CompTIA CertifyMe N10-004 v2011-01-12 by Elvik

Download as pdf or txt
Download as pdf or txt
You are on page 1of 173

CompTIA_CertifyMe_N10-004_v2011-01-12_703q_By-Elvik

Number: N10-004
Passing Score: 800
Time Limit: 120 min
File Version: 2011-01-12

CompTIA - N10-004

Version - 2011-01-12

New material is added with examples and diagrams..

Best of luck

By - Elvik
Exam A

QUESTION 1
Which of the following connection methods is considered secure?

A. HTTPS
B. TELNET
C. RCP
D. HTTP

Answer: A
Section: (none)

QUESTION 2
Which of the following network cable types is LEAST susceptible to EMI?

A. UTP CAT5
B. UTP CAT3
C. Plenum STP CAT5
D. Coaxial

Answer: D
Section: (none)

QUESTION 3
Which of the following tools is used to connect analog telephony wire pairs to a block, such as a 110 or 66
block?

A. Butt set
B. Toner probe
C. Punch down tool
D. Protocol analyzer

Answer: C
Section: (none)

QUESTION 4
Which of the following protocols could be used in a peer-to-peer topology?

A. RADIUS
B. NetBIOS
C. IGMP
D. TACACS+

Answer: C
Section: (none)

QUESTION 5
A technician needs to install phones that will only require one cable for both data and power to be supplied.
Which of the following features MUST the switch support?
A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN

Answer: B
Section: (none)

QUESTION 6
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection.
Which of the following network technologies would BEST handle voice traffic prioritization above all other
data?

A. IPSec
B. Load balancing
C. QoS
D. PoE

Answer: C
Section: (none)

QUESTION 7
Which of the following activities will not be possible if the gateway IP address is set incorrectly on a client's
machines?

A. Pinging a remote computer


B. Printing over a local network
C. Sharing local network files
D. Sniffing the network traffic

Answer: A
Section: (none)

QUESTION 8
Which of the following is a commonly used protocol for VoIP network communication?

A. SNMP
B. DNS
C. SSH
D. RTP

Answer: D
Section: (none)

QUESTION 9
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet)
fiber runs?
A. 10GBase-ER
B. 10GBase-SR
C. 10GBase-SW
D. 100Base-FX

Answer: B
Section: (none)

QUESTION 10
When installing a new secure wireless network the administrator should turn on:

A. WPA and turn off SSID broadcast.


B. WPA and turn on SSID broadcast.
C. WEP and turn off SSID broadcast.
D. WEP and turn on SSID broadcast.

Answer: A
Section: (none)

QUESTION 11
A client attempts to connect to a network resource and is given an error message about their access being
restricted. Which of the following BEST describes the reason for denial?

A. The user's account is disabled.


B. The network resource is unavailable.
C. The user is not connected to the network.
D. The user's account failed to authenticate with correct permissions.

Answer: D
Section: (none)

QUESTION 12
Which of the following is strictly used to convert analog to digital signals?

A. Modem
B. Hub
C. NIC
D. Repeater

Answer: A
Section: (none)

QUESTION 13
A firewall is set to block inbound connections on port 25. Which of the following protocols would enable the
administrator to retrieve email without reconfiguring the firewall?

A. FTP
B. SNMP
C. POP3
D. SMTP

Answer: C
Section: (none)

QUESTION 14
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following
commands can be run on HOST A to determine the process attached to TCP port 4444?

A. netstat -nap
B. netstat -nav
C. ifconfig -a
D. ipconfig /all

Answer: B
Section: (none)

QUESTION 15
Which of the following describes what happens when a technician pings the broadcast address?

A. An ICMP loop floods the network


B. All clients on the subnet respond
C. All clients in the multicast group respond
D. The broadcast server responds

Answer: B
Section: (none)

QUESTION 16
The helpdesk has been informed that the company's ISP is experiencing network outages. Which of the
following commands can an administrator run to quickly locate and determine the TTL of the further
reachable node?

A. route
B. ping
C. arp
D. traceroute

Answer: D
Section: (none)

QUESTION 17
To ensure that VoIP phones are provided with power without using independent power supplies, switches
on the network must have which of the following features?

A. Spanning tree
B. VLAN tagging
C. PoE
D. PPPoE
Answer: C
Section: (none)

QUESTION 18
A network with twenty clients needs to view a video file. Which of the following should be configured on the
client's computers to reduce network traffic?

A. Class C addresses
B. Class A addresses
C. Multicast
D. Broadcast

Answer: C
Section: (none)

QUESTION 19
Which of the following protocols is the MOST secure for transferring network device configurations?

A. TFTP
B. SCP
C. RCP
D. FTP

Answer: B
Section: (none)

QUESTION 20
Which of the following tools is designed to send a signal through one end of a cable, so that it can be found
at the other end of the cable?

A. Toner probe
B. Multimeter
C. Voltage event recorder
D. Cable tester

Answer: C
Section: (none)

QUESTION 21
Which of the following ports does IPSec use, by default?

A. 500
B. 8080
C. 3389
D. 53

Answer: A
Section: (none)
QUESTION 22
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this?

A. Port mirroring
B. Spanning tree
C. PoE
D. VLAN

Answer: D
Section: (none)

QUESTION 23
Multiple users are reporting no connectivity after a recent power outage. An administrator needs a cable to
plug their laptop into the router in order to be able to console into it. Which of the following would the
administrator need to make this connection?

A. Loopback
B. 568B
C. Crossover
D. Rollover

Answer: D
Section: (none)

Explanation/Reference:
Explanation:
Although rollover cable isn't used for hooking Ethernet connections together, you can use it to connect a
host to a router console serial communication (com) port.

QUESTION 24
Which of the following protocols are commonly used for VoIP? (Select TWO).

A. NNTP
B. SIP
C. HSRP
D. NPP
E. RTP

Answer: BE
Section: (none)

QUESTION 25
Which of the following requires the pin-outs to be the same on both ends of a cable?

A. Straight
B. Rollover
C. Loopback
D. Crossover

Answer: A
Section: (none)

QUESTION 26
Which of the following WAN technologies allows for the fastest connection?

A. T1
B. SONET
C. OC-12
D. ADSL

Answer: B
Section: (none)

QUESTION 27
An administrator would like to determine which wire pair on a 100 block connects a jack in the next room.
Which of the following utilities would MOST likely be used to determine this?

A. Port scanner
B. Multimeter
C. Protocol analyzer
D. Toner probe

Answer: B
Section: (none)

QUESTION 28
Which of the following connectors can be used for serial connections?

A. SC
B. RS-232
C. BNC
D. ST

Answer: B
Section: (none)

Explanation/Reference:
Explanation:

Recommended Standard 232 (RS ? 232) was a cable standard commonly used for serial data signals
connecting data ? terminal equipment and data ? communications equipment, as when you connect a
computer's serial port to an external modem.

QUESTION 29
Which of the following is used by a company's ISP to troubleshoot network issues?

A. 110 Block
B. 66 Block
C. Smart Jack
D. Demarc
Answer: C
Section: (none)

QUESTION 30
After receiving network problem reports from users, the technician notices that the router is rebooting itself
several times a day. Which of the following would the technician do NEXT to further diagnose this problem?

A. Replace the router's memory and CPU.


B. Test the router's connection with a throughput tester.
C. Review the router's event logs.
D. Install redundant network connections to the router.

Answer: C
Section: (none)

QUESTION 31
A network has four switches; each switch has a physical link to all other switches. Which of the following
topologies is being used?

A. Star
B. Mesh
C. Point-to-multipoint
D. Ring

Answer: B
Section: (none)

QUESTION 32
The task of replacing hubs with switches reduces retransmissions by increasing which of the following?

A. Domain kiting
B. Broadcast domains
C. Collision domains
D. Frequency domains

Answer: C
Section: (none)

QUESTION 33
Which of the following device can connect multiple workstations, support VLANs, and function as a router?

A. Hub
B. Multilayer switch
C. Switch
D. Repeater

Answer: B
Section: (none)
QUESTION 34
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following
configuration management documentation would be the BEST choice to use?

A. Security policy
B. Baseline configurations
C. CAT5 wiring schematics
D. Physical network diagram

Answer: D
Section: (none)

QUESTION 35
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following
device types is being installed?

A. Intrusion detection
B. Proxy server
C. Bandwidth shaper
D. Load balancer

Answer: C
Section: (none)

QUESTION 36
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-
X. Which of the following cabling will need to be used?

A. Crossover
B. Loopback
C. Straight
D. Rollover

Answer: A
Section: (none)

QUESTION 37
Which of the following routing algorithms would provide the fastest convergence time?

A. A distance-vector algorithm
B. A path-vector algorithm
C. A link-state algorithm
D. A static algorithm

Answer: C
Section: (none)

QUESTION 38
Which of the following is a best practice when implementing a basic wireless network?
A. Configuring encryption with a WEP key and labeling the key on the WAP
B. Not configuring the ESSID point
C. Disabling ESSID broadcast
D. Adding two access points per area of service

Answer: C
Section: (none)

QUESTION 39
Which of the following ports would be commonly used for FTP traffic?

A. 23
B. 25
C. 22
D. 20

Answer: D
Section: (none)

QUESTION 40
Which of the following methods is used to provide access to a VPN?

A. RAS
B. IGP
C. PPTP
D. PPP

Answer: C
Section: (none)

QUESTION 41
All nodes on a subnet are experiencing network slowness. The administrator suspects an infected
computer is on the network and checks if a node is saturating the network. Which of the following tools
should be utilized in this situation?

A. Multimeter
B. IGMP
C. Port scanner
D. Protocol analyzer

Answer: D
Section: (none)

QUESTION 42
Which of the following is the metric used for OSPF?

A. Next hop
B. Bandwidth
C. Latency
D. Cost

Answer: B
Section: (none)

QUESTION 43
Which of the following would an administrator MOST likely require in order to connect a client to a WPA
encrypted network?

A. Pre-shared key
B. SSID
C. DSA public key
D. Gateway address
E. PIN

Answer: A
Section: (none)

QUESTION 44
Which of the following would MOST likely contain information about unlabeled datacenter connections?

A. Emergency call list


B. Procedures manual
C. Logical network diagram
D. Wiring schematic

Answer: D
Section: (none)

QUESTION 45
Which of the following mitigation techniques is MOST effective against a man-in-the-middle attack?

A. Encryption
B. Popup blocker
C. Authentication
D. ACL

Answer: C
Section: (none)

QUESTION 46
Which of the following network access security methods involves the analysis of a physical hardware
addresses?

A. MAC filtering
B. L2TP
C. RAS
D. IP filtering
Answer: A
Section: (none)

QUESTION 47
An administrator would like to monitor the network to evaluate which employees are using an excessive
amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would
BEST be used?

A. Throughput testing
B. Stateful packet inspection
C. Load balancing
D. Packet sniffing

Answer: D
Section: (none)

QUESTION 48
An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following
could be used to accomplish this connection?

A. Token ring
B. Optical media
C. Smart jack
D. Media converter

Answer: D
Section: (none)

QUESTION 49
Multiple users are reporting network issues. Before taking any course of action, which of the following is the
FIRST step a technician should take?

A. Create a plan of action and a final solution for the issues.


B. Document the solution and update all logical/physical network diagrams.
C. Gather information about the problems/symptoms.
D. Establish the probable cause behind the network issues.

Answer: C
Section: (none)

QUESTION 50
Which of the following protocols resolves MAC addresses from IP addresses?

A. RTP
B. ARP
C. DHCP
D. DNS

Answer: B
Section: (none)

QUESTION 51
Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)?

A. Fiber
B. Coaxial
C. Ethernet
D. Serial

Answer: C
Section: (none)

QUESTION 52
Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).

A. SNTP
B. HTTP
C. SFTP
D. RCP
E. SCP

Answer: CE
Section: (none)

QUESTION 53
In which of the following networking types can a computer be a client to other computers and act as a
server as well?

A. Peer to peer
B. Bus
C. Ring
D. VPN

Answer: A
Section: (none)

QUESTION 54
Which of the following is a direct advantage of having wireless standards?

A. Increased number of protocols can be used


B. Greater device security
C. Increased use of wireless spectrum
D. Interoperability between devices

Answer: D
Section: (none)
QUESTION 55
Which of the following wiring standards would MOST likely be used to connect a single network node to a
switch?

A. Loopback
B. Straight
C. Crossover
D. Rollover

Answer: B
Section: (none)

QUESTION 56
Which of the following are usually needed during manual configuration of a client on an 802.11g network
segment using DHCP and WEP? (Select TWO)

A. Name servers
B. Subnet mask
C. SSID
D. Shared key
E. IP address

Answer: CD
Section: (none)

QUESTION 57
Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly
together?

A. Open circuit
B. Attenuation
C. Collision
D. Crosstalk

Answer: D
Section: (none)

QUESTION 58
A user has reported slow network response in a large training room; the class requires many students to
access the same website each day. Which of the following would BEST remedy this problem?

A. Firewall
B. Caching engine
C. Jitter correction
D. Fault tolerance

Answer: B
Section: (none)
QUESTION 59
A user is reporting issues connecting to the corporate web server. When analyzing the output from a packet
sniffer an administrator sees:

Client-> Server SYN


Server ->Client ACK
Client-> Server RST

Which of the following is the user experiencing?

A. The server is failing to properly respond.


B. The 3-way handshake is complete but the browser is unresponsive.
C. The client is prematurely closing the connection.
D. The server is prematurely closing the connection.

Answer: C
Section: (none)

QUESTION 60
A media converter is also known as a:

A. transceiver.
B. hub.
C. modem.
D. repeater.

Answer: A
Section: (none)

QUESTION 61
Which of the following protocols uses port 143 by default?

A. IMAP4
B. NTP
C. SSH
D. SNMP

Answer: A
Section: (none)

QUESTION 62
The primary goal of implementing network QoS features is

A. Provide fault tolerance to the network design.


B. Increase network throughput.
C. Prevent undesirable network traffic from entering the network.
D. Provide predictable network performance.

Answer: D
Section: (none)
QUESTION 63
Which of the following BEST explains the function of OSI layer 4?

A. Connecting hosts on the same segment


B. Routing packets across segments
C. Reliable delivery of packets
D. Specifying signal timing and amplitude

Answer: C
Section: (none)

QUESTION 64
The 802.11n protocol operates at which of the following layers of the OSI model? (Select TWO).

A. Layer 2
B. Layer 1
C. Layer 4
D. Layer 5
E. Layer 3

Answer: A
Section: (none)

QUESTION 65
Which of the following exchanges routing information between two autonomous systems?

A. OSPF
B. IGP
C. EIGRP
D. EGP

Answer: D
Section: (none)

QUESTION 66
An administrator wants to monitor live traffic on a switch to determine if a malicious source is broadcasting
ARP traffic. Which of the following utilities would BEST accomplish this?

A. Switchport mapper
B. Network mapper
C. Packet sniffer
D. Packet injector

Answer: C
Section: (none)

QUESTION 67
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?

A. 255.255.255.240
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.240.0

Answer: D
Section: (none)

QUESTION 68
Which of the following devices does not limit network broadcast traffic and does not increase performance?

A. Switch
B. Brouter
C. Hub
D. Router

Answer: C
Section: (none)

QUESTION 69
Which of the following would be sent to an SNMP network management system in the event that a failure or
predefined threshold was crossed?

A. SNMP trap
B. History log
C. System log
D. SNMP agent

Answer: A
Section: (none)

QUESTION 70
Where does the responsibility for maintenance and support shift from the telecommunication company to
the customer?

A. Demarc
B. Where the telecommunication lines enter the building
C. Central office
D. Smart jack

Answer: A
Section: (none)

QUESTION 71
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client
sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a
response?
A. 2 and 3
B. 1 and 2
C. 5 and 6
D. 3 and 6

Answer: D
Section: (none)

Explanation/Reference:
Explanation:
The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and
100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.

QUESTION 72
An administrator suspects that packets to an IP address are being dropped over the internet. Which of the
following tools would be the BEST to determine the hop that is dropping the packets?

A. netstat
B. traceroute
C. nslookup
D. ping

Answer: B
Section: (none)

QUESTION 73
A mobile user reports that after receiving a new patch cable for their laptop, the laptop is unable to connect
to the network. An administrator verifies that the port is configured correctly and the LAN drop is active.
Which of the following is the MOST likely cause?

A. Crosstalk on the cable


B. Speed mismatch
C. Duplex mismatch
D. Open pairs are present

Answer: C
Section: (none)

QUESTION 74
A user calls network support and reports that email is not working. Which of the following should the
technician do FIRST?

A. Determine which mail hub the user was connected to and perform a graceful restart.
B. Ask the user what operation was performed, what the expected result was, and what the actual result
was.
C. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network
administrator if needed.
D. Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is
sent.

Answer: B
Section: (none)
QUESTION 75
A technician moves a VoIP phone to a new location, but discovers the phone does not start up when
plugged into the network. Which of the following explains this situation?

A. The switch does not support PoE.


B. The phone needs a fiber port.
C. QoS is not enabled on the switch.
D. The jack needs to be rewired using the 568B standard.

Answer: A
Section: (none)

QUESTION 76
Which of the following is a secure way to transfer files from one device to another?

A. TFTP
B. SFTP
C. SNMPv3
D. FTP

Answer: B
Section: (none)

QUESTION 77
Internet-working devices operate at OSI layer:

A. 5
B. 2
C. 4
D. 3

Answer: D
Section: (none)

QUESTION 78
VLANs occur at which of the following layers of the OSI model?

A. 2
B. 3
C. 4
D. 1

Answer: A
Section: (none)

QUESTION 79
Where would a technician MOST likely place the company MX and A records?
A. Firewall
B. Proxy server
C. DNS server
D. Load balancer

Answer: C
Section: (none)

QUESTION 80
A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps
should be done FIRST to diagnose the problem?

A. Compare wiring schematics to industry standards.


B. Escalate the problem to administrative technician.
C. Identify symptoms and draw a network diagram.
D. Use a port analyzer to determine network topology.

Answer: C
Section: (none)

QUESTION 81
A particular route's destination address is referred to as the:

A. link state.
B. next hop.
C. shot vector.
D. RIP peer.

Answer: B
Section: (none)

QUESTION 82
When installing an access point, which of the following encryption schemes should be implemented to
BEST secure the network?

A. WEP
B. WPA
C. WPA with PSK
D. WPA2 with PSK

Answer: D
Section: (none)

QUESTION 83
A network administrator would MOST likely use a port scanner to do which of the following?

A. Trace a physical network port through a building.


B. Capture incoming network packets to port 80 on a workstation.
C. Report the link speed and duplex of all ports on a switch.
D. Remotely test a firewall configuration on a server.

Answer: D
Section: (none)

QUESTION 84
IGP differs from EGP because IGP is designed for use in which of the following?

A. Communication between networks


B. Communication between WANs
C. Single non-autonomous network
D. Single autonomous network

Answer: D
Section: (none)

QUESTION 85
A small company needs to temporarily extend its call center by ten employees. The company decides to
rent office space on the opposite side of the building; the two spaces are 400 feet (122 meters) apart.
Which of the following is the MOST cost effective solution?

A. Install gigabit switches and run Ethernet.


B. Install a new T1 line for that office.
C. Use a wireless repeater and a WAP.
D. Connect the two offices with fiber.

Answer: C
Section: (none)

QUESTION 86
An end user is able to connect to a wireless network and is able to browse the internet, yet is unable to
access network servers. Which of the following is the MOST likely cause of the problem?

A. There is a problem with the DNS server.


B. The network card is malfunctioning.
C. The end user is connected to the incorrect wireless network.
D. The device is configured with an incorrect subnet mask.

Answer: C
Section: (none)

QUESTION 87
Which of the following describes a routing table that needs to be maintained manually?

A. Static
B. Link-state
C. Dynamic
D. Hop count based
Answer: A
Section: (none)

QUESTION 88
An application layer firewall is MOST beneficial when used with which of the following protocols?

A. GRE
B. VoIP
C. HTTP
D. SNMP

Answer: D
Section: (none)

QUESTION 89
Which of the following classes is the address 208.177.23.1?

A. Class A
B. Class B
C. Class D
D. Class C

Answer: D
Section: (none)

QUESTION 90
Which of the following is the BEST tool to use when terminating a network jack?

A. Snips
B. Toner probe
C. Punch down
D. Cable stripper

Answer: C
Section: (none)

QUESTION 91
A technician wishes to implement network authentication at the switch port level. Which of the following
standards is designed to accomplish this?

A. TKIP
B. WPA2
C. 802.1ad
D. 802.1x

Answer: D
Section: (none)
QUESTION 92
Which of the following uses a certificate for a tunneling connection?

A. PPTP
B. SSL VPN
C. VNC
D. RDP

Answer: B
Section: (none)

QUESTION 93
Which of the following technologies is the MOST cost-effective when protecting a large number of
networked workstations from external attacks?

A. External scanning service


B. Host-based IDS
C. Network-based IPS
D. Network-based firewall

Answer: D
Section: (none)

QUESTION 94
A technician would use a logical network diagram to determine the number of:

A. Cables in the network.


B. Users on the network.
C. Broadcast domains on the network.
D. Switches on the network.

Answer: C
Section: (none)

QUESTION 95
A workstation on the network can ping hosts on the network but it cannot ping any addresses on the
internet. Other hosts on the same network can connect to the internet. Which of the following should the
technician check?

A. The hosts file


B. The default gateway
C. The DNS server entries
D. The network card

Answer: B
Section: (none)

QUESTION 96
SONET is normally associated with which of the following?
A. Point to multipoint
B. Bus
C. Point to point
D. Ring

Answer: D
Section: (none)

QUESTION 97
An administrator wants to connect users at three branch offices to the main office through the internet.
Which of the following devices should the administrator install at the main office to BEST accomplish this
goal?

A. IPS sensor
B. Proxy server
C. VPN concentrator
D. Layer 2 switch

Answer: C
Section: (none)

QUESTION 98
Which of the following tools can be used to determine the MAC address of a machine on the local subnet?

A. dig
B. ping
C. arp
D. host

Answer: C
Section: (none)

QUESTION 99
An administrator is troubleshooting network connectivity and would like to view the path that packets are
taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to
use?

A. traceroute
B. ping
C. nslookup
D. route

Answer: A
Section: (none)

QUESTION 100
An administrator is at a client's site to figure out an intermittent network problem. Which of the following is
the FIRST step in the troubleshooting methodology that should be performed?
A. Create an action plan and solution identifying potential effects.
B. Identify the affected areas of the network.
C. Gather information.
D. Implement and test the solution.

Answer: C
Section: (none)

QUESTION 101
An administrator has determined that auto-negotiation has failed on a connection. Which of the following
are the MOST important settings that should be matched on each side of the connection?

A. Port speed, port duplex, flow control


B. VLAN assignment, port authentication, flow control
C. IP address, OSPF area, route propagation
D. Port enable, port mirroring, link aggregation

Answer: A
Section: (none)

QUESTION 102
Information gathering and diagnostics indicate that a worm has infected the local database server and its
clients, and is saturating local network with traffic. Which of the following is the NEXT step for a technician?

A. Run a virus scan on all local workstations.


B. Shutdown the database server
C. Contact the DBA to consider escalation.
D. Scan the database server log for remote connections.

Answer: B
Section: (none)
Exam B

QUESTION 1
After adding a new cable segment to the network, the technician should:

A. Update the wiring schematics.


B. Create a new baseline document.
C. Document the changes in the business continuity plan.
D. Update the disaster recovery plan.

Answer: A
Section: (none)

QUESTION 2
A company needs to perform stateful packet filtering on the core network. Which of the following network
devices would BEST be suited to match this equipment?

A. DHCP server
B. Router ACLs
C. Proxy
D. Firewall

Answer: D
Section: (none)

QUESTION 3
Which of the following describes how original network diagrams contained in the documentation should be
maintained?

A. Used as a point-in-time reference but never relied upon


B. Used only to satisfy a network upgrade checklist requirement
C. Regular audits to ensure that diagrams remain accurate
D. Considered to be the only source-of-truth of the network state

Answer: C
Section: (none)

QUESTION 4
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network
devices? (Select TWO).

A. Workstation
B. Server
C. Laptop
D. Hub
E. Printer

Answer: BE
Section: (none)
QUESTION 5
TCP occurs at which layer of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 3

Answer: C
Section: (none)

QUESTION 6
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and
MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which
of the following is the MOST likely cause of this problem?

Internet Address Physical Address Type


172.30.0.5 00-30-48-82-72-8c dynamic
172.30.0.100 00-15-5d-22-44-8d dynamic
172.30.0.101 00-15-5d-72-7a-be dynamic

A. Static ARP entries


B. Reverse ARP failure
C. IP address conflict
D. MAC spoofing

Answer: D
Section: (none)

QUESTION 7
Which of the following standards provides port authentication?

A. 802.1x
B. 802.1q
C. 802.11
D. 802.2

Answer: A
Section: (none)

QUESTION 8
Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss?

A. 100 feet (30.5meters)


B. 328 feet (100 meters)
C. 358 feet (109.12meters)
D. 207 feet (63.1 meters)

Answer: B
Section: (none)
QUESTION 9
How many potential MAC address schemes are possible?

A. 2<sup>48</sup>
B. 2<sup>64</sup>
C. 2<sup>46</sup>
D. 2<sup>32</sup>

Answer: A
Section: (none)

Explanation/Reference:
Explanation:
The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme. This 48-
bit address space contains potentially 2 or 281,474,976,710,656 possible MAC addresses.

QUESTION 10
Which of the following is the GREATEST concern when using an orbital satellite WAN link?

A. Duplex
B. Collisions
C. Latency
D. Cable length

Answer: C
Section: (none)

QUESTION 11
An administrator has a networking closet on the first floor of a building with all of the network and
communication equipment. However, the telephony provider installed the communications line in the
basement. Which of the following needs to be extended to connect the line to the networking closet?

A. Demarcation point
B. Router
C. Smart jack
D. Patch panel

Answer: D
Section: (none)

QUESTION 12
A port scanner is used by network administrator for which of the following?

A. To determine open ports on network hosts


B. To secure switches and routers
C. To make a physical network diagram
D. To find routers with weak passwords

Answer: A
Section: (none)
QUESTION 13
Which of the following devices can be used to breakup a broadcast domain?

A. Router
B. Bridge
C. DHCP server
D. Unmanaged switch

Answer: A
Section: (none)

QUESTION 14
Which of the following WAN technologies requires fiber optics?

A. PSTN
B. POTS
C. SONET
D. ADSL

Answer: C
Section: (none)

QUESTION 15
Which of the following pairs should be crossed to create a crossover cable?

A. 5,6 and 7,8


B. 1,2 and 3,6
C. 4,5 and 6,7
D. 1,2 and 3,4

Answer: B
Section: (none)

QUESTION 16
A new LAN switch is installed with on fiber ports. Which of the following would a technician need on the new
switch to allow compatibility to the existing fiber network?

A. Repeater
B. Router
C. Hub
D. Media converter

Answer: D
Section: (none)

QUESTION 17
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch
panel?
A. Multimeter
B. Cable crimper
C. Toner probe
D. Punch down tool

Answer: B
Section: (none)

QUESTION 18
Which of the following authentication mechanisms on a wireless network uses a separate network
authentication server?

A. TKIP
B. Kerberos
C. WEP
D. RADIUS

Answer: D
Section: (none)

QUESTION 19
An administrator has configured two hosts as follows:

HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1

HOSTB
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1

Which of the following MUST be changed in order to allow HOST A to talk to HOST B?

A. HOST A netmask to 255.255.255.0


B. HOST B netmask to 255.255.252.0
C. HOST B IP address to192.168.2.200
D. HOST A IP address to192.168.2.100

Answer: C
Section: (none)

QUESTION 20
Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a
cubicle corresponds to a given RJ-45 jack in a patch panel?

A. Spectrum analyzer
B. Multimeter
C. Punch-down tool
D. Toner probe
Answer: B
Section: (none)

QUESTION 21
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of
the following cable types should the administrator plan to use?

A. CAT6 copper
B. RG-6 copper
C. Multimode fiber
D. Single-mode fiber

Answer: C
Section: (none)

QUESTION 22
An administrator has determined that auto-negotiation has failed on a connection. Which of the following
are the MOST important settings that should be matched on each side of the connection?

A. Port speed, port duplex, flow control


B. VLAN assignment, port authentication, flow control
C. IP address, OSPF area, route propagation
D. Port enable, port mirroring, link aggregation

Answer: A
Section: (none)

QUESTION 23
In a new wireless network installation, the administrator has successfully installed and tested the
equipment. The NEXT step after turning wireless access on would be to:

A. Perform a war drive to test for vulnerabilities.


B. Configure the DHCP server.
C. Document the physical layout.
D. Configure wireless adapters.

Answer: C
Section: (none)

QUESTION 24
Which of the following physical connections allows for the BEST performance when connecting to a VPN
server for a remote user?

A. Baseband
B. POTS
C. Broadband
D. Satellite

Answer: C
Section: (none)

QUESTION 25
Which of the following commands would test the loopback adapter of an internal NIC?

A. ping 127.127.0.0
B. ping 127.0.0.1
C. ping 127.1.1.1
D. ping 127.127.1.0

Answer: B
Section: (none)

QUESTION 26
Which of the following networking protocols is used to give the remote computer secure command line
access to the server?

A. ICMP
B. RTP
C. SSH
D. Telnet

Answer: C
Section: (none)

QUESTION 27
After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass.
Which of the following terms BEST describes this firewall behavior?

A. Stateful inspection
B. Intrusion detection
C. Passive fingerprinting
D. Content filtering

Answer: A
Section: (none)

QUESTION 28
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the
officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective
solution?

A. Switch to static IP addressing.


B. Add a router to connect both networks.
C. Change the subnet mask to 255.255.254.0.
D. Request another class C IP scope from the ISP.

Answer: C
Section: (none)
QUESTION 29
Which of the following replaces the destination IP address of a packet?

A. SNAT
B. NAT
C. DNS
D. DHCP

Answer: A
Section: (none)

QUESTION 30
Which of the following commands would MOST likely be used to list the status of all established TCP
connections on port 80?

A. netstat -r
B. netstat -v
C. netstat -aupn
D. netstat -at
E. netstat -p tcp

Answer: E
Section: (none)

QUESTION 31
Which of the following network devices would MOST likely be installed to allow a fiber optic cable to be
plugged into a network device with only RJ-45 connections?

A. Hub
B. Media convertor
C. Basic switch
D. WAP

Answer: B
Section: (none)

QUESTION 32
Mobile users are connecting from sites that have strong security policies and filter most traffic except
HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?

A. RDP access
B. Dial-in access
C. IPSec VPN
D. SSL VPN

Answer: D
Section: (none)
QUESTION 33
Which of the following is an acceptable method for deciding placement of wireless access points?

A. A site survey
B. Where there are electrical service and network connections available
C. Every 300 feet (91 meters)
D. In the middle of each room

Answer: A
Section: (none)

QUESTION 34
A technician has deployed multiple temperature monitoring devices with IP addresses in the 10.137.24.0/25
network. Such devices must receive an ICMP keep-alive packet from the server every five minutes. Which
of the following destination IP addresses must the technician configure on the server to send keep-alive
packets to all the devices?

A. 10.137.24.0
B. 10.137.24.127
C. 10.137.24.128
D. 10.137.24.1

Answer: B
Section: (none)

QUESTION 35
Which of the following is a correct Ethernet MAC address?

A. 16-15-4D-31-59-5J
B. 11:34:7A:88:0C:DB
C. 12:7H:45:89:9F:65
D. 12-88-FF-9X-58-9E

Answer: B
Section: (none)

QUESTION 36
Users utilizing wireless laptops in an outdoor storage yard are experiencing new connectivity issues. Which
of the following is MOST likely causing the new issues?

A. Signal bounce
B. Antenna distance
C. Environment factors
D. Antenna placement

Answer: C
Section: (none)

QUESTION 37
Plenum cable should be used to:

A. protect against ESD.


B. decrease cost.
C. comply with fire codes.
D. increase reliability.

Answer: C
Section: (none)

QUESTION 38
The MAIN difference between an IDS and an IPS is the:

A. IDS blocks malicious activity while the IPS only alerts about malicious activity.
B. IDS is an inline system while the IPS is placed on a span port and has no IP address.
C. IPS blocks malicious activity while the IDS only alerts about malicious activity.
D. IDS uses a deterministic engine while the IPS uses probabilistic engine.

Answer: C
Section: (none)

QUESTION 39
An administrator wants to provide redundant paths to network resources in case a link fails. Which of the
following switch features would the administrator need to use to accomplish this task?

A. Trunking
B. Spanning tree
C. VLAN
D. PoE

Answer: B
Section: (none)

QUESTION 40
An administrator needs to check the number of active connections on their computer. Which of the
following should be administrator use?

A. dig
B. ping
C. netstat
D. ipconfig

Answer: C
Section: (none)

QUESTION 41
Which of the following describes an email that is sent to users with web links that direct them to malicious
websites?
A. Rogue access points
B. Man-in-the-middle
C. Phishing
D. Viruses

Answer: C
Section: (none)

QUESTION 42
Which of the following methods is used in creating an ACL?

A. IP filtering
B. VPNs
C. Content filtering
D. PPPs

Answer: A
Section: (none)

QUESTION 43
Which of the following can be used to help verify that a remote web server is not blocked by a firewall?

A. Toner probe
B. Protocol analyzer
C. Port scanner
D. Packet injector

Answer: C
Section: (none)

QUESTION 44
Which of the following WAN technology types does not use an Ethernet cable as a medium for
communication and is used for long distances?

A. DSL
B. E3/T3
C. ATM
D. WiMAX

Answer: D
Section: (none)

QUESTION 45
Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and
broadcast addresses on network clients and workstations?

A. DHCP server
B. Smart jack
C. Network bridge
D. Layer 2 switch

Answer: A
Section: (none)

QUESTION 46
Which of the following commands can be used to find the MAC address of a connecting router?

A. traceroute
B. arp
C. ping
D. ping sweep

Answer: B
Section: (none)

QUESTION 47
Which of the following OSI layers does a Layer 3 switch operate at? (Select TWO).

A. Presentation
B. Network
C. Transport
D. Data link
E. Session

Answer: B
Section: (none)

QUESTION 48
Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet?

A. RSH
B. SNAT
C. SSH
D. TFTP

Answer: C
Section: (none)

QUESTION 49
A LAN support team is installing new cables when all networked applications slow and then stop working.
Switches in the server room show all connected ports at 100% activity. Which of the following has MOST
likely occurred?

A. Cable run has a break.


B. Switching loop.
C. New switch port is in wrong VLAN.
D. Cable run has a short.
Answer: B
Section: (none)

QUESTION 50
Which of the following Internet technologies would provide the GREATEST bandwidth?

A. T3
B. OC3
C. Cable
D. T1

Answer: B
Section: (none)

QUESTION 51
Which of the following is the MOST appropriate policy for updating physical network diagrams?

A. Update before regularly scheduled network audits.


B. Update whenever a connection is changed.
C. Update after weekly network support team review.
D. Update after new personnel are hired.

Answer: B
Section: (none)

QUESTION 52
A private AS number is useful in which of the following situations?

A. Enterprise network without redundant links


B. Isolated network at a single site
C. Internet multihoming with all ISPs in same BGP area
D. Internet multihoming with multiple carriers

Answer: C
Section: (none)

QUESTION 53
Which of the following would a technician set up for a building to building within a campus?

A. MDF
B. EMI
C. IDF
D. ESD

Answer: C
Section: (none)

QUESTION 54
A user contacts a technician and states, "The network is down." After further investigation the user is unable
to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help
determine the root cause of the problem?

A. Unplug and then plug the network cable back in.


B. Reboot the core router.
C. Have the user run netstat.
D. Have the user ping the default gateway.

Answer: C
Section: (none)

QUESTION 55
Which of the following transport protocols should be used to avoid retransmitting lost packets?

A. TCP
B. IGMP
C. ARP
D. UDP

Answer: D
Section: (none)

QUESTION 56
An administrator would like to evaluate network traffic. Which of the following tools should the administrator
use?

A. OTDR
B. Certifier
C. Toner probe
D. Protocol analyzer

Answer: D
Section: (none)

QUESTION 57
Which of the following network protocols is used for sending outbound email from a host?

A. POP
B. RTP
C. IMAP
D. SMTP

Answer: D
Section: (none)

Explanation/Reference:
Explanation:
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote
server to a local email client. POP3 allows you to download email messages on your local computer and
read them even when you are offline.
The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web
server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for
retrieving emails. Both protocols are supported by all modern email clients and web servers.
Main difference between IMAP and POP3:
The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the IMAP
protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your mailbox is about to
be managed by multiple users. Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending
emails across the Internet. SMTP uses TCP port 25.

QUESTION 58
A solution provided less than ideal results, and the technician is forced to go back and devise a new
solution. Which of the following would be done NEXT, assuming probable cause is established and
escalation is not necessary?

A. Create an action plan and accompanying solution.


B. Document the solution and steps taken during the process.
C. Gather information about the problem.
D. Determine if anything has changed.

Answer: A
Section: (none)

QUESTION 59
Which of the following technologies can prevent a department's network broadcast from propagating to
another department's network if they are located on the same switch?

A. A VLAN
B. A hub
C. A trunk
D. A firewall

Answer: A
Section: (none)

QUESTION 60
Which of the following can be used to find the location of a cable short?

A. Multimeter
B. TDR
C. Protocol analyzer
D. CSU/DSU

Answer: B
Section: (none)

Explanation/Reference:
Explanation:
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in
metallic cables (for example, twisted wire pairs, coaxial cables).

QUESTION 61
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX.
Which of the following should the administrator do NEXT?
A. Update the wiring schematics
B. Update the switch configuration logs
C. Reboot the switch to enable the new connection
D. Update the logical network diagram

Answer: A
Section: (none)

QUESTION 62
Which of the following defines the required distance between each LAN drop that will be installed within a
building?

A. Acceptance use policy


B. Wiring schematics
C. Company regulations
D. Logical network diagrams

Answer: B
Section: (none)

QUESTION 63
Which of the following command line tools can be used to display listening sockets and established
connections on the local computer?

A. ipconfig
B. nbtstat
C. nslookup
D. netstat

Answer: D
Section: (none)

QUESTION 64
Which of the following commands is MOST appropriate to determine whether a network interface is up or
down?

A. ISAKMPD
B. IFCONFIG
C. ARP
D. SNORT

Answer: B
Section: (none)

QUESTION 65
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?

A. 802.11n
B. 802.11a
C. 802.11b
D. 802.11g

Answer: A
Section: (none)

QUESTION 66
Which of the following allows an administrator to view malicious activity after it has taken place?

A. IDS
B. IPS
C. Packet sniffer
D. Port scanner

Answer: A
Section: (none)

QUESTION 67
Which of the following is an IPv6 address for localhost?

A. FFFF:127.0.0.1
B. 127::
C. FF::0
D. ::1

Answer: D
Section: (none)

QUESTION 68
An administrator wishes to determine if there is a service listening on port 1433 on a server. Which of the
following tools would the administrator use to determine this?

A. route
B. net start
C. netstat
D. ipconfig

Answer: C
Section: (none)

QUESTION 69
Which of the following BEST describes a device that helps resolve IP addresses into FQDNs?

A. DHCP server
B. DNS server
C. Firewall
D. Content switch
Answer: B
Section: (none)

QUESTION 70
Which of the following connection methods is considered unsecure and allows a connection to a machine in
terminal emulation mode?

A. TELNET
B. HTTPS
C. RCP
D. HTTP

Answer: A
Section: (none)

QUESTION 71
An administrator needs to test connectivity between two devices located on the same internal network.
Which of the following commands would MOST likely be used?

A. nslookup
B. traceroute
C. ping
D. ipconfig

Answer: C
Section: (none)

QUESTION 72
Which of the following is true about an IP address if the first four bits are all a one?

A. The address is a Class C address.


B. The address is a Class E address.
C. The address is a Class D address.
D. The address is a Class A address.

Answer: B
Section: (none)

QUESTION 73
An administrator would like to segment traffic into two logical networks on a single switch. Which of the
following technologies should be implemented?

A. VPN
B. LAN
C. VLAN
D. VDSL

Answer: C
Section: (none)
QUESTION 74
Windows users are reporting that they cannot connect to legacy file servers. Ping attempts to the file server
and WINS server were successful. Which of the following tools should be used NEXT?

A. TRACERT
B. IPCONFIG
C. NSLOOKUP
D. NBTSTAT

Answer: D
Section: (none)

QUESTION 75
Which of the following is the BEST device to use in order to implement a VLAN on the network?

A. Proxy server
B. VPN
C. VNC
D. Switch

Answer: D
Section: (none)

QUESTION 76
Which of the following devices should be used to segment two networks?

A. Media converter
B. Hub
C. Bridge
D. Repeater

Answer: A
Section: (none)

QUESTION 77
CAT5e cable running to a network closet should always be

A. punched down on a 66 block.


B. placed in a separate VLAN.
C. spliced into a 100-pair cable.
D. terminated in a patch panel.

Answer: D
Section: (none)

QUESTION 78
Which of the following features of a network switch eliminates the need for cross-over cables?
A. 802.1x
B. Auto-MDIX
C. IGMP snooping
D. VLANs

Answer: B
Section: (none)

QUESTION 79
Which of the following is MOST likely to be used for telephone wires connected to the plain old telephone
service (POTS)?

A. CAT6 patch panels


B. 66 block
C. Smart jacks
D. 110 block

Answer: B
Section: (none)

QUESTION 80
A user is having problems accessing the wireless network with a gaming device. Which of the following is
the MOST likely cause of the problem?

A. The device does not support 802.1 p.


B. WPA2 is not supported by the device.
C. Broadcast prevention is enabled on the switch.
D. PoE is not enabled over wireless.

Answer: B
Section: (none)

QUESTION 81
A network engineer is logged onto a router and attempts to ping a host from the router. The first set of ping
packets has a 25% success rate. Several subsequent ping attempts all have a 100% success rate. Which
of the following describes the MOST likely reason?

A. Intermittent issues are present caused by faulty network cabling


B. Network denial of service attack is present.
C. Router was still attempting to learn ARP address.
D. Firewall was initially blocking the ping attempts.

Answer: C
Section: (none)

QUESTION 82
Which of the following LAN technologies has the GREATEST throughput speed?

A. 10BaseF
B. 10BaseTX
C. 10BaseFX
D. 10BaseT

Answer: A
Section: (none)

QUESTION 83
An administrator notices that collisions are repeatedly occurring on a hub. Which of the following would be
the BEST way to help reduce these collisions?

A. Replace the hub with a switch.


B. Install a bridge on the network.
C. Setup VLANs on the hub.
D. Use a static IP address on the network.

Answer: A
Section: (none)

QUESTION 84
Which of the following protocols is used to establish multicast groups?

A. OSPF
B. DHCP
C. RIP
D. IGMP

Answer: D
Section: (none)

QUESTION 85
Which of the following configuration management documents would an administrator use to configure a
new router's ACL for a new network?

A. Logical network diagram


B. Router history and log information
C. Wiring schematics
D. Network procedures and configurations

Answer: D
Section: (none)

QUESTION 86
At which of the following layers of the OSI model does a router reside?

A. Layer 1
B. Layer 5
C. Layer 7
D. Layer 3
Answer: D
Section: (none)

QUESTION 87
Information gathering and diagnostics indicate that a worm has infected the local database server and its
clients, and is saturating local network with traffic. Which of the following is the NEXT step for a technician?

A. Run a virus scan on all local workstations.


B. Shutdown the database server
C. Contact the DBA to consider escalation.
D. Scan the database server log for remote connections.

Answer: B
Section: (none)

QUESTION 88
Which of the following devices is MOST commonly used to create a DMZ?

A. Bastion host
B. Firewall
C. Honeypot
D. Repeater

Answer: B
Section: (none)

QUESTION 89
Which of the following is an example of a private IP address?

A. 11.0.0.8
B. 172.17.22.201
C. 192.165.107.29
D. 64.64.105.22

Answer: B
Section: (none)

QUESTION 90
Which of the following standards uses 5GHz frequency for network communications?

A. 802.11g
B. 802.11b
C. 802.3
D. 802.11a

Answer: D
Section: (none)
QUESTION 91
A port that can use 10/100/1000 speeds MOST commonly uses which of the following physical media?

A. Coax
B. Copper
C. Fiber
D. Wireless

Answer: B
Section: (none)

QUESTION 92
Which of the following is the MAXIMUM segment distance for 100BaseTX?

A. 100 meters (328 feet)


B. 30 meters (100 feet)
C. 1000 meters (3281 feet)
D. 305 meters (1000 feet)

Answer: A
Section: (none)

QUESTION 93
A technician needs to extend the telephone company's original point of entry into the companies Telco
closet. Which of the following will need to be extended?

A. Smart Jack
B. 66 Block
C. 110 Block
D. Demarc

Answer: D
Section: (none)

QUESTION 94
Which of the following protocols functions at the transport layer of the OSI model?

A. RTP
B. SIP
C. UDP
D. TCP

Answer: CD
Section: (none)

QUESTION 95
Which of the following features of a switch allows all VLANs to pass through the same port?
A. Port mirroring
B. Trunking
C. PoE
D. Spanning tree

Answer: B
Section: (none)

QUESTION 96
Which of the following is the maximum number of available segments on a 10Base-T network?

A. 1,024
B. 2
C. 512
D. 1,256

Answer: B
Section: (none)

QUESTION 97
Which of the following would an administrator MOST likely use to forward inbound packets on port 80 to
port 8080 on a local server?

A. Repeater
B. Firewall
C. Packet shaper
D. Bridge

Answer: B
Section: (none)

QUESTION 98
Which of the following would allow an administrator to share Internet connectivity while only publishing one
public IP address?

A. VLAN
B. CIDR
C. NAT
D. DHCP

Answer: C
Section: (none)

QUESTION 99
For the BEST performance, wireless signals should use

A. overlapping channels.
B. non-overlapping channels.
C. redundant channels.
D. different encryption types.

Answer: B
Section: (none)

QUESTION 100
Given a typical 802.11 a/g/n wireless router, which of the following frequencies would the unit operate at, by
default? (Select TWO).

A. 2.4GHz
B. 900MHz
C. 2.1GHz
D. 5GHZ
E. 1.8GHz

Answer: AD
Section: (none)

QUESTION 101
Which of the following is the MOST important factor to ensure wireless connectivity?

A. Centralized device management


B. Installing WPA
C. AP placement
D. Wireless encryption

Answer: C
Section: (none)

QUESTION 102
A user reports that their laptop does not have network connectivity, but was working fine last week. The
technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1
address. This address is not part of the company¡¯ s subnet. Which of the following MOST likely identifies
this address type?

A. Multicast
B. APIPA
C. Broadcast
D. DHCP

Answer: B
Section: (none)
Exam C

QUESTION 1
An administrator suspects an IP conflict on the local LAN. Which of the following is BEST used to
troubleshoot this problem?

A. hostname
B. ifconfig
C. traceroute
D. nslookup

Answer: B
Section: (none)

QUESTION 2
Which of the following WAN types uses a ring topology? (Select TWO)

A. E1fl~1
B. Frame relay
C. FDDI
D. ATM
E. SONET

Answer: CE
Section: (none)

QUESTION 3
An administrator has just completed installing a virtual proxy server. Which of the following documentation
needs to be updated?

A. Wiring schematic
B. Physical network diagram
C. Job log
D. Logical network diagram

Answer: D
Section: (none)

QUESTION 4
Which of the following cable types is primarily used only for POTS lines?

A. CAT5e
B. CAT3
C. CAT5
D. CAT6

Answer: B
Section: (none)
QUESTION 5
A long fiber optic segment has failed. A network technician suspects a broken cable. Which of the following
tools can be utilized to help determine where the cable break has occurred?

A. TDR
B. Toner probe
C. Multimeter
D. OTDR

Answer: D
Section: (none)

QUESTION 6
Which of the following switch features allows power and data from a single connection?

A. VLAN
B. Spanning tree
C. PoE
D. Trunking

Answer: C
Section: (none)

QUESTION 7
A network administrator needs to add an out-of-band IDS to monitor all traffic traversing the switch. Which
of the following features would need to be specifically configured in order to achieve this?

A. Spanning tree protocol


B. Port authentication
C. Port mirroring
D. VLAN trunking

Answer: C
Section: (none)

QUESTION 8
Which of the following would be used to locate a cable that is in a bundle located in a distant
telecommunications closet?

A. Toner probe
B. Butt set
C. Voltage meter
D. Voltage event recorder

Answer: A
Section: (none)

QUESTION 9
Which of the following is the maximum distance for CAT5 cable?
A. 1058 feet (323 meters)
B. 328 feet (100 meters)
C. 100 feet (30.5 meters)
D. 50 feet (15.2 meters)

Answer: B
Section: (none)

QUESTION 10
Which of the following functions at layer one of the OSI model?

A. Repeater
B. Switch
C. DHCP
D. Load balancer

Answer: A
Section: (none)

QUESTION 11
Which of the following is the correct format for an IPv4 IP address?

A. xxxx.xxxx.xxxx
B. xx:xx:xx:xx:xx:xx
C. xx-xx-xx-xx-xx-xx
D. xxx.xxx.xxx.xxx

Answer: D
Section: (none)

QUESTION 12
When pinging the default gateway there is a 40% packet loss. Which of the following MOST likely explains
this situation?

A. Pins 1 and 3 are open


B. Incorrect subnet mask
C. Duplex mismatch
D. Incorrect VLAN

Answer: C
Section: (none)

QUESTION 13
Refer to the attached Exhibit. According to the diagram, which of the following is the correct path for PC7 to
print a document?

Exhibit: image001.jpg

A. Switch C to switch A to the router


B. Switch C to switch A
C. Switch C to switch A to switch B
D. Switch B to the router

Answer: B
Section: (none)

QUESTION 14
An administrator is attempting to verify if a newly installed workstation is connected to the network. Which of
the following commands can be used to verify basic connectivity?

A. ping
B. hostname
C. route
D. dig

Answer: A
Section: (none)

QUESTION 15
Which of the following technologies has the same uplink and downlink speed standards?

A. SDSL
B. ADSL
C. OC12
D. OC3

Answer: ACD
Section: (none)

QUESTION 16
Multiple users on the same floor cannot access the network. Upon investigation, an administrator sees that
the switch has power and all of the active ports are blinking almost non-stop. Which of the following is
MOST likely causing this to occur?

A. DHCP snooping
B. Routing loop
C. Broadcast storm
D. Speed/duplex mismatch

Answer: C
Section: (none)

QUESTION 17
Which of the following protects individual computers from malicious software?

A. NIPS
B. Network based firewalls
C. Host based firewalls
D. HIDS

Answer: C
Section: (none)

QUESTION 18
Which of the following is an example of CIDR notation?

A. ::1
B. 10.10.10.0/30
C. 10.192.30.5:22
D. 255.255.255.0

Answer: B
Section: (none)

QUESTION 19
Which of the following is updated dynamically on all routers in an OSPF configured network, after a change
has occurred on the network?

A. Hop count
B. Access control list
C. Bandwidth availability
D. Routing table

Answer: D
Section: (none)

QUESTION 20
Which of the following cabling types should be used with 100BaseTX?

A. Coaxial
B. Fiber
C. Token ring
D. UTP

Answer: D
Section: (none)

QUESTION 21
Which of the following technologies has the LARGEST bandwidth capacity?

A. SDSL
B. ADSL
C. OC3
D. OC12

Answer: D
Section: (none)
QUESTION 22
Which of the following ports allows telnet traffic to be secure?

A. 25
B. 22
C. 23
D. 21

Answer: B
Section: (none)

QUESTION 23
A network engineer is creating a way to access several servers through the Internet.
Which of the following will accomplish this?

A. Configure dynamic private IP addressing for each server


B. Assign a static private IP address to each server.
C. Assign a static public IP address to each server.
D. Configure dynamic public IP addressing for each server.

Answer: C
Section: (none)

QUESTION 24
A server has an IP address of 192.168.50.12 and a subnet mask of 255.255.255.0. A client on the same
network has an IP address of 192.168.50.112 and a subnet mask of 255.255.255.128. Which of the
following BEST describes the result when the client sends a ping to the server?

A. The packet is received by the server and it replies successfully.


B. The packet is received by the server, but the reply is sent to its default gateway.
C. The packet is sent directly to the client's default gateway
D. The packet is dropped by the server because it did not come from its default gateway.

Answer: A
Section: (none)

QUESTION 25
Which of the following helps network traffic optimization by remembering where each computer is
connected?

A. Firewall
B. VLAN
C. Switch
D. Network analyzer

Answer: C
Section: (none)
QUESTION 26
An administrator suspects there is an issue on the network with DHCP, and wants to monitor the entire
request and response process for giving out leases. Which of the following tools should the administrator
use to BEST monitor these transactions?

A. Protocol bus analyzer


B. Intrusion detection system
C. Protocol analyzer
D. Port scanner

Answer: C
Section: (none)

QUESTION 27
OSPF is an example of which of the following routing protocol types?

A. Link-state IGP
B. Distance-vector EGP
C. Link-state EGP
D. Distance-vector IGP

Answer: A
Section: (none)

QUESTION 28
Which of the following would be MOST important in achieving fault tolerance on a network that hosts a
distributed application?

A. Redundant servers with failover


B. High-capacity disk caching
C. Hypervisor and virtual hosts
D. Unattended reboot of servers

Answer: A
Section: (none)

QUESTION 29
Which of the following LAN technologies has the SHORTEST maximum length for each cable run without
the use of a repeater?

A. 10GBaseT
B. 10GBaseLW
C. 10GBaseX
D. 10BaseT

Answer: D
Section: (none)

QUESTION 30
Which of the following network devices would MOST likely be installed to extend the wireless coverage
range in an office space and help strengthen the signal of the network?

A. Switch
B. Firewall
C. Repeater
D. Hub

Answer: C
Section: (none)

QUESTION 31
Which of the following components is used to terminate a T1 connection?

A. Smartjack
B. Patch panel
C. 66 block
D. 110 block

Answer: A
Section: (none)

QUESTION 32
As an added level of security a network administrator can configure which of the following on a firewall?

A. Port blocking
B. Port forwarding
C. Port mirroring
D. VPN pass-through

Answer: A
Section: (none)

QUESTION 33
Which of the following connector types is used to connect to a dial-up modem?

A. RJ-11
B. RJ-45
C. ST
D. BNC

Answer: A
Section: (none)

QUESTION 34
Which of the following protocols is used to transmit emails?

A. SNMP
B. POP3
C. SMTP
D. IMAP4

Answer: C
Section: (none)

QUESTION 35
Which of the following protocols is used by the ping command to troubleshoot problems between two
devices?

A. ARP
B. SIP
C. IMAP4
D. ICMP

Answer: D
Section: (none)

QUESTION 36
Which of the following devices contains an earpiece dialing interface and speaker, and is used to test local
loop telephony lines and connections?

A. Butt set
B. Protocol analyzer
C. Punch down tool
D. Toner probe

Answer: D
Section: (none)

QUESTION 37
Which of the following tools is used to find the MAC address of a workstation?

A. ipconfig
B. route
C. traceroute
D. netstat

Answer: A
Section: (none)

QUESTION 38
Which of the following technologies verifies that keys have not been tampered with and integrity is
maintained?

A. IPSec AH
B. TKIP
C. Pre-shared key
D. WEP
Answer: A
Section: (none)

QUESTION 39
Which of the following are commonly used FTP ports? (Select TWO).

A. 22
B. 23
C. 20
D. 21
E. 25

Answer: CD
Section: (none)

QUESTION 40
The address 0:0:0:0:0:0:0:1 is also known as the

A. IPv4 localhost address.


B. IPv4 loopback address.
C. IPv6 loopback address.
D. IPv6 default DNS address.

Answer: C
Section: (none)

QUESTION 41
Which of the following technologies allows a company to install IP cameras and IP phones without having to
connect them to a separate power source?

A. STP
B. VTP
C. QoS
D. PoE

Answer: D
Section: (none)

QUESTION 42
Which of the following tools can be used to test if a new DNS server is resolving addresses correctly?

A. nbtstat
B. netstat
C. traceroute
D. nslookup

Answer: D
Section: (none)
QUESTION 43
Which of the following can be configured to logically group ports into different subnets on a switch?

A. VTP
B. VLAN
C. VTY
D. VPN

Answer: B
Section: (none)

QUESTION 44
When no specific route to a destination exists, a router will fallback to its

A. BGP peer.
B. default gateway.
C. source host.
D. shortest path.

Answer: B
Section: (none)

QUESTION 45
A loopback plug is useful for which of the following?

A. NIC diagnostics
B. Toning
C. Throughput testing
D. Punchdown blocks

Answer: A
Section: (none)

QUESTION 46
A company has recently deployed 100 servers to provide online financial transactions. Which of the
following technologies is a technician MOST likely to deploy to ensure that each server is processing no
more than 1000 Internet requests every second and that each request has an average processing time of
five seconds?

A. Load balancer
B. Bandwidth shaper
C. Proxy server
D. Multilayer switch

Answer: A
Section: (none)
QUESTION 47
Which of the following is a secure method for administering a network device?

A. FTP
B. TFTP
C. SIP
D. SNMPv3

Answer: D
Section: (none)

QUESTION 48
Which of the following is the MOST accurate description of spanning tree protocol?

A. Protocol that detects routing loops and then adjusts priorities accordingly
B. Algorithm to span the switch ports in order to create a tree-based hierarchical layout
C. Algorithm that detects cabling loops and then disables an affected port to remove loops
D. Port spanning technique used to provide network fault tolerance

Answer: C
Section: (none)

QUESTION 49
Which of the following terms describes the process of routers accepting the same routing topology in their
route tables?

A. Resemblance
B. Convergence
C. Consolidation
D. Aggregation

Answer: B
Section: (none)

QUESTION 50
An administrator has added four switches to a campus network. Each switch is connected to all other
switches. Which of the following topologies is represented in this design?

A. Star
B. Mesh
C. Ring
D. Bus

Answer: B
Section: (none)

QUESTION 51
Which of the following authenticates a person by a particular key pair?
A. EAP
B. PKI
C. RADIUS
D. CHAP

Answer: B
Section: (none)

QUESTION 52
Which of the following is MOST likely to affect IP based surveillance systems?

A. Social engineering
B. Mantrap
C. Man-in-the-middle
D. Vishing

Answer: C
Section: (none)

QUESTION 53
Using 802.1x on a switch accomplishes which of the following?

A. Port trunking
B. Port mirroring
C. Port spanning
D. Port authentication

Answer: D
Section: (none)

QUESTION 54
Which of the following terms BEST describes the time required for routers to exchange new routes and
update their routing tables with information from other network routers?

A. Propagation
B. Convergence
C. Crosstalk
D. Attenuation

Answer: B
Section: (none)

QUESTION 55
A company's internal email system is an example of which of the following logical network topologies?

A. WAN
B. VLAN
C. Peer to Peer
D. Client/server
Answer: D
Section: (none)

QUESTION 56
An administrator installs a new web server and wishes to restrict traffic to it. However, the administrator
would like to keep the web server less restricted than the internal network. In which of the following firewall
zones would the administrator place the web server?

A. Demilitarized
B. Internal
C. Trusted
D. Internet

Answer: A
Section: (none)

QUESTION 57
In which of the following components will POTS lines MOST likely be terminated?

A. Hub
B. Switch
C. Patch panel
D. 110 block

Answer: D
Section: (none)

QUESTION 58
An administrator believes a workstation is not able to access resources because the wrong DNS server is
configured on the workstation. Which of the following commands would MOST likely be used to determine
the current configured DNS server?

A. ipconfig
B. arp
C. ping
D. traceroute

Answer: A
Section: (none)

QUESTION 59
Which of the following BEST describes a late collision?

A. It does not have as much affect on the network as does a regular collision
B. It occurs when the speeds are mismatched.
C. It occurs after the first 64 bytes of the frame are transmitted.
D. It can only occur after a regular collision has occurred.

Answer: C
Section: (none)

QUESTION 60
A user transferring files via FTP discovers that the username and password has been compromised. Which
of the following may have been used to intercept the login credentials?

A. SNMPv2
B. A network sniffer
C. A telnet session
D. Secure FTP

Answer: B
Section: (none)

QUESTION 61
While installing a WAP a technician sees an option labeled 'SSID broadcast'. Which of the following would
be the result of disabling that feature?

A. The WAP will not broadcast a wireless signal.


B. The wireless network will not be auto detected by wireless clients.
C. The SSID name will be encrypted.
D. The clients will not function until that setting has been changed on them.

Answer: B
Section: (none)

QUESTION 62
Which of the following Internet connections is traditionally carried over an existing coax backbone?

A. ADSL
B. Fiber
C. Cable
D. SDSL

Answer: C
Section: (none)

QUESTION 63
An administrator wants to connect a laptop directly to a printer's network port. Which of the following cable
types should the administrator use to guarantee communication with the printer?

A. Serial cable
B. Cross-over cable
C. Rollover cable
D. Straight-through cable

Answer: B
Section: (none)
QUESTION 64
Which of the following network services replies to requests to port 67?

A. DNS
B. DHCP
C. SNMP
D. IMAP

Answer: B
Section: (none)

QUESTION 65
An administrator is planning a new wireless network by using only channels 1, 6, and 11.
This is to minimize which of the following?

A. Attenuation
B. Interference
C. Reflection
D. Broadcast storms

Answer: B
Section: (none)

QUESTION 66
A digital phone line will MOST likely have which of the following connectors?

A. BNC
B. RJ-11
C. DB-25
D. DB-9

Answer: B
Section: (none)

QUESTION 67
Which of the following tools allows an administrator to verify the network configuration of a system?

A. route
B. ifconfig
C. traceroute
D. ping

Answer: B
Section: (none)

QUESTION 68
According to best practices, which of the following would be used to get a dial-tone off a 66 block?
A. Vampire tap
B. Two pair tri-star connector
C. Butt set
D. Four pair tri-star connector

Answer: C
Section: (none)

QUESTION 69
Which of the following is the default NTP port?

A. 161
B. 143
C. 110
D. 123

Answer: D
Section: (none)

QUESTION 70
A user submits an online transaction to purchase 10 items. The following day, the same user notices that
the transaction receipt shows 100 items being purchased instead of 10.
Which of the following MOST likely occurred?

A. Man-in-the-middle attack
B. DoS attack
C. Botnet attack
D. DDoS attack

Answer: A
Section: (none)

QUESTION 71
Which of the following tools would an administrator use to terminate cabling to a 110 block?

A. Certifier
B. Cable crimper
C. Punch down
D. Toner probe

Answer: C
Section: (none)

QUESTION 72
Which of the following would be used to identify the hot zone in a server room?

A. Cable stripper
B. Temperature monitor
C. OTDR
D. Voltage event monitor

Answer: B
Section: (none)

QUESTION 73
The IP address block 172.31.146.128/25 represents which of the following?

A. Classful address
B. Public address
C. Private address
D. APIPA address

Answer: C
Section: (none)

QUESTION 74
Which of the following network topologies is used within a token based network?

A. Point to Multipoint
B. Mesh
C. Ring
D. Point to Point

Answer: C
Section: (none)

QUESTION 75
An administrator is unsure of how to turn off spanning tree protocol on a switch. Which of the following
documents should the administrator consult to determine the proper settings?

A. Wiring schematic
B. Event logs
C. Logical network diagram
D. Product manual

Answer: C
Section: (none)

QUESTION 76
A laptop cannot connect to a wireless network. The laptop is configured to use WPA2 with PSK and TKIP.
An administrator determines the laptop should be set to use AES.
This is an example of which of the following?

A. Incorrect frequency band usage


B. Faulty wireless antenna
C. Environmental interference
D. Incorrect encryption settings
Answer: D
Section: (none)

QUESTION 77
Computers on a small network recently started receiving APIPA addresses for their NICs. Which of the
following is MOST likely the cause of such a scenario?

A. The hardware firewall is down.


B. The DHCP server is down.
C. The DNS server is down.
D. The email server is down.

Answer: B
Section: (none)

QUESTION 78
Which of the following will MOST likely occur when a technician uses a CAT5 UTP cable longer than the
maximum length per segment?

A. Duplex mismatch
B. Speed mismatch
C. Attenuation
D. Load balancing

Answer: C
Section: (none)

QUESTION 79
Which of the following cable types has immunity from EMI?

A. STP
B. Plenum
C. Fiber
D. UTP

Answer: C
Section: (none)

QUESTION 80
Which of the following Internet connection types uses a POTS line?

A. Cable
B. Dial-up
C. Fiber
D. Satellite

Answer: B
Section: (none)
QUESTION 81
Which of the following WAN technologies uses 53 byte fixed-length cells?

A. Frame relay
B. FDDI
C. ATM
D. SONET

Answer: C
Section: (none)

QUESTION 82
Which of the following network monitoring tools would be used to easily identify the maximum available
bandwidth on a network?

A. Protocol analyzers
B. Port scanners
C. Throughput testers
D. History logs

Answer: C
Section: (none)

QUESTION 83
Which of the following connector types is used to make a CAT5e patch cable?

A. RJ-45
B. SC
C. ST
D. DB-9

Answer: A
Section: (none)

QUESTION 84
The presence of a trusted third party is essential to which of the following authentication methods?

A. Public key infrastructure


B. Advanced encryption standard
C. 3DES password hashing
D. Symmetric key encryption

Answer: A
Section: (none)

QUESTION 85
Which of the following provides encrypted KVM console access to remote computers?
A. RAS
B. PPP
C. RDP
D. VPN

Answer: C
Section: (none)

QUESTION 86
Which of the following MOST likely needs to be implemented to provide central authentication for network
equipment?

A. SSH
B. PKI
C. RADIUS
D. SSL VPN

Answer: C
Section: (none)

QUESTION 87
Which of the following wireless standards has a MAXIMUM throughput, by default, of 54Mbps and operates
at the 5GHz range?

A. 802.11b
B. 802.11n
C. 802.11g
D. 802.11a

Answer: D
Section: (none)

QUESTION 88
Which of the following should be modified after a new network device is added to the network?

A. Intrusion detection software


B. Router configuration setting
C. Physical and logical diagrams
D. System logs

Answer: C
Section: (none)

QUESTION 89
Which of the following LAN technologies has a length segmentation limit of 2 kilometers (1.2 miles)?

A. 1000BaseT
B. 100BaseFX
C. 10BaseF
D. 100BaseTX

Answer: C
Section: (none)

QUESTION 90
When working on a router problem, the technician learns that this problem has been reoccurring. Which of
the following should the technician consult to identify the past technicians that worked on the problem?

A. Network policy
B. ACL
C. Baseline configuration
D. Job logs

Answer: D
Section: (none)

QUESTION 91
A network CAT6 cable of 600 feet (183 meters) needs to be installed. Which of the following devices can be
installed at the halfway point to help ensure cabling speeds are not reduced?

A. Modem
B. Repeater
C. Media converter
D. Router

Answer: B
Section: (none)

QUESTION 92
A user is reporting that their Internet connection is intermittent. Upon further investigation, an administrator
verifies that the cause is not a physical connection issue with the cable. Which of the following issues is
MOST likely the cause?

A. Port duplex mismatch


B. Port is error disabled
C. DNS settings are incorrect on the machine
D. Port is shutdown on the switch

Answer: A
Section: (none)

QUESTION 93
Which of the following ports are associated with email protocols by default? (Select TWO).

A. 123
B. 22
C. 25
D. 110
E. 161

Answer: CD
Section: (none)

QUESTION 94
An administrator is at a client's site to figure out an intermittent network problem. The technician has
already asked if anything has changed on the network. Which of the following is the NEXT step in the
troubleshooting methodology?

A. Identify the results and effects of the solution.


B. Identify the affected areas of the network.
C. Establish the most probable cause
D. Implement and test the solution.

Answer: B
Section: (none)

QUESTION 95
Which of the following will separate broadcast domains by default?

A. Layer 2 switch
B. Repeater
C. Router
D. Hub

Answer: C
Section: (none)

QUESTION 96
Which of the following is a method of connecting devices wirelessly?

A. PPP
B. Bluetooth
C. RDP
D. VNC

Answer: B
Section: (none)

QUESTION 97
Which of the following is the correct number of pins in a RJ-11 connector?

A. 4
B. 3
C. 6
D. 8

Answer: A
Section: (none)

QUESTION 98
An L2 switch has two VLANs. The first computer connects to the switch on VLAN 5, and the second
computer connects to the switch on VLAN 10. Which of the following devices is needed to allow the first
and second computer to communicate?

A. Media converter that connects to the switch.


B. Router that connects to the switch.
C. Proxy server that connects to the switch
D. Bridge that connects to the switch.

Answer: B
Section: (none)

QUESTION 99
Which of the following is true about an IP address if the first two bits are both one and the third bit is a zero?

A. The address is a Class B address.


B. The address is a Class C address.
C. The address is a Class A address.
D. The address is a Class D address.

Answer: B
Section: (none)

QUESTION 100
Which of the following BEST describes a beacon in a wireless network?

A. A type of web cookie that manages session.


B. A token ring frame indicating a serious network problem.
C. A device that amplifies a signal to broadcast SSIDs.
D. A frame that contains AP parameters, such as SSID and rates.

Answer: D
Section: (none)

QUESTION 101
A technician needs to segment a network to provide additional security for the HR department shares.
Which of the following features would need to be configured to provide this?

A. Port mirroring
B. Spanning tree
C. PoE
D. VLAN

Answer: D
Section: (none)
QUESTION 102
Which of the following technologies is the MOST cost-effective when protecting a large number of
networked workstations from external attacks?

A. External scanning service


B. Host-based IDS
C. Network-based IPS
D. Network-based firewall

Answer: D
Section: (none)
Exam D

QUESTION 1
Which of the following is the DOS command to find out the IP address of a host device?

A. netstat
B. ipconfig
C. ifconfig
D. tracrt

Answer: B
Section: (none)

QUESTION 2
Which of the following is intended to be used over existing SONET equipment?

A. 10GBaseLR
B. 10GBaseEW
C. 10GBaseER
D. 1000BaseT

Answer: B
Section: (none)

QUESTION 3
Which of the following commands is MOST likely to allow an administrator to update a router configuration
without being prompted for user credentials? (Select TWO).

A. RCP
B. SSH
C. SCP
D. HTTPS
E. TFTP

Answer: AE
Section: (none)

QUESTION 4
The MAIN difference between a MAC and an IP ACL is

A. IP ACLs work at Layer 3 while MAC ACLs do not.


B. IP ACLs are supported by Layer 2 switches while MAC ACLs are not
C. MAC ACLs are more secure than IP ACLs.
D. MAC addresses cannot be spoofed while IP addresses can.

Answer: A
Section: (none)

QUESTION 5
Which of the following protocols is used during boot-up of diskless hosts?

A. TFTP
B. IGMP
C. SNMP
D. TLS

Answer: A
Section: (none)

QUESTION 6
The IP address 10.4.5.12 is on the same subnet as 10.4.7.192. Which of the following is MOST likely the
network address and subnet mask?

A. 10.4.5.0/25
B. 10.4.7.0/32
C. 10.4.4.0/22
D. 10.4.5.0/23

Answer: C
Section: (none)

QUESTION 7
A host on subnet 10.1.1.0/24 is sending packets with a source address of 169.254.0.100. Which of the
following is the MOST likely explanation?

A. The border router is unreachable.


B. The default gateway is unreachable.
C. The DHCP server is unreachable.
D. The primary DNS server is unreachable.

Answer: C
Section: (none)

QUESTION 8
Which of the following protocols is commonly associated with VoIP?

A. POP3
B. NTP
C. SIP
D. IGMP

Answer: C
Section: (none)

QUESTION 9
Which of the following connection types are typically found in SOHO networks? (Select TWO)

A. ATM
B. ADSL
C. Frame relay
D. T3
E. Cable modem

Answer: BE
Section: (none)

QUESTION 10
In which of the following would a technician need to use a punch down tool in order to end a cable?

A. To terminate a fiber connection in an IDF


B. To connect a patch cable to a wall jack
C. To terminate a rollover cable to a network device
D. To terminate cable into a patch panel

Answer: B
Section: (none)

QUESTION 11
The technician needs to add a third device to an existing /30 network. Which of the following explains how
this can be achieved?

A. The network should be subnetted to a /29.


B. The third device can use the broadcast address.
C. Configure ARP spoofing on the third device.
D. A repeater should be installed for the third device.

Answer: A
Section: (none)

QUESTION 12
Which of the following uses 802.1 q?

A. 802.1x
B. Port mirroring
C. VLAN
D. QoS

Answer: C
Section: (none)

QUESTION 13
Which of the following logical network topologies would a technician MOST likely find in a person's home?

A. WAN
B. Domain
C. P2P
D. Client/server
Answer: C
Section: (none)

QUESTION 14
Which of the following can be used to block a guest's laptop access to DHCP services?

A. Configure DNS servers statically on workstations.


B. Use IPSec on all remote connections.
C. Reserve leases to known MAC addresses.
D. Disable TFTP on local servers.

Answer: C
Section: (none)

QUESTION 15
An administrator needs to extend the wireless coverage inside of the company's office space. Which of the
following devices would MOST likely be installed to allow this extension?

A. Repeater
B. Firewall
C. Switch
D. Router

Answer: A
Section: (none)

QUESTION 16
An individual wearing an A/C technician uniform asks to enter the data center to service the air conditioning
unit. When asked for identification, the individual quickly leaves.
Which of the following was avoided?

A. Identity fraud
B. Social engineering
C. Social media
D. Phishing

Answer: B
Section: (none)

QUESTION 17
A network technician has discovered from a bandwidth monitoring tool that nearly 100% of a serial WAN
link is being utilized. Which of the following would the technician MOST likely use in determining the type of
traffic that is causing the excess traffic on the WAN link?

A. Throughput tester
B. Load tester
C. TFTP
D. Packet sniffer
Answer: D
Section: (none)

QUESTION 18
Which of the following WAN protocols uses fiber-optic media?

A. SONET
B. Frame Relay
C. ISDN
D. POTS

Answer: A
Section: (none)

QUESTION 19
Which of the following is used to convert a FQDN to an IP address?

A. Layer two switch


B. Proxy server
C. DNS server
D. DHCP server

Answer: C
Section: (none)

QUESTION 20
Which of the following tools is used to create a patch cable?

A. Toner probe
B. Cable tester
C. RJ-45 crimper
D. Punch down tool

Answer: C
Section: (none)

QUESTION 21
Which of the following wireless connections has the SHORTEST maximum operating distance?

A. 802.11g
B. Bluetooth
C. 802.11b
D. 802.11a

Answer: B
Section: (none)

QUESTION 22
A technician replaces a hub with a network switch. Multiple users notice that traffic congestion has lessened
substantially. Which of the following was MOST likely causing the network congestion?

A. Crosstalk
B. Attenuation
C. Signal bleed
D. Collisions

Answer: D
Section: (none)

QUESTION 23
Which of the following commands is useful to find out the nodes that are active on an Ethernet segment?

A. ARP
B. NSLOOKUP
C. VMSTAT
D. TRACEROUTE

Answer: A
Section: (none)

QUESTION 24
Which of the following provides the GREATEST level of protection against someone attempting to capture
a router password traversing the network?

A. SCP
B. AH
C. ACL
D. SSH

Answer: D
Section: (none)

QUESTION 25
Which of the following encryption protocols is MOST secure when installing a wireless access point?

A. AES
B. MD5
C. WEP
D. WPA2

Answer: D
Section: (none)

QUESTION 26
An administrator can ping a server, but is unable to SSH to it. Which of the following is the MOST likely
cause of this?
A. The default gateway on the server is incorrect.
B. An IDS device prevents SSH connections.
C. The subnet mask on the client is incorrect.
D. A host-based firewall prevents SSH connections.

Answer: D
Section: (none)

QUESTION 27
An administrator discovers that a compromised system on the network is injecting incorrect routes in an
attempt to intercept network traffic. Which of the following protocols is MOST likely being used?

A. BGP
B. RIP
C. EIGRP
D. OSPF

Answer: A
Section: (none)

QUESTION 28
CAT5, CAT5e, and CAT6 cabling all consist of:

A. 8 separate strands, all split into individual leads with no intertwining.


B. 8 separate strands split into 4 pairs of 2 intertwined leads.
C. 8 separate strands split into 2 pairs of 4 intertwined leads.
D. 4 separate strands split into 2 pairs of 2 intertwined leads.

Answer: B
Section: (none)

QUESTION 29
Which of the following is MOST likely used to identify broadcast storms?

A. Cable tester
B. Voltage event recorder
C. Port scanner
D. Protocol analyzer

Answer: D
Section: (none)

QUESTION 30
Which of the following technologies is used on the backbone of an ISDN?

A. VDSL
B. ATM
C. SDSL
D. OC3
Answer: B
Section: (none)

QUESTION 31
A network administrator is documenting all devices on the network. This type of documentation is known
as which of the following?

A. Network guidelines
B. Network procedures
C. Network baseline
D. Network diagram

Answer: D
Section: (none)

QUESTION 32
Which of the following can allow or deny network access based on a physical hardware address?

A. IP filtering
B. IDS
C. MAC filtering
D. IPS

Answer: C
Section: (none)

QUESTION 33
Which of the following networks are reserved for private IP addresses?

A. 172.16.128.0/15
B. 162.17.0.0/12
C. 168.129.0.0/24
D. 192.168.0.0/16

Answer: D
Section: (none)

QUESTION 34
Which of the following is the MOST accurate description of a L2/L3 switch?

A. A switch that directly connects to a router


B. A router that directly connects to a switch
C. A multi-purpose switch fabric used in full mesh environments
D. Performs switching and routing duties

Answer: D
Section: (none)
QUESTION 35
An Ethernet hub and an Ethernet switch both operate at which of the following layers of the OSI model?

A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 7

Answer: C
Section: (none)

QUESTION 36
A newly created patch cable is not working. The technical notices that the cable has two wires that are
crossed, which of the following connectivity issues is occurring?

A. Collision
B. Attenuation
C. Open pairs
D. A short

Answer: D
Section: (none)

QUESTION 37
Which of the following cables would be used with a RJ-45 connector?

A. UTP
B. Serial
C. Coaxial
D. Fiber

Answer: A
Section: (none)

QUESTION 38
Which of the following is a device that sits inline on the network and stops network attacks in real-time?

A. PKI
B. IDS
C. VPN
D. IPS

Answer: D
Section: (none)

QUESTION 39
Which of the following features will allow for redundancy of a data port?
A. Aggregation
B. PoE
C. VLAN
D. Spanning tree

Answer: A
Section: (none)

QUESTION 40
Users are reporting that they are still experiencing network issues even though a fix was recently applied.
Which of the following troubleshooting methodology steps is the administrator using?

A. Continuing to gather information about the same symptoms


B. Documenting the solution and the entire process
C. Testing the solution and identifying the effects
D. Escalating the problem

Answer: C
Section: (none)

QUESTION 41
Which of the following would contain information regarding network device alerts using SNMP?

A. Audit log
B. Syslog
C. Ping sweep reports
D. History log

Answer: B
Section: (none)

QUESTION 42
Which of the following devices enables a router to communicate with a T1 line?

A. IPS
B. Layer 3 switch
C. CSU/DSU
D. Firewall

Answer: C
Section: (none)

QUESTION 43
Which of the following mitigation techniques is the MOST effective to defend against social engineering?

A. Antivirus scanner
B. User training
C. Patch management solution
D. Security and network policy revision
Answer: B
Section: (none)

QUESTION 44
The primary purpose of an IPS is which of the following?

A. Stop or log intrusions


B. Relay wireless traffic
C. Detect or route packets
D. Route internal network traffic

Answer: A
Section: (none)

QUESTION 45
Which of the following protocols provides secure communication over the Internet?

A. RSH
B. SNMP
C. VNC
D. SSH

Answer: D
Section: (none)

QUESTION 46
Which of the following is the MOST likely authentication scheme used in 802.1x?

A. RADIUS
B. CHAP
C. Kerberos
D. TACACS+

Answer: A
Section: (none)

QUESTION 47
Which of the following connectors is used to terminate fiber?

A. ST
B. RJ-45
C. RJ-11
D. BNC

Answer: A
Section: (none)
QUESTION 48
Which of the following cable types has a MAXIMUM transmission rate of 1Gbps?

A. Fiber
B. Serial
C. CAT7
D. CAT5e

Answer: D
Section: (none)

QUESTION 49
Which of the following is a secure method of remote access via command line?

A. Telnet
B. RSH
C. SSH
D. RCP

Answer: C
Section: (none)

QUESTION 50
A user in the accounting department reports that their office is able to connect to the network, but they are
unable to connect to the Internet. Which of the following documentation would be the MOST useful to the
administrator in diagnosing this issue? (Select TWO).

A. Physical network diagram


B. Acceptable use policy
C. Job log
D. Baseline documentation
E. Wiring schematic

Answer: AE
Section: (none)

QUESTION 51
Which of the following describes 1Gigabit Ethernet?

A. 10Base2
B. 10GBaseER
C. 100Base5
D. 1000BaseT

Answer: D
Section: (none)

QUESTION 52
Which of the following software security devices can be implemented on individual servers in order to solely
identify abnormal behavior?

A. DNS
B. HIDS
C. HIPS
D. Network-based firewall

Answer: B
Section: (none)

QUESTION 53
When installing two 802.11g access points in the same building, which of the following channels will MOST
likely be used to minimize interference?

A. 5 and 6
B. 1and 6
C. 6 and 10
D. 2 and 6

Answer: B
Section: (none)

QUESTION 54
The ¡°1000¡± in 1000BaseT cabling represents which of the following?

A. The theoretical port limit of the cable


B. The quality level of the copper wiring used
C. The theoretical maximum bandwidth
D. The theoretical maximum cable length

Answer: C
Section: (none)

QUESTION 55
Which of the following can be configured on a WAP to authenticate users and place them onto the right
VLAN?

A. Trunking
B. 802.1q
C. 802.1x
D. AAA

Answer: C
Section: (none)

QUESTION 56
Which of the following would be used to determine if near end crosstalk occurs?

A. Cable tester
B. Toner probe
C. Protocol analyzer
D. Multimeter

Answer: A
Section: (none)

QUESTION 57
An administrator needs to diagnose problems with a WINS server. Which of the following tools should be
used?

A. nslookup
B. netstat
C. nbtstat
D. dig

Answer: C
Section: (none)

QUESTION 58
Which of the following encryption technologies would be the WEAKEST method to use when securing a
new SOHO wireless network?

A. WEP64
B. WPA
C. WEP128
D. WPA2

Answer: A
Section: (none)

QUESTION 59
Which of the following is true about an IP address if the first three bits are all one and the fourth bit is a
zero?

A. The address is a Class D address.


B. The address is a Class A address.
C. The address is a Class B address.
D. The address is a Class C address.

Answer: A
Section: (none)

QUESTION 60
Which of the following statements is TRUE regarding static routing tables?

A. They are harder to maintain.


B. They are used in large and complex networks.
C. They update certain aspects automatically.
D. They are easy to configure and maintain.

Answer: A
Section: (none)

QUESTION 61
Which of the following would be used when designing a climate controlled room?

A. Voltage event recorder


B. Temperature monitor
C. Multimeter
D. HVAC

Answer: B
Section: (none)

QUESTION 62
Which of the following is the MAIN disadvantage of using the spanning tree protocol?

A. It only runs at Layer 3.


B. Convergence takes too long.
C. The root port must have gigabit speeds.
D. It is a vender specific protocol.

Answer: B
Section: (none)

QUESTION 63
A technician needs to manage a switch by using the management port on the back of the switch. Which of
the following cables would the technician use?

A. Loopback
B. Straight
C. Console
D. Crossover

Answer: C
Section: (none)

QUESTION 64
Users are reporting problems connecting to servers in the remote company.com domain. The administrator
suspects this to be a DNS problem. Which of the following commands would the administrator run to
identify the DNS server of the remote company.com?

A. dig company.com mx
B. ifconfig -a
C. dig company.com ns
D. ipconfig /all
Answer: C
Section: (none)

QUESTION 65
A user reports that the entire corporate network is down. Which of the following should the technician do
FIRST?

A. Identify if there are any other symptoms.


B. Create an action plan and identify its effects.
C. Escalate to a senior engineer.
D. Implement a solution and test the results.

Answer: A
Section: (none)

QUESTION 66
Which of the following statements is the MOST accurate description of PoE?

A. Provider edge technology used in MPLS core networks


B. 802.3af or 802.3at standard to deliver DC power over CAT5 cables
C. Standard that allows hubs and switches to work together without separate power cables
D. 802.3az energy-efficient Ethernet standard endorsed by IEEE

Answer: B
Section: (none)

QUESTION 67
A technician would like to separate the HR department¡¯ s workstations from the other workstations at the
company. Which of the following network topologies should be used?

A. VPN
B. VLAN
C. Subnetting
D. Peer to peer

Answer: B
Section: (none)

QUESTION 68
Using network monitoring tools would allow an administrator to do which of the following?

A. Configure offline devices


B. Examine performance issues
C. View syslog events
D. Install additional software and updates

Answer: B
Section: (none)
QUESTION 69
A NIC capable of utilizing ¡°auto-sense¡± for a given connection is actually configuring which settings
dynamically on its own? (Select TWO).

A. Link latency
B. Cable type
C. MAC address
D. Link speed
E. Link duplex

Answer: DE
Section: (none)

QUESTION 70
Which of the following protocols can lead to user credential disclosure when a network analyzer is used?
(Select TWO).

A. TFTP
B. SNMPv3
C. Telnet
D. RSH
E. FTP

Answer: CE
Section: (none)

QUESTION 71
VoIP and data traffic are carried on different subnets in an enterprise. Which of the following techniques
can be used to provide both services to hosts on the same UTP cable?

A. Use SSH tunneling for data connections.


B. Put voice and data on separate VLANs.
C. Upgrade terminations from TIA-568A to TIA-568B.
D. Enable time-division multiplexing on local switches.

Answer: B
Section: (none)

QUESTION 72
An administrator would like to troubleshoot email issues and verify that the mail service on server1.
comptiA.org is available and accepting mail. Which of the following commands would BEST accomplish
this?

A. dig @server1.comptiA.org -t MX
B. telnet server1.comptiA.org 25
C. ping -l 110 server1.comptiA.org -t
D. nmap server1.comptiA.org -p0

Answer: B
Section: (none)
QUESTION 73
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?

A. 100BaseFX
B. 10GBaseSW
C. 1000BaseT
D. 100BaseTX

Answer: B
Section: (none)

QUESTION 74
An administrator has just completed creating a new subnet. Users on the new subnet are unable to access
the network. Which documentation will BEST provide information to help identify the issue?

A. Logical network diagram


B. Physical network diagram
C. Policies
D. Procedures

Answer: A
Section: (none)

QUESTION 75
A wireless access point needs to be installed in a conference room for presentations. The access point
comes with an omni-directional antennA. Where is the BEST location for this access point so that it
provides full room wireless coverage?

A. Centered in the room


B. Adjacent to the table top projector
C. In the equipment room
D. On the back wall

Answer: A
Section: (none)

QUESTION 76
In order for computers with private IP addresses to access the public Internet, which of the following must
the router perform?

A. DHCP
B. APIPA
C. BGP
D. NAT

Answer: D
Section: (none)
QUESTION 77
In order for two machines on different VLANs to communicate with one another, which of the following must
be properly set?

A. Load balancing
B. Subnet mask
C. DNS
D. Default gateway

Answer: D
Section: (none)

QUESTION 78
At which of the following OSI layers does the ARP protocol operate?

A. Layer 7
B. Layer 3
C. Layer 2
D. Layer 1

Answer: C
Section: (none)

QUESTION 79
Which of the following devices separates a LAN segment into two collision domains, without affecting the
broadcast domain?

A. Firewall
B. Bridge
C. Repeater
D. Router

Answer: B
Section: (none)

QUESTION 80
Which of the of the following network protocols assigns a device¡¯ s IP address?

A. SMTP
B. TFTP
C. HTTPS
D. DHCP

Answer: D
Section: (none)

QUESTION 81
A company finished deploying an 802.11g wireless mesh. The administrator receives a call from a user who
is unable to connect to the company wireless, though all network configurations are centrally managed.
Which of the following is MOST likely causing the connection problem?

A. The end user is using an 802.11b/g wireless card.


B. The end user is using an 802.11a wireless card.
C. The access point has omni-directional antennas.
D. The access point is not broadcasting the SSID.

Answer: B
Section: (none)

QUESTION 82
Which of the following is the MOST appropriate tool for detecting the enabled network services in the
default install of an operating system?

A. Intrusion detection software


B. Honeypot
C. Port scanner
D. Packet sniffer

Answer: C
Section: (none)

QUESTION 83
An administrator needs to authenticate users to the network, authorize network activities, and account for
activities done. Which of the following are services that will BEST meet these goals? (Select TWO).

A. Kerberos
B. TACACS+
C. 802.1x
D. RADIUS
E. RRAS

Answer: BD
Section: (none)

QUESTION 84
Which of the following network services can be used to provide wireless network authentication?

A. DHCP
B. RADIUS
C. TACACS
D. DNS

Answer: B
Section: (none)

QUESTION 85
Which of the following is the purpose of QoS?
A. Load balance traffic across multiple LAN and WAN links.
B. Classify, mark, and prioritize traffic on WAN and LAN links.
C. Guarantee traffic delivery.
D. Increase speed of network traffic.

Answer: B
Section: (none)

QUESTION 86
Which of the following BEST describes ISDN?

A. Coaxial cable, token passing, local area network


B. Carrier sense, multiple access points, collision detection on multiple workstations
C. Circuit switching, digital signaling, interfaces carry multiple channels
D. Cell switching, 53-byte cells, uniform handling of voice and data

Answer: C
Section: (none)

QUESTION 87
A user¡¯ s web browser begins displaying SSL certificate mismatch warnings. Which of the following
attacks may be occurring?

A. Man in the middle


B. Smurf
C. Denial of service
D. Password hijacking

Answer: A
Section: (none)

QUESTION 88
Which of the following monitors a server to see which protocols might be in use?

A. Ping sweep
B. Wireless packet sniffer
C. Port scanner
D. Intrusion detection software

Answer: C
Section: (none)

QUESTION 89
Which of the following network protocols can be used to keep the network device clocks synchronized?

A. RTP
B. SMTP
C. NTP
D. SNMP
Answer: C
Section: (none)

QUESTION 90
An administrator needs to test connectivity to a particular website without launching a browser session.
Which of the following commands would MOST likely be used to test this connection?

A. ipconfig
B. ping
C. traceroute
D. nslookup

Answer: B
Section: (none)

QUESTION 91
Which of the following devices can be affected by a microwave?

A. 110 block
B. Router
C. Wireless repeater
D. Firewall

Answer: C
Section: (none)

QUESTION 92
Which of the following capabilities is essential in a firewall when securing VoIP traffic between remote
hosts?

A. Multipath for media streams


B. Application layer filtering
C. Filtering by zones
D. Source routing rules

Answer: B
Section: (none)

QUESTION 93
A user receives an email that asks for a username and password and appears to be from a bank. Which of
the following attacks may be occurring?

A. Man in the middle


B. Phishing
C. Worm
D. ARP spoofing

Answer: B
Section: (none)
QUESTION 94
Frames are found within which of the following layers of the OSI model?

A. Layer 1
B. Layer 3
C. Layer 2
D. Layer 5

Answer: C
Section: (none)

QUESTION 95
A workstation has an IP address of 169.254.128.1. Which of the following IP address types is this?

A. RFC1918 private IP address


B. Public Internet address
C. DHCP lease
D. APIPA

Answer: D
Section: (none)

QUESTION 96
An administrator wants to be alerted when a network-based attack is underway, but the company policy
prohibits blocking or dropping network connections. Which of the following MUST be deployed?

A. Firewall
B. IPS
C. Managed PKI
D. IDS

Answer: D
Section: (none)

QUESTION 97
Which of the following devices is MOST likely to have a bridge built-in?

A. NIC
B. Media converter
C. Hub
D. WAP

Answer: D
Section: (none)

QUESTION 98
Which of the following would help a new administrator quickly determine if a network had a DMZ for its
publicly accessible servers?

A. Wiring schematics
B. Baselines
C. Regulations
D. Logical network diagrams

Answer: D
Section: (none)

QUESTION 99
Which of the following port combinations need to be opened over a firewall for Internet browsing?

A. 80 and 443
B. 443 and 143
C. 80 and 110
D. 80 and 25

Answer: A
Section: (none)

QUESTION 100
Which of the following protocols can be found at the application layer?

A. Telnet
B. UDP
C. TCP
D. SNMP

Answer: A
Section: (none)
Exam E

QUESTION 1
Which of the following devices will allow a technician to measure the amount of data that is capable of
traversing the network?

A. Throughput tester
B. Event logs
C. Packet sniffers
D. OTDR

Answer: A
Section: (none)

QUESTION 2
Which of the following is a common type of copper-based Ethernet?

A. 1000BaseFX
B. 100BaseFX
C. 1000BaseSX
D. 1000BaseT

Answer: D
Section: (none)

QUESTION 3
Which of the following features is essential in a firewall if it is to support RTP sessions?

A. Remote console
B. Zones
C. Statefulness
D. Address translation

Answer: C
Section: (none)

QUESTION 4
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following
connectivity issues did the technician discover?

A. Attenuation
B. Open pairs
C. Interference
D. Crosstalk

Answer: B
Section: (none)

QUESTION 5
Which of the following is the MOST common collision detection technique used by an Ethernet switch?
A. CSMA/CA
B. 802.11a RTS
C. Bonding
D. CSMA/CD

Answer: D
Section: (none)

QUESTION 6
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet
without a member of the IT staff configuring the machine first. Which of the following would MOST likely be
installed?

A. IDS
B. CSU
C. Proxy server
D. Multilayer switch

Answer: C
Section: (none)

QUESTION 7
Which of the following is MOST likely used to transfer files to a web server?

A. FTP
B. DNS
C. POP3
D. IMAP4

Answer: A
Section: (none)

QUESTION 8
A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the
following actions should the technician do FIRST?

A. Check their local Internet connection


B. Verify the IP information of the server
C. Call their local ISP
D. Verify the hostname of the server

Answer: A
Section: (none)

QUESTION 9
Which of the following ports will allow a technician to transfer configuration data to a network switch?

A. 3359
B. 110
C. 389
D. 69

Answer: D
Section: (none)

QUESTION 10
Which of the following threats is MOST likely to result in a service disruption for all customers accessing
www.company.com?

A. DoS
B. Port scan
C. War driving
D. Blue snarfing

Answer: A
Section: (none)

QUESTION 11
Which of the following technologies transfers data over an analog signal?

A. ADSL
B. ISDN
C. POTS
D. DOCSIS

Answer: C
Section: (none)

QUESTION 12
Which of the following connector types is commonly identified by two rows of pins with four in one row and
five in the other?

A. SC
B. DB-9
C. RJ-45
D. BNC

Answer: B
Section: (none)

QUESTION 13
Which of the following cables would a technician use to connect two switches together?

A. Crossover
B. 568B
C. Loopback
D. 568A
Answer: A
Section: (none)

QUESTION 14
Which of the following describes the location where an administrator would terminate a bundle of CAT5e
cables?

A. Smart jack
B. Patch panel
C. Switch
D. Router

Answer: B
Section: (none)

QUESTION 15
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a technician
do NEXT?

A. Determine if anything else has changed.


B. Identify the affected areas.
C. Escalate part of the solution to the appropriate section.
D. Create an action plan.

Answer: B
Section: (none)

QUESTION 16
When PKI is used for mutual authentication:

A. the public key is installed on the client and the private key on the server.
B. both the private and the public key are installed on the server.
C. the private key is installed on the client and the public key on the server.
D. both the private and the public key are installed on the client.

Answer: C
Section: (none)

QUESTION 17
Which of the following topologies is the MOST fault tolerant?

A. Mesh
B. Bus
C. Star
D. Ring

Answer: A
Section: (none)
QUESTION 18
Which of the following is a correct IP ACL? (Select TWO).

A. DROP 00-12-34-56-78-9A
B. PERMIT 192.168.1.100 80
C. PERMIT 192.268.20.1
D. DENY ANY ANY
E. DENY 0:::0:::0:::3

Answer: BD
Section: (none)

QUESTION 19
Which of the following would be used to capture data moving across the network?

A. Throughput tester
B. Spanning tree
C. Packet sniffer
D. Load balancer

Answer: C
Section: (none)

QUESTION 20
: 370Which of the following network devices is used to segment multiple networks?

A. Modem
B. Hub
C. Router
D. Layer 2 switch

Answer: C
Section: (none)

QUESTION 21
A technician needs to ensure that the IP of the DHCP enabled workstation will never change. Which of the
following can be implemented on the DHCP server to accomplish this requirement?

A. Reservation
B. Request
C. Option
D. Offer

Answer: A
Section: (none)

QUESTION 22
Which of the following is a dynamic routing protocol?

A. CIDR
B. SNAT
C. OSPF
D. SCTP

Answer: C
Section: (none)

QUESTION 23
Users in a conference room report issues controlling the multimedia equipment in the conference room via
the wireless panel. The projector and audio in the room also are sporadically turning on and off. Which of
the following is the MOST likely cause of this issue?

A. Frequency
B. Encryption
C. Interference
D. Channel

Answer: C
Section: (none)

QUESTION 24
Which of the following routing protocols runs over UDP and determines path based upon distance vectors?

A. RIP
B. BGP
C. OSPF
D. IS-IS

Answer: A
Section: (none)

QUESTION 25
Two autonomous networks who wish to exchange routing data should use which of the following protocols?

A. EIGRP
B. OSPF
C. IS-IS
D. BGP

Answer: D
Section: (none)

QUESTION 26
Delaying low-priority packets is a common technique for achieving which of the following?

A. QoS
B. Fault tolerance
C. Load balancing
D. Dynamic routing

Answer: A
Section: (none)

QUESTION 27
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair
for sending and the other pair for receiving?

A. 100BaseX
B. 100BaseT4
C. 100BaseTX
D. 100BaseFX

Answer: C
Section: (none)

QUESTION 28
Which of the following would be used to optimize network performance and increase bandwidth availability?

A. Packet analysis
B. Fault tolerance
C. QoS
D. Traffic shaping

Answer: D
Section: (none)

QUESTION 29
A technician is setting up a new wireless network in an office where there are existing APs broadcasting on
channels 6 and 11. Which of the following would be the BEST channel to use for the new network to keep
interference to a minimum?

A. 22
B. 3
C. 10
D. 1

Answer: D
Section: (none)

QUESTION 30
Which of the following tools would an administrator use to record and display data passing through the
network?

A. Event recorder
B. Toner probe
C. TDR
D. Protocol analyzer

Answer: D
Section: (none)

QUESTION 31
A device that can detect and disrupt network-based attacks is a(n):

A. IPS.
B. DNS.
C. DSU.
D. IDS.

Answer: A
Section: (none)

QUESTION 32
Which of the following protocols uses port 20, by default?

A. FTP
B. SSH
C. HTTPS
D. DNS

Answer: A
Section: (none)

QUESTION 33
After reports of network performance problems, the technician determines that the switch firmware should
be updated. Which of the following should the technician do NEXT?

A. Identify the results and effects of the solution.


B. Create an action plan and identify potential effects.
C. Identify the affected areas of the network.
D. Document the solution and the entire process.

Answer: B
Section: (none)

QUESTION 34
Which of the following ports would be commonly used for HTTP?

A. 23
B. 80
C. 443
D. 20

Answer: B
Section: (none)

QUESTION 35
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a
call from a user who is unable to connect to the company wireless. Which of the following is MOST likely
causing the connection problem?

A. The laptop is missing the software supplicant.


B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption.
D. The access point is on the wrong channel.

Answer: A
Section: (none)

QUESTION 36
Which of the following is the 802.1x standard an example of?

A. NAT
B. PAT
C. NAC
D. SNAT

Answer: C
Section: (none)

QUESTION 37
An administrator is adding a new router in order to connect to a new remote location. After verifying that all
the wiring and IP information is accurate, the administrator is still unable to connect to the remote router.
Which of the following is the MOST probable cause?

A. Console access is disabled


B. Password is not set correctly
C. Clock speed is not configured
D. Duplex mismatch

Answer: C
Section: (none)

QUESTION 38
Which of the following specialized network devices is used to authenticate users to the web and blocks
certain websites from being accessed?

A. DNS server
B. Proxy server
C. CSU/DSU
D. IDS

Answer: B
Section: (none)
QUESTION 39
Which of the following is required if ports from VLANs on two separate switches need to broadcast to each
other?

A. VPN
B. Trunking
C. Port authentication
D. Port mirroring

Answer: B
Section: (none)

QUESTION 40
An administrator is reviewing helpdesk tickets and discovers multiple tickets for ¡°unable to print¡± and ¡°
noInternet connectivity¡±. Which of the following documents would BEST provide information to help
diagnose the issue?

A. Policies
B. Baseline
C. Wiring schematic
D. Logical network diagram

Answer: D
Section: (none)

QUESTION 41
A technician has been monitoring network performance of the distribution hubs. It appears that many
collisions are occurring during working hours. Which of the following is the BEST approach to resolve these
collisions?

A. Replace hubs with switches.


B. Replace hubs with repeaters.
C. Upgrade the hubs to 10GB.
D. Implement time of day restrictions.

Answer: A
Section: (none)

QUESTION 42
The plans for a new office require 300 network connections. Which of the following network sizes should be
allocated to the new office?

A. /23
B. /25
C. /24
D. /30

Answer: A
Section: (none)
QUESTION 43
Which of the following is the MOST secure method to enable remote users to access a company¡¯ s
internal network resources?

A. DMZ
B. Network-based firewall
C. Stateful firewall
D. VPN concentrator

Answer: D
Section: (none)

QUESTION 44
A user reports an inability to access a certain website, but is able to access all other sites. Which of the
following tools would the administrator MOST likely use to see where the problem is occurring?

A. netstat
B. traceroute
C. hostname
D. ipconfig

Answer: B
Section: (none)

QUESTION 45
Which of the following terminations would be used on a UTP cable connecting a workstation to a switch?

A. TIA-568A on one end, TIA-568B on the other end


B. TIA-568A on one end, TIA-568A with pairs reversed on the other end
C. TIA-568B on one end, TIA-568B on the other end
D. TIA-568B on one end, TIA-568B with pairs reversed on the other end

Answer: C
Section: (none)

QUESTION 46
Which of the following is used to terminate CAT5e cable on the 110 block?

A. Punch down tool


B. Cable stripper
C. Cable tester
D. Snips

Answer: A
Section: (none)

QUESTION 47
An administrator is looking to install new WAPs into remote locations for increased network capacity. Which
of the following technologies would the equipment need to support if accessible power outlets were at a
minimum?

A. MAC filtering
B. PoE
C. WPA
D. VLAN

Answer: B
Section: (none)

QUESTION 48
A user receives an email asking them to update their password for a remote service using a URL provided
in the email. Which of the following is MOST likely occurring?

A. Smurf
B. Denial of service
C. Phishing
D. Man in the middle

Answer: C
Section: (none)

QUESTION 49
Which of the following DNS record types is used for IPv6 host address mappings?

A. CNAME
B. AAAA
C. SRV
D. PTR

Answer: B
Section: (none)

QUESTION 50
Which of the following OSI model layers is the session layer?

A. Layer 5
B. Layer 1
C. Layer 6
D. Layer 7

Answer: A
Section: (none)

QUESTION 51
A technician would like to connect two computers directly via their respective network cards, and no
intermediary devices. Which of the following cable types would allow for this?
A. Crossover
B. Serial
C. RG-6
D. Loopback

Answer: A
Section: (none)

QUESTION 52
Which of the following is a VLAN trunking protocol standard?

A. 802.1x
B. 802.3
C. 802.1q
D. 802.11

Answer: C
Section: (none)

QUESTION 53
Which of the following wireless standards can be used to avoid the 2.4GHz range? (Select TWO).

A. 802.11g
B. 802.11a
C. 802.11b
D. 802.1x
E. 802.11n

Answer: BE
Section: (none)

QUESTION 54
Which of the following tools would be used to determine the quality of the network infrastructure?

A. OTDR
B. Certifier
C. Voltage event recorder
D. Multimeter

Answer: B
Section: (none)

QUESTION 55
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address.
Which of the following is the address that can be used in this scenario?

A. 10.178.1.5/30
B. 10.178.1.5/16
C. 10.178.1.5/1
D. 10.178.1.5/8

Answer: D
Section: (none)

QUESTION 56
Which of the following tools will an administrator need to terminate the network cabling to the patch panel?

A. Multimeter
B. Toner probe
C. Punch down
D. Certifiers

Answer: C
Section: (none)

QUESTION 57
Which of the following network devices is used by a laptop to connect via WPA2?

A. Secure firewall
B. Network repeater
C. Hub
D. Wireless router

Answer: D
Section: (none)

QUESTION 58
An administrator reports to work in the morning to find that all of the company¡¯ s computers have not
received the nightly updates. Which of the following should the administrator check FIRST to determine the
issue?

A. Wiring schematic
B. Acceptable use policy
C. Error logs
D. Session logs

Answer: C
Section: (none)

QUESTION 59
Which of the following is inversely proportional to a wireless client connection speed?

A. Frequency of the access point


B. ESSID length on the access point
C. Encryption of the connection
D. Distance from the access point

Answer: D
Section: (none)

QUESTION 60
Which of the following connectors is MOST commonly associated with a physical bus topology?

A. RJ-45
B. SC
C. RJ-11
D. BNC

Answer: D
Section: (none)

QUESTION 61
If the goal is to minimize the amount of time it takes for other routers in the network to learn about a routing
change, the network administrator should choose a routing protocol that has the shortest:

A. convergence.
B. link state.
C. path.
D. multipath.

Answer: A
Section: (none)

QUESTION 62
Which of the following provides internal network access to the Internet via one public IP address?

A. DNAT
B. Broadcast
C. PAT
D. Multicast

Answer: C
Section: (none)

QUESTION 63
Which of the following is the term used to describe the aggregation of multiple components to form one
logical component?

A. Bonding
B. CSMA/CD
C. Circuit switching
D. Channelization

Answer: A
Section: (none)
QUESTION 64
Which of the following does not affect security on a wireless access point?

A. SSID
B. DHCP
C. Encryption
D. Password

Answer: B
Section: (none)

QUESTION 65
Routers operate predominantly at which of the following layers of the OSI model?

A. 1
B. 3
C. 4
D. 2

Answer: B
Section: (none)

QUESTION 66
An administrator has found interference on a network. Which of the following cable MOST likely composed
of?

A. STP
B. UTP
C. Fiber
D. RG-6

Answer: B
Section: (none)

QUESTION 67
A network administrator suspects that two computers on the same subnet have the same IP address.
Which of the following utilities could be used to determine which physical device the workstation is sending
traffic?

A. ARP
B. NSLOOKUP
C. DIG
D. NETSTAT

Answer: A
Section: (none)

QUESTION 68
A technician is troubleshooting a network connectivity issue with a user¡¯ s desktop configured to use a
static IP address. The technician notes the following configuration:
IP 172.16.2.0
NETMASK 255.255.254.0
DEFAULT GATEWAY 172.16.1.1
DNS 192.168.1.1

Which of the following changes will allow the desktop to communicate properly with remote networks?

A. Changing the DNS to 172.16.1.100


B. Changing the WINS server to 172.17.4.136
C. Changing the netmask to 255.255.255.0
D. Changing the default gateway to 172.16.3.1

Answer: D
Section: (none)

QUESTION 69
Which of the following devices is used to connect to a network by converting analog signals to digital
signals?

A. Hub
B. Modem
C. Switch
D. Repeater

Answer: B
Section: (none)

QUESTION 70
Which of the following authenticates a web server to the remote client in PKI?

A. DNS name
B. Public key
C. Private key
D. FQDN

Answer: B
Section: (none)

QUESTION 71
Which of the following connection methods is considered secure and is normally used to connect to web
resources such as online banking and ecommerce sites?

A. SSH
B. HTTPS
C. SFTP
D. HTTP

Answer: B
Section: (none)
QUESTION 72
A user has logged into a company laptop while at a conference. The user is unable to log directly into the
conference facility¡¯ s wireless network, but is able to connect to another user¡¯ s laptop and thereby
access the conference materials. This is an example of:

A. client/server.
B. shoulder surfing.
C. peer to peer.
D. VPN tunneling.

Answer: C
Section: (none)

QUESTION 73
Which of the following is the process of the amount of time that passes for routing updates in the
environment to reach a steady state?

A. Dynamic
B. Supernetting
C. Convergence
D. Subnetting

Answer: C
Section: (none)

QUESTION 74
A crossover cable is not needed when the switch supports which of the following?

A. MDIX
B. LACP
C. XDSL
D. IGRP

Answer: A
Section: (none)

QUESTION 75
Which of the following is an invalid subnet mask?

A. 255.255.255.255
B. 255.255.0.0
C. 255.256.255.0
D. 255.0.0.0

Answer: C
Section: (none)

QUESTION 76
Which of the following could be used to check network connectivity on a workstation?
A. Toner probe
B. Temperature monitor
C. Cable tester
D. Voltage meter

Answer: C
Section: (none)

QUESTION 77
Which of the following devices limits the possibility of third-party sniffing of traffic between hosts on a local
network?

A. Bridge
B. Packet filter
C. Layer 2 switch
D. Protocol analyzer

Answer: C
Section: (none)

QUESTION 78
A technician is at a client¡¯ s site to figure out an intermittent network problem. The technician has
implemented the solution. Which of the following is the NEXT step in the troubleshooting methodology?

A. Determine if escalation is necessary.


B. Create an action plan and identify potential effects.
C. Document the solution and the entire process.
D. Determine if anything has changed.

Answer: C
Section: (none)

QUESTION 79
Which of the following would be used to lock all of the primary communications equipment of a building,
including its demarcation point?

A. MTR
B. MDF
C. IDF
D. Smart jack

Answer: B
Section: (none)

QUESTION 80
A technician needs to install a VoIP system in the building but some locations do not have electrical outlets
available. Which of the following features of a switch would need to be available?
A. Port authentication
B. VLAN
C. Trunking
D. PoE

Answer: D
Section: (none)

QUESTION 81
Which of the following LAN technologies has the GREATEST length segmentation limit?

A. 100BaseFX
B. 1000BaseT
C. 10BaseF
D. 100BaseTX

Answer: C
Section: (none)

QUESTION 82
Which of the following tools logs electrical surges?

A. Cable tester
B. Toner probe
C. Voltage event recorder
D. Protocol analyzer

Answer: C
Section: (none)

QUESTION 83
Which of the following should be configured to provide priority to voice traffic?

A. Port mirroring
B. QoS
C. DMZ
D. Trunking

Answer: B
Section: (none)

QUESTION 84
An administrator just installed a new DS3 WAN circuit providing 45Mbps. However, multiple users at the
site report slowness when accessing remote resources. Which of the following tools should the
administrator use to diagnose the issue?

A. Content filter
B. Throughput tester
C. Crossover cable
D. Loopback plug

Answer: B
Section: (none)

QUESTION 85
The helpdesk is receiving calls about the corporate web server being down. Which of the following should
be taken NEXT after verifying that the server is unreachable?

A. Continuously ping the server until a ping response is obtained.


B. Implement and test a solution.
C. Escalate the call to a technician.
D. Document any changes in the web server configuration.

Answer: C
Section: (none)

QUESTION 86
Which of the following represents a private IP address?

A. 140.90.90.90
B. 172.16.24.9
C. 139.93.23.22
D. 23.34.98.222

Answer: B
Section: (none)

QUESTION 87
Which of the following describes what the number two represents in 100Base2 cabling?

A. Coaxial cable
B. Fiber
C. UTP
D. Twisted pair

Answer: A
Section: (none)

QUESTION 88
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC.
Which of the following diagrams would assist the technician in finding the machine that is causing the
problem?

A. Physical and logical network


B. Physical network
C. DHCP tables and DNS records
D. Logical network
Answer: A
Section: (none)

QUESTION 89
An administrator adds a second network connection between two devices to increase network bandwidth.
Which of the following features should be used to accomplish the increase?

A. VLANs
B. CSMA/CD
C. Bonding
D. Port mirroring

Answer: C
Section: (none)

QUESTION 90
An administrator is unable to ping a workstation. Which of the following tools would BEST help to resolve
the issue?

A. Cable tester
B. Multimeter
C. Protocol analyzer
D. Toner probe

Answer: A
Section: (none)

QUESTION 91
Which of the following should be used to ensure that all packets are received by every connected device?

A. Switch
B. Firewall
C. Hub
D. Router

Answer: C
Section: (none)

QUESTION 92
Which of the following cable coverings is MOST likely to reduce toxic gasses during a fire?

A. Polyvinyl chloride
B. Multimode
C. Plenum
D. Polystyrene

Answer: C
Section: (none)
QUESTION 93
Interior gateway protocols are used for resolving routes:

A. within networks.
B. between WAPs.
C. between networks.
D. within routers.

Answer: A
Section: (none)

QUESTION 94
Which of the following analyzes the entire subnet to identify all hosts that are active?

A. Packet sniffer
B. Ping sweep
C. Traceroute
D. Port scanner

Answer: B
Section: (none)

QUESTION 95
Which of the following provides VPN services at the HIGHEST OSI level?

A. IPSec
B. PPPoE
C. L2TP
D. SSL

Answer: D
Section: (none)

QUESTION 96
When ordering switches for a new building, which of the following is the BEST way for the technician to
determine the number of switches to put in each network closet?

A. Count the number of phone ports and configure two network ports for each phone port.
B. Review the architectural plans to see how many drops go to each closet.
C. Count the number of rooms near each closet and standardize eight drops per room.
D. Wireless is the new standard and no network switches will be needed in the building.

Answer: B
Section: (none)

QUESTION 97
On which of the following cables would a technician find a BNC connector installed?
A. CAT3
B. RG-6
C. CAT6
D. Fiber

Answer: B
Section: (none)

QUESTION 98
A software vender wants to distribute free updates for clients via the web. Which of the following protocols
would be the MOST efficient to distribute the updates?

A. SSH
B. FTP
C. DNS
D. TLS

Answer: B
Section: (none)

QUESTION 99
Which of the following would BEST describe security devices used to provide content filtering?

A. Proxy server
B. VPN concentrator
C. Port scanners
D. DHCP server

Answer: A
Section: (none)

QUESTION 100
If cable is rated for 10GBaseT, how much theoretical bandwidth can this cable provide in megabits per
second (Mbps)?

A. 100Mbps
B. 10Mbps
C. 10000Mbps
D. 1000Mbps

Answer: C
Section: (none)

QUESTION 101
When each routing device has a consistent view of the network topology, the network is said to be:

A. fault tolerant.
B. autonomous.
C. converged.
D. vectored.

Answer: C
Section: (none)

QUESTION 102
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer
successfully get their network configuration via DHCP, but the user reports that their laptop has no web
access, but can print. Which of the following MOST likely occurred?

A. The laptop and the switch duplex setting do not match.


B. The printer has the wrong DNS configuration.
C. The laptop is in the wrong VLAN.
D. The laptop and switch port speed do not match.

Answer: C
Section: (none)

QUESTION 103
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?

A. Smart jack
B. Demarc
C. 66 block
D. 110 block

Answer: C
Section: (none)
Exam F

QUESTION 1
Link aggregation is also known as port:

A. mirroring.
B. spanning.
C. distribution.
D. trunking.

Answer: D
Section: (none)

QUESTION 2
Which of the following WAN types requires the use of a telephone line?

A. POTS
B. Wireless
C. Satellite
D. ATM

Answer: A
Section: (none)

QUESTION 3
: 381Which of the following cable types is MOST likely to have LC connectors?

A. Category 6 cable
B. Shielded twisted pair
C. RG-6
D. Multimode fiber

Answer: D
Section: (none)

QUESTION 4
When each routing device has a consistent view of the network topology, the network is said to be:

A. fault tolerant.
B. autonomous.
C. converged.
D. vectored.

Answer: C
Section: (none)

QUESTION 5
Which of the following is installed to reduce broadcast packets and collisions?
A. Firewall
B. Switch
C. Repeater
D. Hub

Answer: B
Section: (none)

QUESTION 6
Which of the following is the MOST cost effective solution to extend the distance of one Ethernet cable run?

A. Repeater
B. Hub
C. Switch
D. Router

Answer: A
Section: (none)

QUESTION 7
Which of the following has the STRONGEST encryption?

A. WPA2
B. L2TP
C. WPA
D. WEP

Answer: A
Section: (none)

QUESTION 8
Which of the following allows a technician to mask a private network of IP addresses behind one public IP
address?

A. DHCP
B. DNS
C. Subnetting
D. NAT

Answer: D
Section: (none)

QUESTION 9
Which of the following commands is used to display other computers running on the network?

A. net view
B. ipconfig
C. nslookup
D. hostname
Answer: A
Section: (none)

QUESTION 10
Packet sniffing at an Internet interface on a border host reveals outbound packets with a source address of
10.254.0.5. Which of the following is a likely explanation?

A. A user is accessing an Internet search engine.


B. Enterprise database server has been compromised by Internet worm.
C. There is a missing or incorrect rule in the routing policy.
D. Time-to-live setting is not high enough for multicast service.

Answer: C
Section: (none)

QUESTION 11
Which of the following devices can be installed on individual computers throughout the network?

A. VPN concentrator
B. Host-based firewall
C. NIPS
D. Network-based firewall

Answer: B
Section: (none)

QUESTION 12
A company has both a private network for employees and an Internet access only network for guests on the
same switch. Which of the following advanced features is being used?

A. PoE
B. VLAN
C. Port authentication
D. Port mirroring

Answer: B
Section: (none)

QUESTION 13
Which of the following cables would be used to transfer data from one computer to another if both
computers are directly connected to each other?

A. Crossover
B. Patch
C. Loopback
D. Rollover

Answer: A
Section: (none)
QUESTION 14
Which of the following will MOST likely use an ISDN PRI circuit?

A. Analog phone system


B. Fax machine
C. Cable modem
D. Digital phone system

Answer: D
Section: (none)

QUESTION 15
Session affinity is a feature of which of the following devices?

A. IPS
B. Load balancer
C. DNS server
D. DHCP server

Answer: B
Section: (none)

QUESTION 16
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is
located in the basement and there is no easy way to run a cable to the third floor. Which of the following
devices should be installed to extend the wireless coverage to cover the entire third floor without running
cables?

A. Switch
B. Bridge
C. Router
D. Repeater

Answer: D
Section: (none)

QUESTION 17
Which of the following is the BEST reason for implementing QoS?

A. To implement a network security policy


B. To minimize network delays for real-time traffic
C. To prevent peer to peer network traffic from being delivered
D. To provide fault tolerance by using load balancing

Answer: B
Section: (none)
QUESTION 18
Which of the following is the name of the routing update process involved when a change occurs in the
routing environment?

A. Supernetting
B. Subnetting
C. Convergence
D. Dynamic

Answer: C
Section: (none)

QUESTION 19
Which of the following allows a WAP to be installed in a location where there are no power outlets
available?

A. PoE
B. Port authentication
C. PPTP
D. Trunking

Answer: A
Section: (none)

QUESTION 20
Which of the following OSI model layers is the transport layer?

A. Layer 6
B. Layer 4
C. Layer 7
D. Layer 1

Answer: B
Section: (none)

QUESTION 21
A new company has been given one public IP address. The company employs 200 users requiring Internet
access from the headquarters. Which of the following can be implemented to provide Internet access for all
the employees?

A. Proxy server
B. NAT
C. Multicasting
D. Subnetting

Answer: B
Section: (none)

QUESTION 22
Which of the following protocols is typically used for VoIP solutions?
A. SSH
B. RTP
C. TLS
D. IGMP

Answer: B
Section: (none)

QUESTION 23
Which of the following devices allows users to connect to company resources by providing them with a valid
internal IP address?

A. Firewall
B. DHCP server
C. Switch
D. Hub

Answer: B
Section: (none)

QUESTION 24
In which of the following topologies could the failure of one machine cause the entire network to stop
functioning?

A. Token ring
B. Star
C. Mesh
D. Spanning tree

Answer: A
Section: (none)

QUESTION 25
The administrator¡¯ s ISP indicates that they will need an autonomous system number to begin routing
external network traffic. Which of the following protocols should the ISP plan to use?

A. BGP
B. OSPF
C. RIPv2
D. IS-IS

Answer: A
Section: (none)

QUESTION 26
11g wireless signals operating at 2.4GHz has a maximum line of sight range of which of the following?

A. 460 feet (140 meters)


B. 560 feet (171 meters)
C. 840 feet (256 meters)
D. 540 feet (165 meters)

Answer: A
Section: (none)

QUESTION 27
A link light on a switch is an example of which of the following Ethernet properties?

A. Collision detection
B. Collision avoidance
C. Multiple access points
D. Carrier sense

Answer: D
Section: (none)

QUESTION 28
A company network is experiencing a man-in-the-middle attack, where a malicious user is impersonating
the default gateway IP address of 192.168.1.1. Given that the default gateway MAC address is 00-11-22-
33-44-55, which of the following commands can an administrator run on the affected hosts to resolve the
issue?

A. arp -a 192.168.1.1
B. arp -a 00-11-22-33-44-55
C. apr -s 192.168.1.1 00-11-22-33-44-55
D. arp -s 00-11-22-33-44-55 192.168.1.1

Answer: C
Section: (none)

QUESTION 29
Which of the following network devices commonly uses OSPF?

A. Layer 2 switch
B. Firewall
C. Repeater
D. Router

Answer: D
Section: (none)

QUESTION 30
Exhibit:
Refer to the attached Exhibit. In the diagram, which of the following would be a single point of failure with
the highest impact to systems?

A. Switch A failing
B. Connection between switch A and switch B failing
C. Router failing
D. Connection between the router and switch A failing

Answer: A
Section: (none)

QUESTION 31
How much theoretical bandwidth is available to three wireless access points that share the same 80 meter
radius, if channel six is used on all three access points?

A. 162Mbps
B. 54Mbps
C. 100Mbps
D. 22Mbps

Answer: B
Section: (none)

QUESTION 32
A company has recently received a new ADSL backup Internet connection. Which of the following will
MOST likely be used between the modem and the ISP?

A. RAS
B. MSCHAP
C. PPPoE
D. IPSec
Answer: C
Section: (none)

QUESTION 33
Which of the following tools can be used to identify the location of a network outage?

A. ping
B. traceroute
C. netstat
D. nslookup

Answer: B
Section: (none)

QUESTION 34
A Linux user is reporting intermittent issues connecting to several websites. Which of the following
commands would the administrator MOST likely use to see where the traffic is dropping off at and the
connections statistics to each device along the way?

A. mtr
B. ifconfig
C. ping
D. traceroute

Answer: A
Section: (none)

QUESTION 35
Allowing two ports to function as one is considered to be which of the following features?

A. Etherchanneling on same switch


B. Port authentication
C. Port trunking on different switches
D. Port mirroring

Answer: A
Section: (none)

QUESTION 36
An administrator is deploying three B/G wireless access points in a new office location. Which of the
following channels eliminates interference?

A. 1, 6, and 11
B. 11, 16, and 20
C. 3, 6, and 9
D. 36, 40, and 44

Answer: A
Section: (none)
QUESTION 37
Which of the following ports would be commonly used for email traffic?

A. 20
B. 443
C. 80
D. 110

Answer: D
Section: (none)

QUESTION 38
Which of the following should be used to transfer data between two computers via their NICs?

A. RG-6 cable
B. Crossover cable
C. Loopback cable
D. Rollover cable

Answer: B
Section: (none)

QUESTION 39
An IDS device needs to be plugged into a port that can see all traffic on a network switch. Which of the
following features of the switch should be used?

A. Port security
B. Port trunking
C. Port mirroring
D. Port spanning

Answer: C
Section: (none)

QUESTION 40
Which of the following technologies facilitates the conversion of internal private IP addressing to external
public IP addressing?

A. NAT
B. SNMP
C. DHCP
D. TCP/IP

Answer: A
Section: (none)

QUESTION 41
Which of the following can be an STP cable?

A. CAT5e
B. RG-59
C. Fiber
D. RG-6

Answer: A
Section: (none)

QUESTION 42
Which of the following protocols ensures message integrity when transferring data from the server to the
client?

A. RSH
B. SNMPv3
C. FTP
D. SNMPv2

Answer: B
Section: (none)

QUESTION 43
An administrator needs to update a router configuration for a router that does not support SSH. Which of
the following can be used to securely update the router configuration?

A. HTTPS
B. FTP
C. TFTP
D. SNMPv2

Answer: A
Section: (none)

QUESTION 44
An administrator monitors the performance of a network router and wants to determine if the traffic load is
greater than normal. Which of the following should the administrator do to discover this?

A. Clear the interface buffers and reset packet counts.


B. Compare current information with the router baseline.
C. Review the logical network diagram for default connection speeds.
D. Perform interface stress tests to see if performance is degraded.

Answer: B
Section: (none)

QUESTION 45
The SSL protocol is MOST commonly associated with which of the following ports?
A. 443
B. 143
C. 22
D. 80

Answer: A
Section: (none)

QUESTION 46
Which of the following is the difference between FTP and SFTP?

A. SFTP is tunneled over IPSec.


B. SFTP runs in passive mode.
C. SFTP protocol is tunneled over SSL.
D. SFTP is run over SSH.

Answer: D
Section: (none)

QUESTION 47
An administrator has recently separated the printer network to increase security. A user connects both a
laptop and a network printer to the wall jack in the office. Both the laptop and the network printer
successfully get their network configuration via DHCP, but the user reports that their laptop has no web
access, but can print. Which of the following MOST likely occurred?

A. The laptop and the switch duplex setting do not match.


B. The printer has the wrong DNS configuration.
C. The laptop is in the wrong VLAN.
D. The laptop and switch port speed do not match.

Answer: C
Section: (none)

QUESTION 48
Firewalls can be used for which of the following?

A. Protocol analysis
B. Port scanning
C. Packet sniffing
D. Content filtering

Answer: D
Section: (none)

QUESTION 49
Which of the following is encrypted when IPSec operates in tunnel mode? (Select TWO).

A. Source MAC address


B. IP address of the tunnel termination points
C. Destination MAC address
D. Payload information
E. Header information

Answer: DE
Section: (none)

QUESTION 50
All of the following are valid subnet masks EXCEPT:

A. 255.255.0.0
B. 255.255.255.0
C. 255.255.240.0
D. 255.255.253.0

Answer: D
Section: (none)

QUESTION 51
An administrator receives a contract for a server install at a new building. Which of the following should be
completed after installing the server?

A. Review the evacuation procedures


B. Test the air temperature
C. Log the administrator password used
D. Update the network diagram

Answer: D
Section: (none)

QUESTION 52
Which of the following IP addresses is a private IP address?

A. 11.100.101.1
B. 192.166.100.1
C. 192.186.200.221
D. 172.22.254.254

Answer: D
Section: (none)

QUESTION 53
All of the following features require the need for a nearby power outlet EXCEPT:

A. port mirroring.
B. PPPoE.
C. PoE.
D. port trunking.
Answer: C
Section: (none)

QUESTION 54
Web users are reporting issues downloading various types of mediA. Which of the following should the
administrator do FIRST?

A. Continue to gather information and see what other problems may exist.
B. Create an action plan and solution identifying potential effects.
C. Determine the most probable cause.
D. Find out what has recently changed on the network.

Answer: A
Section: (none)

QUESTION 55
Which of the following cable types has the reception and transmission leads flipped on opposing ends of
the media?

A. Rollover
B. Serial
C. Crossover
D. Patch

Answer: C
Section: (none)

QUESTION 56
Which of the following devices only monitors traffic being sent to a host?

A. IPS
B. Firewall
C. IDS
D. Proxy server

Answer: C
Section: (none)

QUESTION 57
Which of the following logical network topologies is MOST likely to use the IPSec protocol?

A. VLAN
B. VPN
C. Peer-to-peer network
D. VTP domain

Answer: B
Section: (none)
QUESTION 58
Which of the following is true of stateless inspection?

A. It is able to detect packets from established connections only.


B. It is not able to determine which ports to block.
C. It is able to determine the connection state of all packets going through the firewall.
D. It is not able to determine if a packet is related to an established connection.

Answer: D
Section: (none)

QUESTION 59
Multiple users call from the same location saying that they have no network connectivity. The administrator
is unable to ping the main switch at that IDF. Which of the following configuration management documents
would the administrator MOST likely consult to troubleshoot the issue?

A. Physical network diagram


B. Baseline configuration
C. Performance and transaction logs
D. Security policy

Answer: A
Section: (none)

QUESTION 60
Which of the following is an example of a MAC address?

A. 1A-23-F9-CD-06-9B-23-5C
B. 10.0.10.1
C. 1A-23-F9-CD-06-9L
D. 1A-23-F9-CD-06-9B

Answer: D
Section: (none)

QUESTION 61
An administrator is troubleshooting a communication issue between two computers on the same Layer 2
switch. Which of the following is the BEST way to determine if the switch is causing the issue?

A. Setup an ACL that allows and logs all IP traffic between the two computers
B. Setup a span port on the switch to watch for CRC errors
C. Configure a spanning tree to check for a loop
D. Connect both computers using a crossover cable

Answer: D
Section: (none)

QUESTION 62
Which of the following would an administrator use to locate where to extend a new wireless network at a
new location?

A. Baseline configuration
B. Security policy
C. Logical network map
D. Wiring schematic

Answer: C
Section: (none)

QUESTION 63
A technician at a company providing online, real-time media streaming to the Internet is needs a network
technology that will reduce bandwidth while delivering high throughput. Which of the following can the
technician implement to fit these requirements?

A. Multicast
B. Subnetting
C. Broadcast
D. Unicast

Answer: A
Section: (none)

QUESTION 64
Administrators are performing a war drive around their company¡¯ s complex. Which of the following are
they attempting to detect?

A. Bluesnarfing attacks
B. DDoS attacks
C. Worms
D. Rogue access points

Answer: D
Section: (none)

QUESTION 65
An administrator needs to remove sleeves on a CAT6 cable. Which of the following tools will work BEST?

A. Punch down
B. Cable tester
C. Cable stripper
D. Cable certifier

Answer: C
Section: (none)

QUESTION 66
Which of the following protocols controls the set up, tear down, and accounting of voice over IP based
communications?
A. TLS
B. RTP
C. SIP
D. IGMP

Answer: C
Section: (none)

QUESTION 67
After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?

A. Crosstalk
B. Data collision
C. Signal bleed
D. Signal loss

Answer: D
Section: (none)

QUESTION 68
A user reports being occasionally disconnected from the server. Which of the following tools could the
technician use to determine if it is the client or the server that is dropping the connection?

A. Packet sniffer
B. Throughput tester
C. Load balancer
D. Multimeter

Answer: A
Section: (none)

QUESTION 69
Which of the following cable types is intended to be used on short distances and is immune to any type of
interference?

A. Singlemode fiber
B. Multimode fiber
C. Unshielded twisted pair
D. Shielded twisted pair

Answer: B
Section: (none)

QUESTION 70
Which of the following should be installed in a server room?

A. Protocol analyzer
B. Certifiers
C. Temperature monitor
D. OTDR

Answer: C
Section: (none)

QUESTION 71
A network sniffer has been set up on a switch port in an attempt to monitor traffic from another switch port.
Which of the following technologies would allow this to work in a switched network?

A. VLANs
B. Port mirroring
C. Port trunking
D. Spanning tree

Answer: B
Section: (none)

QUESTION 72
Which of the following would MOST likely be used to punch down LAN cables before connecting them to
the main switch?

A. 110 block
B. MDF
C. 66 block
D. IDF

Answer: A
Section: (none)

QUESTION 73
An administrator is troubleshooting a device that will not power on. Which of the following tools should the
administrator use to check the wall outlet?

A. Multimeter
B. Toner probe
C. Cable tester
D. OTDR

Answer: A
Section: (none)

QUESTION 74
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?

A. Butt set
B. Stripper
C. Punch down tool
D. Snips
Answer: B
Section: (none)

QUESTION 75
Which of the following troubleshooting steps should be performed NEXT after a core router has been
reported down?

A. Test a solution.
B. Implement a solution.
C. Identify all affected areas.
D. Establish the outage cause.

Answer: C
Section: (none)

QUESTION 76
When implementing a basic wireless home network, which of the following should be taken into
consideration when configuring the wireless router so it does not conflict with other home electronics?

A. Beacon
B. Appropriate encryption
C. Frequency
D. ESSID

Answer: C
Section: (none)

QUESTION 77
BGP is an example of which of the following routing protocol types?

A. Link-state IGP
B. Link-state EGP
C. Distance-vector EGP
D. Distance-vector IGP

Answer: C
Section: (none)

QUESTION 78
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company web
address. Which of the following command sequences will test DNS functionality?

A. nslookup
server ns.company.com
www.company.com
B. nslookup
settype=mx
www.company.com
C. nslookup
Set type=ns
@ns.company.com www
D. nslookup
domain ns.company.com
lookup www

Answer: A
Section: (none)

QUESTION 79
After crimping a new RJ-45 plug in an unmarked cable, the network tester tool gives the message ¡°
Warning! Voltage on line!¡±. Which of the following is the MOST likely cause of this message?

A. The cable is a T1 connection.


B. The cable is being used on the phone network.
C. Fluorescent lights are causing interference on the cable.
D. There is a short in the cable.

Answer: B
Section: (none)

QUESTION 80
Which of the following documents should always be kept up-to-date after any major changes are made to a
network backbone?

A. Network diagram
B. Network security procedure
C. Company policy
D. Performance baseline

Answer: A
Section: (none)

QUESTION 81
An administrator has added four switches to a campus network. The switch in wiring closet is connected to
the switch in wiring closet and the switch in wiring closet. The switch in wiring closet is connected to the
switch in wiring closet and the switch in wiring closet.
Which of the following topologies is represented in this design?

A. Ring
B. Bus
C. Mesh
D. Star

Answer: A
Section: (none)

QUESTION 82
Which of the following describes an area where communications equipment is stored?
A. HVAC
B. Demarc
C. MDF
D. 110 block

Answer: C
Section: (none)

QUESTION 83
A technician is using a packet sniffer to identify a server. The technician observes the following network
traffic:
HOST-A TCP 80 -> HOST-B TCP 1328 PUSH
HOST-B TCP 1328 -> HOST-A TCP 80 PUSH ACK
HOST-A UDP 69 -> HOSTC UDP 1235
HOST-C ICMP -> HOST-D ICMP
Which of the following is MOST likely to be the server?

A. HOST-C
B. HOST-A
C. HOST-B
D. HOST-D

Answer: B
Section: (none)

QUESTION 84
Which of the following cables can be a UTP cable?

A. Fiber
B. RG-6
C. CAT6
D. RG-59

Answer: C
Section: (none)

QUESTION 85
Which of the following is an example of an IPv4 address?

A. 1A-23-F9-CD-06-9B
B. 10:0:10:1
C. 10.0.10.1
D. 100.101.100

Answer: C
Section: (none)

QUESTION 86
FTP is commonly used to do which of the following?
A. Transfer files to a network device
B. Redirect URLs of a network device
C. Send and receive emails
D. Remotely manage servers

Answer: A
Section: (none)

QUESTION 87
Which of the following features would BEST be used to optimize real-time voice and video chat? (Select
TWO).

A. QoS
B. Fault tolerance systems
C. Caching engines
D. Traffic shaping
E. Load balancing

Answer: AD
Section: (none)

QUESTION 88
Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33 feet)?

A. X-10
B. 802.11a
C. Bluetooth
D. 802.11b

Answer: C
Section: (none)

QUESTION 89
Which of the following is the MOST likely reason that two computers in different VLANs, on the same Layer
2 switch, are unable to communicate with each other?

A. IGMP snooping should be enabled on the switch.


B. A router is needed to route traffic between the VLANs.
C. The computers do not support ARP proxy.
D. Spanning trees between the VLANs need to be converged.

Answer: B
Section: (none)

QUESTION 90
An administrator replaced a router with a switch. End users are able to access network shares but are not
able to access the Internet. Which of the following is the BEST explanation why the users are unable to
access the Internet?
A. Router routes traffic between different networks and a switch does not.
B. The switch needs to be setup to forward data traffic to the Internet.
C. The firewall needs to be setup to allow traffic to reach the Internet.
D. The new switch is faulty and needs to be replaced and configured correctly.

Answer: A
Section: (none)

QUESTION 91
Which of the following devices transmits timed broadcasts onto an active network?

A. Bridge
B. Unmanaged switch
C. DHCP client
D. Firewall

Answer: C
Section: (none)

QUESTION 92
Which of the following commands is used to track the path a packet takes to get to its destination?

A. nbtstat
B. traceroute
C. ifconfig
D. nslookup

Answer: B
Section: (none)

QUESTION 93
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband
connection on many routers?

A. VDSL
B. DSL
C. POTS
D. Smart jack

Answer: C
Section: (none)

QUESTION 94
Which of the following connection methods or protocols is considered unsecure and by default uses port
80?

A. HTTP
B. HTTPS
C. TELNET
D. RCP

Answer: A
Section: (none)

QUESTION 95
Which of the following address formats uses 32-bit addressing?

A. IPv6
B. IPv4
C. Host address
D. MAC address

Answer: B
Section: (none)

QUESTION 96
At which of the following OSI model layers is HTTPS encryption performed?

A. Layer 3
B. Layer 7
C. Layer 5
D. Layer 6

Answer: D
Section: (none)

QUESTION 97
Which of the following is a purpose of using a port scanner?

A. To determine VLAN port configuration on the network


B. To determine services running on a server
C. To detect DoS attacks on the network
D. To analyze network traffic at the packet level

Answer: B
Section: (none)

QUESTION 98
Which of the following utilities would MOST likely be used to query the locally cached list of IP addresses
and their corresponding names as resolved through NetBIOS over TCP/IP?

A. DIG
B. NBTSTAT
C. NSLOOKUP
D. NSCD

Answer: B
Section: (none)

QUESTION 99
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?

A. Smart jack
B. Demarc
C. 66 block
D. 110 block

Answer: C
Section: (none)

QUESTION 100
Which of the following components would a technician check to see if a phone outage is an internal or
external problem?

A. 110 block
B. Demarc
C. 66 block
D. Patch panel

Answer: B
Section: (none)

QUESTION 101
Which of the following uses 802.1 q?

A. 802.1x
B. Port mirroring
C. VLAN
D. QoS

Answer: C
Section: (none)

QUESTION 102
Which of the following can allow or deny network access based on a physical hardware address?

A. IP filtering
B. IDS
C. MAC filtering
D. IPS

Answer: C
Section: (none)

QUESTION 103
Which of the following BEST describes ISDN?

A. Coaxial cable, token passing, local area network


B. Carrier sense, multiple access points, collision detection on multiple workstations
C. Circuit switching, digital signaling, interfaces carry multiple channels
D. Cell switching, 53-byte cells, uniform handling of voice and data

Answer: C
Section: (none)
Exam G

QUESTION 1
Which of the following devices can be configured to block ports?

A. DHCP server
B. Basic firewall
C. Content filter
D. Hub

Answer: B
Section: (none)

QUESTION 2
A technician is installing new LAN lines into a company¡¯ s new office space. Which of the following is the
termination point for each new run?

A. Patch Panel
B. Demarc
C. 66 Block
D. Smart Jack

Answer: A
Section: (none)

QUESTION 3
Two business partners have recently been connected via a dedicated extranet. It has been discovered that
each of the companies are using the same private IP address space. Which of the following will help to
resolve potential routing issues?

A. CIDR
B. NAT
C. Multicast
D. PAT

Answer: B
Section: (none)

QUESTION 4
Which of the following will allow data and power over the same connection?

A. Trunking
B. Mirroring
C. Spanning tree
D. PoE

Answer: D
Section: (none)

QUESTION 5
Which of the following can be used to record and save VoIP conversations?

A. Port scanner
B. Packet sniffer
C. IDS
D. Banner grabber

Answer: B
Section: (none)

QUESTION 6
Users from different locations are reporting issues with various intranet sites. After identifying all the
affected areas, which of the following should a technician do NEXT?

A. Determine what has recently changed.


B. Establish the most probable cause.
C. Create an action plan and solution identifying potential effects.
D. Continue to identify new symptoms and problems elsewhere.

Answer: A
Section: (none)

QUESTION 7
An administrator needs to identify the DNS servers that a computer is using. Which of the following
commands would MOST likely be used?

A. ping
B. nslookup
C. ipconfig
D. traceroute

Answer: B
Section: (none)

QUESTION 8
A firewall acts at which layer of the OSI model to perform content filtering?

A. Presentation
B. Application
C. Session
D. Network

Answer: B
Section: (none)

QUESTION 9
An administrator would like to turn off web-based administration access to critical network routers and
switches. Which of the following ports should be blocked? (Select TWO).
A. 21
B. 80
C. 23
D. 110
E. 443

Answer: BE
Section: (none)

QUESTION 10
Which of the following is typically used in an LAN environment?

A. 10GBaseLW
B. 10GBaseEW
C. 10GBaseSW
D. 10GBaseSR

Answer: D
Section: (none)

QUESTION 11
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?

A. ifconfig
B. netstat
C. dig
D. ipconfig

Answer: A
Section: (none)

QUESTION 12
Which of the following configuration management documentation types would an administrator use to know
how and when to properly install new network devices on the LAN?

A. Network policy
B. Baseline configuration
C. Logical network diagram
D. Wiring schematic

Answer: A
Section: (none)

QUESTION 13
A technician needs to configure a machine to automatically request an IP address upon boot. Which of the
following BEST describes this type of addressing?

A. Static
B. Routed
C. Dynamic
D. Convergence

Answer: C
Section: (none)

QUESTION 14
Which of the following commands provides similar information about the current configuration of active local
Ethernet adapters? (Select TWO).

A. route
B. hostname
C. ifconfig
D. traceroute
E. ipconfig

Answer: CE
Section: (none)

QUESTION 15
Which of the following WAN technologies provides the highest maximum bandwidth?

A. ADSL
B. SONET
C. T1
D. E3

Answer: B
Section: (none)

QUESTION 16
An administrator is setting up a network and would like to prevent users from having the ability to plug their
PC into the network to receive an IP address. Which of the following addressing schemes should the
technician use?

A. Dynamic
B. NAT
C. Static
D. Subnetting

Answer: C
Section: (none)

QUESTION 17
Which of the following network cable types requires grounding?

A. Fiber
B. STP
C. Serial
D. UTP

Answer: B
Section: (none)

QUESTION 18
Which of the following protocols operate at layer 4 of the OSI model? (Select TWO).

A. HTTP
B. FTP
C. UDP
D. TCP
E. ICMP

Answer: CD
Section: (none)

QUESTION 19
A technician is troubleshooting a network connectivity issue. Given the following abbreviated traceroute
output:
1 192.168.1.1
2 172.16.40.1
3 10.4.0.1
4 172.16.40.1

Which of the following is MOST likely occurring?

A. IP conflict
B. Broadcast storm
C. Switching loop
D. Routing loop

Answer: D
Section: (none)

QUESTION 20
Which of the following features enables a firewall to inspect a packet based on connection status?

A. Signature identification
B. Stateless inspection
C. Port forwarding
D. Stateful inspection

Answer: D
Section: (none)

QUESTION 21
If an IPSec session is not working correctly, which of the following would a technician do FIRST?

A. Check that IGMP is enabled on the network switch


B. Verify that IPSec service is running on the DNS server
C. Verify that the correct SNMP strings are setup on each system
D. Check whether their system is set to the correct IPSec setting

Answer: D
Section: (none)

QUESTION 22
New service from the telephone company is delivered over fiber, but the technician does not have a fiber
module for the router. Which of the following would remedy this issue?

A. CSU/DSU
B. Media converter
C. Fiber repeater
D. OTDR

Answer: B
Section: (none)

QUESTION 23
Which of the following is a secure replacement for telnet console connections?

A. TLS
B. SSH
C. HTTPS
D. SIP

Answer: B
Section: (none)

QUESTION 24
Which of the following networks would MOST likely require EGP routing?

A. Networks with classless Internet domain routing


B. Networks that use OSPF in addition to static routes
C. Networks that use encryption
D. Networks with multiple ISPs

Answer: D
Section: (none)

QUESTION 25
Which of the following allows TCP/IP packets to be analyzed for possible threats?

A. IDS
B. DNS server
C. Proxy server
D. CSU
Answer: A
Section: (none)

QUESTION 26
Which of the following describes the ICMP protocol?

A. Layer 4 protocol
B. TCP protocol
C. Layer 3 protocol
D. UDP protocol

Answer: C
Section: (none)

QUESTION 27
A Linux user is reporting trouble accessing the Internet. After verifying that the workstation is authenticated
to the domain, which of the following should the administrator perform FIRST on the Linux workstation?

A. nslookup
B. ifconfig
C. ipconfig
D. dig

Answer: D
Section: (none)

QUESTION 28
Which of the following is a reason why satellite Internet should be avoided, if VoIP is being used?

A. One-way communication
B. Latency
C. Low bandwidth
D. Availability

Answer: B
Section: (none)

QUESTION 29
Which of the following is a secure method of transferring a file?

A. FTP
B. RCP
C. SCP
D. SSH

Answer: C
Section: (none)
QUESTION 30
An administrator indicates that the T1 line at a remote site can plug directly into the new router, eliminating
the need for a secondary device. Which of the following external devices is no longer needed?

A. CSU/DSU
B. VLAN
C. MDF
D. ATM

Answer: A
Section: (none)

QUESTION 31
An E1 connection contains how many lines?

A. 22
B. 24
C. 16
D. 32

Answer: D
Section: (none)

QUESTION 32
Which of the following is the MOST important factor to ensure wireless connectivity?

A. Centralized device management


B. Installing WPA
C. AP placement
D. Wireless encryption

Answer: C
Section: (none)

QUESTION 33
Which of the following would an administrator use to standardize all cross connects on a RJ-45 jack?

A. Smart jack
B. 110 block
C. 66 block
D. Patch panel

Answer: D
Section: (none)

QUESTION 34
Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO).

A. OSPF
B. RIPv2
C. RIP
D. IGRP
E. EIGRP

Answer: CD
Section: (none)

QUESTION 35
Which of the following would need to be implemented on a wireless router to allow network access based
on a passphrase that the administrator would supply?

A. MAC filtering
B. SSID broadcast
C. WPA-PSK encryption
D. Port forwarding

Answer: C
Section: (none)

QUESTION 36
A technician needs to install additional access points for a new high speed connection being added in the
new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable
connections?

A. Smart Jack
B. 110 Block
C. Demarc
D. 66 Block

Answer: B
Section: (none)

QUESTION 37
An administrator needs to view the routing table on a UNIX system. Which of the following tools should be
used?

A. ifconfig
B. traceroute
C. netstat
D. nslookup

Answer: C
Section: (none)

QUESTION 38
After troubleshooting a network problem, a technician determines that the problem is not on the local
network but exists on the ISP network. Which of the following should the technician do NEXT?
A. Escalate the problem to the ISP for resolution.
B. Report the ISP to the IANA.
C. Visit the ISP data center and reboot their router.
D. Switch the Internet connection to a new ISP.

Answer: A
Section: (none)

QUESTION 39
Which of the following technologies was designed to provide the FASTEST data rates over analog phone
lines?

A. MPLS
B. RADSL
C. SONET
D. ADSL

Answer: D
Section: (none)

QUESTION 40
Which of the following protocols would MOST likely be used to provide for the simple movement of files
across two machines over the Internet?

A. NTP
B. SMTP
C. FTP
D. POP3

Answer: C
Section: (none)

QUESTION 41
Which of the following devices is used to connect multiple devices to a network and does not stop
broadcast traffic?

A. Hub
B. Repeater
C. Switch
D. Modem

Answer: A
Section: (none)

QUESTION 42
Which of the following is the MOST widely used VoIP protocol?

A. SIP
B. IAX
C. SCTP
D. H.264

Answer: A
Section: (none)

QUESTION 43
Which of the following protocols is used by a WAP to authenticate its identity with a server on the domain?

A. TKIP
B. RADIUS
C. CHAP
D. MS-CHAP

Answer: B
Section: (none)

QUESTION 44
Which of the following ports is associated with FTP?

A. 20
B. 53
C. 3389
D. 23

Answer: A
Section: (none)

QUESTION 45
Which of the following SNMP versions allows for authorization and encryption when connecting?

A. 2c
B. 3
C. 3c
D. 2

Answer: B
Section: (none)

QUESTION 46
When configured, MPLS can increase routing redundancy by providing which of the following network
topology types?

A. Bus
B. Mesh
C. Ring
D. Multipath

Answer: B
Section: (none)

QUESTION 47
Which of the following would MOST likely be used with multimode fiber?

A. 10GBaseT
B. 10GBaseSR
C. 10GBaseER
D. 10GBaseLR

Answer: B
Section: (none)

QUESTION 48
A link light on a network card refers to which of the following?

A. Auto duplex
B. Collision detection
C. Carrier sense
D. Multiple access points

Answer: C
Section: (none)

QUESTION 49
Which of the following components is typically used for voice transmissions and has a 10Mbps maximum
transfer speed?

A. Patch panel
B. 66 block
C. 110 block
D. Vertical cross connect

Answer: B
Section: (none)

QUESTION 50
Refer to the attached Exhibit. In the environment represented by the diagram, a technician is asked to
temporarily connect three printers to the network. They are to be placed physically next to the existing
network printer. The technician needs to install a new switch to connect these printers because all ports are
taken on the network. Which of the following locations on the network would be the BEST place for the
additional switch to be placed?

A. Between the existing printer and switch A


B. Between switch A and switch B
C. Between the DHCP and switch A
D. Between switch A and switch C

Answer: A
Section: (none)
QUESTION 51
Which of the following commands will display the routing table on a UNIX/Linux computer?

A. mtr
B. netstat
C. route
D. ipconfig

Answer: C
Section: (none)

QUESTION 52
Which of the following protocols uses a three-way handshake process before establishing a connection?

A. DNS
B. TFTP
C. UDP
D. TCP

Answer: D
Section: (none)

QUESTION 53
Which of the following can be used to mitigate network congestion from users streaming media?

A. Protocol analyzer
B. Caching gateway
C. Broadcast traffic optimization
D. Traffic shaping

Answer: D
Section: (none)

QUESTION 54
Which of the following devices is used to extend network coverage by helping to maintain the signal quality
of the original transmission?

A. Switch
B. Hub
C. Repeater
D. Modem

Answer: C
Section: (none)

QUESTION 55
Which of the following protocols is responsible for the delivery of email from server to server?
A. IMAP
B. SNMP
C. POP3
D. SMTP

Answer: D
Section: (none)

QUESTION 56
A workstation is having connectivity issues when being added to the domain. Which of the following
commands would allow the administrator to see the DNS and WINS servers that are currently configured
for the workstation?

A. nslookup
B. netstat
C. nbtstat
D. ipconfig

Answer: D
Section: (none)

QUESTION 57
A wireless access point supports up to 20 clients. Which of the following describes this wireless network?

A. Point to point
B. Ring
C. Mesh
D. Point to multipoint

Answer: D
Section: (none)

QUESTION 58
Which of the following commands can be used to add a default gateway to a host?

A. traceroute -d 192.168.1.1
B. ping -s 1 192.168.1.1
C. ifconfig eth0 192.168.1.1 255.255.255.0
D. route add 0.0.0.0 gw 192.168.1.1

Answer: D
Section: (none)

QUESTION 59
Which of the following is the default DNS port?

A. 143
B. 53
C. 23
D. 443

Answer: B
Section: (none)

QUESTION 60
Which of the following protocols allows dynamic addresses to be assigned to devices?

A. SNMP
B. ARP
C. SMTP
D. DHCP

Answer: D
Section: (none)

QUESTION 61
Which of the following is a distance vector routing protocol?

A. OSPF
B. EIGRP
C. IS-IS
D. RIP

Answer: D
Section: (none)

QUESTION 62
Which of the following processes translates a private IP address for a public IP address?

A. DNS
B. PAT
C. NAT
D. DHCP

Answer: C
Section: (none)

QUESTION 63
When a device wants to send a packet over the network, the process of listening to the network media to
see whether any other packets are sent is called:

A. multiple access points.


B. carrier sense.
C. media access control.
D. collision avoidance.

Answer: B
Section: (none)

QUESTION 64
Which of the following documentation would be the BEST to use when determining the location of the wiring
closets?

A. Event logs
B. Logical network diagram
C. Physical network diagram
D. Job logs

Answer: C
Section: (none)

QUESTION 65
Which of the following controls are MOST effective when a route only supports remote configuration
changes via Telnet? (Select TWO).

A. Vulnerability scanner
B. Strong passwords
C. Port scanner
D. Two factor authentication
E. IP ACLs

Answer: DE
Section: (none)

QUESTION 66
An administrator would like to test the firewall rules on a corporate network. Which of the following tools
would MOST likely be used?

A. Port scanner
B. Packet sniffer
C. Traffic shaper
D. Ping sweep

Answer: A
Section: (none)

QUESTION 67
Which of the following connectors would be on a fiber cable?

A. DB-25
B. LC
C. BNC
D. DB-9

Answer: B
Section: (none)
QUESTION 68
Which of the following is true of an ACL when a packet matching an ACE is found?

A. The matching ACE is processed and then the last ACE is examined.
B. The matching ACE is processed and then the next ACE is examined.
C. The matching ACE is processed and the next packet is examined.
D. The matching ACE is skipped to allow all other ACEs to be examined.

Answer: C
Section: (none)

QUESTION 69
Which of the following devices will measure the amount of EMI that a network cable emits?

A. Protocol analyzer
B. OTDR
C. Cable tester
D. TDR

Answer: D
Section: (none)

QUESTION 70
Which of the following can be used by web developers to remotely and securely update content on a
website?

A. SNMP
B. SFTP
C. FTP
D. RCP

Answer: B
Section: (none)

QUESTION 71
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following
features needs to be configured to allow for this addition?

A. DHCP relay
B. Proxy server
C. DHCP server
D. Repeater

Answer: A
Section: (none)

QUESTION 72
Which of the following technologies allows an administrator to submit traffic to an IDS for review?

A. Port mirroring
B. VLAN
C. Spanning tree
D. PoE

Answer: A
Section: (none)

QUESTION 73
Which of the following describes an attack where all TCP flags are enabled on a packet?

A. DDos
B. Xmas attack
C. Smurf attack
D. DoS

Answer: B
Section: (none)

QUESTION 74
An administrator is setting up a security camera that will send the same feed to twelve of the twenty
workstations on the network. Which of the following addressing schemes was designed for this scenario?

A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer

Answer: A
Section: (none)

QUESTION 75
Which of the following is true of IPSec when operating in transport mode?

A. Both the header and the payload are encrypted


B. Only the header is encrypted
C. Neither the header nor the payload are encrypted
D. Only the payload is encrypted

Answer: D
Section: (none)

QUESTION 76
As the number of networks and routers has grown, the technician finds that entering the routing information
for all customers in each router has become a time consuming and error prone process. Which of the
following should the technician do?
A. Keep routing assignments in an exportable spreadsheet.
B. Stop routing and bridge all connections.
C. Switch to a dynamic routing protocol.
D. Hire another technician to maintain routing assignments.

Answer: C
Section: (none)

QUESTION 77
Which of the following does the AP use to broadcast the SSID of the wireless network to allow clients to find
and connect to the network?

A. Association
B. Beacon
C. Probe
D. WPA

Answer: B
Section: (none)

QUESTION 78
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop
shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following
would BEST describe this connection speed?

A. The laptop is too far away from the WAP.


B. The WAP is using 802.11a frequencies.
C. The laptop is only set to allow 802.11n connections.
D. The technician is on an 802.11b network.

Answer: D
Section: (none)

QUESTION 79
Which of the following protocols would an administrator use to backup files from a router to a local server?

A. DHCP
B. SMTP
C. NTP
D. TFTP

Answer: D
Section: (none)

QUESTION 80
Which of the following technologies attempts to avoid loops at Layer 2 of the OSI model?

A. Port mirroring
B. PoE
C. Spanning tree
D. VLAN

Answer: C
Section: (none)

QUESTION 81
Which of the following is a secure method of copying information over a public network?

A. TFTP
B. SCP
C. SNMP
D. SMTP

Answer: B
Section: (none)

QUESTION 82
Which of the following is the MOST common WAN technology type used in residential homes?

A. Frame relay
B. MPLS
C. Cable modem
D. ATM

Answer: C
Section: (none)

QUESTION 83
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?

A. 10GBaseSW
B. 10GBaseEW
C. 10GBaseER
D. 10GBaseLW

Answer: D
Section: (none)

QUESTION 84
A user reports that their laptop does not have network connectivity, but was working fine last week. The
technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1
address. This address is not part of the company¡¯ s subnet. Which of the following MOST likely identifies
this address type?

A. Multicast
B. APIPA
C. Broadcast
D. DHCP
Answer: B
Section: (none)

QUESTION 85
An administrator is troubleshooting crosstalk issues. Which of the following should the administrator check
FIRST?

A. Proxy settings
B. WLAN channels
C. Patch cables
D. Port duplex

Answer: C
Section: (none)

QUESTION 86
Which of the following is the rate in bits per second of a bearer channel in a PRI circuit?

A. 16 Kbps
B. 1.5 Mbps
C. 1 Mbps
D. 64 Kbps

Answer: D
Section: (none)

QUESTION 87
An administrator is implementing a wireless network. Which of the following encryption technologies is the
MOST secure method and will authenticate devices to the network?

A. WEP
B. VPN
C. SSH
D. WPA

Answer: D
Section: (none)

QUESTION 88
Users report an intermittent degradation of sound on their IP phones. Which of the following would a
network administrator do to alleviate the problem?

A. Configure QoS.
B. Configure VLAN trunking on the switch.
C. Use plenum cables.
D. Provide fault tolerance for the switch.

Answer: A
Section: (none)
QUESTION 89
Which of the following has a maximum data rate of 11Mbps?

A. 802.11a
B. 802.11g
C. 802.11n
D. 802.11b

Answer: D
Section: (none)

QUESTION 90
After a power outage, the helpdesk receives multiple calls. Which of the following steps should a technician
do NEXT?

A. Determine if anything else has changed.


B. Identify the affected areas.
C. Escalate part of the solution to the appropriate section.
D. Create an action plan.

Answer: B
Section: (none)

QUESTION 91
When ordering switches for a new building, which of the following is the BEST way for the technician to
determine the number of switches to put in each network closet?

A. Count the number of phone ports and configure two network ports for each phone port.
B. Review the architectural plans to see how many drops go to each closet.
C. Count the number of rooms near each closet and standardize eight drops per room.
D. Wireless is the new standard and no network switches will be needed in the building.

Answer: B
Section: (none)

You might also like