1.
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
A. 
B. 
C. 
D. 
2.
Which of the following is the port number used by HTTP?
A. 
B. 
C. 
D. 
3.
Which of the following is most effective against threats when used with an updated sewer? (Select
TWO)
A. 
B. 
C. 
D. 
E. 
4.
A crossover cable is MOST commonly associated with which of the following layers of the OSI
model?
A. 
B. 
C. 
D. 
5.
For security reasons Kurt, a network technician, wants to install a Linux based email server.
Microsoft web services, and directory services on different servers. Which of the following
technologies would be BEST to reduce hardware costs?
A. 
B. 
C. 
D. 
6.
A company is about to install a second network connection with a new ISP. Which of the following
routing protocols is the BEST choice?
A. 
B. 
C. 
D. 
7.
A layer 3 switch can move packets between subnets based on which of the following criteria?
A. 
B. 
C. 
D. 
8.
Which of the following would be used to test out the security of a specific network by allowing it to
receive security attacks?
A. 
B. 
C. 
D. 
9.
A bridge handles frames at which of the following layers of the OSI model?
A. 
B. 
C. 
D. 
10.
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is
Joe MOST likely connecting?
A. 
B. 
C. 
D. 
11.
Joe, an administrator, has just finished installing a new switch and connected two servers with IPs
of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to
reach the Internet. Joe sees the following information in the switch configuration:
Interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST
likely cause of the problem?
A. 
The subnet mask is incorrect
B. 
A routing loop has occurred
C. 
Joe used a crossover cable to connect the switch to the gateway
D. 
The server is missing default-gateway information
12.
Which of the following wireless technologies can support the MOST allowable MIMO streams?
A. 
B. 
C. 
D. 
13.
Which of the following devices should Joe, an administrator, connect to a protocol analyzer in
order to collect all of the traffic on a LAN segment?
A. 
B. 
C. 
D. 
14.
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the
fiber cable, which of the following configurations MUST be present?
A. 
B. 
Full duplex on the fiber link
C. 
D. 
15.
Sandy, a user, is unable to access the company website on a laptop. A network technician verifies
that the user can access other Internet pages. According to network troubleshooting methodology,
which of the following steps should be taken NEXT?
A. 
Remotely connect to Sandy’s laptop and review the network configuration settings.
B. 
Ping the web server from inside the network to ensure it is still up and running.
C. 
Check to make sure the company’s website is accessible from the Internet
D. 
Ensure the Ethernet cable is securely plugged into Sandy’s laptop
16.
Karen, a network technician, is troubleshooting a problem and has just established a plan of action
to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?
A. 
Verify full system functionality and if applicable implement preventative measures
B. 
Implement the solution or escalate as necessary.
C. 
Document findings, actions, and outcom
D. 
Establish a theory of probable cause (e.g. question the obvious).
17.
Which of the following wireless technologies can support the GREATEST distance on either
2.4GHz or 5GHz frequencies?
A. 
B. 
C. 
D. 
18.
A company needs strong wireless security enabled for minimal cost. Which of the following
security measures is the BEST to use?
A. 
B. 
C. 
D. 
Longer SSID broadcast intervals
19.
Which of the following ports is the default telnet port?
A. 
B. 
C. 
D. 
20.
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. 
This is a private address which cannot be seen by external users
B. 
The address does not have the appropriate subnet mask assigned.
C. 
This is a public address which can only be seen by internal users.
D. 
This is a private address which can only be seen by external users
21.
Which of the following is the network topology in which computers connect to form a straight line?
A. 
B. 
C. 
D. 
22.
Users have reported slow access limes when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
A. 
B. 
C. 
D. 
23.
Karen, a network administrator, needs to add an additional connection to a room. She adds a new
Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to
connect the two switches?
A. 
B. 
C. 
D. 
24.
Which of the following DNS record types provides the hostname to IP address mapping?
A. 
B. 
C. 
D. 
25.
The selection of the correct punch down tool to use depends on which of the following?
A. 
B. 
Demarcation point location
C. 
D.