Networking 005 Part 6

100 Questions | Total Attempts: 54

Settings
Please wait...
Networking Quizzes & Trivia

Networking


Questions and Answers
  • 1. 
    • A. 

      The laptop is too far away from the WAP.

    • B. 

      The WAP is using 802.11a frequencies

    • C. 

      The laptop is only set to allow 802.11n connections

    • D. 

      The technician is on an 802.11b network

  • 2. 
    Users report an intermittent degradation of sound on their IP phones. Which of the following would a network administrator do to alleviate the problem?
    • A. 

      Use plenum cables

    • B. 

      Provide fault tolerance for the switch

    • C. 

      Configure VLAN trunking on the switch

    • D. 

      Configure QoS

  • 3. 
    Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks?
    • A. 

      Switch

    • B. 

      Repeater

    • C. 

      Hub

    • D. 

      WAP

  • 4. 
    A natural disaster has occurred and the administrator must return the network to a healthy status. Which of the following should the administrator do in this case?
    • A. 

      Follow the emergency action plan.

    • B. 

      Wait for an issue to be reported.

    • C. 

      Establish a new baseline

    • D. 

      Determine if escalation is necessary.

  • 5. 
    Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
    • A. 

      Reverse ARP

    • B. 

      Full duplex on the fiber link

    • C. 

      PoE

    • D. 

      802.1q trunking

  • 6. 
    Which of the following connector types is commonly identified by two rows of pins with four in one row and five in the other?
    • A. 

      DB-9

    • B. 

      RJ-45

    • C. 

      SC

    • D. 

      BNC

  • 7. 
    At which of the following layers does the UDP protocol operate?
    • A. 

      Layer 1

    • B. 

      Layer4

    • C. 

      Layer 6

    • D. 

      Layer 7

  • 8. 
    Interior gateway protocols are used for resolving routes:
    • A. 

      Between networks

    • B. 

      Within routers

    • C. 

      Within networks

    • D. 

      Between WAPs

  • 9. 
    • A. 

      Ipconfig/release

    • B. 

      Ipconfig/renew

    • C. 

      Ipconfig/all

    • D. 

      Ipconfig/help

  • 10. 
    Which of the following protocols can be used to retrieve system and network performance information from a router?
    • A. 

      LDAP

    • B. 

      IMAP

    • C. 

      TFTP

    • D. 

      SNMP

  • 11. 
    • A. 

      NIPS

    • B. 

      Network-based firewall

    • C. 

      VPN concentrator

    • D. 

      Host-based firewall

  • 12. 
    Several users are sending emails to CompTIA.org. but they are not being received. Which of the following commands could be used to verify that the company is able to connect to the mail service at CompTIA.org?
    • A. 

      Ping

    • B. 

      Arp

    • C. 

      Dig

    • D. 

      Telnet

  • 13. 
    • A. 

      Hop count

    • B. 

      MTU

    • C. 

      Latency

    • D. 

      Bandwidth

  • 14. 
    • A. 

      Traceroute

    • B. 

      Netstat

    • C. 

      Nslookup

    • D. 

      Ping

  • 15. 
    • A. 

      802.11n

    • B. 

      802.11g

    • C. 

      802.11b

    • D. 

      802.11a

  • 16. 
    • A. 

      168.129.00/24

    • B. 

      172.16.128.0/15

    • C. 

      192.168.0.0/16

    • D. 

      162.17.0.0/12

  • 17. 
    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?
    • A. 

      Phishing scam

    • B. 

      Social engineering

    • C. 

      Man-in-the-Middle

    • D. 

      Shoulder surfing

  • 18. 
    An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?
    • A. 

      Multimeter

    • B. 

      Snips

    • C. 

      Toner probe

    • D. 

      Punch down tool

  • 19. 
    A small business with eight employees has just opened their office in a renovated loft in a busy downtown area. The owner of the building does not want to run any additional wiring beyond power, to preserve the historic nature of the building. Because of this stipulation, almost all tenants in the building have chosen to implement wireless. Which of the following should be the FIRST step in setting up this SOHO network?
    • A. 

      Run a wireless site survey

    • B. 

      Speak to tenants to determine their telephone standards.

    • C. 

      Install and configure a Gigabit switch.

    • D. 

      Determine the operating system versions

  • 20. 
    Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?
    • A. 

      Multicast

    • B. 

      PAT

    • C. 

      CIDR

    • D. 

      NAT

  • 21. 
    Two autonomous networks who wish to exchange routing data should use which of the following protocols?
    • A. 

      OSPF

    • B. 

      BGP

    • C. 

      EIGRP

    • D. 

      IS-IS

  • 22. 
    A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured?
    • A. 

      DNS primary server

    • B. 

      Host route

    • C. 

      Proxy ARP

    • D. 

      Default gateway

  • 23. 
    A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?
    • A. 

      Subnetting

    • B. 

      Unicast

    • C. 

      Broadcast

    • D. 

      Multicast

  • 24. 
    Which of the following would be used to lock all of the primary communication equipment of a building, including its demarcation point?
    • A. 

      MTR

    • B. 

      MDF

    • C. 

      Smartjack

    • D. 

      IDF

  • 25. 
    • A. 

      IDS

    • B. 

      SSL

    • C. 

      ACL

    • D. 

      SMNPv2

  • 26. 
    In which of the following topologies could the failure of one machine cause the entire network to stop functioning?
    • A. 

      Mesh

    • B. 

      Token ring

    • C. 

      Star

    • D. 

      Spanning tree

  • 27. 
    A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?
    • A. 

      Multicast

    • B. 

      DHCP

    • C. 

      APIPA

    • D. 

      Broadcast

  • 28. 
    • A. 

      IPv4IPv4

    • B. 

      MAC address

    • C. 

      IPv6

    • D. 

      Host address

  • 29. 
    Determining when to retransmit frames is an example of which of the following Ethernet properties?
    • A. 

      Carrier sense

    • B. 

      Collision detection

    • C. 

      Multiple access points

    • D. 

      Collision avoidance

  • 30. 
    The T568B wiring standard slates that CAT5 cables should be coded as follows:
    • A. 

      White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown

    • B. 

      White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,

    • C. 

      White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown

    • D. 

      White/Orange, Orange, White/Green, Blue,

  • 31. 
    Using network monitoring tools would allow an administrator to do which of the following?
    • A. 

      Configure offline devices

    • B. 

      Examine performance issues

    • C. 

      Install additional software and updates

    • D. 

      View syslog events

  • 32. 
    • A. 

      Frame Relay

    • B. 

      POTS

    • C. 

      PSTN

    • D. 

      ISDN

  • 33. 
    • A. 

      Layer 1

    • B. 

      Layer 5

    • C. 

      Layer 6

    • D. 

      Layer 7

  • 34. 
    An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?
    • A. 

      Turn down the transmission strength of the access point.

    • B. 

      Replace the antenna with a smaller one.

    • C. 

      Change the wireless password to a more complex one.

    • D. 

      Change the SSID of the access point

  • 35. 
    • A. 

      802.11b/g

    • B. 

      802.11g

    • C. 

      802.11b

    • D. 

      802.11a

  • 36. 
    The "1000" in 1000BaseT cabling represents which of the following?
    • A. 

      The theoretical maximum cable length

    • B. 

      The theoretical maximum bandwidth

    • C. 

      The theoretical port limit of the cable

    • D. 

      The quality level of the copper wiring used

  • 37. 
    • A. 

      SIP

    • B. 

      ICMP

    • C. 

      TFTP

    • D. 

      ARP

  • 38. 
    • A. 

      802.11g

    • B. 

      802.11a

    • C. 

      802.1 n

    • D. 

      802.11b

  • 39. 
    • A. 

      ISDN

    • B. 

      SONET

    • C. 

      Frame Relay

    • D. 

      ATM

  • 40. 
    When verifying a new wireless installation the administrator is unable to see a wireless signal with any wireless laptop. The MOST likely problem is:
    • A. 

      The SSID is not set to broadcast

    • B. 

      An incorrect channel is being used

    • C. 

      Incorrect client security settings are configured

    • D. 

      Incorrect client configuration on the laptops

  • 41. 
    Link aggregation is also known as port:
    • A. 

      Distribution

    • B. 

      Mirroring

    • C. 

      Spanning

    • D. 

      Trunking

  • 42. 
    802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the following?
    • A. 

      460 feet (140 meters

    • B. 

      540 feet (165 meters)

    • C. 

      560 feet (171 meters

    • D. 

      840 feet (256 meters

  • 43. 
    Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?
    • A. 

      Proxy

    • B. 

      Load balancer

    • C. 

      Router

    • D. 

      Bandwidth shaper

  • 44. 
    • A. 

      Dynamic routing is created adhoc and static routing cannot be changed once implemented

    • B. 

      Static routing is hard-coded and requires significant administrative overhead for large networks.

    • C. 

      Static routing requires little administrative overhead and dynamic routing requires significant administrative overhead

    • D. 

      Dynamic routing is the best solution for small networks and static routing is the best solution for large scale networks.

  • 45. 
    A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?
    • A. 

      Call their local ISP

    • B. 

      Verify the IP information of the server

    • C. 

      Check their local Internet connection

    • D. 

      Verify the hostname of the server

  • 46. 
    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?
    • A. 

      The laptop is missing the software supplicant

    • B. 

      The access point SSID is hidden.

    • C. 

      The laptop only supports TKIP and AES encryption,

    • D. 

      The access point is on the wrong channel

  • 47. 
    • A. 

      RADIUS

    • B. 

      SNAT

    • C. 

      PAT

    • D. 

      NAT

  • 48. 
    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?
    • A. 

      Baseline configuration

    • B. 

      Security policy

    • C. 

      Performance and transaction logs

    • D. 

      Physical network diagram

  • 49. 
    A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?
    • A. 

      DHCP server

    • B. 

      Proxy server

    • C. 

      Repeater

    • D. 

      DHCP relay

  • 50. 
    An administrator is troubleshooting wireless connectivity issues at a client’s office and discovers that the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?
    • A. 

      802.1 1g

    • B. 

      802.1X

    • C. 

      802.11n

    • D. 

      802.11b

  • 51. 
    For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?
    • A. 

      VPN concentrator

    • B. 

      Virtual servers

    • C. 

      Wireless

    • D. 

      Multimode fiber

  • 52. 
    A client is having problems connecting remotely after replacing a router. An administrator has just created an action plan. Which of the following is the NEXT step the administrator should perform to resolve this issue?
    • A. 

      Implement and test the solution.

    • B. 

      Determine if escalation is necessary.

    • C. 

      Identify the affected areas of the network.

    • D. 

      Identify the results and effects of the solution

  • 53. 
    • A. 

      Ping sweep

    • B. 

      Intrusion detection software

    • C. 

      Port scanner

    • D. 

      Wireless packet sniffer

  • 54. 
    • A. 

      SFTP

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      SNTP

  • 55. 
    Which of the following technologies was designed to provide the FASTEST data rates over analog phone lines?
    • A. 

      RADSL

    • B. 

      SONET

    • C. 

      ADSL

    • D. 

      MPLS

  • 56. 
    Which of the following services can an administrator use to reduce latency and prioritize the flow of data?
    • A. 

      Fault tolerance

    • B. 

      RADIUS

    • C. 

      Qos

    • D. 

      Load balancing

  • 57. 
    • A. 

      802.11g

    • B. 

      802.1X

    • C. 

      802.11b

    • D. 

      802.1 m

    • E. 

      802.11a

  • 58. 
    A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement?
    • A. 

      Multicast addressing

    • B. 

      Load balancing

    • C. 

      Address translation

    • D. 

      DHCP

  • 59. 
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 60. 
    A stateless firewall requires a technician to:
    • A. 

      Write more packet filters.

    • B. 

      Write less packet filters.

    • C. 

      Purchase a license for states

    • D. 

      Upgrade definitions manually

  • 61. 
    Which of the following should be used to test an internal NIC without having to connect it to the network?
    • A. 

      Loopback cable

    • B. 

      Crossover cable

    • C. 

      Rollover cable

    • D. 

      Straight cable

  • 62. 
    • A. 

      T1

    • B. 

      ADSL

    • C. 

      SDSL

    • D. 

      OC-3

  • 63. 
    Users are reporting that they are still experiencing network issues even though a fix was recently applied. Which of the following troubleshooting methodology steps is the administrator using?
    • A. 

      Escalating the problem

    • B. 

      Testing the solution and identifying the effects

    • C. 

      Continuing to gather information about the same symptoms

    • D. 

      Documenting the solution and the entire process

  • 64. 
    Kerberos is a form of user authentication that:
    • A. 

      Provides users access to network resources

    • B. 

      Performs router commands after user authentication.

    • C. 

      Provides users with remote access only capabilities

    • D. 

      Does not require an authentication server

  • 65. 
    After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?
    • A. 

      Signal loss

    • B. 

      Signal bleed

    • C. 

      Data collision

    • D. 

      Crosstalk

  • 66. 
    At which of the following does the telephone company's responsibility cease?
    • A. 

      66 block

    • B. 

      Demarc

    • C. 

      110 block

    • D. 

      MDF

  • 67. 
    Which of the following tools allows an administrator to determine the MAC address of another computer?
    • A. 

      Ping

    • B. 

      Arp

    • C. 

      Ifconfig

    • D. 

      Ipconfig

  • 68. 
    • A. 

      PAT

    • B. 

      NAT

    • C. 

      Multicast

    • D. 

      Subnetting

  • 69. 
    Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices?
    • A. 

      802.11a

    • B. 

      802.11g

    • C. 

      802.11b

    • D. 

      802.11n

  • 70. 
    • A. 

      Hostname

    • B. 

      Ipconfig

    • C. 

      Net view

    • D. 

      Nslookup

  • 71. 
    Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?
    • A. 

      Dig company.com ns

    • B. 

      Ipconfig/all

    • C. 

      Ifconfig-a

    • D. 

      Dig company.com mx

  • 72. 
    In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?
    • A. 

      Incorrect subnet mask

    • B. 

      Mismatched MTU

    • C. 

      Switching loop

    • D. 

      VLAN mismatch

  • 73. 
    • A. 

      CHAP

    • B. 

      RADIUS

    • C. 

      TACACS+

    • D. 

      Kerberos

  • 74. 
    • A. 

      Encryption

    • B. 

      DHCP

    • C. 

      Password

    • D. 

      SSID

  • 75. 
    A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?
    • A. 

      DHCP

    • B. 

      PAT

    • C. 

      Proxy

    • D. 

      IPX

  • 76. 
    Which of the following WAN technologies has the GREATEST latency and is not recommended for VoIP?
    • A. 

      ISDN

    • B. 

      DSL

    • C. 

      Satellite

    • D. 

      Cable

  • 77. 
    Which of the following should be changed to secure access to a WAPs configuration management interface?
    • A. 

      SSID

    • B. 

      WPA2

    • C. 

      DHCP

    • D. 

      Password

  • 78. 
    • A. 

      66 block

    • B. 

      Patch panel

    • C. 

      Wiring closet

    • D. 

      Demarc

  • 79. 
    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?
    • A. 

      SSH

    • B. 

      WEP

    • C. 

      VPN

    • D. 

      WPA

  • 80. 
    • A. 

      IS-IS

    • B. 

      BGP

    • C. 

      EIGRP

    • D. 

      OSPF

  • 81. 
    Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?
    • A. 

      The DHCP server has an incorrect gateway configured

    • B. 

      The DHCP server was incorrectly configured with a six hour lease time on addresses

    • C. 

      The DHCP server was incorrectly configured with no-expiring lease time on addresses.

    • D. 

      The DNS server is no longer functional and internal name-address resolution is down

  • 82. 
    Physical and logical network diagrams are used for which of the following configuration management goals?
    • A. 

      Track DHCP distribution

    • B. 

      Compare MAC and IP addresses

    • C. 

      Document Internet access history

    • D. 

      Identity network devices

  • 83. 
    • A. 

      Create an action plan

    • B. 

      Implement and test a solution

    • C. 

      Determine if anything has changed

    • D. 

      Identity a probable cause

  • 84. 
    • A. 

      Physical

    • B. 

      Transport

    • C. 

      Network

    • D. 

      Data link

  • 85. 
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 6

    • D. 

      Layer 7

  • 86. 
    • A. 

      CAT6

    • B. 

      CAT5

    • C. 

      Single-mode fiber

    • D. 

      CAT3

  • 87. 
    An administrator has found interference on a network. Which of the following cable types is the network MOST likely composed of?
    • A. 

      UTP

    • B. 

      Fiber

    • C. 

      RG-6

    • D. 

      STP

  • 88. 
    When debugging a routing problem, the time-to-live (TTL) value can be used to determine:
    • A. 

      Number of routes available.

    • B. 

      Number of router hops

    • C. 

      Time that an advertised route is valid.

    • D. 

      Time to make a round trip.

  • 89. 
    Web users are reporting issues downloading various types of media. Which of the following should the administrator do FIRST?
    • A. 

      Find out what has recently changed on the network

    • B. 

      Create an action plan and solution identifying potential effects.

    • C. 

      Continue to gather information and see what other problems may exist.

    • D. 

      Determine the most probable cause.

  • 90. 
    Which of the following mitigation techniques would an administrator apply to a device in order to restrict remote access?
    • A. 

      Disable TELNET

    • B. 

      Disable IGMP snooping

    • C. 

      Enable TELNET but not SSL

    • D. 

      Disable ICMP/ping on device

  • 91. 
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?
    • A. 

      Disable SSID

    • B. 

      WPA

    • C. 

      MAC filtering

    • D. 

      RAS

  • 92. 
    Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
    • A. 

      CSMA/CA

    • B. 

      CSMA/CD

    • C. 

      Wireless encryption

    • D. 

      Wireless bonding

  • 93. 
    When ordering aT1 line, the network technician tells the telecommunications company that a particular device is not needed since it is built-in to the router's T1 port. Which of the following devices is the technician referring to?
    • A. 

      CSU/DSU

    • B. 

      ATM

    • C. 

      TDR

    • D. 

      DWDM

  • 94. 
    Which of the following is the full range of address block 192.16876.0/23?
    • A. 

      192.168.76.0-192.168.77.255

    • B. 

      192.168.76.0-192.168.76.255

    • C. 

      192.168.76.0-192.168.76.23

    • D. 

      192.168.76.0-192.168.78 0

  • 95. 
    Which of the following is the MOST secure method to enable remote users to access a company's internal network resources?
    • A. 

      VPN concentrator

    • B. 

      Network-based firewall

    • C. 

      DMZ

    • D. 

      Stateful firewall

  • 96. 
    A network at a small business utilizes a star topology and is experiencing frequent collisions among data packets. Which of the following devices is MOST likely being used?
    • A. 

      Unmanaged switch

    • B. 

      Hardware firewall

    • C. 

      Hub

    • D. 

      Managed switch

  • 97. 
    A technician temporarily needs an additional network connection in their office to test a new workstation. Which of the following is the BEST solution to add a temporary network connection?
    • A. 

      Install a small network switch

    • B. 

      Use port mirroring on the switch

    • C. 

      Split the pairs of the existing jack

    • D. 

      Install a CSU/DSU

  • 98. 
    A technician is troubleshooting a network connectivity issue with a user's desktop configured to use a static IP address. The technician notes the following configuration: IP 172.16.2.0 NETMASK 255.255.254.0 DEFAULT GATEWAY 172.16.1.1 DNS 192.168.1.1 Which of the following changes will allow the desktop to communicate properly with remote networks?
    • A. 

      Changing the DNS to 172.16.1.100

    • B. 

      Changing the WINS server to 172.174.136

    • C. 

      Changing the netmask to 255.255.255.0

    • D. 

      Changing the default gateway to 1 72.16.3.1

  • 99. 
    An administrator needs to know the workstation name of a user who called in for support in order to remotely manage it. After calling the user and having the user open a command prompt, which of the following commands would the administrator ask the user to type?
    • A. 

      Netstat

    • B. 

      Ifconfig

    • C. 

      Hostname

    • D. 

      Ping

  • 100. 
    A user is trying to connect their new desktop to the network but is unable to get an IP address. The technician tests the cable and finds that there are too many open pairs. Which of the following wiring standards needs to be used in the replacement cable?
    • A. 

      568B

    • B. 

      Crossover

    • C. 

      569-A

    • D. 

      607-A