CompTIA CertifyMe N10-004 v2011-01-12 by Elvik
CompTIA CertifyMe N10-004 v2011-01-12 by Elvik
CompTIA CertifyMe N10-004 v2011-01-12 by Elvik
Number: N10-004
Passing Score: 800
Time Limit: 120 min
File Version: 2011-01-12
CompTIA - N10-004
Version - 2011-01-12
Best of luck
By - Elvik
Exam A
QUESTION 1
Which of the following connection methods is considered secure?
A. HTTPS
B. TELNET
C. RCP
D. HTTP
Answer: A
Section: (none)
QUESTION 2
Which of the following network cable types is LEAST susceptible to EMI?
A. UTP CAT5
B. UTP CAT3
C. Plenum STP CAT5
D. Coaxial
Answer: D
Section: (none)
QUESTION 3
Which of the following tools is used to connect analog telephony wire pairs to a block, such as a 110 or 66
block?
A. Butt set
B. Toner probe
C. Punch down tool
D. Protocol analyzer
Answer: C
Section: (none)
QUESTION 4
Which of the following protocols could be used in a peer-to-peer topology?
A. RADIUS
B. NetBIOS
C. IGMP
D. TACACS+
Answer: C
Section: (none)
QUESTION 5
A technician needs to install phones that will only require one cable for both data and power to be supplied.
Which of the following features MUST the switch support?
A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN
Answer: B
Section: (none)
QUESTION 6
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection.
Which of the following network technologies would BEST handle voice traffic prioritization above all other
data?
A. IPSec
B. Load balancing
C. QoS
D. PoE
Answer: C
Section: (none)
QUESTION 7
Which of the following activities will not be possible if the gateway IP address is set incorrectly on a client's
machines?
Answer: A
Section: (none)
QUESTION 8
Which of the following is a commonly used protocol for VoIP network communication?
A. SNMP
B. DNS
C. SSH
D. RTP
Answer: D
Section: (none)
QUESTION 9
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet)
fiber runs?
A. 10GBase-ER
B. 10GBase-SR
C. 10GBase-SW
D. 100Base-FX
Answer: B
Section: (none)
QUESTION 10
When installing a new secure wireless network the administrator should turn on:
Answer: A
Section: (none)
QUESTION 11
A client attempts to connect to a network resource and is given an error message about their access being
restricted. Which of the following BEST describes the reason for denial?
Answer: D
Section: (none)
QUESTION 12
Which of the following is strictly used to convert analog to digital signals?
A. Modem
B. Hub
C. NIC
D. Repeater
Answer: A
Section: (none)
QUESTION 13
A firewall is set to block inbound connections on port 25. Which of the following protocols would enable the
administrator to retrieve email without reconfiguring the firewall?
A. FTP
B. SNMP
C. POP3
D. SMTP
Answer: C
Section: (none)
QUESTION 14
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following
commands can be run on HOST A to determine the process attached to TCP port 4444?
A. netstat -nap
B. netstat -nav
C. ifconfig -a
D. ipconfig /all
Answer: B
Section: (none)
QUESTION 15
Which of the following describes what happens when a technician pings the broadcast address?
Answer: B
Section: (none)
QUESTION 16
The helpdesk has been informed that the company's ISP is experiencing network outages. Which of the
following commands can an administrator run to quickly locate and determine the TTL of the further
reachable node?
A. route
B. ping
C. arp
D. traceroute
Answer: D
Section: (none)
QUESTION 17
To ensure that VoIP phones are provided with power without using independent power supplies, switches
on the network must have which of the following features?
A. Spanning tree
B. VLAN tagging
C. PoE
D. PPPoE
Answer: C
Section: (none)
QUESTION 18
A network with twenty clients needs to view a video file. Which of the following should be configured on the
client's computers to reduce network traffic?
A. Class C addresses
B. Class A addresses
C. Multicast
D. Broadcast
Answer: C
Section: (none)
QUESTION 19
Which of the following protocols is the MOST secure for transferring network device configurations?
A. TFTP
B. SCP
C. RCP
D. FTP
Answer: B
Section: (none)
QUESTION 20
Which of the following tools is designed to send a signal through one end of a cable, so that it can be found
at the other end of the cable?
A. Toner probe
B. Multimeter
C. Voltage event recorder
D. Cable tester
Answer: C
Section: (none)
QUESTION 21
Which of the following ports does IPSec use, by default?
A. 500
B. 8080
C. 3389
D. 53
Answer: A
Section: (none)
QUESTION 22
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this?
A. Port mirroring
B. Spanning tree
C. PoE
D. VLAN
Answer: D
Section: (none)
QUESTION 23
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a cable to
plug their laptop into the router in order to be able to console into it. Which of the following would the
administrator need to make this connection?
A. Loopback
B. 568B
C. Crossover
D. Rollover
Answer: D
Section: (none)
Explanation/Reference:
Explanation:
Although rollover cable isn't used for hooking Ethernet connections together, you can use it to connect a
host to a router console serial communication (com) port.
QUESTION 24
Which of the following protocols are commonly used for VoIP? (Select TWO).
A. NNTP
B. SIP
C. HSRP
D. NPP
E. RTP
Answer: BE
Section: (none)
QUESTION 25
Which of the following requires the pin-outs to be the same on both ends of a cable?
A. Straight
B. Rollover
C. Loopback
D. Crossover
Answer: A
Section: (none)
QUESTION 26
Which of the following WAN technologies allows for the fastest connection?
A. T1
B. SONET
C. OC-12
D. ADSL
Answer: B
Section: (none)
QUESTION 27
An administrator would like to determine which wire pair on a 100 block connects a jack in the next room.
Which of the following utilities would MOST likely be used to determine this?
A. Port scanner
B. Multimeter
C. Protocol analyzer
D. Toner probe
Answer: B
Section: (none)
QUESTION 28
Which of the following connectors can be used for serial connections?
A. SC
B. RS-232
C. BNC
D. ST
Answer: B
Section: (none)
Explanation/Reference:
Explanation:
Recommended Standard 232 (RS ? 232) was a cable standard commonly used for serial data signals
connecting data ? terminal equipment and data ? communications equipment, as when you connect a
computer's serial port to an external modem.
QUESTION 29
Which of the following is used by a company's ISP to troubleshoot network issues?
A. 110 Block
B. 66 Block
C. Smart Jack
D. Demarc
Answer: C
Section: (none)
QUESTION 30
After receiving network problem reports from users, the technician notices that the router is rebooting itself
several times a day. Which of the following would the technician do NEXT to further diagnose this problem?
Answer: C
Section: (none)
QUESTION 31
A network has four switches; each switch has a physical link to all other switches. Which of the following
topologies is being used?
A. Star
B. Mesh
C. Point-to-multipoint
D. Ring
Answer: B
Section: (none)
QUESTION 32
The task of replacing hubs with switches reduces retransmissions by increasing which of the following?
A. Domain kiting
B. Broadcast domains
C. Collision domains
D. Frequency domains
Answer: C
Section: (none)
QUESTION 33
Which of the following device can connect multiple workstations, support VLANs, and function as a router?
A. Hub
B. Multilayer switch
C. Switch
D. Repeater
Answer: B
Section: (none)
QUESTION 34
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following
configuration management documentation would be the BEST choice to use?
A. Security policy
B. Baseline configurations
C. CAT5 wiring schematics
D. Physical network diagram
Answer: D
Section: (none)
QUESTION 35
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following
device types is being installed?
A. Intrusion detection
B. Proxy server
C. Bandwidth shaper
D. Load balancer
Answer: C
Section: (none)
QUESTION 36
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-
X. Which of the following cabling will need to be used?
A. Crossover
B. Loopback
C. Straight
D. Rollover
Answer: A
Section: (none)
QUESTION 37
Which of the following routing algorithms would provide the fastest convergence time?
A. A distance-vector algorithm
B. A path-vector algorithm
C. A link-state algorithm
D. A static algorithm
Answer: C
Section: (none)
QUESTION 38
Which of the following is a best practice when implementing a basic wireless network?
A. Configuring encryption with a WEP key and labeling the key on the WAP
B. Not configuring the ESSID point
C. Disabling ESSID broadcast
D. Adding two access points per area of service
Answer: C
Section: (none)
QUESTION 39
Which of the following ports would be commonly used for FTP traffic?
A. 23
B. 25
C. 22
D. 20
Answer: D
Section: (none)
QUESTION 40
Which of the following methods is used to provide access to a VPN?
A. RAS
B. IGP
C. PPTP
D. PPP
Answer: C
Section: (none)
QUESTION 41
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected
computer is on the network and checks if a node is saturating the network. Which of the following tools
should be utilized in this situation?
A. Multimeter
B. IGMP
C. Port scanner
D. Protocol analyzer
Answer: D
Section: (none)
QUESTION 42
Which of the following is the metric used for OSPF?
A. Next hop
B. Bandwidth
C. Latency
D. Cost
Answer: B
Section: (none)
QUESTION 43
Which of the following would an administrator MOST likely require in order to connect a client to a WPA
encrypted network?
A. Pre-shared key
B. SSID
C. DSA public key
D. Gateway address
E. PIN
Answer: A
Section: (none)
QUESTION 44
Which of the following would MOST likely contain information about unlabeled datacenter connections?
Answer: D
Section: (none)
QUESTION 45
Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack?
A. Encryption
B. Popup blocker
C. Authentication
D. ACL
Answer: C
Section: (none)
QUESTION 46
Which of the following network access security methods involves the analysis of a physical hardware
addresses?
A. MAC filtering
B. L2TP
C. RAS
D. IP filtering
Answer: A
Section: (none)
QUESTION 47
An administrator would like to monitor the network to evaluate which employees are using an excessive
amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would
BEST be used?
A. Throughput testing
B. Stateful packet inspection
C. Load balancing
D. Packet sniffing
Answer: D
Section: (none)
QUESTION 48
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following
could be used to accomplish this connection?
A. Token ring
B. Optical media
C. Smart jack
D. Media converter
Answer: D
Section: (none)
QUESTION 49
Multiple users are reporting network issues. Before taking any course of action, which of the following is the
FIRST step a technician should take?
Answer: C
Section: (none)
QUESTION 50
Which of the following protocols resolves MAC addresses from IP addresses?
A. RTP
B. ARP
C. DHCP
D. DNS
Answer: B
Section: (none)
QUESTION 51
Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)?
A. Fiber
B. Coaxial
C. Ethernet
D. Serial
Answer: C
Section: (none)
QUESTION 52
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).
A. SNTP
B. HTTP
C. SFTP
D. RCP
E. SCP
Answer: CE
Section: (none)
QUESTION 53
In which of the following networking types can a computer be a client to other computers and act as a
server as well?
A. Peer to peer
B. Bus
C. Ring
D. VPN
Answer: A
Section: (none)
QUESTION 54
Which of the following is a direct advantage of having wireless standards?
Answer: D
Section: (none)
QUESTION 55
Which of the following wiring standards would MOST likely be used to connect a single network node to a
switch?
A. Loopback
B. Straight
C. Crossover
D. Rollover
Answer: B
Section: (none)
QUESTION 56
Which of the following are usually needed during manual configuration of a client on an 802.11g network
segment using DHCP and WEP? (Select TWO)
A. Name servers
B. Subnet mask
C. SSID
D. Shared key
E. IP address
Answer: CD
Section: (none)
QUESTION 57
Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly
together?
A. Open circuit
B. Attenuation
C. Collision
D. Crosstalk
Answer: D
Section: (none)
QUESTION 58
A user has reported slow network response in a large training room; the class requires many students to
access the same website each day. Which of the following would BEST remedy this problem?
A. Firewall
B. Caching engine
C. Jitter correction
D. Fault tolerance
Answer: B
Section: (none)
QUESTION 59
A user is reporting issues connecting to the corporate web server. When analyzing the output from a packet
sniffer an administrator sees:
Answer: C
Section: (none)
QUESTION 60
A media converter is also known as a:
A. transceiver.
B. hub.
C. modem.
D. repeater.
Answer: A
Section: (none)
QUESTION 61
Which of the following protocols uses port 143 by default?
A. IMAP4
B. NTP
C. SSH
D. SNMP
Answer: A
Section: (none)
QUESTION 62
The primary goal of implementing network QoS features is
Answer: D
Section: (none)
QUESTION 63
Which of the following BEST explains the function of OSI layer 4?
Answer: C
Section: (none)
QUESTION 64
The 802.11n protocol operates at which of the following layers of the OSI model? (Select TWO).
A. Layer 2
B. Layer 1
C. Layer 4
D. Layer 5
E. Layer 3
Answer: A
Section: (none)
QUESTION 65
Which of the following exchanges routing information between two autonomous systems?
A. OSPF
B. IGP
C. EIGRP
D. EGP
Answer: D
Section: (none)
QUESTION 66
An administrator wants to monitor live traffic on a switch to determine if a malicious source is broadcasting
ARP traffic. Which of the following utilities would BEST accomplish this?
A. Switchport mapper
B. Network mapper
C. Packet sniffer
D. Packet injector
Answer: C
Section: (none)
QUESTION 67
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?
A. 255.255.255.240
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.240.0
Answer: D
Section: (none)
QUESTION 68
Which of the following devices does not limit network broadcast traffic and does not increase performance?
A. Switch
B. Brouter
C. Hub
D. Router
Answer: C
Section: (none)
QUESTION 69
Which of the following would be sent to an SNMP network management system in the event that a failure or
predefined threshold was crossed?
A. SNMP trap
B. History log
C. System log
D. SNMP agent
Answer: A
Section: (none)
QUESTION 70
Where does the responsibility for maintenance and support shift from the telecommunication company to
the customer?
A. Demarc
B. Where the telecommunication lines enter the building
C. Central office
D. Smart jack
Answer: A
Section: (none)
QUESTION 71
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client
sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a
response?
A. 2 and 3
B. 1 and 2
C. 5 and 6
D. 3 and 6
Answer: D
Section: (none)
Explanation/Reference:
Explanation:
The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and
100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.
QUESTION 72
An administrator suspects that packets to an IP address are being dropped over the internet. Which of the
following tools would be the BEST to determine the hop that is dropping the packets?
A. netstat
B. traceroute
C. nslookup
D. ping
Answer: B
Section: (none)
QUESTION 73
A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable to connect
to the network. An administrator verifies that the port is configured correctly and the LAN drop is active.
Which of the following is the MOST likely cause?
Answer: C
Section: (none)
QUESTION 74
A user calls network support and reports that email is not working. Which of the following should the
technician do FIRST?
A. Determine which mail hub the user was connected to and perform a graceful restart.
B. Ask the user what operation was performed, what the expected result was, and what the actual result
was.
C. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network
administrator if needed.
D. Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is
sent.
Answer: B
Section: (none)
QUESTION 75
A technician moves a VoIP phone to a new location, but discovers the phone does not start up when
plugged into the network. Which of the following explains this situation?
Answer: A
Section: (none)
QUESTION 76
Which of the following is a secure way to transfer files from one device to another?
A. TFTP
B. SFTP
C. SNMPv3
D. FTP
Answer: B
Section: (none)
QUESTION 77
Internet-working devices operate at OSI layer:
A. 5
B. 2
C. 4
D. 3
Answer: D
Section: (none)
QUESTION 78
VLANs occur at which of the following layers of the OSI model?
A. 2
B. 3
C. 4
D. 1
Answer: A
Section: (none)
QUESTION 79
Where would a technician MOST likely place the company MX and A records?
A. Firewall
B. Proxy server
C. DNS server
D. Load balancer
Answer: C
Section: (none)
QUESTION 80
A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps
should be done FIRST to diagnose the problem?
Answer: C
Section: (none)
QUESTION 81
A particular route's destination address is referred to as the:
A. link state.
B. next hop.
C. shot vector.
D. RIP peer.
Answer: B
Section: (none)
QUESTION 82
When installing an access point, which of the following encryption schemes should be implemented to
BEST secure the network?
A. WEP
B. WPA
C. WPA with PSK
D. WPA2 with PSK
Answer: D
Section: (none)
QUESTION 83
A network administrator would MOST likely use a port scanner to do which of the following?
Answer: D
Section: (none)
QUESTION 84
IGP differs from EGP because IGP is designed for use in which of the following?
Answer: D
Section: (none)
QUESTION 85
A small company needs to temporarily extend its call center by ten employees. The company decides to
rent office space on the opposite side of the building; the two spaces are 400 feet (122 meters) apart.
Which of the following is the MOST cost effective solution?
Answer: C
Section: (none)
QUESTION 86
An end user is able to connect to a wireless network and is able to browse the internet, yet is unable to
access network servers. Which of the following is the MOST likely cause of the problem?
Answer: C
Section: (none)
QUESTION 87
Which of the following describes a routing table that needs to be maintained manually?
A. Static
B. Link-state
C. Dynamic
D. Hop count based
Answer: A
Section: (none)
QUESTION 88
An application layer firewall is MOST beneficial when used with which of the following protocols?
A. GRE
B. VoIP
C. HTTP
D. SNMP
Answer: D
Section: (none)
QUESTION 89
Which of the following classes is the address 208.177.23.1?
A. Class A
B. Class B
C. Class D
D. Class C
Answer: D
Section: (none)
QUESTION 90
Which of the following is the BEST tool to use when terminating a network jack?
A. Snips
B. Toner probe
C. Punch down
D. Cable stripper
Answer: C
Section: (none)
QUESTION 91
A technician wishes to implement network authentication at the switch port level. Which of the following
standards is designed to accomplish this?
A. TKIP
B. WPA2
C. 802.1ad
D. 802.1x
Answer: D
Section: (none)
QUESTION 92
Which of the following uses a certificate for a tunneling connection?
A. PPTP
B. SSL VPN
C. VNC
D. RDP
Answer: B
Section: (none)
QUESTION 93
Which of the following technologies is the MOST cost-effective when protecting a large number of
networked workstations from external attacks?
Answer: D
Section: (none)
QUESTION 94
A technician would use a logical network diagram to determine the number of:
Answer: C
Section: (none)
QUESTION 95
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the
internet. Other hosts on the same network can connect to the internet. Which of the following should the
technician check?
Answer: B
Section: (none)
QUESTION 96
SONET is normally associated with which of the following?
A. Point to multipoint
B. Bus
C. Point to point
D. Ring
Answer: D
Section: (none)
QUESTION 97
An administrator wants to connect users at three branch offices to the main office through the internet.
Which of the following devices should the administrator install at the main office to BEST accomplish this
goal?
A. IPS sensor
B. Proxy server
C. VPN concentrator
D. Layer 2 switch
Answer: C
Section: (none)
QUESTION 98
Which of the following tools can be used to determine the MAC address of a machine on the local subnet?
A. dig
B. ping
C. arp
D. host
Answer: C
Section: (none)
QUESTION 99
An administrator is troubleshooting network connectivity and would like to view the path that packets are
taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to
use?
A. traceroute
B. ping
C. nslookup
D. route
Answer: A
Section: (none)
QUESTION 100
An administrator is at a client's site to figure out an intermittent network problem. Which of the following is
the FIRST step in the troubleshooting methodology that should be performed?
A. Create an action plan and solution identifying potential effects.
B. Identify the affected areas of the network.
C. Gather information.
D. Implement and test the solution.
Answer: C
Section: (none)
QUESTION 101
An administrator has determined that auto-negotiation has failed on a connection. Which of the following
are the MOST important settings that should be matched on each side of the connection?
Answer: A
Section: (none)
QUESTION 102
Information gathering and diagnostics indicate that a worm has infected the local database server and its
clients, and is saturating local network with traffic. Which of the following is the NEXT step for a technician?
Answer: B
Section: (none)
Exam B
QUESTION 1
After adding a new cable segment to the network, the technician should:
Answer: A
Section: (none)
QUESTION 2
A company needs to perform stateful packet filtering on the core network. Which of the following network
devices would BEST be suited to match this equipment?
A. DHCP server
B. Router ACLs
C. Proxy
D. Firewall
Answer: D
Section: (none)
QUESTION 3
Which of the following describes how original network diagrams contained in the documentation should be
maintained?
Answer: C
Section: (none)
QUESTION 4
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network
devices? (Select TWO).
A. Workstation
B. Server
C. Laptop
D. Hub
E. Printer
Answer: BE
Section: (none)
QUESTION 5
TCP occurs at which layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 3
Answer: C
Section: (none)
QUESTION 6
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and
MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which
of the following is the MOST likely cause of this problem?
Answer: D
Section: (none)
QUESTION 7
Which of the following standards provides port authentication?
A. 802.1x
B. 802.1q
C. 802.11
D. 802.2
Answer: A
Section: (none)
QUESTION 8
Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss?
Answer: B
Section: (none)
QUESTION 9
How many potential MAC address schemes are possible?
A. 2<sup>48</sup>
B. 2<sup>64</sup>
C. 2<sup>46</sup>
D. 2<sup>32</sup>
Answer: A
Section: (none)
Explanation/Reference:
Explanation:
The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme. This 48-
bit address space contains potentially 2 or 281,474,976,710,656 possible MAC addresses.
QUESTION 10
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
A. Duplex
B. Collisions
C. Latency
D. Cable length
Answer: C
Section: (none)
QUESTION 11
An administrator has a networking closet on the first floor of a building with all of the network and
communication equipment. However, the telephony provider installed the communications line in the
basement. Which of the following needs to be extended to connect the line to the networking closet?
A. Demarcation point
B. Router
C. Smart jack
D. Patch panel
Answer: D
Section: (none)
QUESTION 12
A port scanner is used by network administrator for which of the following?
Answer: A
Section: (none)
QUESTION 13
Which of the following devices can be used to breakup a broadcast domain?
A. Router
B. Bridge
C. DHCP server
D. Unmanaged switch
Answer: A
Section: (none)
QUESTION 14
Which of the following WAN technologies requires fiber optics?
A. PSTN
B. POTS
C. SONET
D. ADSL
Answer: C
Section: (none)
QUESTION 15
Which of the following pairs should be crossed to create a crossover cable?
Answer: B
Section: (none)
QUESTION 16
A new LAN switch is installed with on fiber ports. Which of the following would a technician need on the new
switch to allow compatibility to the existing fiber network?
A. Repeater
B. Router
C. Hub
D. Media converter
Answer: D
Section: (none)
QUESTION 17
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch
panel?
A. Multimeter
B. Cable crimper
C. Toner probe
D. Punch down tool
Answer: B
Section: (none)
QUESTION 18
Which of the following authentication mechanisms on a wireless network uses a separate network
authentication server?
A. TKIP
B. Kerberos
C. WEP
D. RADIUS
Answer: D
Section: (none)
QUESTION 19
An administrator has configured two hosts as follows:
HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
HOSTB
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
Which of the following MUST be changed in order to allow HOST A to talk to HOST B?
Answer: C
Section: (none)
QUESTION 20
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a
cubicle corresponds to a given RJ-45 jack in a patch panel?
A. Spectrum analyzer
B. Multimeter
C. Punch-down tool
D. Toner probe
Answer: B
Section: (none)
QUESTION 21
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of
the following cable types should the administrator plan to use?
A. CAT6 copper
B. RG-6 copper
C. Multimode fiber
D. Single-mode fiber
Answer: C
Section: (none)
QUESTION 22
An administrator has determined that auto-negotiation has failed on a connection. Which of the following
are the MOST important settings that should be matched on each side of the connection?
Answer: A
Section: (none)
QUESTION 23
In a new wireless network installation, the administrator has successfully installed and tested the
equipment. The NEXT step after turning wireless access on would be to:
Answer: C
Section: (none)
QUESTION 24
Which of the following physical connections allows for the BEST performance when connecting to a VPN
server for a remote user?
A. Baseband
B. POTS
C. Broadband
D. Satellite
Answer: C
Section: (none)
QUESTION 25
Which of the following commands would test the loopback adapter of an internal NIC?
A. ping 127.127.0.0
B. ping 127.0.0.1
C. ping 127.1.1.1
D. ping 127.127.1.0
Answer: B
Section: (none)
QUESTION 26
Which of the following networking protocols is used to give the remote computer secure command line
access to the server?
A. ICMP
B. RTP
C. SSH
D. Telnet
Answer: C
Section: (none)
QUESTION 27
After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass.
Which of the following terms BEST describes this firewall behavior?
A. Stateful inspection
B. Intrusion detection
C. Passive fingerprinting
D. Content filtering
Answer: A
Section: (none)
QUESTION 28
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the
officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective
solution?
Answer: C
Section: (none)
QUESTION 29
Which of the following replaces the destination IP address of a packet?
A. SNAT
B. NAT
C. DNS
D. DHCP
Answer: A
Section: (none)
QUESTION 30
Which of the following commands would MOST likely be used to list the status of all established TCP
connections on port 80?
A. netstat -r
B. netstat -v
C. netstat -aupn
D. netstat -at
E. netstat -p tcp
Answer: E
Section: (none)
QUESTION 31
Which of the following network devices would MOST likely be installed to allow a fiber optic cable to be
plugged into a network device with only RJ-45 connections?
A. Hub
B. Media convertor
C. Basic switch
D. WAP
Answer: B
Section: (none)
QUESTION 32
Mobile users are connecting from sites that have strong security policies and filter most traffic except
HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?
A. RDP access
B. Dial-in access
C. IPSec VPN
D. SSL VPN
Answer: D
Section: (none)
QUESTION 33
Which of the following is an acceptable method for deciding placement of wireless access points?
A. A site survey
B. Where there are electrical service and network connections available
C. Every 300 feet (91 meters)
D. In the middle of each room
Answer: A
Section: (none)
QUESTION 34
A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25
network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which
of the following destination IP addresses must the technician configure on the server to send keep-alive
packets to all the devices?
A. 10.137.24.0
B. 10.137.24.127
C. 10.137.24.128
D. 10.137.24.1
Answer: B
Section: (none)
QUESTION 35
Which of the following is a correct Ethernet MAC address?
A. 16-15-4D-31-59-5J
B. 11:34:7A:88:0C:DB
C. 12:7H:45:89:9F:65
D. 12-88-FF-9X-58-9E
Answer: B
Section: (none)
QUESTION 36
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity issues. Which
of the following is MOST likely causing the new issues?
A. Signal bounce
B. Antenna distance
C. Environment factors
D. Antenna placement
Answer: C
Section: (none)
QUESTION 37
Plenum cable should be used to:
Answer: C
Section: (none)
QUESTION 38
The MAIN difference between an IDS and an IPS is the:
A. IDS blocks malicious activity while the IPS only alerts about malicious activity.
B. IDS is an inline system while the IPS is placed on a span port and has no IP address.
C. IPS blocks malicious activity while the IDS only alerts about malicious activity.
D. IDS uses a deterministic engine while the IPS uses probabilistic engine.
Answer: C
Section: (none)
QUESTION 39
An administrator wants to provide redundant paths to network resources in case a link fails. Which of the
following switch features would the administrator need to use to accomplish this task?
A. Trunking
B. Spanning tree
C. VLAN
D. PoE
Answer: B
Section: (none)
QUESTION 40
An administrator needs to check the number of active connections on their computer. Which of the
following should be administrator use?
A. dig
B. ping
C. netstat
D. ipconfig
Answer: C
Section: (none)
QUESTION 41
Which of the following describes an email that is sent to users with web links that direct them to malicious
websites?
A. Rogue access points
B. Man-in-the-middle
C. Phishing
D. Viruses
Answer: C
Section: (none)
QUESTION 42
Which of the following methods is used in creating an ACL?
A. IP filtering
B. VPNs
C. Content filtering
D. PPPs
Answer: A
Section: (none)
QUESTION 43
Which of the following can be used to help verify that a remote web server is not blocked by a firewall?
A. Toner probe
B. Protocol analyzer
C. Port scanner
D. Packet injector
Answer: C
Section: (none)
QUESTION 44
Which of the following WAN technology types does not use an Ethernet cable as a medium for
communication and is used for long distances?
A. DSL
B. E3/T3
C. ATM
D. WiMAX
Answer: D
Section: (none)
QUESTION 45
Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and
broadcast addresses on network clients and workstations?
A. DHCP server
B. Smart jack
C. Network bridge
D. Layer 2 switch
Answer: A
Section: (none)
QUESTION 46
Which of the following commands can be used to find the MAC address of a connecting router?
A. traceroute
B. arp
C. ping
D. ping sweep
Answer: B
Section: (none)
QUESTION 47
Which of the following OSI layers does a Layer 3 switch operate at? (Select TWO).
A. Presentation
B. Network
C. Transport
D. Data link
E. Session
Answer: B
Section: (none)
QUESTION 48
Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet?
A. RSH
B. SNAT
C. SSH
D. TFTP
Answer: C
Section: (none)
QUESTION 49
A LAN support team is installing new cables when all networked applications slow and then stop working.
Switches in the server room show all connected ports at 100% activity. Which of the following has MOST
likely occurred?
QUESTION 50
Which of the following Internet technologies would provide the GREATEST bandwidth?
A. T3
B. OC3
C. Cable
D. T1
Answer: B
Section: (none)
QUESTION 51
Which of the following is the MOST appropriate policy for updating physical network diagrams?
Answer: B
Section: (none)
QUESTION 52
A private AS number is useful in which of the following situations?
Answer: C
Section: (none)
QUESTION 53
Which of the following would a technician set up for a building to building within a campus?
A. MDF
B. EMI
C. IDF
D. ESD
Answer: C
Section: (none)
QUESTION 54
A user contacts a technician and states, "The network is down." After further investigation the user is unable
to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help
determine the root cause of the problem?
Answer: C
Section: (none)
QUESTION 55
Which of the following transport protocols should be used to avoid retransmitting lost packets?
A. TCP
B. IGMP
C. ARP
D. UDP
Answer: D
Section: (none)
QUESTION 56
An administrator would like to evaluate network traffic. Which of the following tools should the administrator
use?
A. OTDR
B. Certifier
C. Toner probe
D. Protocol analyzer
Answer: D
Section: (none)
QUESTION 57
Which of the following network protocols is used for sending outbound email from a host?
A. POP
B. RTP
C. IMAP
D. SMTP
Answer: D
Section: (none)
Explanation/Reference:
Explanation:
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote
server to a local email client. POP3 allows you to download email messages on your local computer and
read them even when you are offline.
The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web
server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for
retrieving emails. Both protocols are supported by all modern email clients and web servers.
Main difference between IMAP and POP3:
The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the IMAP
protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your mailbox is about to
be managed by multiple users. Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending
emails across the Internet. SMTP uses TCP port 25.
QUESTION 58
A solution provided less than ideal results, and the technician is forced to go back and devise a new
solution. Which of the following would be done NEXT, assuming probable cause is established and
escalation is not necessary?
Answer: A
Section: (none)
QUESTION 59
Which of the following technologies can prevent a department's network broadcast from propagating to
another department's network if they are located on the same switch?
A. A VLAN
B. A hub
C. A trunk
D. A firewall
Answer: A
Section: (none)
QUESTION 60
Which of the following can be used to find the location of a cable short?
A. Multimeter
B. TDR
C. Protocol analyzer
D. CSU/DSU
Answer: B
Section: (none)
Explanation/Reference:
Explanation:
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in
metallic cables (for example, twisted wire pairs, coaxial cables).
QUESTION 61
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX.
Which of the following should the administrator do NEXT?
A. Update the wiring schematics
B. Update the switch configuration logs
C. Reboot the switch to enable the new connection
D. Update the logical network diagram
Answer: A
Section: (none)
QUESTION 62
Which of the following defines the required distance between each LAN drop that will be installed within a
building?
Answer: B
Section: (none)
QUESTION 63
Which of the following command line tools can be used to display listening sockets and established
connections on the local computer?
A. ipconfig
B. nbtstat
C. nslookup
D. netstat
Answer: D
Section: (none)
QUESTION 64
Which of the following commands is MOST appropriate to determine whether a network interface is up or
down?
A. ISAKMPD
B. IFCONFIG
C. ARP
D. SNORT
Answer: B
Section: (none)
QUESTION 65
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
A. 802.11n
B. 802.11a
C. 802.11b
D. 802.11g
Answer: A
Section: (none)
QUESTION 66
Which of the following allows an administrator to view malicious activity after it has taken place?
A. IDS
B. IPS
C. Packet sniffer
D. Port scanner
Answer: A
Section: (none)
QUESTION 67
Which of the following is an IPv6 address for localhost?
A. FFFF:127.0.0.1
B. 127::
C. FF::0
D. ::1
Answer: D
Section: (none)
QUESTION 68
An administrator wishes to determine if there is a service listening on port 1433 on a server. Which of the
following tools would the administrator use to determine this?
A. route
B. net start
C. netstat
D. ipconfig
Answer: C
Section: (none)
QUESTION 69
Which of the following BEST describes a device that helps resolve IP addresses into FQDNs?
A. DHCP server
B. DNS server
C. Firewall
D. Content switch
Answer: B
Section: (none)
QUESTION 70
Which of the following connection methods is considered unsecure and allows a connection to a machine in
terminal emulation mode?
A. TELNET
B. HTTPS
C. RCP
D. HTTP
Answer: A
Section: (none)
QUESTION 71
An administrator needs to test connectivity between two devices located on the same internal network.
Which of the following commands would MOST likely be used?
A. nslookup
B. traceroute
C. ping
D. ipconfig
Answer: C
Section: (none)
QUESTION 72
Which of the following is true about an IP address if the first four bits are all a one?
Answer: B
Section: (none)
QUESTION 73
An administrator would like to segment traffic into two logical networks on a single switch. Which of the
following technologies should be implemented?
A. VPN
B. LAN
C. VLAN
D. VDSL
Answer: C
Section: (none)
QUESTION 74
Windows users are reporting that they cannot connect to legacy file servers. Ping attempts to the file server
and WINS server were successful. Which of the following tools should be used NEXT?
A. TRACERT
B. IPCONFIG
C. NSLOOKUP
D. NBTSTAT
Answer: D
Section: (none)
QUESTION 75
Which of the following is the BEST device to use in order to implement a VLAN on the network?
A. Proxy server
B. VPN
C. VNC
D. Switch
Answer: D
Section: (none)
QUESTION 76
Which of the following devices should be used to segment two networks?
A. Media converter
B. Hub
C. Bridge
D. Repeater
Answer: A
Section: (none)
QUESTION 77
CAT5e cable running to a network closet should always be
Answer: D
Section: (none)
QUESTION 78
Which of the following features of a network switch eliminates the need for cross-over cables?
A. 802.1x
B. Auto-MDIX
C. IGMP snooping
D. VLANs
Answer: B
Section: (none)
QUESTION 79
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone
service (POTS)?
Answer: B
Section: (none)
QUESTION 80
A user is having problems accessing the wireless network with a gaming device. Which of the following is
the MOST likely cause of the problem?
Answer: B
Section: (none)
QUESTION 81
A network engineer is logged onto a router and attempts to ping a host from the router. The first set of ping
packets has a 25% success rate. Several subsequent ping attempts all have a 100% success rate. Which
of the following describes the MOST likely reason?
Answer: C
Section: (none)
QUESTION 82
Which of the following LAN technologies has the GREATEST throughput speed?
A. 10BaseF
B. 10BaseTX
C. 10BaseFX
D. 10BaseT
Answer: A
Section: (none)
QUESTION 83
An administrator notices that collisions are repeatedly occurring on a hub. Which of the following would be
the BEST way to help reduce these collisions?
Answer: A
Section: (none)
QUESTION 84
Which of the following protocols is used to establish multicast groups?
A. OSPF
B. DHCP
C. RIP
D. IGMP
Answer: D
Section: (none)
QUESTION 85
Which of the following configuration management documents would an administrator use to configure a
new router's ACL for a new network?
Answer: D
Section: (none)
QUESTION 86
At which of the following layers of the OSI model does a router reside?
A. Layer 1
B. Layer 5
C. Layer 7
D. Layer 3
Answer: D
Section: (none)
QUESTION 87
Information gathering and diagnostics indicate that a worm has infected the local database server and its
clients, and is saturating local network with traffic. Which of the following is the NEXT step for a technician?
Answer: B
Section: (none)
QUESTION 88
Which of the following devices is MOST commonly used to create a DMZ?
A. Bastion host
B. Firewall
C. Honeypot
D. Repeater
Answer: B
Section: (none)
QUESTION 89
Which of the following is an example of a private IP address?
A. 11.0.0.8
B. 172.17.22.201
C. 192.165.107.29
D. 64.64.105.22
Answer: B
Section: (none)
QUESTION 90
Which of the following standards uses 5GHz frequency for network communications?
A. 802.11g
B. 802.11b
C. 802.3
D. 802.11a
Answer: D
Section: (none)
QUESTION 91
A port that can use 10/100/1000 speeds MOST commonly uses which of the following physical media?
A. Coax
B. Copper
C. Fiber
D. Wireless
Answer: B
Section: (none)
QUESTION 92
Which of the following is the MAXIMUM segment distance for 100BaseTX?
Answer: A
Section: (none)
QUESTION 93
A technician needs to extend the telephone company's original point of entry into the companies Telco
closet. Which of the following will need to be extended?
A. Smart Jack
B. 66 Block
C. 110 Block
D. Demarc
Answer: D
Section: (none)
QUESTION 94
Which of the following protocols functions at the transport layer of the OSI model?
A. RTP
B. SIP
C. UDP
D. TCP
Answer: CD
Section: (none)
QUESTION 95
Which of the following features of a switch allows all VLANs to pass through the same port?
A. Port mirroring
B. Trunking
C. PoE
D. Spanning tree
Answer: B
Section: (none)
QUESTION 96
Which of the following is the maximum number of available segments on a 10Base-T network?
A. 1,024
B. 2
C. 512
D. 1,256
Answer: B
Section: (none)
QUESTION 97
Which of the following would an administrator MOST likely use to forward inbound packets on port 80 to
port 8080 on a local server?
A. Repeater
B. Firewall
C. Packet shaper
D. Bridge
Answer: B
Section: (none)
QUESTION 98
Which of the following would allow an administrator to share Internet connectivity while only publishing one
public IP address?
A. VLAN
B. CIDR
C. NAT
D. DHCP
Answer: C
Section: (none)
QUESTION 99
For the BEST performance, wireless signals should use
A. overlapping channels.
B. non-overlapping channels.
C. redundant channels.
D. different encryption types.
Answer: B
Section: (none)
QUESTION 100
Given a typical 802.11 a/g/n wireless router, which of the following frequencies would the unit operate at, by
default? (Select TWO).
A. 2.4GHz
B. 900MHz
C. 2.1GHz
D. 5GHZ
E. 1.8GHz
Answer: AD
Section: (none)
QUESTION 101
Which of the following is the MOST important factor to ensure wireless connectivity?
Answer: C
Section: (none)
QUESTION 102
A user reports that their laptop does not have network connectivity, but was working fine last week. The
technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1
address. This address is not part of the company¡¯ s subnet. Which of the following MOST likely identifies
this address type?
A. Multicast
B. APIPA
C. Broadcast
D. DHCP
Answer: B
Section: (none)
Exam C
QUESTION 1
An administrator suspects an IP conflict on the local LAN. Which of the following is BEST used to
troubleshoot this problem?
A. hostname
B. ifconfig
C. traceroute
D. nslookup
Answer: B
Section: (none)
QUESTION 2
Which of the following WAN types uses a ring topology? (Select TWO)
A. E1fl~1
B. Frame relay
C. FDDI
D. ATM
E. SONET
Answer: CE
Section: (none)
QUESTION 3
An administrator has just completed installing a virtual proxy server. Which of the following documentation
needs to be updated?
A. Wiring schematic
B. Physical network diagram
C. Job log
D. Logical network diagram
Answer: D
Section: (none)
QUESTION 4
Which of the following cable types is primarily used only for POTS lines?
A. CAT5e
B. CAT3
C. CAT5
D. CAT6
Answer: B
Section: (none)
QUESTION 5
A long fiber optic segment has failed. A network technician suspects a broken cable. Which of the following
tools can be utilized to help determine where the cable break has occurred?
A. TDR
B. Toner probe
C. Multimeter
D. OTDR
Answer: D
Section: (none)
QUESTION 6
Which of the following switch features allows power and data from a single connection?
A. VLAN
B. Spanning tree
C. PoE
D. Trunking
Answer: C
Section: (none)
QUESTION 7
A network administrator needs to add an out-of-band IDS to monitor all traffic traversing the switch. Which
of the following features would need to be specifically configured in order to achieve this?
Answer: C
Section: (none)
QUESTION 8
Which of the following would be used to locate a cable that is in a bundle located in a distant
telecommunications closet?
A. Toner probe
B. Butt set
C. Voltage meter
D. Voltage event recorder
Answer: A
Section: (none)
QUESTION 9
Which of the following is the maximum distance for CAT5 cable?
A. 1058 feet (323 meters)
B. 328 feet (100 meters)
C. 100 feet (30.5 meters)
D. 50 feet (15.2 meters)
Answer: B
Section: (none)
QUESTION 10
Which of the following functions at layer one of the OSI model?
A. Repeater
B. Switch
C. DHCP
D. Load balancer
Answer: A
Section: (none)
QUESTION 11
Which of the following is the correct format for an IPv4 IP address?
A. xxxx.xxxx.xxxx
B. xx:xx:xx:xx:xx:xx
C. xx-xx-xx-xx-xx-xx
D. xxx.xxx.xxx.xxx
Answer: D
Section: (none)
QUESTION 12
When pinging the default gateway there is a 40% packet loss. Which of the following MOST likely explains
this situation?
Answer: C
Section: (none)
QUESTION 13
Refer to the attached Exhibit. According to the diagram, which of the following is the correct path for PC7 to
print a document?
Exhibit: image001.jpg
Answer: B
Section: (none)
QUESTION 14
An administrator is attempting to verify if a newly installed workstation is connected to the network. Which of
the following commands can be used to verify basic connectivity?
A. ping
B. hostname
C. route
D. dig
Answer: A
Section: (none)
QUESTION 15
Which of the following technologies has the same uplink and downlink speed standards?
A. SDSL
B. ADSL
C. OC12
D. OC3
Answer: ACD
Section: (none)
QUESTION 16
Multiple users on the same floor cannot access the network. Upon investigation, an administrator sees that
the switch has power and all of the active ports are blinking almost non-stop. Which of the following is
MOST likely causing this to occur?
A. DHCP snooping
B. Routing loop
C. Broadcast storm
D. Speed/duplex mismatch
Answer: C
Section: (none)
QUESTION 17
Which of the following protects individual computers from malicious software?
A. NIPS
B. Network based firewalls
C. Host based firewalls
D. HIDS
Answer: C
Section: (none)
QUESTION 18
Which of the following is an example of CIDR notation?
A. ::1
B. 10.10.10.0/30
C. 10.192.30.5:22
D. 255.255.255.0
Answer: B
Section: (none)
QUESTION 19
Which of the following is updated dynamically on all routers in an OSPF configured network, after a change
has occurred on the network?
A. Hop count
B. Access control list
C. Bandwidth availability
D. Routing table
Answer: D
Section: (none)
QUESTION 20
Which of the following cabling types should be used with 100BaseTX?
A. Coaxial
B. Fiber
C. Token ring
D. UTP
Answer: D
Section: (none)
QUESTION 21
Which of the following technologies has the LARGEST bandwidth capacity?
A. SDSL
B. ADSL
C. OC3
D. OC12
Answer: D
Section: (none)
QUESTION 22
Which of the following ports allows telnet traffic to be secure?
A. 25
B. 22
C. 23
D. 21
Answer: B
Section: (none)
QUESTION 23
A network engineer is creating a way to access several servers through the Internet.
Which of the following will accomplish this?
Answer: C
Section: (none)
QUESTION 24
A server has an IP address of 192.168.50.12 and a subnet mask of 255.255.255.0. A client on the same
network has an IP address of 192.168.50.112 and a subnet mask of 255.255.255.128. Which of the
following BEST describes the result when the client sends a ping to the server?
Answer: A
Section: (none)
QUESTION 25
Which of the following helps network traffic optimization by remembering where each computer is
connected?
A. Firewall
B. VLAN
C. Switch
D. Network analyzer
Answer: C
Section: (none)
QUESTION 26
An administrator suspects there is an issue on the network with DHCP, and wants to monitor the entire
request and response process for giving out leases. Which of the following tools should the administrator
use to BEST monitor these transactions?
Answer: C
Section: (none)
QUESTION 27
OSPF is an example of which of the following routing protocol types?
A. Link-state IGP
B. Distance-vector EGP
C. Link-state EGP
D. Distance-vector IGP
Answer: A
Section: (none)
QUESTION 28
Which of the following would be MOST important in achieving fault tolerance on a network that hosts a
distributed application?
Answer: A
Section: (none)
QUESTION 29
Which of the following LAN technologies has the SHORTEST maximum length for each cable run without
the use of a repeater?
A. 10GBaseT
B. 10GBaseLW
C. 10GBaseX
D. 10BaseT
Answer: D
Section: (none)
QUESTION 30
Which of the following network devices would MOST likely be installed to extend the wireless coverage
range in an office space and help strengthen the signal of the network?
A. Switch
B. Firewall
C. Repeater
D. Hub
Answer: C
Section: (none)
QUESTION 31
Which of the following components is used to terminate a T1 connection?
A. Smartjack
B. Patch panel
C. 66 block
D. 110 block
Answer: A
Section: (none)
QUESTION 32
As an added level of security a network administrator can configure which of the following on a firewall?
A. Port blocking
B. Port forwarding
C. Port mirroring
D. VPN pass-through
Answer: A
Section: (none)
QUESTION 33
Which of the following connector types is used to connect to a dial-up modem?
A. RJ-11
B. RJ-45
C. ST
D. BNC
Answer: A
Section: (none)
QUESTION 34
Which of the following protocols is used to transmit emails?
A. SNMP
B. POP3
C. SMTP
D. IMAP4
Answer: C
Section: (none)
QUESTION 35
Which of the following protocols is used by the ping command to troubleshoot problems between two
devices?
A. ARP
B. SIP
C. IMAP4
D. ICMP
Answer: D
Section: (none)
QUESTION 36
Which of the following devices contains an earpiece dialing interface and speaker, and is used to test local
loop telephony lines and connections?
A. Butt set
B. Protocol analyzer
C. Punch down tool
D. Toner probe
Answer: D
Section: (none)
QUESTION 37
Which of the following tools is used to find the MAC address of a workstation?
A. ipconfig
B. route
C. traceroute
D. netstat
Answer: A
Section: (none)
QUESTION 38
Which of the following technologies verifies that keys have not been tampered with and integrity is
maintained?
A. IPSec AH
B. TKIP
C. Pre-shared key
D. WEP
Answer: A
Section: (none)
QUESTION 39
Which of the following are commonly used FTP ports? (Select TWO).
A. 22
B. 23
C. 20
D. 21
E. 25
Answer: CD
Section: (none)
QUESTION 40
The address 0:0:0:0:0:0:0:1 is also known as the
Answer: C
Section: (none)
QUESTION 41
Which of the following technologies allows a company to install IP cameras and IP phones without having to
connect them to a separate power source?
A. STP
B. VTP
C. QoS
D. PoE
Answer: D
Section: (none)
QUESTION 42
Which of the following tools can be used to test if a new DNS server is resolving addresses correctly?
A. nbtstat
B. netstat
C. traceroute
D. nslookup
Answer: D
Section: (none)
QUESTION 43
Which of the following can be configured to logically group ports into different subnets on a switch?
A. VTP
B. VLAN
C. VTY
D. VPN
Answer: B
Section: (none)
QUESTION 44
When no specific route to a destination exists, a router will fallback to its
A. BGP peer.
B. default gateway.
C. source host.
D. shortest path.
Answer: B
Section: (none)
QUESTION 45
A loopback plug is useful for which of the following?
A. NIC diagnostics
B. Toning
C. Throughput testing
D. Punchdown blocks
Answer: A
Section: (none)
QUESTION 46
A company has recently deployed 100 servers to provide online financial transactions. Which of the
following technologies is a technician MOST likely to deploy to ensure that each server is processing no
more than 1000 Internet requests every second and that each request has an average processing time of
five seconds?
A. Load balancer
B. Bandwidth shaper
C. Proxy server
D. Multilayer switch
Answer: A
Section: (none)
QUESTION 47
Which of the following is a secure method for administering a network device?
A. FTP
B. TFTP
C. SIP
D. SNMPv3
Answer: D
Section: (none)
QUESTION 48
Which of the following is the MOST accurate description of spanning tree protocol?
A. Protocol that detects routing loops and then adjusts priorities accordingly
B. Algorithm to span the switch ports in order to create a tree-based hierarchical layout
C. Algorithm that detects cabling loops and then disables an affected port to remove loops
D. Port spanning technique used to provide network fault tolerance
Answer: C
Section: (none)
QUESTION 49
Which of the following terms describes the process of routers accepting the same routing topology in their
route tables?
A. Resemblance
B. Convergence
C. Consolidation
D. Aggregation
Answer: B
Section: (none)
QUESTION 50
An administrator has added four switches to a campus network. Each switch is connected to all other
switches. Which of the following topologies is represented in this design?
A. Star
B. Mesh
C. Ring
D. Bus
Answer: B
Section: (none)
QUESTION 51
Which of the following authenticates a person by a particular key pair?
A. EAP
B. PKI
C. RADIUS
D. CHAP
Answer: B
Section: (none)
QUESTION 52
Which of the following is MOST likely to affect IP based surveillance systems?
A. Social engineering
B. Mantrap
C. Man-in-the-middle
D. Vishing
Answer: C
Section: (none)
QUESTION 53
Using 802.1x on a switch accomplishes which of the following?
A. Port trunking
B. Port mirroring
C. Port spanning
D. Port authentication
Answer: D
Section: (none)
QUESTION 54
Which of the following terms BEST describes the time required for routers to exchange new routes and
update their routing tables with information from other network routers?
A. Propagation
B. Convergence
C. Crosstalk
D. Attenuation
Answer: B
Section: (none)
QUESTION 55
A company's internal email system is an example of which of the following logical network topologies?
A. WAN
B. VLAN
C. Peer to Peer
D. Client/server
Answer: D
Section: (none)
QUESTION 56
An administrator installs a new web server and wishes to restrict traffic to it. However, the administrator
would like to keep the web server less restricted than the internal network. In which of the following firewall
zones would the administrator place the web server?
A. Demilitarized
B. Internal
C. Trusted
D. Internet
Answer: A
Section: (none)
QUESTION 57
In which of the following components will POTS lines MOST likely be terminated?
A. Hub
B. Switch
C. Patch panel
D. 110 block
Answer: D
Section: (none)
QUESTION 58
An administrator believes a workstation is not able to access resources because the wrong DNS server is
configured on the workstation. Which of the following commands would MOST likely be used to determine
the current configured DNS server?
A. ipconfig
B. arp
C. ping
D. traceroute
Answer: A
Section: (none)
QUESTION 59
Which of the following BEST describes a late collision?
A. It does not have as much affect on the network as does a regular collision
B. It occurs when the speeds are mismatched.
C. It occurs after the first 64 bytes of the frame are transmitted.
D. It can only occur after a regular collision has occurred.
Answer: C
Section: (none)
QUESTION 60
A user transferring files via FTP discovers that the username and password has been compromised. Which
of the following may have been used to intercept the login credentials?
A. SNMPv2
B. A network sniffer
C. A telnet session
D. Secure FTP
Answer: B
Section: (none)
QUESTION 61
While installing a WAP a technician sees an option labeled 'SSID broadcast'. Which of the following would
be the result of disabling that feature?
Answer: B
Section: (none)
QUESTION 62
Which of the following Internet connections is traditionally carried over an existing coax backbone?
A. ADSL
B. Fiber
C. Cable
D. SDSL
Answer: C
Section: (none)
QUESTION 63
An administrator wants to connect a laptop directly to a printer's network port. Which of the following cable
types should the administrator use to guarantee communication with the printer?
A. Serial cable
B. Cross-over cable
C. Rollover cable
D. Straight-through cable
Answer: B
Section: (none)
QUESTION 64
Which of the following network services replies to requests to port 67?
A. DNS
B. DHCP
C. SNMP
D. IMAP
Answer: B
Section: (none)
QUESTION 65
An administrator is planning a new wireless network by using only channels 1, 6, and 11.
This is to minimize which of the following?
A. Attenuation
B. Interference
C. Reflection
D. Broadcast storms
Answer: B
Section: (none)
QUESTION 66
A digital phone line will MOST likely have which of the following connectors?
A. BNC
B. RJ-11
C. DB-25
D. DB-9
Answer: B
Section: (none)
QUESTION 67
Which of the following tools allows an administrator to verify the network configuration of a system?
A. route
B. ifconfig
C. traceroute
D. ping
Answer: B
Section: (none)
QUESTION 68
According to best practices, which of the following would be used to get a dial-tone off a 66 block?
A. Vampire tap
B. Two pair tri-star connector
C. Butt set
D. Four pair tri-star connector
Answer: C
Section: (none)
QUESTION 69
Which of the following is the default NTP port?
A. 161
B. 143
C. 110
D. 123
Answer: D
Section: (none)
QUESTION 70
A user submits an online transaction to purchase 10 items. The following day, the same user notices that
the transaction receipt shows 100 items being purchased instead of 10.
Which of the following MOST likely occurred?
A. Man-in-the-middle attack
B. DoS attack
C. Botnet attack
D. DDoS attack
Answer: A
Section: (none)
QUESTION 71
Which of the following tools would an administrator use to terminate cabling to a 110 block?
A. Certifier
B. Cable crimper
C. Punch down
D. Toner probe
Answer: C
Section: (none)
QUESTION 72
Which of the following would be used to identify the hot zone in a server room?
A. Cable stripper
B. Temperature monitor
C. OTDR
D. Voltage event monitor
Answer: B
Section: (none)
QUESTION 73
The IP address block 172.31.146.128/25 represents which of the following?
A. Classful address
B. Public address
C. Private address
D. APIPA address
Answer: C
Section: (none)
QUESTION 74
Which of the following network topologies is used within a token based network?
A. Point to Multipoint
B. Mesh
C. Ring
D. Point to Point
Answer: C
Section: (none)
QUESTION 75
An administrator is unsure of how to turn off spanning tree protocol on a switch. Which of the following
documents should the administrator consult to determine the proper settings?
A. Wiring schematic
B. Event logs
C. Logical network diagram
D. Product manual
Answer: C
Section: (none)
QUESTION 76
A laptop cannot connect to a wireless network. The laptop is configured to use WPA2 with PSK and TKIP.
An administrator determines the laptop should be set to use AES.
This is an example of which of the following?
QUESTION 77
Computers on a small network recently started receiving APIPA addresses for their NICs. Which of the
following is MOST likely the cause of such a scenario?
Answer: B
Section: (none)
QUESTION 78
Which of the following will MOST likely occur when a technician uses a CAT5 UTP cable longer than the
maximum length per segment?
A. Duplex mismatch
B. Speed mismatch
C. Attenuation
D. Load balancing
Answer: C
Section: (none)
QUESTION 79
Which of the following cable types has immunity from EMI?
A. STP
B. Plenum
C. Fiber
D. UTP
Answer: C
Section: (none)
QUESTION 80
Which of the following Internet connection types uses a POTS line?
A. Cable
B. Dial-up
C. Fiber
D. Satellite
Answer: B
Section: (none)
QUESTION 81
Which of the following WAN technologies uses 53 byte fixed-length cells?
A. Frame relay
B. FDDI
C. ATM
D. SONET
Answer: C
Section: (none)
QUESTION 82
Which of the following network monitoring tools would be used to easily identify the maximum available
bandwidth on a network?
A. Protocol analyzers
B. Port scanners
C. Throughput testers
D. History logs
Answer: C
Section: (none)
QUESTION 83
Which of the following connector types is used to make a CAT5e patch cable?
A. RJ-45
B. SC
C. ST
D. DB-9
Answer: A
Section: (none)
QUESTION 84
The presence of a trusted third party is essential to which of the following authentication methods?
Answer: A
Section: (none)
QUESTION 85
Which of the following provides encrypted KVM console access to remote computers?
A. RAS
B. PPP
C. RDP
D. VPN
Answer: C
Section: (none)
QUESTION 86
Which of the following MOST likely needs to be implemented to provide central authentication for network
equipment?
A. SSH
B. PKI
C. RADIUS
D. SSL VPN
Answer: C
Section: (none)
QUESTION 87
Which of the following wireless standards has a MAXIMUM throughput, by default, of 54Mbps and operates
at the 5GHz range?
A. 802.11b
B. 802.11n
C. 802.11g
D. 802.11a
Answer: D
Section: (none)
QUESTION 88
Which of the following should be modified after a new network device is added to the network?
Answer: C
Section: (none)
QUESTION 89
Which of the following LAN technologies has a length segmentation limit of 2 kilometers (1.2 miles)?
A. 1000BaseT
B. 100BaseFX
C. 10BaseF
D. 100BaseTX
Answer: C
Section: (none)
QUESTION 90
When working on a router problem, the technician learns that this problem has been reoccurring. Which of
the following should the technician consult to identify the past technicians that worked on the problem?
A. Network policy
B. ACL
C. Baseline configuration
D. Job logs
Answer: D
Section: (none)
QUESTION 91
A network CAT6 cable of 600 feet (183 meters) needs to be installed. Which of the following devices can be
installed at the halfway point to help ensure cabling speeds are not reduced?
A. Modem
B. Repeater
C. Media converter
D. Router
Answer: B
Section: (none)
QUESTION 92
A user is reporting that their Internet connection is intermittent. Upon further investigation, an administrator
verifies that the cause is not a physical connection issue with the cable. Which of the following issues is
MOST likely the cause?
Answer: A
Section: (none)
QUESTION 93
Which of the following ports are associated with email protocols by default? (Select TWO).
A. 123
B. 22
C. 25
D. 110
E. 161
Answer: CD
Section: (none)
QUESTION 94
An administrator is at a client's site to figure out an intermittent network problem. The technician has
already asked if anything has changed on the network. Which of the following is the NEXT step in the
troubleshooting methodology?
Answer: B
Section: (none)
QUESTION 95
Which of the following will separate broadcast domains by default?
A. Layer 2 switch
B. Repeater
C. Router
D. Hub
Answer: C
Section: (none)
QUESTION 96
Which of the following is a method of connecting devices wirelessly?
A. PPP
B. Bluetooth
C. RDP
D. VNC
Answer: B
Section: (none)
QUESTION 97
Which of the following is the correct number of pins in a RJ-11 connector?
A. 4
B. 3
C. 6
D. 8
Answer: A
Section: (none)
QUESTION 98
An L2 switch has two VLANs. The first computer connects to the switch on VLAN 5, and the second
computer connects to the switch on VLAN 10. Which of the following devices is needed to allow the first
and second computer to communicate?
Answer: B
Section: (none)
QUESTION 99
Which of the following is true about an IP address if the first two bits are both one and the third bit is a zero?
Answer: B
Section: (none)
QUESTION 100
Which of the following BEST describes a beacon in a wireless network?
Answer: D
Section: (none)
QUESTION 101
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this?
A. Port mirroring
B. Spanning tree
C. PoE
D. VLAN
Answer: D
Section: (none)
QUESTION 102
Which of the following technologies is the MOST cost-effective when protecting a large number of
networked workstations from external attacks?
Answer: D
Section: (none)
Exam D
QUESTION 1
Which of the following is the DOS command to find out the IP address of a host device?
A. netstat
B. ipconfig
C. ifconfig
D. tracrt
Answer: B
Section: (none)
QUESTION 2
Which of the following is intended to be used over existing SONET equipment?
A. 10GBaseLR
B. 10GBaseEW
C. 10GBaseER
D. 1000BaseT
Answer: B
Section: (none)
QUESTION 3
Which of the following commands is MOST likely to allow an administrator to update a router configuration
without being prompted for user credentials? (Select TWO).
A. RCP
B. SSH
C. SCP
D. HTTPS
E. TFTP
Answer: AE
Section: (none)
QUESTION 4
The MAIN difference between a MAC and an IP ACL is
Answer: A
Section: (none)
QUESTION 5
Which of the following protocols is used during boot-up of diskless hosts?
A. TFTP
B. IGMP
C. SNMP
D. TLS
Answer: A
Section: (none)
QUESTION 6
The IP address 10.4.5.12 is on the same subnet as 10.4.7.192. Which of the following is MOST likely the
network address and subnet mask?
A. 10.4.5.0/25
B. 10.4.7.0/32
C. 10.4.4.0/22
D. 10.4.5.0/23
Answer: C
Section: (none)
QUESTION 7
A host on subnet 10.1.1.0/24 is sending packets with a source address of 169.254.0.100. Which of the
following is the MOST likely explanation?
Answer: C
Section: (none)
QUESTION 8
Which of the following protocols is commonly associated with VoIP?
A. POP3
B. NTP
C. SIP
D. IGMP
Answer: C
Section: (none)
QUESTION 9
Which of the following connection types are typically found in SOHO networks? (Select TWO)
A. ATM
B. ADSL
C. Frame relay
D. T3
E. Cable modem
Answer: BE
Section: (none)
QUESTION 10
In which of the following would a technician need to use a punch down tool in order to end a cable?
Answer: B
Section: (none)
QUESTION 11
The technician needs to add a third device to an existing /30 network. Which of the following explains how
this can be achieved?
Answer: A
Section: (none)
QUESTION 12
Which of the following uses 802.1 q?
A. 802.1x
B. Port mirroring
C. VLAN
D. QoS
Answer: C
Section: (none)
QUESTION 13
Which of the following logical network topologies would a technician MOST likely find in a person's home?
A. WAN
B. Domain
C. P2P
D. Client/server
Answer: C
Section: (none)
QUESTION 14
Which of the following can be used to block a guest's laptop access to DHCP services?
Answer: C
Section: (none)
QUESTION 15
An administrator needs to extend the wireless coverage inside of the company's office space. Which of the
following devices would MOST likely be installed to allow this extension?
A. Repeater
B. Firewall
C. Switch
D. Router
Answer: A
Section: (none)
QUESTION 16
An individual wearing an A/C technician uniform asks to enter the data center to service the air conditioning
unit. When asked for identification, the individual quickly leaves.
Which of the following was avoided?
A. Identity fraud
B. Social engineering
C. Social media
D. Phishing
Answer: B
Section: (none)
QUESTION 17
A network technician has discovered from a bandwidth monitoring tool that nearly 100% of a serial WAN
link is being utilized. Which of the following would the technician MOST likely use in determining the type of
traffic that is causing the excess traffic on the WAN link?
A. Throughput tester
B. Load tester
C. TFTP
D. Packet sniffer
Answer: D
Section: (none)
QUESTION 18
Which of the following WAN protocols uses fiber-optic media?
A. SONET
B. Frame Relay
C. ISDN
D. POTS
Answer: A
Section: (none)
QUESTION 19
Which of the following is used to convert a FQDN to an IP address?
Answer: C
Section: (none)
QUESTION 20
Which of the following tools is used to create a patch cable?
A. Toner probe
B. Cable tester
C. RJ-45 crimper
D. Punch down tool
Answer: C
Section: (none)
QUESTION 21
Which of the following wireless connections has the SHORTEST maximum operating distance?
A. 802.11g
B. Bluetooth
C. 802.11b
D. 802.11a
Answer: B
Section: (none)
QUESTION 22
A technician replaces a hub with a network switch. Multiple users notice that traffic congestion has lessened
substantially. Which of the following was MOST likely causing the network congestion?
A. Crosstalk
B. Attenuation
C. Signal bleed
D. Collisions
Answer: D
Section: (none)
QUESTION 23
Which of the following commands is useful to find out the nodes that are active on an Ethernet segment?
A. ARP
B. NSLOOKUP
C. VMSTAT
D. TRACEROUTE
Answer: A
Section: (none)
QUESTION 24
Which of the following provides the GREATEST level of protection against someone attempting to capture
a router password traversing the network?
A. SCP
B. AH
C. ACL
D. SSH
Answer: D
Section: (none)
QUESTION 25
Which of the following encryption protocols is MOST secure when installing a wireless access point?
A. AES
B. MD5
C. WEP
D. WPA2
Answer: D
Section: (none)
QUESTION 26
An administrator can ping a server, but is unable to SSH to it. Which of the following is the MOST likely
cause of this?
A. The default gateway on the server is incorrect.
B. An IDS device prevents SSH connections.
C. The subnet mask on the client is incorrect.
D. A host-based firewall prevents SSH connections.
Answer: D
Section: (none)
QUESTION 27
An administrator discovers that a compromised system on the network is injecting incorrect routes in an
attempt to intercept network traffic. Which of the following protocols is MOST likely being used?
A. BGP
B. RIP
C. EIGRP
D. OSPF
Answer: A
Section: (none)
QUESTION 28
CAT5, CAT5e, and CAT6 cabling all consist of:
Answer: B
Section: (none)
QUESTION 29
Which of the following is MOST likely used to identify broadcast storms?
A. Cable tester
B. Voltage event recorder
C. Port scanner
D. Protocol analyzer
Answer: D
Section: (none)
QUESTION 30
Which of the following technologies is used on the backbone of an ISDN?
A. VDSL
B. ATM
C. SDSL
D. OC3
Answer: B
Section: (none)
QUESTION 31
A network administrator is documenting all devices on the network. This type of documentation is known
as which of the following?
A. Network guidelines
B. Network procedures
C. Network baseline
D. Network diagram
Answer: D
Section: (none)
QUESTION 32
Which of the following can allow or deny network access based on a physical hardware address?
A. IP filtering
B. IDS
C. MAC filtering
D. IPS
Answer: C
Section: (none)
QUESTION 33
Which of the following networks are reserved for private IP addresses?
A. 172.16.128.0/15
B. 162.17.0.0/12
C. 168.129.0.0/24
D. 192.168.0.0/16
Answer: D
Section: (none)
QUESTION 34
Which of the following is the MOST accurate description of a L2/L3 switch?
Answer: D
Section: (none)
QUESTION 35
An Ethernet hub and an Ethernet switch both operate at which of the following layers of the OSI model?
A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 7
Answer: C
Section: (none)
QUESTION 36
A newly created patch cable is not working. The technical notices that the cable has two wires that are
crossed, which of the following connectivity issues is occurring?
A. Collision
B. Attenuation
C. Open pairs
D. A short
Answer: D
Section: (none)
QUESTION 37
Which of the following cables would be used with a RJ-45 connector?
A. UTP
B. Serial
C. Coaxial
D. Fiber
Answer: A
Section: (none)
QUESTION 38
Which of the following is a device that sits inline on the network and stops network attacks in real-time?
A. PKI
B. IDS
C. VPN
D. IPS
Answer: D
Section: (none)
QUESTION 39
Which of the following features will allow for redundancy of a data port?
A. Aggregation
B. PoE
C. VLAN
D. Spanning tree
Answer: A
Section: (none)
QUESTION 40
Users are reporting that they are still experiencing network issues even though a fix was recently applied.
Which of the following troubleshooting methodology steps is the administrator using?
Answer: C
Section: (none)
QUESTION 41
Which of the following would contain information regarding network device alerts using SNMP?
A. Audit log
B. Syslog
C. Ping sweep reports
D. History log
Answer: B
Section: (none)
QUESTION 42
Which of the following devices enables a router to communicate with a T1 line?
A. IPS
B. Layer 3 switch
C. CSU/DSU
D. Firewall
Answer: C
Section: (none)
QUESTION 43
Which of the following mitigation techniques is the MOST effective to defend against social engineering?
A. Antivirus scanner
B. User training
C. Patch management solution
D. Security and network policy revision
Answer: B
Section: (none)
QUESTION 44
The primary purpose of an IPS is which of the following?
Answer: A
Section: (none)
QUESTION 45
Which of the following protocols provides secure communication over the Internet?
A. RSH
B. SNMP
C. VNC
D. SSH
Answer: D
Section: (none)
QUESTION 46
Which of the following is the MOST likely authentication scheme used in 802.1x?
A. RADIUS
B. CHAP
C. Kerberos
D. TACACS+
Answer: A
Section: (none)
QUESTION 47
Which of the following connectors is used to terminate fiber?
A. ST
B. RJ-45
C. RJ-11
D. BNC
Answer: A
Section: (none)
QUESTION 48
Which of the following cable types has a MAXIMUM transmission rate of 1Gbps?
A. Fiber
B. Serial
C. CAT7
D. CAT5e
Answer: D
Section: (none)
QUESTION 49
Which of the following is a secure method of remote access via command line?
A. Telnet
B. RSH
C. SSH
D. RCP
Answer: C
Section: (none)
QUESTION 50
A user in the accounting department reports that their office is able to connect to the network, but they are
unable to connect to the Internet. Which of the following documentation would be the MOST useful to the
administrator in diagnosing this issue? (Select TWO).
Answer: AE
Section: (none)
QUESTION 51
Which of the following describes 1Gigabit Ethernet?
A. 10Base2
B. 10GBaseER
C. 100Base5
D. 1000BaseT
Answer: D
Section: (none)
QUESTION 52
Which of the following software security devices can be implemented on individual servers in order to solely
identify abnormal behavior?
A. DNS
B. HIDS
C. HIPS
D. Network-based firewall
Answer: B
Section: (none)
QUESTION 53
When installing two 802.11g access points in the same building, which of the following channels will MOST
likely be used to minimize interference?
A. 5 and 6
B. 1and 6
C. 6 and 10
D. 2 and 6
Answer: B
Section: (none)
QUESTION 54
The ¡°1000¡± in 1000BaseT cabling represents which of the following?
Answer: C
Section: (none)
QUESTION 55
Which of the following can be configured on a WAP to authenticate users and place them onto the right
VLAN?
A. Trunking
B. 802.1q
C. 802.1x
D. AAA
Answer: C
Section: (none)
QUESTION 56
Which of the following would be used to determine if near end crosstalk occurs?
A. Cable tester
B. Toner probe
C. Protocol analyzer
D. Multimeter
Answer: A
Section: (none)
QUESTION 57
An administrator needs to diagnose problems with a WINS server. Which of the following tools should be
used?
A. nslookup
B. netstat
C. nbtstat
D. dig
Answer: C
Section: (none)
QUESTION 58
Which of the following encryption technologies would be the WEAKEST method to use when securing a
new SOHO wireless network?
A. WEP64
B. WPA
C. WEP128
D. WPA2
Answer: A
Section: (none)
QUESTION 59
Which of the following is true about an IP address if the first three bits are all one and the fourth bit is a
zero?
Answer: A
Section: (none)
QUESTION 60
Which of the following statements is TRUE regarding static routing tables?
Answer: A
Section: (none)
QUESTION 61
Which of the following would be used when designing a climate controlled room?
Answer: B
Section: (none)
QUESTION 62
Which of the following is the MAIN disadvantage of using the spanning tree protocol?
Answer: B
Section: (none)
QUESTION 63
A technician needs to manage a switch by using the management port on the back of the switch. Which of
the following cables would the technician use?
A. Loopback
B. Straight
C. Console
D. Crossover
Answer: C
Section: (none)
QUESTION 64
Users are reporting problems connecting to servers in the remote company.com domain. The administrator
suspects this to be a DNS problem. Which of the following commands would the administrator run to
identify the DNS server of the remote company.com?
A. dig company.com mx
B. ifconfig -a
C. dig company.com ns
D. ipconfig /all
Answer: C
Section: (none)
QUESTION 65
A user reports that the entire corporate network is down. Which of the following should the technician do
FIRST?
Answer: A
Section: (none)
QUESTION 66
Which of the following statements is the MOST accurate description of PoE?
Answer: B
Section: (none)
QUESTION 67
A technician would like to separate the HR department¡¯ s workstations from the other workstations at the
company. Which of the following network topologies should be used?
A. VPN
B. VLAN
C. Subnetting
D. Peer to peer
Answer: B
Section: (none)
QUESTION 68
Using network monitoring tools would allow an administrator to do which of the following?
Answer: B
Section: (none)
QUESTION 69
A NIC capable of utilizing ¡°auto-sense¡± for a given connection is actually configuring which settings
dynamically on its own? (Select TWO).
A. Link latency
B. Cable type
C. MAC address
D. Link speed
E. Link duplex
Answer: DE
Section: (none)
QUESTION 70
Which of the following protocols can lead to user credential disclosure when a network analyzer is used?
(Select TWO).
A. TFTP
B. SNMPv3
C. Telnet
D. RSH
E. FTP
Answer: CE
Section: (none)
QUESTION 71
VoIP and data traffic are carried on different subnets in an enterprise. Which of the following techniques
can be used to provide both services to hosts on the same UTP cable?
Answer: B
Section: (none)
QUESTION 72
An administrator would like to troubleshoot email issues and verify that the mail service on server1.
comptiA.org is available and accepting mail. Which of the following commands would BEST accomplish
this?
A. dig @server1.comptiA.org -t MX
B. telnet server1.comptiA.org 25
C. ping -l 110 server1.comptiA.org -t
D. nmap server1.comptiA.org -p0
Answer: B
Section: (none)
QUESTION 73
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
A. 100BaseFX
B. 10GBaseSW
C. 1000BaseT
D. 100BaseTX
Answer: B
Section: (none)
QUESTION 74
An administrator has just completed creating a new subnet. Users on the new subnet are unable to access
the network. Which documentation will BEST provide information to help identify the issue?
Answer: A
Section: (none)
QUESTION 75
A wireless access point needs to be installed in a conference room for presentations. The access point
comes with an omni-directional antennA. Where is the BEST location for this access point so that it
provides full room wireless coverage?
Answer: A
Section: (none)
QUESTION 76
In order for computers with private IP addresses to access the public Internet, which of the following must
the router perform?
A. DHCP
B. APIPA
C. BGP
D. NAT
Answer: D
Section: (none)
QUESTION 77
In order for two machines on different VLANs to communicate with one another, which of the following must
be properly set?
A. Load balancing
B. Subnet mask
C. DNS
D. Default gateway
Answer: D
Section: (none)
QUESTION 78
At which of the following OSI layers does the ARP protocol operate?
A. Layer 7
B. Layer 3
C. Layer 2
D. Layer 1
Answer: C
Section: (none)
QUESTION 79
Which of the following devices separates a LAN segment into two collision domains, without affecting the
broadcast domain?
A. Firewall
B. Bridge
C. Repeater
D. Router
Answer: B
Section: (none)
QUESTION 80
Which of the of the following network protocols assigns a device¡¯ s IP address?
A. SMTP
B. TFTP
C. HTTPS
D. DHCP
Answer: D
Section: (none)
QUESTION 81
A company finished deploying an 802.11g wireless mesh. The administrator receives a call from a user who
is unable to connect to the company wireless, though all network configurations are centrally managed.
Which of the following is MOST likely causing the connection problem?
Answer: B
Section: (none)
QUESTION 82
Which of the following is the MOST appropriate tool for detecting the enabled network services in the
default install of an operating system?
Answer: C
Section: (none)
QUESTION 83
An administrator needs to authenticate users to the network, authorize network activities, and account for
activities done. Which of the following are services that will BEST meet these goals? (Select TWO).
A. Kerberos
B. TACACS+
C. 802.1x
D. RADIUS
E. RRAS
Answer: BD
Section: (none)
QUESTION 84
Which of the following network services can be used to provide wireless network authentication?
A. DHCP
B. RADIUS
C. TACACS
D. DNS
Answer: B
Section: (none)
QUESTION 85
Which of the following is the purpose of QoS?
A. Load balance traffic across multiple LAN and WAN links.
B. Classify, mark, and prioritize traffic on WAN and LAN links.
C. Guarantee traffic delivery.
D. Increase speed of network traffic.
Answer: B
Section: (none)
QUESTION 86
Which of the following BEST describes ISDN?
Answer: C
Section: (none)
QUESTION 87
A user¡¯ s web browser begins displaying SSL certificate mismatch warnings. Which of the following
attacks may be occurring?
Answer: A
Section: (none)
QUESTION 88
Which of the following monitors a server to see which protocols might be in use?
A. Ping sweep
B. Wireless packet sniffer
C. Port scanner
D. Intrusion detection software
Answer: C
Section: (none)
QUESTION 89
Which of the following network protocols can be used to keep the network device clocks synchronized?
A. RTP
B. SMTP
C. NTP
D. SNMP
Answer: C
Section: (none)
QUESTION 90
An administrator needs to test connectivity to a particular website without launching a browser session.
Which of the following commands would MOST likely be used to test this connection?
A. ipconfig
B. ping
C. traceroute
D. nslookup
Answer: B
Section: (none)
QUESTION 91
Which of the following devices can be affected by a microwave?
A. 110 block
B. Router
C. Wireless repeater
D. Firewall
Answer: C
Section: (none)
QUESTION 92
Which of the following capabilities is essential in a firewall when securing VoIP traffic between remote
hosts?
Answer: B
Section: (none)
QUESTION 93
A user receives an email that asks for a username and password and appears to be from a bank. Which of
the following attacks may be occurring?
Answer: B
Section: (none)
QUESTION 94
Frames are found within which of the following layers of the OSI model?
A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 5
Answer: C
Section: (none)
QUESTION 95
A workstation has an IP address of 169.254.128.1. Which of the following IP address types is this?
Answer: D
Section: (none)
QUESTION 96
An administrator wants to be alerted when a network-based attack is underway, but the company policy
prohibits blocking or dropping network connections. Which of the following MUST be deployed?
A. Firewall
B. IPS
C. Managed PKI
D. IDS
Answer: D
Section: (none)
QUESTION 97
Which of the following devices is MOST likely to have a bridge built-in?
A. NIC
B. Media converter
C. Hub
D. WAP
Answer: D
Section: (none)
QUESTION 98
Which of the following would help a new administrator quickly determine if a network had a DMZ for its
publicly accessible servers?
A. Wiring schematics
B. Baselines
C. Regulations
D. Logical network diagrams
Answer: D
Section: (none)
QUESTION 99
Which of the following port combinations need to be opened over a firewall for Internet browsing?
A. 80 and 443
B. 443 and 143
C. 80 and 110
D. 80 and 25
Answer: A
Section: (none)
QUESTION 100
Which of the following protocols can be found at the application layer?
A. Telnet
B. UDP
C. TCP
D. SNMP
Answer: A
Section: (none)
Exam E
QUESTION 1
Which of the following devices will allow a technician to measure the amount of data that is capable of
traversing the network?
A. Throughput tester
B. Event logs
C. Packet sniffers
D. OTDR
Answer: A
Section: (none)
QUESTION 2
Which of the following is a common type of copper-based Ethernet?
A. 1000BaseFX
B. 100BaseFX
C. 1000BaseSX
D. 1000BaseT
Answer: D
Section: (none)
QUESTION 3
Which of the following features is essential in a firewall if it is to support RTP sessions?
A. Remote console
B. Zones
C. Statefulness
D. Address translation
Answer: C
Section: (none)
QUESTION 4
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following
connectivity issues did the technician discover?
A. Attenuation
B. Open pairs
C. Interference
D. Crosstalk
Answer: B
Section: (none)
QUESTION 5
Which of the following is the MOST common collision detection technique used by an Ethernet switch?
A. CSMA/CA
B. 802.11a RTS
C. Bonding
D. CSMA/CD
Answer: D
Section: (none)
QUESTION 6
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet
without a member of the IT staff configuring the machine first. Which of the following would MOST likely be
installed?
A. IDS
B. CSU
C. Proxy server
D. Multilayer switch
Answer: C
Section: (none)
QUESTION 7
Which of the following is MOST likely used to transfer files to a web server?
A. FTP
B. DNS
C. POP3
D. IMAP4
Answer: A
Section: (none)
QUESTION 8
A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the
following actions should the technician do FIRST?
Answer: A
Section: (none)
QUESTION 9
Which of the following ports will allow a technician to transfer configuration data to a network switch?
A. 3359
B. 110
C. 389
D. 69
Answer: D
Section: (none)
QUESTION 10
Which of the following threats is MOST likely to result in a service disruption for all customers accessing
www.company.com?
A. DoS
B. Port scan
C. War driving
D. Blue snarfing
Answer: A
Section: (none)
QUESTION 11
Which of the following technologies transfers data over an analog signal?
A. ADSL
B. ISDN
C. POTS
D. DOCSIS
Answer: C
Section: (none)
QUESTION 12
Which of the following connector types is commonly identified by two rows of pins with four in one row and
five in the other?
A. SC
B. DB-9
C. RJ-45
D. BNC
Answer: B
Section: (none)
QUESTION 13
Which of the following cables would a technician use to connect two switches together?
A. Crossover
B. 568B
C. Loopback
D. 568A
Answer: A
Section: (none)
QUESTION 14
Which of the following describes the location where an administrator would terminate a bundle of CAT5e
cables?
A. Smart jack
B. Patch panel
C. Switch
D. Router
Answer: B
Section: (none)
QUESTION 15
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a technician
do NEXT?
Answer: B
Section: (none)
QUESTION 16
When PKI is used for mutual authentication:
A. the public key is installed on the client and the private key on the server.
B. both the private and the public key are installed on the server.
C. the private key is installed on the client and the public key on the server.
D. both the private and the public key are installed on the client.
Answer: C
Section: (none)
QUESTION 17
Which of the following topologies is the MOST fault tolerant?
A. Mesh
B. Bus
C. Star
D. Ring
Answer: A
Section: (none)
QUESTION 18
Which of the following is a correct IP ACL? (Select TWO).
A. DROP 00-12-34-56-78-9A
B. PERMIT 192.168.1.100 80
C. PERMIT 192.268.20.1
D. DENY ANY ANY
E. DENY 0:::0:::0:::3
Answer: BD
Section: (none)
QUESTION 19
Which of the following would be used to capture data moving across the network?
A. Throughput tester
B. Spanning tree
C. Packet sniffer
D. Load balancer
Answer: C
Section: (none)
QUESTION 20
: 370Which of the following network devices is used to segment multiple networks?
A. Modem
B. Hub
C. Router
D. Layer 2 switch
Answer: C
Section: (none)
QUESTION 21
A technician needs to ensure that the IP of the DHCP enabled workstation will never change. Which of the
following can be implemented on the DHCP server to accomplish this requirement?
A. Reservation
B. Request
C. Option
D. Offer
Answer: A
Section: (none)
QUESTION 22
Which of the following is a dynamic routing protocol?
A. CIDR
B. SNAT
C. OSPF
D. SCTP
Answer: C
Section: (none)
QUESTION 23
Users in a conference room report issues controlling the multimedia equipment in the conference room via
the wireless panel. The projector and audio in the room also are sporadically turning on and off. Which of
the following is the MOST likely cause of this issue?
A. Frequency
B. Encryption
C. Interference
D. Channel
Answer: C
Section: (none)
QUESTION 24
Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
A. RIP
B. BGP
C. OSPF
D. IS-IS
Answer: A
Section: (none)
QUESTION 25
Two autonomous networks who wish to exchange routing data should use which of the following protocols?
A. EIGRP
B. OSPF
C. IS-IS
D. BGP
Answer: D
Section: (none)
QUESTION 26
Delaying low-priority packets is a common technique for achieving which of the following?
A. QoS
B. Fault tolerance
C. Load balancing
D. Dynamic routing
Answer: A
Section: (none)
QUESTION 27
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair
for sending and the other pair for receiving?
A. 100BaseX
B. 100BaseT4
C. 100BaseTX
D. 100BaseFX
Answer: C
Section: (none)
QUESTION 28
Which of the following would be used to optimize network performance and increase bandwidth availability?
A. Packet analysis
B. Fault tolerance
C. QoS
D. Traffic shaping
Answer: D
Section: (none)
QUESTION 29
A technician is setting up a new wireless network in an office where there are existing APs broadcasting on
channels 6 and 11. Which of the following would be the BEST channel to use for the new network to keep
interference to a minimum?
A. 22
B. 3
C. 10
D. 1
Answer: D
Section: (none)
QUESTION 30
Which of the following tools would an administrator use to record and display data passing through the
network?
A. Event recorder
B. Toner probe
C. TDR
D. Protocol analyzer
Answer: D
Section: (none)
QUESTION 31
A device that can detect and disrupt network-based attacks is a(n):
A. IPS.
B. DNS.
C. DSU.
D. IDS.
Answer: A
Section: (none)
QUESTION 32
Which of the following protocols uses port 20, by default?
A. FTP
B. SSH
C. HTTPS
D. DNS
Answer: A
Section: (none)
QUESTION 33
After reports of network performance problems, the technician determines that the switch firmware should
be updated. Which of the following should the technician do NEXT?
Answer: B
Section: (none)
QUESTION 34
Which of the following ports would be commonly used for HTTP?
A. 23
B. 80
C. 443
D. 20
Answer: B
Section: (none)
QUESTION 35
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a
call from a user who is unable to connect to the company wireless. Which of the following is MOST likely
causing the connection problem?
Answer: A
Section: (none)
QUESTION 36
Which of the following is the 802.1x standard an example of?
A. NAT
B. PAT
C. NAC
D. SNAT
Answer: C
Section: (none)
QUESTION 37
An administrator is adding a new router in order to connect to a new remote location. After verifying that all
the wiring and IP information is accurate, the administrator is still unable to connect to the remote router.
Which of the following is the MOST probable cause?
Answer: C
Section: (none)
QUESTION 38
Which of the following specialized network devices is used to authenticate users to the web and blocks
certain websites from being accessed?
A. DNS server
B. Proxy server
C. CSU/DSU
D. IDS
Answer: B
Section: (none)
QUESTION 39
Which of the following is required if ports from VLANs on two separate switches need to broadcast to each
other?
A. VPN
B. Trunking
C. Port authentication
D. Port mirroring
Answer: B
Section: (none)
QUESTION 40
An administrator is reviewing helpdesk tickets and discovers multiple tickets for ¡°unable to print¡± and ¡°
noInternet connectivity¡±. Which of the following documents would BEST provide information to help
diagnose the issue?
A. Policies
B. Baseline
C. Wiring schematic
D. Logical network diagram
Answer: D
Section: (none)
QUESTION 41
A technician has been monitoring network performance of the distribution hubs. It appears that many
collisions are occurring during working hours. Which of the following is the BEST approach to resolve these
collisions?
Answer: A
Section: (none)
QUESTION 42
The plans for a new office require 300 network connections. Which of the following network sizes should be
allocated to the new office?
A. /23
B. /25
C. /24
D. /30
Answer: A
Section: (none)
QUESTION 43
Which of the following is the MOST secure method to enable remote users to access a company¡¯ s
internal network resources?
A. DMZ
B. Network-based firewall
C. Stateful firewall
D. VPN concentrator
Answer: D
Section: (none)
QUESTION 44
A user reports an inability to access a certain website, but is able to access all other sites. Which of the
following tools would the administrator MOST likely use to see where the problem is occurring?
A. netstat
B. traceroute
C. hostname
D. ipconfig
Answer: B
Section: (none)
QUESTION 45
Which of the following terminations would be used on a UTP cable connecting a workstation to a switch?
Answer: C
Section: (none)
QUESTION 46
Which of the following is used to terminate CAT5e cable on the 110 block?
Answer: A
Section: (none)
QUESTION 47
An administrator is looking to install new WAPs into remote locations for increased network capacity. Which
of the following technologies would the equipment need to support if accessible power outlets were at a
minimum?
A. MAC filtering
B. PoE
C. WPA
D. VLAN
Answer: B
Section: (none)
QUESTION 48
A user receives an email asking them to update their password for a remote service using a URL provided
in the email. Which of the following is MOST likely occurring?
A. Smurf
B. Denial of service
C. Phishing
D. Man in the middle
Answer: C
Section: (none)
QUESTION 49
Which of the following DNS record types is used for IPv6 host address mappings?
A. CNAME
B. AAAA
C. SRV
D. PTR
Answer: B
Section: (none)
QUESTION 50
Which of the following OSI model layers is the session layer?
A. Layer 5
B. Layer 1
C. Layer 6
D. Layer 7
Answer: A
Section: (none)
QUESTION 51
A technician would like to connect two computers directly via their respective network cards, and no
intermediary devices. Which of the following cable types would allow for this?
A. Crossover
B. Serial
C. RG-6
D. Loopback
Answer: A
Section: (none)
QUESTION 52
Which of the following is a VLAN trunking protocol standard?
A. 802.1x
B. 802.3
C. 802.1q
D. 802.11
Answer: C
Section: (none)
QUESTION 53
Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).
A. 802.11g
B. 802.11a
C. 802.11b
D. 802.1x
E. 802.11n
Answer: BE
Section: (none)
QUESTION 54
Which of the following tools would be used to determine the quality of the network infrastructure?
A. OTDR
B. Certifier
C. Voltage event recorder
D. Multimeter
Answer: B
Section: (none)
QUESTION 55
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address.
Which of the following is the address that can be used in this scenario?
A. 10.178.1.5/30
B. 10.178.1.5/16
C. 10.178.1.5/1
D. 10.178.1.5/8
Answer: D
Section: (none)
QUESTION 56
Which of the following tools will an administrator need to terminate the network cabling to the patch panel?
A. Multimeter
B. Toner probe
C. Punch down
D. Certifiers
Answer: C
Section: (none)
QUESTION 57
Which of the following network devices is used by a laptop to connect via WPA2?
A. Secure firewall
B. Network repeater
C. Hub
D. Wireless router
Answer: D
Section: (none)
QUESTION 58
An administrator reports to work in the morning to find that all of the company¡¯ s computers have not
received the nightly updates. Which of the following should the administrator check FIRST to determine the
issue?
A. Wiring schematic
B. Acceptable use policy
C. Error logs
D. Session logs
Answer: C
Section: (none)
QUESTION 59
Which of the following is inversely proportional to a wireless client connection speed?
Answer: D
Section: (none)
QUESTION 60
Which of the following connectors is MOST commonly associated with a physical bus topology?
A. RJ-45
B. SC
C. RJ-11
D. BNC
Answer: D
Section: (none)
QUESTION 61
If the goal is to minimize the amount of time it takes for other routers in the network to learn about a routing
change, the network administrator should choose a routing protocol that has the shortest:
A. convergence.
B. link state.
C. path.
D. multipath.
Answer: A
Section: (none)
QUESTION 62
Which of the following provides internal network access to the Internet via one public IP address?
A. DNAT
B. Broadcast
C. PAT
D. Multicast
Answer: C
Section: (none)
QUESTION 63
Which of the following is the term used to describe the aggregation of multiple components to form one
logical component?
A. Bonding
B. CSMA/CD
C. Circuit switching
D. Channelization
Answer: A
Section: (none)
QUESTION 64
Which of the following does not affect security on a wireless access point?
A. SSID
B. DHCP
C. Encryption
D. Password
Answer: B
Section: (none)
QUESTION 65
Routers operate predominantly at which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 2
Answer: B
Section: (none)
QUESTION 66
An administrator has found interference on a network. Which of the following cable MOST likely composed
of?
A. STP
B. UTP
C. Fiber
D. RG-6
Answer: B
Section: (none)
QUESTION 67
A network administrator suspects that two computers on the same subnet have the same IP address.
Which of the following utilities could be used to determine which physical device the workstation is sending
traffic?
A. ARP
B. NSLOOKUP
C. DIG
D. NETSTAT
Answer: A
Section: (none)
QUESTION 68
A technician is troubleshooting a network connectivity issue with a user¡¯ s desktop configured to use a
static IP address. The technician notes the following configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1
Which of the following changes will allow the desktop to communicate properly with remote networks?
Answer: D
Section: (none)
QUESTION 69
Which of the following devices is used to connect to a network by converting analog signals to digital
signals?
A. Hub
B. Modem
C. Switch
D. Repeater
Answer: B
Section: (none)
QUESTION 70
Which of the following authenticates a web server to the remote client in PKI?
A. DNS name
B. Public key
C. Private key
D. FQDN
Answer: B
Section: (none)
QUESTION 71
Which of the following connection methods is considered secure and is normally used to connect to web
resources such as online banking and ecommerce sites?
A. SSH
B. HTTPS
C. SFTP
D. HTTP
Answer: B
Section: (none)
QUESTION 72
A user has logged into a company laptop while at a conference. The user is unable to log directly into the
conference facility¡¯ s wireless network, but is able to connect to another user¡¯ s laptop and thereby
access the conference materials. This is an example of:
A. client/server.
B. shoulder surfing.
C. peer to peer.
D. VPN tunneling.
Answer: C
Section: (none)
QUESTION 73
Which of the following is the process of the amount of time that passes for routing updates in the
environment to reach a steady state?
A. Dynamic
B. Supernetting
C. Convergence
D. Subnetting
Answer: C
Section: (none)
QUESTION 74
A crossover cable is not needed when the switch supports which of the following?
A. MDIX
B. LACP
C. XDSL
D. IGRP
Answer: A
Section: (none)
QUESTION 75
Which of the following is an invalid subnet mask?
A. 255.255.255.255
B. 255.255.0.0
C. 255.256.255.0
D. 255.0.0.0
Answer: C
Section: (none)
QUESTION 76
Which of the following could be used to check network connectivity on a workstation?
A. Toner probe
B. Temperature monitor
C. Cable tester
D. Voltage meter
Answer: C
Section: (none)
QUESTION 77
Which of the following devices limits the possibility of third-party sniffing of traffic between hosts on a local
network?
A. Bridge
B. Packet filter
C. Layer 2 switch
D. Protocol analyzer
Answer: C
Section: (none)
QUESTION 78
A technician is at a client¡¯ s site to figure out an intermittent network problem. The technician has
implemented the solution. Which of the following is the NEXT step in the troubleshooting methodology?
Answer: C
Section: (none)
QUESTION 79
Which of the following would be used to lock all of the primary communications equipment of a building,
including its demarcation point?
A. MTR
B. MDF
C. IDF
D. Smart jack
Answer: B
Section: (none)
QUESTION 80
A technician needs to install a VoIP system in the building but some locations do not have electrical outlets
available. Which of the following features of a switch would need to be available?
A. Port authentication
B. VLAN
C. Trunking
D. PoE
Answer: D
Section: (none)
QUESTION 81
Which of the following LAN technologies has the GREATEST length segmentation limit?
A. 100BaseFX
B. 1000BaseT
C. 10BaseF
D. 100BaseTX
Answer: C
Section: (none)
QUESTION 82
Which of the following tools logs electrical surges?
A. Cable tester
B. Toner probe
C. Voltage event recorder
D. Protocol analyzer
Answer: C
Section: (none)
QUESTION 83
Which of the following should be configured to provide priority to voice traffic?
A. Port mirroring
B. QoS
C. DMZ
D. Trunking
Answer: B
Section: (none)
QUESTION 84
An administrator just installed a new DS3 WAN circuit providing 45Mbps. However, multiple users at the
site report slowness when accessing remote resources. Which of the following tools should the
administrator use to diagnose the issue?
A. Content filter
B. Throughput tester
C. Crossover cable
D. Loopback plug
Answer: B
Section: (none)
QUESTION 85
The helpdesk is receiving calls about the corporate web server being down. Which of the following should
be taken NEXT after verifying that the server is unreachable?
Answer: C
Section: (none)
QUESTION 86
Which of the following represents a private IP address?
A. 140.90.90.90
B. 172.16.24.9
C. 139.93.23.22
D. 23.34.98.222
Answer: B
Section: (none)
QUESTION 87
Which of the following describes what the number two represents in 100Base2 cabling?
A. Coaxial cable
B. Fiber
C. UTP
D. Twisted pair
Answer: A
Section: (none)
QUESTION 88
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC.
Which of the following diagrams would assist the technician in finding the machine that is causing the
problem?
QUESTION 89
An administrator adds a second network connection between two devices to increase network bandwidth.
Which of the following features should be used to accomplish the increase?
A. VLANs
B. CSMA/CD
C. Bonding
D. Port mirroring
Answer: C
Section: (none)
QUESTION 90
An administrator is unable to ping a workstation. Which of the following tools would BEST help to resolve
the issue?
A. Cable tester
B. Multimeter
C. Protocol analyzer
D. Toner probe
Answer: A
Section: (none)
QUESTION 91
Which of the following should be used to ensure that all packets are received by every connected device?
A. Switch
B. Firewall
C. Hub
D. Router
Answer: C
Section: (none)
QUESTION 92
Which of the following cable coverings is MOST likely to reduce toxic gasses during a fire?
A. Polyvinyl chloride
B. Multimode
C. Plenum
D. Polystyrene
Answer: C
Section: (none)
QUESTION 93
Interior gateway protocols are used for resolving routes:
A. within networks.
B. between WAPs.
C. between networks.
D. within routers.
Answer: A
Section: (none)
QUESTION 94
Which of the following analyzes the entire subnet to identify all hosts that are active?
A. Packet sniffer
B. Ping sweep
C. Traceroute
D. Port scanner
Answer: B
Section: (none)
QUESTION 95
Which of the following provides VPN services at the HIGHEST OSI level?
A. IPSec
B. PPPoE
C. L2TP
D. SSL
Answer: D
Section: (none)
QUESTION 96
When ordering switches for a new building, which of the following is the BEST way for the technician to
determine the number of switches to put in each network closet?
A. Count the number of phone ports and configure two network ports for each phone port.
B. Review the architectural plans to see how many drops go to each closet.
C. Count the number of rooms near each closet and standardize eight drops per room.
D. Wireless is the new standard and no network switches will be needed in the building.
Answer: B
Section: (none)
QUESTION 97
On which of the following cables would a technician find a BNC connector installed?
A. CAT3
B. RG-6
C. CAT6
D. Fiber
Answer: B
Section: (none)
QUESTION 98
A software vender wants to distribute free updates for clients via the web. Which of the following protocols
would be the MOST efficient to distribute the updates?
A. SSH
B. FTP
C. DNS
D. TLS
Answer: B
Section: (none)
QUESTION 99
Which of the following would BEST describe security devices used to provide content filtering?
A. Proxy server
B. VPN concentrator
C. Port scanners
D. DHCP server
Answer: A
Section: (none)
QUESTION 100
If cable is rated for 10GBaseT, how much theoretical bandwidth can this cable provide in megabits per
second (Mbps)?
A. 100Mbps
B. 10Mbps
C. 10000Mbps
D. 1000Mbps
Answer: C
Section: (none)
QUESTION 101
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant.
B. autonomous.
C. converged.
D. vectored.
Answer: C
Section: (none)
QUESTION 102
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer
successfully get their network configuration via DHCP, but the user reports that their laptop has no web
access, but can print. Which of the following MOST likely occurred?
Answer: C
Section: (none)
QUESTION 103
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?
A. Smart jack
B. Demarc
C. 66 block
D. 110 block
Answer: C
Section: (none)
Exam F
QUESTION 1
Link aggregation is also known as port:
A. mirroring.
B. spanning.
C. distribution.
D. trunking.
Answer: D
Section: (none)
QUESTION 2
Which of the following WAN types requires the use of a telephone line?
A. POTS
B. Wireless
C. Satellite
D. ATM
Answer: A
Section: (none)
QUESTION 3
: 381Which of the following cable types is MOST likely to have LC connectors?
A. Category 6 cable
B. Shielded twisted pair
C. RG-6
D. Multimode fiber
Answer: D
Section: (none)
QUESTION 4
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant.
B. autonomous.
C. converged.
D. vectored.
Answer: C
Section: (none)
QUESTION 5
Which of the following is installed to reduce broadcast packets and collisions?
A. Firewall
B. Switch
C. Repeater
D. Hub
Answer: B
Section: (none)
QUESTION 6
Which of the following is the MOST cost effective solution to extend the distance of one Ethernet cable run?
A. Repeater
B. Hub
C. Switch
D. Router
Answer: A
Section: (none)
QUESTION 7
Which of the following has the STRONGEST encryption?
A. WPA2
B. L2TP
C. WPA
D. WEP
Answer: A
Section: (none)
QUESTION 8
Which of the following allows a technician to mask a private network of IP addresses behind one public IP
address?
A. DHCP
B. DNS
C. Subnetting
D. NAT
Answer: D
Section: (none)
QUESTION 9
Which of the following commands is used to display other computers running on the network?
A. net view
B. ipconfig
C. nslookup
D. hostname
Answer: A
Section: (none)
QUESTION 10
Packet sniffing at an Internet interface on a border host reveals outbound packets with a source address of
10.254.0.5. Which of the following is a likely explanation?
Answer: C
Section: (none)
QUESTION 11
Which of the following devices can be installed on individual computers throughout the network?
A. VPN concentrator
B. Host-based firewall
C. NIPS
D. Network-based firewall
Answer: B
Section: (none)
QUESTION 12
A company has both a private network for employees and an Internet access only network for guests on the
same switch. Which of the following advanced features is being used?
A. PoE
B. VLAN
C. Port authentication
D. Port mirroring
Answer: B
Section: (none)
QUESTION 13
Which of the following cables would be used to transfer data from one computer to another if both
computers are directly connected to each other?
A. Crossover
B. Patch
C. Loopback
D. Rollover
Answer: A
Section: (none)
QUESTION 14
Which of the following will MOST likely use an ISDN PRI circuit?
Answer: D
Section: (none)
QUESTION 15
Session affinity is a feature of which of the following devices?
A. IPS
B. Load balancer
C. DNS server
D. DHCP server
Answer: B
Section: (none)
QUESTION 16
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is
located in the basement and there is no easy way to run a cable to the third floor. Which of the following
devices should be installed to extend the wireless coverage to cover the entire third floor without running
cables?
A. Switch
B. Bridge
C. Router
D. Repeater
Answer: D
Section: (none)
QUESTION 17
Which of the following is the BEST reason for implementing QoS?
Answer: B
Section: (none)
QUESTION 18
Which of the following is the name of the routing update process involved when a change occurs in the
routing environment?
A. Supernetting
B. Subnetting
C. Convergence
D. Dynamic
Answer: C
Section: (none)
QUESTION 19
Which of the following allows a WAP to be installed in a location where there are no power outlets
available?
A. PoE
B. Port authentication
C. PPTP
D. Trunking
Answer: A
Section: (none)
QUESTION 20
Which of the following OSI model layers is the transport layer?
A. Layer 6
B. Layer 4
C. Layer 7
D. Layer 1
Answer: B
Section: (none)
QUESTION 21
A new company has been given one public IP address. The company employs 200 users requiring Internet
access from the headquarters. Which of the following can be implemented to provide Internet access for all
the employees?
A. Proxy server
B. NAT
C. Multicasting
D. Subnetting
Answer: B
Section: (none)
QUESTION 22
Which of the following protocols is typically used for VoIP solutions?
A. SSH
B. RTP
C. TLS
D. IGMP
Answer: B
Section: (none)
QUESTION 23
Which of the following devices allows users to connect to company resources by providing them with a valid
internal IP address?
A. Firewall
B. DHCP server
C. Switch
D. Hub
Answer: B
Section: (none)
QUESTION 24
In which of the following topologies could the failure of one machine cause the entire network to stop
functioning?
A. Token ring
B. Star
C. Mesh
D. Spanning tree
Answer: A
Section: (none)
QUESTION 25
The administrator¡¯ s ISP indicates that they will need an autonomous system number to begin routing
external network traffic. Which of the following protocols should the ISP plan to use?
A. BGP
B. OSPF
C. RIPv2
D. IS-IS
Answer: A
Section: (none)
QUESTION 26
11g wireless signals operating at 2.4GHz has a maximum line of sight range of which of the following?
Answer: A
Section: (none)
QUESTION 27
A link light on a switch is an example of which of the following Ethernet properties?
A. Collision detection
B. Collision avoidance
C. Multiple access points
D. Carrier sense
Answer: D
Section: (none)
QUESTION 28
A company network is experiencing a man-in-the-middle attack, where a malicious user is impersonating
the default gateway IP address of 192.168.1.1. Given that the default gateway MAC address is 00-11-22-
33-44-55, which of the following commands can an administrator run on the affected hosts to resolve the
issue?
A. arp -a 192.168.1.1
B. arp -a 00-11-22-33-44-55
C. apr -s 192.168.1.1 00-11-22-33-44-55
D. arp -s 00-11-22-33-44-55 192.168.1.1
Answer: C
Section: (none)
QUESTION 29
Which of the following network devices commonly uses OSPF?
A. Layer 2 switch
B. Firewall
C. Repeater
D. Router
Answer: D
Section: (none)
QUESTION 30
Exhibit:
Refer to the attached Exhibit. In the diagram, which of the following would be a single point of failure with
the highest impact to systems?
A. Switch A failing
B. Connection between switch A and switch B failing
C. Router failing
D. Connection between the router and switch A failing
Answer: A
Section: (none)
QUESTION 31
How much theoretical bandwidth is available to three wireless access points that share the same 80 meter
radius, if channel six is used on all three access points?
A. 162Mbps
B. 54Mbps
C. 100Mbps
D. 22Mbps
Answer: B
Section: (none)
QUESTION 32
A company has recently received a new ADSL backup Internet connection. Which of the following will
MOST likely be used between the modem and the ISP?
A. RAS
B. MSCHAP
C. PPPoE
D. IPSec
Answer: C
Section: (none)
QUESTION 33
Which of the following tools can be used to identify the location of a network outage?
A. ping
B. traceroute
C. netstat
D. nslookup
Answer: B
Section: (none)
QUESTION 34
A Linux user is reporting intermittent issues connecting to several websites. Which of the following
commands would the administrator MOST likely use to see where the traffic is dropping off at and the
connections statistics to each device along the way?
A. mtr
B. ifconfig
C. ping
D. traceroute
Answer: A
Section: (none)
QUESTION 35
Allowing two ports to function as one is considered to be which of the following features?
Answer: A
Section: (none)
QUESTION 36
An administrator is deploying three B/G wireless access points in a new office location. Which of the
following channels eliminates interference?
A. 1, 6, and 11
B. 11, 16, and 20
C. 3, 6, and 9
D. 36, 40, and 44
Answer: A
Section: (none)
QUESTION 37
Which of the following ports would be commonly used for email traffic?
A. 20
B. 443
C. 80
D. 110
Answer: D
Section: (none)
QUESTION 38
Which of the following should be used to transfer data between two computers via their NICs?
A. RG-6 cable
B. Crossover cable
C. Loopback cable
D. Rollover cable
Answer: B
Section: (none)
QUESTION 39
An IDS device needs to be plugged into a port that can see all traffic on a network switch. Which of the
following features of the switch should be used?
A. Port security
B. Port trunking
C. Port mirroring
D. Port spanning
Answer: C
Section: (none)
QUESTION 40
Which of the following technologies facilitates the conversion of internal private IP addressing to external
public IP addressing?
A. NAT
B. SNMP
C. DHCP
D. TCP/IP
Answer: A
Section: (none)
QUESTION 41
Which of the following can be an STP cable?
A. CAT5e
B. RG-59
C. Fiber
D. RG-6
Answer: A
Section: (none)
QUESTION 42
Which of the following protocols ensures message integrity when transferring data from the server to the
client?
A. RSH
B. SNMPv3
C. FTP
D. SNMPv2
Answer: B
Section: (none)
QUESTION 43
An administrator needs to update a router configuration for a router that does not support SSH. Which of
the following can be used to securely update the router configuration?
A. HTTPS
B. FTP
C. TFTP
D. SNMPv2
Answer: A
Section: (none)
QUESTION 44
An administrator monitors the performance of a network router and wants to determine if the traffic load is
greater than normal. Which of the following should the administrator do to discover this?
Answer: B
Section: (none)
QUESTION 45
The SSL protocol is MOST commonly associated with which of the following ports?
A. 443
B. 143
C. 22
D. 80
Answer: A
Section: (none)
QUESTION 46
Which of the following is the difference between FTP and SFTP?
Answer: D
Section: (none)
QUESTION 47
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer
successfully get their network configuration via DHCP, but the user reports that their laptop has no web
access, but can print. Which of the following MOST likely occurred?
Answer: C
Section: (none)
QUESTION 48
Firewalls can be used for which of the following?
A. Protocol analysis
B. Port scanning
C. Packet sniffing
D. Content filtering
Answer: D
Section: (none)
QUESTION 49
Which of the following is encrypted when IPSec operates in tunnel mode? (Select TWO).
Answer: DE
Section: (none)
QUESTION 50
All of the following are valid subnet masks EXCEPT:
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.240.0
D. 255.255.253.0
Answer: D
Section: (none)
QUESTION 51
An administrator receives a contract for a server install at a new building. Which of the following should be
completed after installing the server?
Answer: D
Section: (none)
QUESTION 52
Which of the following IP addresses is a private IP address?
A. 11.100.101.1
B. 192.166.100.1
C. 192.186.200.221
D. 172.22.254.254
Answer: D
Section: (none)
QUESTION 53
All of the following features require the need for a nearby power outlet EXCEPT:
A. port mirroring.
B. PPPoE.
C. PoE.
D. port trunking.
Answer: C
Section: (none)
QUESTION 54
Web users are reporting issues downloading various types of mediA. Which of the following should the
administrator do FIRST?
A. Continue to gather information and see what other problems may exist.
B. Create an action plan and solution identifying potential effects.
C. Determine the most probable cause.
D. Find out what has recently changed on the network.
Answer: A
Section: (none)
QUESTION 55
Which of the following cable types has the reception and transmission leads flipped on opposing ends of
the media?
A. Rollover
B. Serial
C. Crossover
D. Patch
Answer: C
Section: (none)
QUESTION 56
Which of the following devices only monitors traffic being sent to a host?
A. IPS
B. Firewall
C. IDS
D. Proxy server
Answer: C
Section: (none)
QUESTION 57
Which of the following logical network topologies is MOST likely to use the IPSec protocol?
A. VLAN
B. VPN
C. Peer-to-peer network
D. VTP domain
Answer: B
Section: (none)
QUESTION 58
Which of the following is true of stateless inspection?
Answer: D
Section: (none)
QUESTION 59
Multiple users call from the same location saying that they have no network connectivity. The administrator
is unable to ping the main switch at that IDF. Which of the following configuration management documents
would the administrator MOST likely consult to troubleshoot the issue?
Answer: A
Section: (none)
QUESTION 60
Which of the following is an example of a MAC address?
A. 1A-23-F9-CD-06-9B-23-5C
B. 10.0.10.1
C. 1A-23-F9-CD-06-9L
D. 1A-23-F9-CD-06-9B
Answer: D
Section: (none)
QUESTION 61
An administrator is troubleshooting a communication issue between two computers on the same Layer 2
switch. Which of the following is the BEST way to determine if the switch is causing the issue?
A. Setup an ACL that allows and logs all IP traffic between the two computers
B. Setup a span port on the switch to watch for CRC errors
C. Configure a spanning tree to check for a loop
D. Connect both computers using a crossover cable
Answer: D
Section: (none)
QUESTION 62
Which of the following would an administrator use to locate where to extend a new wireless network at a
new location?
A. Baseline configuration
B. Security policy
C. Logical network map
D. Wiring schematic
Answer: C
Section: (none)
QUESTION 63
A technician at a company providing online, real-time media streaming to the Internet is needs a network
technology that will reduce bandwidth while delivering high throughput. Which of the following can the
technician implement to fit these requirements?
A. Multicast
B. Subnetting
C. Broadcast
D. Unicast
Answer: A
Section: (none)
QUESTION 64
Administrators are performing a war drive around their company¡¯ s complex. Which of the following are
they attempting to detect?
A. Bluesnarfing attacks
B. DDoS attacks
C. Worms
D. Rogue access points
Answer: D
Section: (none)
QUESTION 65
An administrator needs to remove sleeves on a CAT6 cable. Which of the following tools will work BEST?
A. Punch down
B. Cable tester
C. Cable stripper
D. Cable certifier
Answer: C
Section: (none)
QUESTION 66
Which of the following protocols controls the set up, tear down, and accounting of voice over IP based
communications?
A. TLS
B. RTP
C. SIP
D. IGMP
Answer: C
Section: (none)
QUESTION 67
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?
A. Crosstalk
B. Data collision
C. Signal bleed
D. Signal loss
Answer: D
Section: (none)
QUESTION 68
A user reports being occasionally disconnected from the server. Which of the following tools could the
technician use to determine if it is the client or the server that is dropping the connection?
A. Packet sniffer
B. Throughput tester
C. Load balancer
D. Multimeter
Answer: A
Section: (none)
QUESTION 69
Which of the following cable types is intended to be used on short distances and is immune to any type of
interference?
A. Singlemode fiber
B. Multimode fiber
C. Unshielded twisted pair
D. Shielded twisted pair
Answer: B
Section: (none)
QUESTION 70
Which of the following should be installed in a server room?
A. Protocol analyzer
B. Certifiers
C. Temperature monitor
D. OTDR
Answer: C
Section: (none)
QUESTION 71
A network sniffer has been set up on a switch port in an attempt to monitor traffic from another switch port.
Which of the following technologies would allow this to work in a switched network?
A. VLANs
B. Port mirroring
C. Port trunking
D. Spanning tree
Answer: B
Section: (none)
QUESTION 72
Which of the following would MOST likely be used to punch down LAN cables before connecting them to
the main switch?
A. 110 block
B. MDF
C. 66 block
D. IDF
Answer: A
Section: (none)
QUESTION 73
An administrator is troubleshooting a device that will not power on. Which of the following tools should the
administrator use to check the wall outlet?
A. Multimeter
B. Toner probe
C. Cable tester
D. OTDR
Answer: A
Section: (none)
QUESTION 74
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
A. Butt set
B. Stripper
C. Punch down tool
D. Snips
Answer: B
Section: (none)
QUESTION 75
Which of the following troubleshooting steps should be performed NEXT after a core router has been
reported down?
A. Test a solution.
B. Implement a solution.
C. Identify all affected areas.
D. Establish the outage cause.
Answer: C
Section: (none)
QUESTION 76
When implementing a basic wireless home network, which of the following should be taken into
consideration when configuring the wireless router so it does not conflict with other home electronics?
A. Beacon
B. Appropriate encryption
C. Frequency
D. ESSID
Answer: C
Section: (none)
QUESTION 77
BGP is an example of which of the following routing protocol types?
A. Link-state IGP
B. Link-state EGP
C. Distance-vector EGP
D. Distance-vector IGP
Answer: C
Section: (none)
QUESTION 78
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company web
address. Which of the following command sequences will test DNS functionality?
A. nslookup
server ns.company.com
www.company.com
B. nslookup
settype=mx
www.company.com
C. nslookup
Set type=ns
@ns.company.com www
D. nslookup
domain ns.company.com
lookup www
Answer: A
Section: (none)
QUESTION 79
After crimping a new RJ-45 plug in an unmarked cable, the network tester tool gives the message ¡°
Warning! Voltage on line!¡±. Which of the following is the MOST likely cause of this message?
Answer: B
Section: (none)
QUESTION 80
Which of the following documents should always be kept up-to-date after any major changes are made to a
network backbone?
A. Network diagram
B. Network security procedure
C. Company policy
D. Performance baseline
Answer: A
Section: (none)
QUESTION 81
An administrator has added four switches to a campus network. The switch in wiring closet is connected to
the switch in wiring closet and the switch in wiring closet. The switch in wiring closet is connected to the
switch in wiring closet and the switch in wiring closet.
Which of the following topologies is represented in this design?
A. Ring
B. Bus
C. Mesh
D. Star
Answer: A
Section: (none)
QUESTION 82
Which of the following describes an area where communications equipment is stored?
A. HVAC
B. Demarc
C. MDF
D. 110 block
Answer: C
Section: (none)
QUESTION 83
A technician is using a packet sniffer to identify a server. The technician observes the following network
traffic:
HOST-A TCP 80 -> HOST-B TCP 1328 PUSH
HOST-B TCP 1328 -> HOST-A TCP 80 PUSH ACK
HOST-A UDP 69 -> HOSTC UDP 1235
HOST-C ICMP -> HOST-D ICMP
Which of the following is MOST likely to be the server?
A. HOST-C
B. HOST-A
C. HOST-B
D. HOST-D
Answer: B
Section: (none)
QUESTION 84
Which of the following cables can be a UTP cable?
A. Fiber
B. RG-6
C. CAT6
D. RG-59
Answer: C
Section: (none)
QUESTION 85
Which of the following is an example of an IPv4 address?
A. 1A-23-F9-CD-06-9B
B. 10:0:10:1
C. 10.0.10.1
D. 100.101.100
Answer: C
Section: (none)
QUESTION 86
FTP is commonly used to do which of the following?
A. Transfer files to a network device
B. Redirect URLs of a network device
C. Send and receive emails
D. Remotely manage servers
Answer: A
Section: (none)
QUESTION 87
Which of the following features would BEST be used to optimize real-time voice and video chat? (Select
TWO).
A. QoS
B. Fault tolerance systems
C. Caching engines
D. Traffic shaping
E. Load balancing
Answer: AD
Section: (none)
QUESTION 88
Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33 feet)?
A. X-10
B. 802.11a
C. Bluetooth
D. 802.11b
Answer: C
Section: (none)
QUESTION 89
Which of the following is the MOST likely reason that two computers in different VLANs, on the same Layer
2 switch, are unable to communicate with each other?
Answer: B
Section: (none)
QUESTION 90
An administrator replaced a router with a switch. End users are able to access network shares but are not
able to access the Internet. Which of the following is the BEST explanation why the users are unable to
access the Internet?
A. Router routes traffic between different networks and a switch does not.
B. The switch needs to be setup to forward data traffic to the Internet.
C. The firewall needs to be setup to allow traffic to reach the Internet.
D. The new switch is faulty and needs to be replaced and configured correctly.
Answer: A
Section: (none)
QUESTION 91
Which of the following devices transmits timed broadcasts onto an active network?
A. Bridge
B. Unmanaged switch
C. DHCP client
D. Firewall
Answer: C
Section: (none)
QUESTION 92
Which of the following commands is used to track the path a packet takes to get to its destination?
A. nbtstat
B. traceroute
C. ifconfig
D. nslookup
Answer: B
Section: (none)
QUESTION 93
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband
connection on many routers?
A. VDSL
B. DSL
C. POTS
D. Smart jack
Answer: C
Section: (none)
QUESTION 94
Which of the following connection methods or protocols is considered unsecure and by default uses port
80?
A. HTTP
B. HTTPS
C. TELNET
D. RCP
Answer: A
Section: (none)
QUESTION 95
Which of the following address formats uses 32-bit addressing?
A. IPv6
B. IPv4
C. Host address
D. MAC address
Answer: B
Section: (none)
QUESTION 96
At which of the following OSI model layers is HTTPS encryption performed?
A. Layer 3
B. Layer 7
C. Layer 5
D. Layer 6
Answer: D
Section: (none)
QUESTION 97
Which of the following is a purpose of using a port scanner?
Answer: B
Section: (none)
QUESTION 98
Which of the following utilities would MOST likely be used to query the locally cached list of IP addresses
and their corresponding names as resolved through NetBIOS over TCP/IP?
A. DIG
B. NBTSTAT
C. NSLOOKUP
D. NSCD
Answer: B
Section: (none)
QUESTION 99
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?
A. Smart jack
B. Demarc
C. 66 block
D. 110 block
Answer: C
Section: (none)
QUESTION 100
Which of the following components would a technician check to see if a phone outage is an internal or
external problem?
A. 110 block
B. Demarc
C. 66 block
D. Patch panel
Answer: B
Section: (none)
QUESTION 101
Which of the following uses 802.1 q?
A. 802.1x
B. Port mirroring
C. VLAN
D. QoS
Answer: C
Section: (none)
QUESTION 102
Which of the following can allow or deny network access based on a physical hardware address?
A. IP filtering
B. IDS
C. MAC filtering
D. IPS
Answer: C
Section: (none)
QUESTION 103
Which of the following BEST describes ISDN?
Answer: C
Section: (none)
Exam G
QUESTION 1
Which of the following devices can be configured to block ports?
A. DHCP server
B. Basic firewall
C. Content filter
D. Hub
Answer: B
Section: (none)
QUESTION 2
A technician is installing new LAN lines into a company¡¯ s new office space. Which of the following is the
termination point for each new run?
A. Patch Panel
B. Demarc
C. 66 Block
D. Smart Jack
Answer: A
Section: (none)
QUESTION 3
Two business partners have recently been connected via a dedicated extranet. It has been discovered that
each of the companies are using the same private IP address space. Which of the following will help to
resolve potential routing issues?
A. CIDR
B. NAT
C. Multicast
D. PAT
Answer: B
Section: (none)
QUESTION 4
Which of the following will allow data and power over the same connection?
A. Trunking
B. Mirroring
C. Spanning tree
D. PoE
Answer: D
Section: (none)
QUESTION 5
Which of the following can be used to record and save VoIP conversations?
A. Port scanner
B. Packet sniffer
C. IDS
D. Banner grabber
Answer: B
Section: (none)
QUESTION 6
Users from different locations are reporting issues with various intranet sites. After identifying all the
affected areas, which of the following should a technician do NEXT?
Answer: A
Section: (none)
QUESTION 7
An administrator needs to identify the DNS servers that a computer is using. Which of the following
commands would MOST likely be used?
A. ping
B. nslookup
C. ipconfig
D. traceroute
Answer: B
Section: (none)
QUESTION 8
A firewall acts at which layer of the OSI model to perform content filtering?
A. Presentation
B. Application
C. Session
D. Network
Answer: B
Section: (none)
QUESTION 9
An administrator would like to turn off web-based administration access to critical network routers and
switches. Which of the following ports should be blocked? (Select TWO).
A. 21
B. 80
C. 23
D. 110
E. 443
Answer: BE
Section: (none)
QUESTION 10
Which of the following is typically used in an LAN environment?
A. 10GBaseLW
B. 10GBaseEW
C. 10GBaseSW
D. 10GBaseSR
Answer: D
Section: (none)
QUESTION 11
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?
A. ifconfig
B. netstat
C. dig
D. ipconfig
Answer: A
Section: (none)
QUESTION 12
Which of the following configuration management documentation types would an administrator use to know
how and when to properly install new network devices on the LAN?
A. Network policy
B. Baseline configuration
C. Logical network diagram
D. Wiring schematic
Answer: A
Section: (none)
QUESTION 13
A technician needs to configure a machine to automatically request an IP address upon boot. Which of the
following BEST describes this type of addressing?
A. Static
B. Routed
C. Dynamic
D. Convergence
Answer: C
Section: (none)
QUESTION 14
Which of the following commands provides similar information about the current configuration of active local
Ethernet adapters? (Select TWO).
A. route
B. hostname
C. ifconfig
D. traceroute
E. ipconfig
Answer: CE
Section: (none)
QUESTION 15
Which of the following WAN technologies provides the highest maximum bandwidth?
A. ADSL
B. SONET
C. T1
D. E3
Answer: B
Section: (none)
QUESTION 16
An administrator is setting up a network and would like to prevent users from having the ability to plug their
PC into the network to receive an IP address. Which of the following addressing schemes should the
technician use?
A. Dynamic
B. NAT
C. Static
D. Subnetting
Answer: C
Section: (none)
QUESTION 17
Which of the following network cable types requires grounding?
A. Fiber
B. STP
C. Serial
D. UTP
Answer: B
Section: (none)
QUESTION 18
Which of the following protocols operate at layer 4 of the OSI model? (Select TWO).
A. HTTP
B. FTP
C. UDP
D. TCP
E. ICMP
Answer: CD
Section: (none)
QUESTION 19
A technician is troubleshooting a network connectivity issue. Given the following abbreviated traceroute
output:
1 192.168.1.1
2 172.16.40.1
3 10.4.0.1
4 172.16.40.1
A. IP conflict
B. Broadcast storm
C. Switching loop
D. Routing loop
Answer: D
Section: (none)
QUESTION 20
Which of the following features enables a firewall to inspect a packet based on connection status?
A. Signature identification
B. Stateless inspection
C. Port forwarding
D. Stateful inspection
Answer: D
Section: (none)
QUESTION 21
If an IPSec session is not working correctly, which of the following would a technician do FIRST?
Answer: D
Section: (none)
QUESTION 22
New service from the telephone company is delivered over fiber, but the technician does not have a fiber
module for the router. Which of the following would remedy this issue?
A. CSU/DSU
B. Media converter
C. Fiber repeater
D. OTDR
Answer: B
Section: (none)
QUESTION 23
Which of the following is a secure replacement for telnet console connections?
A. TLS
B. SSH
C. HTTPS
D. SIP
Answer: B
Section: (none)
QUESTION 24
Which of the following networks would MOST likely require EGP routing?
Answer: D
Section: (none)
QUESTION 25
Which of the following allows TCP/IP packets to be analyzed for possible threats?
A. IDS
B. DNS server
C. Proxy server
D. CSU
Answer: A
Section: (none)
QUESTION 26
Which of the following describes the ICMP protocol?
A. Layer 4 protocol
B. TCP protocol
C. Layer 3 protocol
D. UDP protocol
Answer: C
Section: (none)
QUESTION 27
A Linux user is reporting trouble accessing the Internet. After verifying that the workstation is authenticated
to the domain, which of the following should the administrator perform FIRST on the Linux workstation?
A. nslookup
B. ifconfig
C. ipconfig
D. dig
Answer: D
Section: (none)
QUESTION 28
Which of the following is a reason why satellite Internet should be avoided, if VoIP is being used?
A. One-way communication
B. Latency
C. Low bandwidth
D. Availability
Answer: B
Section: (none)
QUESTION 29
Which of the following is a secure method of transferring a file?
A. FTP
B. RCP
C. SCP
D. SSH
Answer: C
Section: (none)
QUESTION 30
An administrator indicates that the T1 line at a remote site can plug directly into the new router, eliminating
the need for a secondary device. Which of the following external devices is no longer needed?
A. CSU/DSU
B. VLAN
C. MDF
D. ATM
Answer: A
Section: (none)
QUESTION 31
An E1 connection contains how many lines?
A. 22
B. 24
C. 16
D. 32
Answer: D
Section: (none)
QUESTION 32
Which of the following is the MOST important factor to ensure wireless connectivity?
Answer: C
Section: (none)
QUESTION 33
Which of the following would an administrator use to standardize all cross connects on a RJ-45 jack?
A. Smart jack
B. 110 block
C. 66 block
D. Patch panel
Answer: D
Section: (none)
QUESTION 34
Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO).
A. OSPF
B. RIPv2
C. RIP
D. IGRP
E. EIGRP
Answer: CD
Section: (none)
QUESTION 35
Which of the following would need to be implemented on a wireless router to allow network access based
on a passphrase that the administrator would supply?
A. MAC filtering
B. SSID broadcast
C. WPA-PSK encryption
D. Port forwarding
Answer: C
Section: (none)
QUESTION 36
A technician needs to install additional access points for a new high speed connection being added in the
new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable
connections?
A. Smart Jack
B. 110 Block
C. Demarc
D. 66 Block
Answer: B
Section: (none)
QUESTION 37
An administrator needs to view the routing table on a UNIX system. Which of the following tools should be
used?
A. ifconfig
B. traceroute
C. netstat
D. nslookup
Answer: C
Section: (none)
QUESTION 38
After troubleshooting a network problem, a technician determines that the problem is not on the local
network but exists on the ISP network. Which of the following should the technician do NEXT?
A. Escalate the problem to the ISP for resolution.
B. Report the ISP to the IANA.
C. Visit the ISP data center and reboot their router.
D. Switch the Internet connection to a new ISP.
Answer: A
Section: (none)
QUESTION 39
Which of the following technologies was designed to provide the FASTEST data rates over analog phone
lines?
A. MPLS
B. RADSL
C. SONET
D. ADSL
Answer: D
Section: (none)
QUESTION 40
Which of the following protocols would MOST likely be used to provide for the simple movement of files
across two machines over the Internet?
A. NTP
B. SMTP
C. FTP
D. POP3
Answer: C
Section: (none)
QUESTION 41
Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic?
A. Hub
B. Repeater
C. Switch
D. Modem
Answer: A
Section: (none)
QUESTION 42
Which of the following is the MOST widely used VoIP protocol?
A. SIP
B. IAX
C. SCTP
D. H.264
Answer: A
Section: (none)
QUESTION 43
Which of the following protocols is used by a WAP to authenticate its identity with a server on the domain?
A. TKIP
B. RADIUS
C. CHAP
D. MS-CHAP
Answer: B
Section: (none)
QUESTION 44
Which of the following ports is associated with FTP?
A. 20
B. 53
C. 3389
D. 23
Answer: A
Section: (none)
QUESTION 45
Which of the following SNMP versions allows for authorization and encryption when connecting?
A. 2c
B. 3
C. 3c
D. 2
Answer: B
Section: (none)
QUESTION 46
When configured, MPLS can increase routing redundancy by providing which of the following network
topology types?
A. Bus
B. Mesh
C. Ring
D. Multipath
Answer: B
Section: (none)
QUESTION 47
Which of the following would MOST likely be used with multimode fiber?
A. 10GBaseT
B. 10GBaseSR
C. 10GBaseER
D. 10GBaseLR
Answer: B
Section: (none)
QUESTION 48
A link light on a network card refers to which of the following?
A. Auto duplex
B. Collision detection
C. Carrier sense
D. Multiple access points
Answer: C
Section: (none)
QUESTION 49
Which of the following components is typically used for voice transmissions and has a 10Mbps maximum
transfer speed?
A. Patch panel
B. 66 block
C. 110 block
D. Vertical cross connect
Answer: B
Section: (none)
QUESTION 50
Refer to the attached Exhibit. In the environment represented by the diagram, a technician is asked to
temporarily connect three printers to the network. They are to be placed physically next to the existing
network printer. The technician needs to install a new switch to connect these printers because all ports are
taken on the network. Which of the following locations on the network would be the BEST place for the
additional switch to be placed?
Answer: A
Section: (none)
QUESTION 51
Which of the following commands will display the routing table on a UNIX/Linux computer?
A. mtr
B. netstat
C. route
D. ipconfig
Answer: C
Section: (none)
QUESTION 52
Which of the following protocols uses a three-way handshake process before establishing a connection?
A. DNS
B. TFTP
C. UDP
D. TCP
Answer: D
Section: (none)
QUESTION 53
Which of the following can be used to mitigate network congestion from users streaming media?
A. Protocol analyzer
B. Caching gateway
C. Broadcast traffic optimization
D. Traffic shaping
Answer: D
Section: (none)
QUESTION 54
Which of the following devices is used to extend network coverage by helping to maintain the signal quality
of the original transmission?
A. Switch
B. Hub
C. Repeater
D. Modem
Answer: C
Section: (none)
QUESTION 55
Which of the following protocols is responsible for the delivery of email from server to server?
A. IMAP
B. SNMP
C. POP3
D. SMTP
Answer: D
Section: (none)
QUESTION 56
A workstation is having connectivity issues when being added to the domain. Which of the following
commands would allow the administrator to see the DNS and WINS servers that are currently configured
for the workstation?
A. nslookup
B. netstat
C. nbtstat
D. ipconfig
Answer: D
Section: (none)
QUESTION 57
A wireless access point supports up to 20 clients. Which of the following describes this wireless network?
A. Point to point
B. Ring
C. Mesh
D. Point to multipoint
Answer: D
Section: (none)
QUESTION 58
Which of the following commands can be used to add a default gateway to a host?
A. traceroute -d 192.168.1.1
B. ping -s 1 192.168.1.1
C. ifconfig eth0 192.168.1.1 255.255.255.0
D. route add 0.0.0.0 gw 192.168.1.1
Answer: D
Section: (none)
QUESTION 59
Which of the following is the default DNS port?
A. 143
B. 53
C. 23
D. 443
Answer: B
Section: (none)
QUESTION 60
Which of the following protocols allows dynamic addresses to be assigned to devices?
A. SNMP
B. ARP
C. SMTP
D. DHCP
Answer: D
Section: (none)
QUESTION 61
Which of the following is a distance vector routing protocol?
A. OSPF
B. EIGRP
C. IS-IS
D. RIP
Answer: D
Section: (none)
QUESTION 62
Which of the following processes translates a private IP address for a public IP address?
A. DNS
B. PAT
C. NAT
D. DHCP
Answer: C
Section: (none)
QUESTION 63
When a device wants to send a packet over the network, the process of listening to the network media to
see whether any other packets are sent is called:
Answer: B
Section: (none)
QUESTION 64
Which of the following documentation would be the BEST to use when determining the location of the wiring
closets?
A. Event logs
B. Logical network diagram
C. Physical network diagram
D. Job logs
Answer: C
Section: (none)
QUESTION 65
Which of the following controls are MOST effective when a route only supports remote configuration
changes via Telnet? (Select TWO).
A. Vulnerability scanner
B. Strong passwords
C. Port scanner
D. Two factor authentication
E. IP ACLs
Answer: DE
Section: (none)
QUESTION 66
An administrator would like to test the firewall rules on a corporate network. Which of the following tools
would MOST likely be used?
A. Port scanner
B. Packet sniffer
C. Traffic shaper
D. Ping sweep
Answer: A
Section: (none)
QUESTION 67
Which of the following connectors would be on a fiber cable?
A. DB-25
B. LC
C. BNC
D. DB-9
Answer: B
Section: (none)
QUESTION 68
Which of the following is true of an ACL when a packet matching an ACE is found?
A. The matching ACE is processed and then the last ACE is examined.
B. The matching ACE is processed and then the next ACE is examined.
C. The matching ACE is processed and the next packet is examined.
D. The matching ACE is skipped to allow all other ACEs to be examined.
Answer: C
Section: (none)
QUESTION 69
Which of the following devices will measure the amount of EMI that a network cable emits?
A. Protocol analyzer
B. OTDR
C. Cable tester
D. TDR
Answer: D
Section: (none)
QUESTION 70
Which of the following can be used by web developers to remotely and securely update content on a
website?
A. SNMP
B. SFTP
C. FTP
D. RCP
Answer: B
Section: (none)
QUESTION 71
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following
features needs to be configured to allow for this addition?
A. DHCP relay
B. Proxy server
C. DHCP server
D. Repeater
Answer: A
Section: (none)
QUESTION 72
Which of the following technologies allows an administrator to submit traffic to an IDS for review?
A. Port mirroring
B. VLAN
C. Spanning tree
D. PoE
Answer: A
Section: (none)
QUESTION 73
Which of the following describes an attack where all TCP flags are enabled on a packet?
A. DDos
B. Xmas attack
C. Smurf attack
D. DoS
Answer: B
Section: (none)
QUESTION 74
An administrator is setting up a security camera that will send the same feed to twelve of the twenty
workstations on the network. Which of the following addressing schemes was designed for this scenario?
A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer
Answer: A
Section: (none)
QUESTION 75
Which of the following is true of IPSec when operating in transport mode?
Answer: D
Section: (none)
QUESTION 76
As the number of networks and routers has grown, the technician finds that entering the routing information
for all customers in each router has become a time consuming and error prone process. Which of the
following should the technician do?
A. Keep routing assignments in an exportable spreadsheet.
B. Stop routing and bridge all connections.
C. Switch to a dynamic routing protocol.
D. Hire another technician to maintain routing assignments.
Answer: C
Section: (none)
QUESTION 77
Which of the following does the AP use to broadcast the SSID of the wireless network to allow clients to find
and connect to the network?
A. Association
B. Beacon
C. Probe
D. WPA
Answer: B
Section: (none)
QUESTION 78
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop
shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following
would BEST describe this connection speed?
Answer: D
Section: (none)
QUESTION 79
Which of the following protocols would an administrator use to backup files from a router to a local server?
A. DHCP
B. SMTP
C. NTP
D. TFTP
Answer: D
Section: (none)
QUESTION 80
Which of the following technologies attempts to avoid loops at Layer 2 of the OSI model?
A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN
Answer: C
Section: (none)
QUESTION 81
Which of the following is a secure method of copying information over a public network?
A. TFTP
B. SCP
C. SNMP
D. SMTP
Answer: B
Section: (none)
QUESTION 82
Which of the following is the MOST common WAN technology type used in residential homes?
A. Frame relay
B. MPLS
C. Cable modem
D. ATM
Answer: C
Section: (none)
QUESTION 83
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
A. 10GBaseSW
B. 10GBaseEW
C. 10GBaseER
D. 10GBaseLW
Answer: D
Section: (none)
QUESTION 84
A user reports that their laptop does not have network connectivity, but was working fine last week. The
technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1
address. This address is not part of the company¡¯ s subnet. Which of the following MOST likely identifies
this address type?
A. Multicast
B. APIPA
C. Broadcast
D. DHCP
Answer: B
Section: (none)
QUESTION 85
An administrator is troubleshooting crosstalk issues. Which of the following should the administrator check
FIRST?
A. Proxy settings
B. WLAN channels
C. Patch cables
D. Port duplex
Answer: C
Section: (none)
QUESTION 86
Which of the following is the rate in bits per second of a bearer channel in a PRI circuit?
A. 16 Kbps
B. 1.5 Mbps
C. 1 Mbps
D. 64 Kbps
Answer: D
Section: (none)
QUESTION 87
An administrator is implementing a wireless network. Which of the following encryption technologies is the
MOST secure method and will authenticate devices to the network?
A. WEP
B. VPN
C. SSH
D. WPA
Answer: D
Section: (none)
QUESTION 88
Users report an intermittent degradation of sound on their IP phones. Which of the following would a
network administrator do to alleviate the problem?
A. Configure QoS.
B. Configure VLAN trunking on the switch.
C. Use plenum cables.
D. Provide fault tolerance for the switch.
Answer: A
Section: (none)
QUESTION 89
Which of the following has a maximum data rate of 11Mbps?
A. 802.11a
B. 802.11g
C. 802.11n
D. 802.11b
Answer: D
Section: (none)
QUESTION 90
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a technician
do NEXT?
Answer: B
Section: (none)
QUESTION 91
When ordering switches for a new building, which of the following is the BEST way for the technician to
determine the number of switches to put in each network closet?
A. Count the number of phone ports and configure two network ports for each phone port.
B. Review the architectural plans to see how many drops go to each closet.
C. Count the number of rooms near each closet and standardize eight drops per room.
D. Wireless is the new standard and no network switches will be needed in the building.
Answer: B
Section: (none)