CompTIA Network+ Certification! Hardest Trivia Quiz

100 Questions | Total Attempts: 40

SettingsSettingsSettings
CompTIA Network+ Certification! Hardest Trivia Quiz

.


Questions and Answers
  • 1. 
    Where would a technician MOST likely place the company MX and A records?
    • A. 

      Proxy server

    • B. 

      Load balancer

    • C. 

      DNS server

    • D. 

      Firewall

  • 2. 
    Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for multiple routers and switches?
    • A. 

      DOCSIS

    • B. 

      HDLC

    • C. 

      SNMP

    • D. 

      TACACS+

  • 3. 
    Which of the following network cables is comprised of the below pin-out?1 C 82 C 73 C 64 C 
    • A. 

      Rollover

    • B. 

      568A

    • C. 

      Crossover

    • D. 

      Straight-through

  • 4. 
    Which of the following packet addresses represents a single NIC
    • A. 

      Broadcast address

    • B. 

      Unicast address

    • C. 

      Multicast address

    • D. 

      Broadcast domain

  • 5. 
    Which of the following cable types has immunity from EMI?
    • A. 

      UTP

    • B. 

      Plenum

    • C. 

      STP

    • D. 

      Fiber

  • 6. 
    A network engineer needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
    • A. 

      MS-CHAP

    • B. 

      Kerberos

    • C. 

      TACACS+

    • D. 

      PKI

  • 7. 
    A client is having problems getting a wireless signal to the entire warehouse; right now the AP is located at the far northern end of the building. The AP frequency is strong enough to cover the entire building. Which of the following is the MOST likely reason the AP is not covering the entire area?
    • A. 

      Standard mismatch

    • B. 

      Incorrect channel

    • C. 

      Incorrect placement

    • D. 

      Encryption type

  • 8. 
    Which of the following encryption methods is the MOST secure?
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      WPA2

    • D. 

      WEP-TKIP

  • 9. 
    Which of the following would be used to quickly check for availability of the HTTP service on the server?
    • A. 

      Reserved ports

    • B. 

      Protocol analyzer

    • C. 

      Packet sniffers

    • D. 

      Port scanners

  • 10. 
    Which of the following would be used to identify the hot zone in a server room?
    • A. 

      OTDR

    • B. 

      Temperature monitor

    • C. 

      Cable stripper

    • D. 

      Voltage event monitor

  • 11. 
    Which of the following is the BEST tool to use when terminating a network jack?
    • A. 

      Snips

    • B. 

      Cable stripper

    • C. 

      Toner probe

    • D. 

      Punch down

  • 12. 
    A technician needs to increase the bandwidth between two switches which currently have a 1GBps connection. Which of the following is the BEST way to achieve this? A. Switch the connection to 1GBps multimode fiber. B. Create a 2GBps connection with link aggregation. C. Configure port mirroring between the switches. D. Install a redundant wireless bridge between the switches.
    • A. 

      Switch the connection to 1GBps multimode fiber.

    • B. 

      Create a 2GBps connection with link aggregation

    • C. 

      Configure port mirroring between the switches.

    • D. 

      Install a redundant wireless bridge between the switches.

  • 13. 
    Which of the following mitigation techniques would be used in order to defend against social engineering?
    • A. 

      Updating antivirus definitions

    • B. 

      Implementing patch management solutions

    • C. 

      Enabling audit logs on all workstations

    • D. 

      Revising security and network policies

  • 14. 
    Which of the following are commonly used FTP ports?
    • A. 

      20,21

    • B. 

      22,23

    • C. 

      24,25

  • 15. 
    A 66 block is MOST commonly used in which of the following networks?
    • A. 

      Voice

    • B. 

      Cloud

    • C. 

      SONET

    • D. 

      Data

  • 16. 
    A technician is having intermittent connectivity problems with a hotel's wireless network. Using the laptop's wireless utility, the technician sees three access points all using channel 11. Which of the following describes the reason for the connectivity problems?
    • A. 

      Beacon rate

    • B. 

      Attenuation

    • C. 

      Interference

    • D. 

      Crosstalk

  • 17. 
    Which of the following components have home runs from different locations to the telecommunications closet?
    • A. 

      Smart jack

    • B. 

      Patch panel

    • C. 

      Demarc

    • D. 

      Demarc extension

  • 18. 
    A traceroute command primarily provides information in the context of number and:
    • A. 

      IP address of packets

    • B. 

      Location of MAC addresses

    • C. 

      Location of ports

    • D. 

      IP address of hops

  • 19. 
    A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
    • A. 

      VLAN tag mismatch

    • B. 

      Port filtering

    • C. 

      Smurf attack

    • D. 

      Faulty routing rule

  • 20. 
    Which of the following is an IPv6 address for localhost?
    • A. 

      ::1

    • B. 

      127::

    • C. 

      FF::0

    • D. 

      FFFF:127.0.0.1

  • 21. 
    After a technician has established a plan of action to resolve the problem, which of the following steps should be performed NEXT?
    • A. 

      Establish a theory of probable cause.

    • B. 

      Implement preventative measures.

    • C. 

      Verify full system functionality.

    • D. 

      Implement the solution of escalate as necessary.

  • 22. 
    Which of the following standards is implemented in 802.1af?
    • A. 

      WiMAX

    • B. 

      Power over Ethernet

    • C. 

      Fast Ethernet

    • D. 

      5Ghz Wireless

  • 23. 
    An administrator is creating a patch cable. Which of the following devices should the administrator use to terminate the ends?
    • A. 

      Cable tester

    • B. 

      Certifier

    • C. 

      Cable stripper

    • D. 

      Data crimper

  • 24. 
    Which of the following tools would be BEST used to trace a wire through an area where multiple wires of the same color are twisted together?
    • A. 

      Cable tester

    • B. 

      Toner probe

    • C. 

      Cable crimper

    • D. 

      Punch down tool

  • 25. 
    Which of the following commands will remove cached DNS entries?
    • A. 

      route del -net 127.0.0.1

    • B. 

      Route add -net 0.0.0.0

    • C. 

      Ipconfig /flushdns

    • D. 

      Nslookup 127.0.0.1

  • 26. 
    A technician needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this?
    • A. 

      Multimeter, Loopback plug

    • B. 

      Cable certifier, Punch down tool

    • C. 

      Punch down tool, Crimper

    • D. 

      Punch down tool, Cable certifier

  • 27. 
    An administrator suspects the computer they are working on has lost its default gateway and its specific route to the HR department. Which of the following commands should be run to verify the route setting?
    • A. 

      Route add default gateway 192.168.1.1

    • B. 

      Route -nr

    • C. 

      Ipconfig /all

    • D. 

      Route print

  • 28. 
    Which of the following allows for multiple operating systems to be run simultaneously on a single server? A. Dual boot B. Multiple hard drives C. PXE boot D. Virtual machines
    • A. 

      Dual boot

    • B. 

      Multiple hard drives

    • C. 

      PXE boot

    • D. 

      Virtual machines

  • 29. 
    Which of the following connector types would MOST likely be used in combination with a GBIC?
    • A. 

      RS-232

    • B. 

      SC

    • C. 

      RJ-11

    • D. 

      BNC

  • 30. 
    A home user reports an issue with the wireless network connection on a laptop. It seems to occur only when the phone rings. Which of the following should be changed to resolve the issue?
    • A. 

      Change the channel of the WAP.

    • B. 

      Change the wireless security that is being used.

    • C. 

      Rename the SSID.

    • D. 

      Relocate the antenna to another area.

  • 31. 
    Which of the following technologies relies on up-to-date signatures to protect the network and block malicious network-based attacks?  
    • A. 

      HIDS

    • B. 

      IDS

    • C. 

      IPS

    • D. 

      Firewall

  • 32. 
    Which of the following features of a switch allows WAPs to be installed in locations where no power sources are available?
    • A. 

      Aggregation

    • B. 

      Port forwarding

    • C. 

      PoE

    • D. 

      VLAN

  • 33. 
    A small office has asked to have their Ethernet NIC enabled PCs networked together by a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will the consultant need? (Select TWO).  
    • A. 

      Network bridge, CAT5e patch cabling

    • B. 

      Switch,Firewall

    • C. 

      RG-59 patch cabling,Firewall

    • D. 

      CAT5e patch cabling, Switch

  • 34. 
    Which of the following is an encrypted client/server authentication?  
    • A. 

      IPSec

    • B. 

      VNC

    • C. 

      IP filtering

    • D. 

      MAC filtering

  • 35. 
    Which of the following has similar functionalities as a wireless repeater?
    • A. 

      Basic switch

    • B. 

      Wireless access point

    • C. 

      Basic firewall

    • D. 

      DHCP server

  • 36. 
    Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of the network?
    • A. 

      Convergence

    • B. 

      Spanning tree

    • C. 

      Port mirroring

    • D. 

      Link state

  • 37. 
    Which of the following should an administrator use to identify where all the MDFs are located within the network?  
    • A. 

      Wiring schematics

    • B. 

      Security and network policies

    • C. 

      Physical network diagram

    • D. 

      Baseline configurations

  • 38. 
    Which of the following attacks is a social engineering attack?
    • A. 

      Man-in-the-middl

    • B. 

      Rootkits

    • C. 

      Vishing

    • D. 

      DDoS

  • 39. 
    Which of the following BEST describes how packets are delivered to the destination node?  
    • A. 

      Routing table

    • B. 

      Metrics

    • C. 

      Convergence

    • D. 

      Neighbor status

  • 40. 
    When testing CAT5e cables that were recently terminated, the testing device reports near end crosstalk. Which of the following is the MOST likely cause of this problem?  
    • A. 

      The cable jacket is plenum rated.

    • B. 

      The cable is shielded.

    • C. 

      The technician used RJ-11 connectors on the wire.

    • D. 

      The technician did not leave enough twists on the pairs.

  • 41. 
    A technician installed a wireless network, and it worked as expected during testing. However during the conference, the network was intermittent at best. Which of the following BEST describes what is occurring?  
    • A. 

      Interference from the satellite dish is causing a broadcast storm.

    • B. 

      PoE requirements are much greater with multiple users.

    • C. 

      The AP has reached capacity.

    • D. 

      The network switches have overheated due to capacity.

  • 42. 
    Which of the following devices will forward broadcast traffic by default?  
    • A. 

      Switch

    • B. 

      Firewall

    • C. 

      Bridge

    • D. 

      Hub

  • 43. 
    Which of the following WAN technologies uses a maximum line rate of 2.048Mbps?  
    • A. 

      T3

    • B. 

      E1

    • C. 

      ISDN PRI

    • D. 

      ISDN BRI

  • 44. 
    Which of the following network protocols is required to allow two computers to communicate within the same network segment?  
    • A. 

      SSH

    • B. 

      POP3

    • C. 

      ARP

    • D. 

      DNS

  • 45. 
    Which of the following devices is unable to differentiate the appropriate destination of intended traffic on a network?  
    • A. 

      Bridge

    • B. 

      Unmanaged switch

    • C. 

      Hub

    • D. 

      Managed switch

  • 46. 
    Which of the following should occur when closing a network project?  
    • A. 

      Update documentation

    • B. 

      Validate the design

    • C. 

      Configure the new network devices

    • D. 

      Develop a project plan

  • 47. 
    Which of the following utilities would a technician use to determine the location of lost packets on a routed network?
    • A. 

      Ping

    • B. 

      Nslookup

    • C. 

      Route

    • D. 

      Tracert

  • 48. 
    A user has reported a problem with a network device. The network technician has theorized that the device is faulty and has tested to confirm the theory. Which of the following steps in the troubleshooting methodology should the technician do NEXT?  
    • A. 

      Establish a theory of probable cause.

    • B. 

      Implement preventative measures.

    • C. 

      Mplement the solution.

    • D. 

      Establish a plan of action to resolve the problem.

  • 49. 
    A technician is setting up a temporary wired network for a conference being hosted at the company headquarters. The purpose of the network is to share files between guests laptops, with no Internet access. Which of the following devices would BEST accomplish this scenario at a low cost?  
    • A. 

      Bridge

    • B. 

      Repeater

    • C. 

      Modem

    • D. 

      Switch

  • 50. 
    Which of the following devices is a technician MOST likely to be connecting to if they are using a rollover cable?  
    • A. 

      Hub

    • B. 

      Router

    • C. 

      UPS

    • D. 

      Unmanaged switch

  • 51. 
    Which of the following is the address length of an IPv6 address?  
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 52. 
    Which of the following is intended to be used over existing SONET equipment?  
    • A. 

      10GBaseER

    • B. 

      1000BaseT

    • C. 

      10GBaseEW

    • D. 

      10GBaseLR

  • 53. 
    A company is adding more users and has leased more office space five floors below their current office. The company should install which of the following in the additional space?  
    • A. 

      Smart jack

    • B. 

      EDF

    • C. 

      IDF

    • D. 

      MDF

  • 54. 
    An administrator would like to display active TCP connections on a computer. Which of the following commands would BEST accomplish this?  
    • A. 

      route

    • B. 

      Nslookup

    • C. 

      ifconfig

    • D. 

      netstat

  • 55. 
    Access point placement is determined during which phase of the wireless network project?  
    • A. 

      Site survey

    • B. 

      Hand-off

    • C. 

      Installation

    • D. 

      Testing

  • 56. 
    Which of the following services does UDP connections provide to application layer protocols?  
    • A. 

      Manage large data sizes using segmentation

    • B. 

      Secure Kerberos password encryption

    • C. 

      Transport means without error recovery

    • D. 

      Ensure delivery through error recovery

  • 57. 
    A customer has reported that when using a cable to connect an older laptop to a 100Mbps switch that the link light does not illuminate. When testing the same cable with a newer 1Gbps switch, it works fine. Which of the following is the MOST likely cause of the problem?  
    • A. 

      The port on the old switch has failed.

    • B. 

      The cable is pinned as a crossover.

    • C. 

      The older switch is not compliant with the new cable specifications.

    • D. 

      The laptop has a failed network card.

  • 58. 
    Which of the following tools will allow an administrator to troubleshoot connectivity problems between two networks?  
    • A. 

      Winipcfg

    • B. 

      Ipconfig

    • C. 

      Tracert

    • D. 

      ifconfig

  • 59. 
    After upgrading the network switch to a gigabit, one users connection no longer works. Which of the following would an administrator use to verify the network cable will work at a gigabit speed?    
    • A. 

      Toner probe

    • B. 

      Certifier

    • C. 

      Snips

    • D. 

      Cable stripper

  • 60. 
    Which of the following would be a primary concern to the physical security in a wireless network installation?  
    • A. 

      MAC filtering

    • B. 

      Key logger

    • C. 

      Antenna placement

    • D. 

      WAP placement

  • 61. 
    An administrator is at a clients site to figure out an intermittent network problem. Which of the following is the FIRST step in the troubleshooting methodology that should be performed?  
    • A. 

      Implement and test the solution.

    • B. 

      Create an action plan and solution identifying potential effects.

    • C. 

      Identify the affected areas of the network.

    • D. 

      Gather information.

  • 62. 
    Which of the following uses 802.1q?  
    • A. 

      VLAN

    • B. 

      QoS

    • C. 

      Port mirroring

    • D. 

      802.1x

  • 63. 
    Which of the following cable types are acceptable to use in an environment where EMI/RFI are present? (Select TWO). A. MMF B. UDP C. CAT5e D. STP E. ST
    • A. 

      MMF, STP

    • B. 

      STP, ST

    • C. 

      CAT5e, MMF

    • D. 

      UDP,STP

    • E. 

      UDP,MMF

  • 64. 
    A user browsing the Internet sees a page displaying the following information: Company policy prohibits access to the following website. Which of the following is MOST likely in place at the users company?  
    • A. 

      Content filter

    • B. 

      Application layer firewall

    • C. 

      Web load balancer

    • D. 

      NIDS

  • 65. 
    Which of the following allows the LARGEST distance to be covered in a single segment?  
    • A. 

      10GBaseLR

    • B. 

      10GBaseT

    • C. 

      10GBaseSR

    • D. 

      10GBaseER

  • 66. 
    Which of the following protocols operates securely at the transport layer? A. TCP B. SNMP C. TLS D. TCP/IP
    • A. 

      TCP

    • B. 

      SNMP

    • C. 

      TLS

    • D. 

      TCP/IP

  • 67. 
    A port scanner identifies that port 143 is open on the firewall and port 25 is closed. Which of the following protocols is being used by the company?  
    • A. 

      POP3

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      IMAP4

  • 68. 
    A technician changes a VLAN name from VLAN10 to VLAN20 in a switch. Which of the following should be updated?  
    • A. 

      Wiring diagram

    • B. 

      Physical network diagram

    • C. 

      Network baseline

    • D. 

      Logical network diagram

  • 69. 
    In which of the following wireless standards is MIMO used?  
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 70. 
    Clients begin having network problems and ask the technician to expand the pool of available IP addresses. On which of the following servers should this be done?  
    • A. 

      DNS

    • B. 

      TFTP

    • C. 

      DHCP

    • D. 

      PKI

  • 71. 
    The 10GBaseT specification is an example of a:  
    • A. 

      Transport layer protocol

    • B. 

      Data link layer protocol

    • C. 

      Physical layer protocol

    • D. 

      Network layer protocol

  • 72. 
    If network devices are all plugged into an Ethernet switch, the physical network topology is a:  
    • A. 

      Star

    • B. 

      Mesh

    • C. 

      Ring

    • D. 

      Point-to-point

  • 73. 
    Which of the following mitigation techniques would be BEST used against cross-site scripting?  
    • A. 

      Content filtering

    • B. 

      MAC filtering

    • C. 

      Policies and procedures

    • D. 

      User training

  • 74. 
    A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which of the following destination IP addresses must the technician configure on the server to send keep-alive packets to all the devices?  
    • A. 

      10.137.24.0

    • B. 

      10.137.24.1

    • C. 

      10.137.24.127

    • D. 

      10.137.24.128

  • 75. 
    Which of the following protocols can be found at the transport layer?  
    • A. 

      HTTP

    • B. 

      UDP

    • C. 

      FTP

    • D. 

      DNS

  • 76. 
    Which of the following authentication protocols is typically employed in Cisco networks?  
    • A. 

      NTLMv2

    • B. 

      TACACS+

    • C. 

      Kerberos

    • D. 

      MS CHAP

  • 77. 
    Which of the following encryption types is an administrator MOST likely to enable on a public WAP in order to provide better security?  
    • A. 

      WPA

    • B. 

      WPA2

    • C. 

      WEP

    • D. 

      IPSec

  • 78. 
    A user reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?  
    • A. 

      Man-in-the-middle

    • B. 

      Denial of service

    • C. 

      Ping flooding

    • D. 

      Smurfing

  • 79. 
    While troubleshooting DHCP configurations, a technician notices that the address pool is full of active leases although the workstations may not even be on the network. Which of the following would be the BEST solution?  
    • A. 

      Disabled the DHCP server and set static IP addresses

    • B. 

      Increase the lease time on the DHCP server

    • C. 

      Shorten the lease time on the DHCP server

    • D. 

      Subnet the IP address

  • 80. 
    Which of the following is an example of two-factor authentication?  
    • A. 

      A username and PIN

    • B. 

      A username and password

    • C. 

      A username, password, finger print scan, and smart card

    • D. 

      A username, password, and key fob number

  • 81. 
    Which of the following uses eight groups of characters for addressing?  
    • A. 

      MAC

    • B. 

      IPv4

    • C. 

      IPv6

    • D. 

      DHCP

  • 82. 
    Which of the following WAN technologies uses labels to make forwarding decisions?  
    • A. 

      MPLS

    • B. 

      Frame-relay

    • C. 

      ISDN

    • D. 

      ATM

  • 83. 
    An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users connection issues?  
    • A. 

      Limit the devices to 802.11n only.

    • B. 

      Enable the SSID broadcast.

    • C. 

      Enable MAC filtering.

    • D. 

      Use a WEP 128-bit key.

  • 84. 
    An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?  
    • A. 

      Stateful packet inspection

    • B. 

      Load balancing

    • C. 

      Packet sniffing

    • D. 

      Throughput testing

  • 85. 
    A user is getting very weak signals while trying to connect to wireless. Which of the following should the user do to help with signal strength?  
    • A. 

      Call the wireless provider and ask for a T3 circuit.

    • B. 

      Move the wireless router to a better location where line of sight is obtained.

    • C. 

      Reinstall the operating system to the PC to ensure the newest patches are installed.

    • D. 

      Install a hub to ensure there is a clear path for the cables to run.

  • 86. 
    Which of the following is the BEST reason why satellite connectivity for VoIP applications should not be used?  
    • A. 

      Latency sensitivity

    • B. 

      EMI

    • C. 

      Low bandwidth

    • D. 

      Crosstalk

  • 87. 
    A network technician is installing multiple 802.11g WAPs with the same SSID. Which of the following channel combinations would allow all three WAPs to operate without interfering with each other?  
    • A. 

      1,6,11

    • B. 

      2,6,10

    • C. 

      3,5,9

    • D. 

      7,9,11

  • 88. 
    Which of the following identifies the WLAN a user is connected to?  
    • A. 

      SSID

    • B. 

      Frequency

    • C. 

      WEP

    • D. 

      Channel

  • 89. 
    An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?  
    • A. 

      Packet filtering

    • B. 

      ACL

    • C. 

      MAC filtering

    • D. 

      CSU

  • 90. 
    A network technician has configured a server with the following IP settings:IP Address: 192.168.1.40/27Default Gateway: 192.168.1.64DNS: 192.168.1.33The server cannot access the Internet. Which of the following settings needs to be changed? A. Default gateway B. IP address C. VLAN D. DNS
    • A. 

      Default gateway

    • B. 

      IP address

    • C. 

      VLAN

    • D. 

      DNS

  • 91. 
    Which of the following configuration management documents will allow an administrator to troubleshoot a connectivity problem with a CAT5e cable?  
    • A. 

      Wiring schematic

    • B. 

      Logical network diagram

    • C. 

      Physical network diagram

    • D. 

      Baseline configuration

  • 92. 
    Which of the following protocols does a router use to communicate packets to other routers?  
    • A. 

      RIP

    • B. 

      VLAN

    • C. 

      STP

    • D. 

      VTP

  • 93. 
    A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST? A. arp B. ipconfig C. tracert D. route
    • A. 

      Arp

    • B. 

      Ipconfig

    • C. 

      Tracert

    • D. 

      Route

  • 94. 
    Which of the following is the default port for SMTP? A. 21 B. 23 C. 24 D. 25
    • A. 

      21

    • B. 

      23

    • C. 

      24

    • D. 

      25

  • 95. 
    Which of the following connector types is used to connect a serial cable?  
    • A. 

      RJ-11

    • B. 

      BNC

    • C. 

      LC

    • D. 

      DB-9

  • 96. 
    Which of the following is BEST used to proactively identify if a web server has crashed?  
    • A. 

      IPS

    • B. 

      Packet sniffer

    • C. 

      Port scanner

    • D. 

      Caching engine

  • 97. 
    A technician wants to separate networks on a switch. Which of the following should be configured to allow this?  
    • A. 

      VLAN

    • B. 

      Trunking

    • C. 

      Spanning tree

    • D. 

      Traffic filtering

  • 98. 
    A customer shares a building with several other tenants. The customer reports that an unencrypted wireless network has been getting slower while their Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?    
    • A. 

      VLAN

    • B. 

      MTU

    • C. 

      WPA

    • D. 

      SSID

  • 99. 
    A network administrator is tasked to deploy wireless in a new building. The building will be used by a company that manufactures 5GHz cordless phones. Additionally, the wireless system must support a minimum speed of 54Mbps. Which of the following should be deployed to meet the requirements and avoid interference?  
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      801.11g

    • D. 

      802.11n

  • 100. 
    After a switch upgrade, several users report no connection to the Internet, while other users report no problems. Which of the following is the MOST likely problem?
    • A. 

      Wrong gateway

    • B. 

      Faulty or missing routes

    • C. 

      No DNS

    • D. 

      VLAN port assignments