1.
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
Correct Answer
A. 1, 6, 11
Explanation
The 2.4GHz range is divided into 14 channels, but only channels 1, 6, and 11 are non-overlapping. This means that these channels can be used simultaneously without causing interference to each other. Channels 2, 7, 10, 2, 8, 13, and 3, 6, 9 are overlapping channels and using them together can result in interference and degraded performance.
2.
Which of the following is the port number used by HTTP?
Correct Answer
B. 80
Explanation
The port number used by HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting and receiving web pages and other resources on the internet. Port numbers are used to identify specific processes or services on a computer or network. In the case of HTTP, port 80 is the default port number used for communication between web browsers and web servers.
3.
Which of the following is most effective against threats when used with an updated sewer? (Select
TWO)
Correct Answer(s)
C. Content filter
D. IDS
Explanation
A content filter is effective against threats as it can block access to malicious websites or filter out harmful content. An IDS (Intrusion Detection System) is also effective as it can detect and alert to any suspicious activity or potential threats within the network. When used in conjunction with an updated sewer, these two tools can provide a strong defense against various threats and help maintain the security of the system.
4.
A crossover cable is MOST commonly associated with which of the following layers of the OSI
model?
Correct Answer
B. Application
Explanation
A crossover cable is used to connect two devices directly without the need for a network switch or hub. It is commonly used to connect two computers or devices together for file sharing or network communication. The Application layer in the OSI model is responsible for providing services and protocols for applications to communicate with each other. Therefore, a crossover cable is most commonly associated with the Application layer as it enables direct communication between devices at this layer.
5.
For security reasons Kurt, a network technician, wants to install a Linux based email server.
Microsoft web services, and directory services on different servers. Which of the following
technologies would be BEST to reduce hardware costs?
Correct Answer
C. Wireless
Explanation
Installing a Linux based email server on a wireless network would be the best option to reduce hardware costs. By using a wireless network, Kurt can eliminate the need for additional hardware such as cables and physical connections. This can save on the cost of purchasing and maintaining network infrastructure. Additionally, wireless networks provide flexibility and scalability, allowing for easy expansion and reconfiguration without the need for physical changes to the network setup.
6.
A company is about to install a second network connection with a new ISP. Which of the following
routing protocols is the BEST choice?
Correct Answer
C. OSPF
Explanation
OSPF (Open Shortest Path First) is the best choice for a company installing a second network connection with a new ISP. OSPF is a link-state routing protocol that is widely used in large networks. It is designed to efficiently determine the shortest path for data packets to travel through a network, making it ideal for complex network topologies. OSPF also supports load balancing and provides fast convergence, ensuring efficient and reliable routing. BGP (Border Gateway Protocol) is typically used for routing between different autonomous systems, while IS-IS (Intermediate System to Intermediate System) and RIP (Routing Information Protocol) are less commonly used and may not be as suitable for larger networks.
7.
A layer 3 switch can move packets between subnets based on which of the following criteria?
Correct Answer
D. IP address
Explanation
A layer 3 switch can move packets between subnets based on the IP address. The IP address is a unique identifier assigned to each device on a network, allowing the layer 3 switch to determine the destination of the packet and route it accordingly. The 802.1q tag is used for VLAN tagging, the port refers to the physical port on the switch, and the application does not play a role in determining the routing of packets between subnets.
8.
Which of the following would be used to test out the security of a specific network by allowing it to
receive security attacks?
Correct Answer
A. Honeynet
Explanation
A honeynet is a network of computers or systems that are intentionally set up to be vulnerable to attacks. It is used to attract and monitor attackers, allowing organizations to gather information about their techniques and motives. By deploying a honeynet, security professionals can test the security of a specific network by exposing it to potential security attacks and analyzing the attackers' behavior and methods. This helps in identifying vulnerabilities and strengthening the network's defenses.
9.
A bridge handles frames at which of the following layers of the OSI model?
Correct Answer
D. Data Link
Explanation
A bridge handles frames at the Data Link layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data between adjacent network nodes and provides error detection and correction. Bridges operate at this layer by examining the MAC addresses in the frames and making forwarding decisions based on this information. They connect two or more network segments together, allowing for the transfer of data between them.
10.
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is
Joe MOST likely connecting?
Correct Answer
A. A 110 block
Explanation
Joe is most likely connecting the cable to a 110 block. A 110 block is a type of punch-down block commonly used in telecommunications and networking to terminate and connect copper wires. It is used to organize and distribute incoming and outgoing wires, allowing for easy connectivity and troubleshooting.
11.
Joe, an administrator, has just finished installing a new switch and connected two servers with IPs
of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to
reach the Internet. Joe sees the following information in the switch configuration:
Interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST
likely cause of the problem?
Correct Answer
D. The server is missing default-gateway information
Explanation
The server is missing default-gateway information. This means that the server does not know where to send traffic that is destined for the Internet. The default gateway is the IP address of the router that connects the local network to the Internet. Without this information, the server is unable to route traffic beyond the local network.
12.
Which of the following wireless technologies can support the MOST allowable MIMO streams?
Correct Answer
D. 802.11n
Explanation
802.11n is the correct answer because it is the only option that supports Multiple-Input Multiple-Output (MIMO) technology. MIMO allows for the transmission and reception of multiple data streams simultaneously, which increases the overall throughput and capacity of the wireless network. 802.11a, 802.11b, and 802.11g do not support MIMO, therefore they cannot support as many allowable MIMO streams as 802.11n.
13.
Which of the following devices should Joe, an administrator, connect to a protocol analyzer in
order to collect all of the traffic on a LAN segment?
Correct Answer
A. Hub
Explanation
A hub is the correct device to connect to a protocol analyzer in order to collect all of the traffic on a LAN segment. A hub is a networking device that broadcasts all incoming network traffic to all connected devices, allowing the protocol analyzer to capture and analyze the traffic. Unlike switches or routers, hubs do not filter or direct traffic, making them ideal for capturing all network traffic for analysis purposes.
14.
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107.
Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the
fiber cable, which of the following configurations MUST be present?
Correct Answer
D. 802.1q trunking
Explanation
In order for packets from all VLANs to cross the fiber cable, the configuration of 802.1q trunking must be present. 802.1q trunking is a method of tagging VLAN information on Ethernet frames, allowing multiple VLANs to be transmitted over a single physical link. This allows the switches to understand and separate the different VLANs, ensuring that packets from all VLANs can cross the fiber cable.
15.
Sandy, a user, is unable to access the company website on a laptop. A network technician verifies
that the user can access other Internet pages. According to network troubleshooting methodology,
which of the following steps should be taken NEXT?
Correct Answer
C. Check to make sure the company’s website is accessible from the Internet
Explanation
The next step should be to check if the company's website is accessible from the Internet. This is important because if the website is not accessible, it could indicate a problem with the website itself rather than an issue with Sandy's laptop or network configuration. By checking the website's accessibility from the Internet, the technician can narrow down the possible causes of the issue and determine the appropriate course of action to resolve it.
16.
Karen, a network technician, is troubleshooting a problem and has just established a plan of action
to resolve the problem. Which of the following is the NEXT step in the troubleshooting
methodology?
Correct Answer
B. Implement the solution or escalate as necessary.
Explanation
The next step in the troubleshooting methodology after establishing a plan of action is to implement the solution or escalate the problem as necessary. This means that Karen should now take the necessary steps to resolve the problem based on the plan that has been established. If she is unable to implement the solution herself, she should escalate the problem to someone who can. This step is crucial in order to move forward with resolving the issue effectively.
17.
Which of the following wireless technologies can support the GREATEST distance on either
2.4GHz or 5GHz frequencies?
Correct Answer
D. 802.11n
Explanation
802.11n can support the greatest distance on either 2.4GHz or 5GHz frequencies compared to the other options. This is because 802.11n uses multiple-input multiple-output (MIMO) technology, which allows for multiple antennas to be used for transmitting and receiving data. This results in improved range and coverage compared to older wireless technologies like 802.11a, 802.11b, and 802.11g.
18.
A company needs strong wireless security enabled for minimal cost. Which of the following
security measures is the BEST to use?
Correct Answer
C. WPA
Explanation
WPA (Wi-Fi Protected Access) is the best security measure to use for strong wireless security at minimal cost. WPA provides better security than WEP (Wired Equivalent Privacy) as it uses stronger encryption algorithms and authentication methods. Port filtering is not specifically a wireless security measure and may not provide adequate protection. Longer SSID broadcast intervals may help in reducing the visibility of the wireless network, but it does not provide strong security. Therefore, WPA is the most suitable option for the given scenario.
19.
Which of the following ports is the default telnet port?
Correct Answer
D. 23
Explanation
The default telnet port is port number 23. Telnet is a network protocol used for remote terminal connections. It allows users to access and manage remote computers or devices over a network. Port number 23 is the standard port used for telnet communication, and it is the correct answer to this question.
20.
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
Correct Answer
A. This is a private address which cannot be seen by external users
Explanation
The reason this will ultimately not work is because a private address, such as 10.0.0.15, cannot be seen by external users. Private addresses are reserved for internal use within a network and are not routable on the internet. Therefore, external users attempting to access the FQDN mapped to this private address will not be able to reach the internal server.
21.
Which of the following is the network topology in which computers connect to form a straight line?
Correct Answer
C. Bus
Explanation
Bus network topology is the correct answer. In a bus topology, computers are connected in a straight line using a single cable called the bus. All computers share this common communication medium. Each computer sends data on the bus, and the intended recipient receives it. This topology is simple to implement and cost-effective for small networks. However, if the bus cable fails, the entire network may become inoperable.
22.
Users have reported slow access limes when retrieving information from a server on the
company’s network. Which of the following tools would provide access time information on each
segment of the network to reach the server?
Correct Answer
D. Tracert
Explanation
Tracert is a network diagnostic tool that allows users to trace the route taken by packets from their computer to a destination server. It provides access time information on each segment of the network by displaying the IP addresses of the routers that the packets pass through and the time it takes for the packets to reach each router. By analyzing the output of tracert, users can identify any network segments that are causing slow access times and troubleshoot the issue accordingly.
23.
Karen, a network administrator, needs to add an additional connection to a room. She adds a new
Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to
connect the two switches?
Correct Answer
C. Crossover cable
Explanation
Karen should use a crossover cable to connect the two switches. A crossover cable is specifically designed to connect similar devices, such as two switches, without the need for a hub or a router. It allows the transmit and receive signals to be crossed over, enabling the switches to communicate effectively.
24.
Which of the following DNS record types provides the hostname to IP address mapping?
Correct Answer
A. A record
Explanation
The A record in DNS (Domain Name System) provides the hostname to IP address mapping. It is used to translate domain names into their corresponding IP addresses. When a user enters a domain name in a web browser, the A record is queried to retrieve the IP address associated with that domain name, allowing the browser to establish a connection to the correct server.
25.
The selection of the correct punch down tool to use depends on which of the following?
Correct Answer
C. Block type
Explanation
The correct punch down tool to use depends on the block type. Different block types may require different punch down tools to ensure proper termination and connection.
26.
Which of the following uses a ring topology?
Correct Answer
D. SONET
Explanation
SONET (Synchronous Optical Networking) uses a ring topology. In a ring topology, the network nodes are connected in a circular manner, where each node is connected to exactly two other nodes, forming a closed loop. This allows for data to flow in both directions, providing redundancy and fault tolerance. SONET is commonly used in telecommunications networks to transmit large amounts of data reliably and efficiently over long distances.
27.
A company wants to secure access to its internal wifeless network. The company wants to use the
most secure means to access the network. Which of the following is the BEST choice for wireless
security in this situation?
Correct Answer
D. WPA encryption
Explanation
WPA encryption is the best choice for wireless security in this situation. WPA (Wi-Fi Protected Access) provides stronger security compared to WEP (Wired Equivalent Privacy) encryption. WEP encryption is outdated and vulnerable to attacks. Channel rotation does not directly relate to wireless security. Disabling SSID (Service Set Identifier) can provide some level of security, but it is not as effective as WPA encryption in protecting the network from unauthorized access.
28.
1000BaseT has a MAXIMUM run distance of:
Correct Answer
B. 100 meters (328 feet)
Explanation
The correct answer is 100 meters (328 feet). 1000BaseT is an Ethernet standard that uses twisted pair cables for data transmission. It has a maximum run distance of 100 meters, which means that the cable length between the network devices should not exceed 100 meters for optimal performance. Beyond this distance, there may be signal degradation and loss of data integrity.
29.
Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404:
Page not found'. She then uses the ping command and finds that the default gateway cannot be
pinged. At which of the following layers does the problem MOST likely reside?
Correct Answer
A. Layer 1
Explanation
The problem most likely resides at Layer 1, which is the physical layer of the OSI model. The error message "Error 404: Page not found" indicates that the web page cannot be accessed, which suggests a connectivity issue. The fact that the default gateway cannot be pinged further supports this, as the default gateway is responsible for routing network traffic. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interfaces. Therefore, a problem at Layer 1 could indicate a physical issue with the network connection, such as a faulty cable or network interface.
30.
Which of the following protocols is Joe, a technician, using to encrypt data between web servers
and web browsers?
Correct Answer
D. SSL
Explanation
Joe, the technician, is using SSL (Secure Sockets Layer) protocol to encrypt data between web servers and web browsers. SSL is a cryptographic protocol that provides secure communication over the internet. It ensures that the data transmitted between the web server and web browser is encrypted, preventing unauthorized access or tampering of the information. SSL is commonly used for secure online transactions, such as online banking or shopping, to protect sensitive data like credit card information.
31.
Which of the following would Karen, a technician, use in voice over IP communications?
Correct Answer
D. SIP
Explanation
Karen, as a technician, would use SIP (Session Initiation Protocol) in voice over IP communications. SIP is a signaling protocol that is used to establish, modify, and terminate multimedia sessions such as voice and video calls over IP networks. It is commonly used in VoIP systems to initiate and manage communication sessions between devices, allowing users to make and receive voice calls over the internet. SNTP (Simple Network Time Protocol), SCP (Secure Copy Protocol), and SMTP (Simple Mail Transfer Protocol) are not specifically related to voice over IP communications.
32.
Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to
the MDF, through a room that has a large number of motors. Which of the following would be the
BEST cable type to choose?
Correct Answer
D. Fiber
Explanation
Fiber optic cables are the best choice in this scenario because they are immune to electromagnetic interference, which is important in a room with a large number of motors. Fiber optic cables also have a much higher bandwidth and can transmit data over longer distances compared to other cable types like CAT3, STP, and coaxial cables.
33.
Karen, a customer, wants to install a wireless network into a shared office space. There are
several other wireless networks from other companies that can be detected within the office
space. Which of the following should be configured on Karen's wireless network to differentiate it
from other wireless network and still provide the BEST performance and security? (Select TWO).
Correct Answer(s)
A. SSID
B. Channel
Explanation
SSID and Channel should be configured on Karen's wireless network to differentiate it from other wireless networks and still provide the best performance and security. The SSID (Service Set Identifier) is a unique name that identifies the wireless network. By giving Karen's network a distinct SSID, it will be easily identifiable among the other networks in the shared office space. The Channel refers to the specific frequency on which the wireless network operates. By selecting a channel that is less congested or interference-free, Karen's network can achieve better performance and security.
34.
Joe, a user, can no longer access the accounting file share, but others are still able to access the
share. Which of the following would be the FIRST step in troubleshooting the issue?
Correct Answer
C. Ask Joe if anything has changed on the system.
Explanation
The first step in troubleshooting the issue would be to ask Joe if anything has changed on the system. By doing so, it can help identify if there have been any recent changes or updates that may have caused Joe's inability to access the accounting file share. This information can then be used to narrow down the possible causes and determine the appropriate solution.
35.
Which of the following wiring standards would Karen, a technician, MOST likely use to
interconnect two devices without the use of a hub or switch?
Correct Answer
C. Crossover
Explanation
Karen would most likely use the crossover wiring standard to interconnect two devices without the use of a hub or switch. Crossover cables are specifically designed to connect two devices directly, without the need for an intermediary device like a hub or switch. This allows for direct communication between the devices, making it an ideal choice in this scenario.
36.
Which of the following would provide Kurt, a technician, with a performance reference point to
refer back to after hardware repair?
Correct Answer
A. Baseline
Explanation
A baseline would provide Kurt with a performance reference point to refer back to after hardware repair. A baseline is a snapshot of the system's performance before any changes or repairs are made. It serves as a benchmark to compare the system's performance before and after the repair, allowing Kurt to assess the effectiveness of the repair and identify any discrepancies or improvements in the system's performance.
37.
Which of the following connector types is MOST commonly found with coaxial cabling?
Correct Answer
B. BNC
Explanation
The BNC connector is the most commonly found connector type with coaxial cabling. BNC stands for Bayonet Neill-Concelman and it is widely used for connecting coaxial cables in various applications such as video surveillance systems, television antennas, and computer networks. The BNC connector provides a secure and reliable connection, ensuring good signal transmission and minimizing interference. It is easy to install and remove, making it a popular choice for coaxial cabling.
38.
Which of the following connector types will MOST likely be located on a serial cable?
Correct Answer
A. DB-9
Explanation
A DB-9 connector is most likely to be located on a serial cable. Serial cables are commonly used to connect devices such as modems, printers, and older computer peripherals. The DB-9 connector is a type of D-subminiature connector that has 9 pins arranged in a D-shaped housing. It is often used for serial communication and is compatible with RS-232 standards.
39.
Kurt, a user, on a network cannot access any network resources. The link light on his computer
shows that a connection is present. Which of the following is the MOST likely cause of the
problem?
Correct Answer
C. The port on the switch is configured incorrectly
Explanation
The most likely cause of Kurt not being able to access any network resources, despite having a connection present, is that the port on the switch is configured incorrectly. This means that there may be an issue with the settings or configuration of the switch port, preventing Kurt from accessing the network resources.
40.
Which of the following basic devices blocks ports and can sometimes filter data?
Correct Answer
C. Firewall
Explanation
A firewall is a basic device that blocks ports and can sometimes filter data. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By blocking specific ports, a firewall can prevent unauthorized access to a network, while also filtering data to ensure that only legitimate and safe traffic is allowed through. This helps to enhance network security and protect against potential threats or attacks.
41.
Which of the following protocols is commonly used for VoIP technology?
Correct Answer
C. SIP
Explanation
SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. It is a communication protocol that enables the initiation, modification, and termination of interactive user sessions involving voice, video, and messaging applications. SIP is widely adopted in the telecommunications industry as it allows for efficient and effective communication over IP networks. It facilitates the establishment and management of voice and multimedia sessions, making it the ideal protocol for VoIP technology.
42.
Which of the following metrics indentifies the number of connections that is between two devices?
Correct Answer
A. Hop count
Explanation
Hop count is a metric that identifies the number of connections between two devices. It represents the number of routers or network devices that a packet must traverse to reach its destination. A higher hop count indicates a longer path and potentially more latency in the network. Therefore, hop count is a useful metric for measuring the efficiency and performance of a network connection.
43.
A router that takes the workstations internal IP address and changes it to another IP address when
it sends the data outside of the network is and example of which of the following?
Correct Answer
A. NAT
Explanation
NAT stands for Network Address Translation. It is a technology used by routers to translate the internal IP addresses of devices in a private network to a different IP address when sending data outside of the network. This allows multiple devices to share a single public IP address. In this case, the router is performing NAT by changing the internal IP address of the workstation to another IP address before sending the data outside of the network.
44.
Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away
from the networking equipment. The type of cable being run is CAT6. Karen purchases and
installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between
the office and the networking equipment. Which of the following would have been the BEST to
install instead of the CAT6 cable?
Correct Answer
A. Install two CAT6 cables with a repeater
Explanation
Installing two CAT6 cables with a repeater would be the best option instead of the CAT6 cable. This is because the weak signal between the office and the networking equipment suggests that the distance is too long for a single CAT6 cable to maintain a strong signal. By installing two CAT6 cables and using a repeater, the signal can be boosted and maintained over the longer distance.
45.
Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives
reports from the server administrator that servers connected to the new switch seem to be
experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core
switch and sees the following information:
#show run interface GigabitEthernet 0/10
Switchport trunk encapsulation dotlq
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
Correct Answer
B. Speed and duplex have not been set
Explanation
The most likely cause of the slow connections is that the speed and duplex settings have not been configured on the port connecting the new switch to the core switch. This means that the switch and the core switch are not communicating at the optimal speed and duplex settings, resulting in slower LAN connections. Configuring the correct speed and duplex settings on the port should help resolve the issue and improve the network performance.
46.
Karen, an administrator, wants to list all the network connections to and from the server. Which of
the following commands would MOST likely be used?
Correct Answer
D. Netstat
Explanation
The command "netstat" would most likely be used to list all the network connections to and from the server. Netstat is a command-line tool that displays active network connections, listening ports, and other network statistics. It provides information about the IP addresses and ports being used by the server for network communication. This command is commonly used by administrators to troubleshoot network issues and monitor network activity.
47.
A company plans to implement a wired network between several computers. The company wants
this network to be able to have a transmission rate of 1Gbps. Which of the following cable types
should be purchased?
Correct Answer
D. CAT5e
Explanation
CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial, CAT3, and CAT5 cables do not have the same level of performance and may not be able to achieve the desired transmission rate.
48.
Which of the following regulates the amount of network traffic a single node receives in a server
cluster?
Correct Answer
A. Load balancer
Explanation
A load balancer is a device or software that distributes network traffic across multiple servers or nodes in a server cluster. It helps regulate the amount of network traffic that each individual node receives by evenly distributing the workload. This ensures that no single node is overwhelmed with too much traffic, which can lead to performance issues or system failure. Therefore, a load balancer is the correct answer for regulating network traffic in a server cluster.
49.
Before installing a wireless network, which of the following should Karen, a network technician,
take into consideration to reduce signal exposure for war drivers?
Correct Answer
A. Device placement
Explanation
To reduce signal exposure for war drivers, Karen should consider device placement. This means strategically positioning the wireless network devices, such as routers and access points, to minimize the range and strength of the wireless signal outside of the intended coverage area. By placing the devices in areas where the signal does not extend beyond the desired boundaries, Karen can help prevent unauthorized individuals from accessing the network and reduce the risk of data breaches or attacks.
50.
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to
pass on its default port? (Select TWO).
Correct Answer(s)
D. 161
E. 162
Explanation
To allow SNMP traffic to pass on its default port, ports 161 and 162 would have to be allowed through the firewall. Port 161 is used for SNMP requests, while port 162 is used for SNMP trap messages. By allowing these ports, the firewall will permit the necessary communication for SNMP traffic to flow through.