. The router looks up the destination IP address in the routing table and determines the next hop IP address, which is the address of the next router or network interface that the packet should be forwarded to.

Rate this question:

• 29.

### In computer networking, a Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification. Which of the following MAC address is valid for a workstation?

• A.

131.44.32.255

• B.

00:08:38:05:B5:F4

• C.

05:14:K9:07:B2:M4

• D.

FFFF.FFFF.FFFF

B. 00:08:38:05:B5:F4
Explanation
A MAC address is a 48-bit address represented in hexadecimal format, separated by colons or hyphens. The given MAC address "00:08:38:05:B5:F4" follows the correct format and is valid for a workstation.

Rate this question:

• 30.

### What is the objective of IDS?

• A.

Monitors inbound and outbound network connections in order to identify suspicious activity.

• B.

Controls inbound and outbound connections in a network device by command lines.

• C.

Monitors inbound and outbound network connections in order to prevent suspicious activity.

• D.

Controls inbound and outbound connections to prevent unauthorized access to the Internet.

A. Monitors inbound and outbound network connections in order to identify suspicious activity.
Explanation
The objective of IDS (Intrusion Detection System) is to monitor both inbound and outbound network connections to identify any suspicious activity. By analyzing network traffic and patterns, an IDS can detect potential threats or attacks and alert the system administrator. This helps in maintaining the security of the network and preventing any unauthorized access or malicious activity.

Rate this question:

• 31.

### If an authentication protocol is being implemented that uses a private key and a session key, the protocol is:

• A.

L2TP (Layer 2 Tunneling Protocol) .

• B.

Kerberos

• C.

IPSec (Internet Protocol Security) .

• D.

PPTP (Point-to-Point Tunneling Protocol) .

B. Kerberos
Explanation
Kerberos is the correct answer because it is an authentication protocol that uses both a private key and a session key. It is commonly used in network environments to provide secure authentication for users and services. Kerberos uses a trusted third-party server, known as the Key Distribution Center (KDC), to issue tickets that contain the session key for authentication. The private key is used to encrypt and decrypt these tickets, ensuring secure communication between entities in the network.

Rate this question:

• 32.

### How to differ dynamic routing from static routing?

• A.

Dynamic routing is used by a WINS server.

• B.

Static routing is best used in large scalable networks.

• C.

• D.

D. Dynamic routes are added automatically.
Explanation
Dynamic routing is a type of routing where the routing tables are updated automatically based on network changes and updates. It is typically used in smaller networks or networks with changing topologies. On the other hand, static routing is manually configured by network administrators and is best suited for large scalable networks where the network topology remains relatively stable. Therefore, the statement "Dynamic routes are added automatically" correctly explains the difference between dynamic and static routing.

Rate this question:

• 33.

### Which statement best describes the routing convergence time?

• A.

Time required for an IDS to detect suspicious software

• B.

Time required by protocols to update their forwarding tables after changes have occurred

• C.

Time required by switch ports to update their link status and transition to the forwarding state

• D.

Time required for a VPN connection to occur

B. Time required by protocols to update their forwarding tables after changes have occurred
Explanation
The routing convergence time refers to the time required by protocols to update their forwarding tables after changes have occurred. This means that when there are changes in the network, such as a link failure or a new route being added, the routing protocols need to update their tables to reflect these changes and ensure that packets are forwarded correctly. The convergence time is the time it takes for these updates to propagate through the network and for the forwarding tables to be updated.

Rate this question:

• 34.

### At which layer of the OSI reference model does data encryption occur?

• A.

The Transport Layer

• B.

The Session Layer

• C.

The Presentation Layer

• D.

The Application Layer

C. The Presentation Layer
Explanation
Data encryption occurs at the Presentation Layer of the OSI reference model. This layer is responsible for formatting, encrypting, and decrypting data for presentation to the application layer. Encryption ensures the confidentiality and integrity of the data being transmitted over the network.

Rate this question:

• 35.

### During network issue troubleshooting, which action will be taken first?

• A.

Record what steps should be taken to resolve the issue.

• B.

Record the solution in the appropriate logs for future use.

• C.

Ask the user who reported the issue to explain the symptoms in detail.

• D.

Ask the user who reported the issue what past documentation they have.

C. Ask the user who reported the issue to explain the symptoms in detail.
Explanation
The first action to be taken during network issue troubleshooting is to ask the user who reported the issue to explain the symptoms in detail. This step is crucial as it helps in understanding the problem more accurately and gathering relevant information about the issue. By asking the user to explain the symptoms, it becomes easier to diagnose and identify the root cause of the problem. This information can then be used to determine the appropriate steps to resolve the issue effectively.

Rate this question:

• 36.

### Layer 2 is the data link layer of the OSI model. Observe the following items carefully, which one will be discovered in a layer2 switch?

• A.

DNS zones

• B.

Routing protocols

• C.

SSID settings

• D.

VLAN settings

D. VLAN settings
Explanation
In a layer 2 switch, VLAN settings can be discovered. VLANs (Virtual Local Area Networks) are used to segment a network into multiple virtual networks, allowing for better control and management of network traffic. Layer 2 switches operate at the data link layer of the OSI model, which is responsible for the reliable transmission of data between adjacent network nodes. VLAN settings determine how devices are grouped and isolated within the network, improving security, performance, and scalability. Therefore, a layer 2 switch would be able to discover and configure VLAN settings.

Rate this question:

• 37.

### Dynamic Host Configuration Protocol (DHCP) is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network. Which characteristic belongs to a DHCP server?

• A.

• B.

Secure shell connections

• C.

• D.

Resolving IP addresses to canonical names

Explanation
A DHCP server is responsible for assigning IP addresses to devices on a network. However, in certain cases, it may be necessary to assign a specific IP address to a device permanently. This is known as a static IP address reservation. By reserving a specific IP address for a device, the DHCP server ensures that the device always receives the same IP address whenever it connects to the network. This is useful for devices that require a consistent IP address for specific network functions or services.

Rate this question:

• 38.

### Your company has a secure network room with restricted access to a workstation that is located in the room. Which policy can identify intrusions?

• A.

Backup policy

• B.

Audit policy

• C.

Internet fair use policy

• D.

User training policy

B. Audit policy
Explanation
An audit policy is designed to monitor and record activities within a network or system. By implementing an audit policy in the secure network room, any unauthorized access or intrusion attempts can be detected and recorded. This policy can help identify intrusions by providing a trail of evidence, such as log files, that can be analyzed to determine if any unauthorized access or suspicious activities have occurred. It allows for the monitoring and tracking of user actions, helping to maintain the security and integrity of the network room.

Rate this question:

• 39.

### Select one protocol from the following to describe a connectionless state without using acknowledgements?

• A.

NTP

• B.

UDP

• C.

TCP

• D.

POP3

B. UDP
Explanation
UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. It is a simple and lightweight protocol that allows data to be sent from one device to another without establishing a connection or verifying if the data has been received. UDP is commonly used for applications that require fast and efficient data transmission, such as streaming media, online gaming, and DNS. Unlike TCP, UDP does not guarantee delivery or order of packets, making it suitable for situations where occasional packet loss is acceptable.

Rate this question:

• 40.

### The command ping uses which of the following protocols?

• A.

IGMP

• B.

TFTP

• C.

ICMP

• D.

SMTP

C. ICMP
Explanation
The command "ping" uses the ICMP (Internet Control Message Protocol) protocol. ICMP is used to send control messages and error reporting between network devices. The ping command is used to test the reachability of a network host by sending ICMP echo request packets and waiting for the corresponding echo reply packets. It is commonly used to troubleshoot network connectivity issues and measure round-trip time for packets.

Rate this question:

• 41.

### Which of the following statements regarding the OSI reference model is TRUE?

• A.

The Transport Layer of the OSI model defines several standard network services, as well as the interface between the network and the application.

• B.

The Session Layer of the OSI model is responsible for establishing, maintaining, and breaking sessions.

• C.

The Presentation Layer of the OSI model defines the choice of protocols, and provides error recovery and flow control.

• D.

The Application Layer of the OSI model converts the data from the lower layers into a format that the upper-layer processes require.

B. The Session Layer of the OSI model is responsible for establishing, maintaining, and breaking sessions.
Explanation
The statement that the Session Layer of the OSI model is responsible for establishing, maintaining, and breaking sessions is true. The Session Layer is responsible for managing the communication sessions between applications. It establishes and terminates connections between applications, manages the synchronization of data exchange, and ensures that data is delivered in the correct order. This layer also handles session checkpoints and recovery in case of failures.

Rate this question:

• 42.

### Computer networks use a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. Encryption is especially important in wireless communications. Refer to the following protocols, which one is applicable to tunneling and encryption purposes?.

• A.

L2TP

• B.

Digdug

• C.

SLIP

• D.

PPPoE

A. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) is applicable to tunneling and encryption purposes. It is commonly used to create virtual private networks (VPNs) by encapsulating data from one network protocol and transmitting it over another network. L2TP provides a secure and encrypted connection, making it suitable for tunneling and protecting data during transmission.

Rate this question:

• 43.

### A customer is complaining about the disconnection to the Internet, but all other users can connect to the network. Which action will be taken next after obtaining all the information about the users workstation?

• A.

Perform a trace route to that users workstation.

• B.

Ping the users workstation to verify network connectivity.

• C.

Replace the NIC in the users workstation.

• D.

Go to the users workstation and do an ipconfig.

B. Ping the users workstation to verify network connectivity.
Explanation
The next action to be taken after obtaining all the information about the user's workstation would be to ping the user's workstation to verify network connectivity. By pinging the workstation, it can be determined if there is a network connection issue between the user's workstation and the rest of the network. This will help in identifying if the problem lies with the workstation itself or with the network connection.

Rate this question:

• 44.

### On a switched Ethernet network that is operating perfectly, what is the state in which a user will find the activity LED (Light Emitting Diode) ?

• A.

Lit solid

• B.

Off

• C.

• D.

Explanation
The activity LED on a switched Ethernet network will periodically blink when the network is operating perfectly. This indicates that there is regular data transmission happening on the network.

Rate this question:

• 45.

### You are reported that a user can't access any website, but he can access the network shares and their email. How to resolve this problem?

• A.

Trace route to any website to see where the disconnection is occurring.

• B.

Use the ping command to see if the workstation can access the DHCP server.

• C.

Use the route add command to add static routes to see if the routes are an issue.

• D.

Perform the ipconfig command to verify settings on that workstation are correct.

A. Trace route to any website to see where the disconnection is occurring.
Explanation
The correct answer suggests using the trace route command to identify where the disconnection is occurring. By tracing the route to a website, it can help determine if there is a problem with the network connection or if there are any issues with the network infrastructure. This can provide valuable information for troubleshooting and resolving the problem.

Rate this question:

• 46.

### In order to present the active routes on a workstation, which tool will be deployed?

• A.

Arp ping

• B.

Nbstat

• C.

Arp -a

• D.

Netstat -r

D. Netstat -r
Explanation
The correct answer is netstat -r. The netstat -r command is used to display the routing table on a workstation. It shows the active routes that the workstation is currently using. The other options, arp ping, nbstat, and arp -a, are not specifically used for displaying active routes.

Rate this question:

• 47.

### All users are unable to access the network. In order to solve this issue, which action will you take first?

• A.

Use the ping command to verify connection to the DHCP server.

• B.

Use the route add command to see if static routes can be added.

• C.

Use the rarp command to check network settings.

• D.

Use the arp command to verify connections to the network.

A. Use the ping command to verify connection to the DHCP server.
Explanation
To solve the issue of all users being unable to access the network, the first action would be to use the ping command to verify the connection to the DHCP server. By using the ping command, it can be determined if there is a connection between the users and the DHCP server. If the ping is successful, it indicates that the network connection is working properly. If the ping fails, it suggests that there may be an issue with the DHCP server or the network connection between the users and the server. Hence, using the ping command is the appropriate first step in troubleshooting the network access problem.

Rate this question:

• 48.

### Identify the Windows utility being used given the following output: Proto Local Address Foreign Address State TCP JDoe:epmap JDoe.jdoe.com:0 Listening

• A.

Winipcfg

• B.

Nslookup

• C.

Nbtstat

• D.

Netstat

D. Netstat
Explanation
The correct answer is netstat. The given output is a list of active TCP connections and listening ports on the local machine. Netstat is a Windows utility that displays network statistics and active connections. It provides information about the protocol, local and foreign addresses, and the state of each connection.

Rate this question:

• 49.

### Two network devices are connected by a crossover cable. Which pins below are different between them?

• A.

Pin1, Pin2, Pin3, Pin6

• B.

Pin6, Pin7, Pin8, Pin1

• C.

Pin4, Pin5, Pin1, Pin2

• D.

Pin4, Pin5, Pin7, Pin8

A. Pin1, Pin2, Pin3, Pin6
Explanation
The correct answer is Pin1, Pin2, Pin3, Pin6. A crossover cable is used to directly connect two devices of the same type, such as two computers or two switches, without the need for a network hub or switch. In a crossover cable, the transmit and receive pins are crossed over, so that the transmit pins on one device connect to the receive pins on the other device, and vice versa. Therefore, the pins that are different between the two devices connected by a crossover cable are Pin1 (transmit on one device, receive on the other), Pin2 (receive on one device, transmit on the other), Pin3 (transmit on one device, receive on the other), and Pin6 (receive on one device, transmit on the other).

Rate this question:

• 50.

• A.

ACK

• B.

TCP

• C.

RSH

• D.

SYN