Practice Network+ 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

After a power outage several switches lose their current configurations, but the core router is still working properly. The switches affected are not able to connect to the network. After further investigation the network administrator is able to identify the affected areas, establish the cause, and escalated the problem. Which of the following would be the NEXT step that the network administrator should do? A. Immediately implement a solution. B. Meet with the emergency response team to determine the next step. C. Create an action plan and solution. D. Copy the core routers current configuration to all the affected switches

C

All the workstations at a company have a static IP address. A newly deployed workstation is unable to connect to the company intranet server using an Internet browser. The technician can ping the intranet servers IP address. The MOST likely cause of this is an incorrect: A. VLAN. B. IP address on the new workstation. C. DNS server setting on the client. D. gateway setting on the client

C

In a Class A subnet, a Host ID may occupy a maximum of: A. 32bits. B. 31bits. C. 24bits. D. 16bits.

C

There are two networks sharing the same office space. One network already has an 802.11g access point. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other? A. Encryption type B. Pre-shared key C. Channel D. WEP key

C

Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity? A. CHAP B. EAP C. PKI D. Kerberos

C

Which of the following command line tools would BEST be used to verify DNS functionality? A. netstat B. traceroute C. dig D. arp

C

Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports? A. Bridge B. Router C. Hub D. Switch

C

Which of the following ipconfig switches will display when the lease was obtained? A. /displaydns B. /release C. /all D. /renew

C

Which of the following is a client- server based authentication software system which maintains user profiles in a central database? A. CHAP B. MSCHAP C. RADIUS D. EAP

C

Which of the following is the MOST secure wireless encryption? A. ESSID B. WPA C. WPA2 D. WEP

C

Which of the following is the difference between static and dynamic routing? A. Static routes are added automatically. B. Static routing is best used in large scalable networks. C. Dynamic routes are added automatically. D. Dynamic routing is used by a WINS server

C

Which of the following is the maximum range of 10GBaseSR? A. 1000 feet (305 meters) B. 6 miles (1593 kilometers) C. 990 feet (302 meters) D. 328 feet (100 meters)

C

Which of the following monitoring software is used to view network traffic at the frame level? A. Connectivity B. Throughput testing C. Packet sniffer D. Load testing

C

Which of the following network components operates on Layer 2 of the OSI model? A. Gateway B. Router C. Switch D. Hub

C

Which of the following protocols is used to access files on a remote server? A. ARP B. SIP C. FTP D. NTP

C

Which of the following protocols uses port 443? A. SMTP B. FTP C. HTTPS D. HTTP

C

Which of the following punch down blocks is BEST suited for highspeed data transmission? A. 66 block B. Crossconnect block C. 110 block D. 25 pair cable block

C

Which of the following tools is used to show the active routes on a workstation? A. arp ping B. arpa C. netstat r D. nbstat

C

Which of the following would a technician find 568B standard? A. Network baseline B. Logical network diagram C. Wiring schematic D. Local regulation

C

Which of the following protocols are used for email traffic? (Select THREE). A. SNMP B. NTP C. POP3 D. TFTP E. IMAP4 F. SSH G. SMTP

C,E,G

Given the following routing table entries, which of the following will the next hop address be for a packet destined for the address 192.168.1.203? Network Address Subnet Mask Next Hop Address 0.0.0.0 0.0.0.0 77.0.5.5 192.168.0.0 255.255.0.0 66.40.90.121 192.168.1.0 255.255.255.0 72.40.91.1 192.168.1.0 255.255.255.127 40.40.0.254 A. 40.40.0.254 B. 66.40.90.121 C. 77.0.5.5 D. 72.40.91.1

D

On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause? A. The wireless network card is not working. B. The wireless router does not have DHCP enabled. C. The wireless network card is out of range. D. The gateway is not configured on the router

D

The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is: A. 1Mbps. B. 10Mbps. C. 1000Mbps. D. 100Mbps

D

Which of the following BEST explains the purpose of a DMZ? A. To separate a security zone for an IPS. B. To separate a security zone for a VPN. C. To create a security zone that allows private traffic but is isolated from the public network. D. To create a security zone that allows public traffic but is isolated from the private network

D

Which of the following equipment would allow for routing based on logical addresses? A. Layer 2 hub B. Layer 2 switch C. Layer 1 NIC D. Layer 3 switch

D

Which of the following is the maximum cable length in a 1000BaseT network? A. 1,024 meters (3360 feet) B. 1000 meters (3280 feet) C. 128 meters (420 feet) D. 100 meters (328 feet)

D

Which of the following network component interfaces with a Telco T1 line at the demarcation point? A. ISDN adapter B. Modem C. NIC D. CSU / DSU

D

Which of the following network topologies would BEST prevent downtime in a WAN environment? A. Ring B. Star C. Bus D. Mesh

D

Which of the following protocols maps an IP address to a MAC address? A. RARP B. DHCP C. NTP D. ARP

D

Which of the following wiring standards is depicted below? Pin 1 WhiteOrange Pin 2 Orange Pin 3 White Green Pin 4 Blue Pin 5 White Blue Pin 6 Green Pin 7 White Brown Pin 8 Brown A. IEEE 1394 B. Crossover cable C. 568A D. 568B

D

A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased? A. Bluetooth B. WiFi C. IEEE 1394 D. 802.11a

A

A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue? A. Escalate the issue to a senior network associate. B. Reboot the computer to try and recreate the issue. C. Determine if anything has changed. D. Document all possible causes

A

A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between the hops? A. tracert B. nbtstat C. nslookup D. ping

A

An administrator is going to be performing maintenance on a network router and wants to temporarily reroute traffic through another office. Which of the following would allow the administrator to accomplish this? A. Configure a static route. B. Configure EGP. C. Implement NAT on the server. D. Implement steady state convergence

A

How many DS0s are used in a T1? A. 24 B. 30 C. 23 D. 31

A

When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm? A. Spanning tree protocol B. Port mirroring C. Port aggregation D. 802.1q VLAN trunking protocol

A

Which of the following address ranges should a network administrator deny in the ACL to prevent multicast packets from crossing the WAN interface? A. 224.0.0.0239.255.255.255 B. 127.0.0.0127.255.255.255 C. 192.168.0.0192.168.255.255 D. 10.0.0.010.255.255.255

A

Which of the following advanced features prevents switching loops by using a preferred path? A. Spanning tree B. VLAN C. Port bonding D. Port authentication

A

Which of the following can an application layer firewall filter that a network layer firewall cannot? A. HTTP URLs B. Telnet traffic C. ICMP D. HTTP traffic

A

Which of the following defines the main purpose of dynamic routing? A. Adapts quickly to network changes without manual entries. B. Enables routing protocols with the least amount of hops. C. Adapts to network changes by making manual changes. D. Reduces domain collisions

A

Which of the following devices would administer routing in a network? A. Multilayer switch B. Proxy server C. DNS server D. Load balancer

A

Which of the following is a topology used in networks for its scalability? A. Star B. Ring C. Bus D. Mesh

A

Which of the following is required to pass traffic from one VLAN to another? A. A layer three switch B. A layer two switch C. A server with NICs on both VLANs D. A layer one switch

A

Which of the following is resistant to crosstalk? A. 100BaseFX B. 10GBaseCX C. STP D. 1000BaseT

A

Which of the following network hardware allows the MOST network traffic collisions? A. Hub B. WAP C. Router D. Switch

A

Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers? A. LDAP B. SMTP C. TCP D. UDP

A

Which of the following protocols will help reduce multicast flooding on a layer 2 switch? A. IGMP B. ARP C. SNMP D. ICMP

A

Which of the following utilities shows the relationship between a MAC address and the corresponding IP address? A. arp B. nslookup C. ipconfig D. tracert

A

Which of the following will prevent unauthorized access to the server room? A. Biometric lock B. PKI card C. Cable lock D. RSA token

A

While reviewing a firewall policy, a network administrator notices a large block of addresses are denied without comment. Given that the blocked address range is from 224.0.0.0 to 239.255.255.255, which of the following group of addresses does this specify? A. Multicast addresses B. Unused private addresses C. RFC1918 private addresses D. Asiapacific addresses

A

Which of the following log files listed below should be reviewed by the network administrator to inform you that there are performance and network issues within the LAN? A. The administrator should check the System logs. B. The administrator should check the Event logs. C. The administrator should check the Application logs. D. The administrator should check the security logs.

A,B

Which of the following protocols should be used to securely copy a file? (Select TWO). A. SFTP B. SCP C. TFTP D. FTP E. SNMP

A,B

Which of the following tools could an administrator use to determine if a machine was using the correct DNS server? (Select TWO). A. ipconfig B. nbtstat C. netstat D. ifconfig E. tracert

A,D

A computer is not able to connect to the network. The link light on the NIC is not illuminated. Which of the following should the technician do FIRST? A. Reinstall NIC drivers with the most current drivers. B. Verify network cable connectivity. C. Replace the NIC card with a known good NIC card. D. Check to make sure that the port on the switch is working properly

B

A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to BEST accomplish this? A. Content switch B. Load balancer C. Proxy server D. Bandwidth shaper

B

A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used? A. Throughput tester B. Packet sniffer C. VPN concentrator D. Network scanner

B

A power outage occurred over the weekend and on Monday morning the helpdesk was receiving calls about network issues from only one section of the LAN. A network administrator has implemented the solution and identified all the results. After all the network issues were resolved, what would be the NEXT step for that network administrator? A. Identify potential effects of the solution. B. Document the entire process. C. Let all users within the LAN know what the problem was. D. Determine if anything has changed

B

A technician is troubleshooting a network data transmission issue. Which of the following commands would the technician be able to use to identify the location of the packet loss? A. ipconfig B. traceroute C. ping D. arp

B

A trouble ticket has been generated, reporting a workstation has lost network connectivity. Which of the following should be the FIRST course of action taken? A. Check gateway. B. Gather information. C. Escalate the issue. D. Check switches

B

After adding a new cable segment to the network, the technician should: A. document the changes in the business continuity plan. B. update the wiring schematics. C. create a new baseline document. D. update the disaster recovery plan

B

After installing a new switch and connecting redundant uplinks to other switches, a LAN experiences a broadcast storm causing severe throughput problems. Which of the following is the MOST likely cause of the broadcast storm? A. VLAN assignments on the new switch conflicted with existing VLAN assignments elsewhere on the network. B. Spanning tree protocol was not operational on the LAN. C. Incorrect trunk encapsulation was applied. D. Port aggregation was incorrectly configured

B

Ensuring that data is transmitted securely over an IP network is the main purpose of: A. FTP. B. TLS. C. Telnet. D. SIP

B

SMTP resides at which of the following layers of the OSI model? A. Transport B. Application C. Network D. Presentation

B

The difference between 10BaseT and 100BaseT is: A. 100BaseT frames hold more data. B. shorter timing between Ethernet frames. C. 100BaseT requires STP cabling. D. smaller headers on Ethernet frames

B

Which of the following authentication protocols uses plain text to transmit passwords over the internet? A. RADIUS B. PAP C. CHAP D. Kerberos

B

Which of the following command line utilities is used to display the IP to Physical address table? A. netstat B. arp C. nbtstat D. ping

B

Which of the following is a benefit of using dynamic routing as opposed to static routing? A. More secure B. Scales to large networks C. Improves network speed D. Less network overhead

B

Which of the following is the MOST secure access method? A. RSH B. SFTP C. SNMPv1 D. RCP

B

Which of the following is the default port for HTTPS? A. 143 B. 443 C. 80 D. 8080

B

Which of the following network devices is required to translate a synchronous serial connection to time division multiplexed connection? A. A proxy server B. A CSU/DSU C. A content switch D. A router

B

Which of the following network devices routes packets over a wireless network? A. NIC B. WAP C. WEP D. CSU / DSU

B

Which of the following network protocols allows for automated alerts and reports on network devices? A. SMTP B. SNMP C. IGMP D. TLS

B

Which of the following port numbers does SSH use? A. 21 B. 22 C. 23 D. 20

B

Which of the following protocols describes a connectionless state and does not use acknowledgements? A. POP3 B. UDP C. NTP D. TCP

B

Which of the following routing protocols has a limitation of 15 hops? A. OSPF B. RIP C. IGRP D. BGP

B

Which of the following security mitigation techniques is the MOST effective against zero day attacks? A. MAC filtering B. User awareness training C. Update antivirus definitions D. Effective security policies

B

Which of the following tools would be used to verify the wiring installation for the network? A. Multimeter B. Cable tester C. Voltage event recorder D. Protocol analyzer

B

Which of the following type of WAN technologies uses cell switching? A. PSTN B. ATM C. T1 D. Frame relay

B

Which of the following will have problems functioning if a firewall has been set up to block all UDP traffic? A. A server database application B. A VoIP device C. The Internet D. A network printer

B

Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone? A. Hub B. Media converter C. Repeater D. Bridge

B

Which of the following would occur at the application layer of the OSI model? A. UDP B. FTP C. TCP D. SPX

B

Which of the following protocols are used in VoIP? (Select TWO). A. RDP B. RTP C. SSH D. SMTP E. SIP

B,E

A technician receives a request to move several established phones? the technician can perform this request at the termination block by moving the wire connection. Which of the following tools is required to reconnect wires to the termination block? A. Cable stripper B. Butt set C. Punch down tool D. Snips

C

During testing, technician notices that a user has been given the wrong IP address from the DHCP server once they connect. Which of the following is the MOST likely problem? A. Incorrect subnet mask B. Incorrect duplex C. Incorrect trunk D. Incorrect VLAN

D

.QoS is used to accomplish which of the following objectives? A. Block traffic from certain websites. B. Block traffic from certain users. C. Provide priority of one or more types of traffic over others. D. Make use of the current bandwidth so it is a constant preset ideal by caching traffic

C

A 66 block is typically connected to the telecommunication company through which of the following types of cable? A. Fiber optic B. CAT6 C. 25 pair D. 100 pair

C

A DHCP enabled computer on the network is changing IP addresses and the technician wants to have the same IP address assigned for that computer. Which of the following would be implemented? A. The technician needs to add the IP address to the host file. B. The technician needs to restart the DHCP services. C. The technician needs to add the computer to the reservation list. D. The technician needs to add the MAC address to the host file

C

A VoIP telephone with a builtin hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future? A. Port mirroring B. VLANS C. Spanning tree D. Trunking

C

A corporate office network has 40 computers all in the same private IP subnet. The corporate office has purchased an Internet connection from their local ISP. They were assigned one static public IP address, and all 40 computers will require access to the Internet. How can this be accomplished? A. DHCP will assign addresses capable of accessing the Internet. B. The use of static NAT will allow access to the Internet. C. PAT will allow access to the Internet. D. Supernetting will allow access to the Internet

C

A host is unable to communicate across a network. From the information below, which of the following is the cause of the issue? Host Name . . . . .. . . . . . . : Test20 Primary Dns Suffix . . . . . .. : abc.com Node Type . . . . .. . . . . . . : Unknown IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : abc.com Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix . : Description . . . . .. . . . . . : Broadcom NetXtreme Gigabit Ethernet Physical Address. . . . . . . . . : 00000015A1D0 Dhcp Enabled. . . . . . . . . . . : No IP Address. . . . . . . . . . . .: 10.0.37.144 Subnet Mask . . .. . . . . . . . : 255.255.254.0 Default Gateway . . .. . . . . . : 10.0.38.1 DNS Servers . . . . . . . . . .. : 10.0.36.5 A. Subnet mask is incorrect. B. IP address is incorrect. C. Gateway IP is incorrect. D. DNS server address is incorrect

C

A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement? A. VPN B. DHCP C. PAT D. DNS

C

A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements? A. 802.1s B. 802.1d C. 802.1x D. 802.1w

C

A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would MOST likely be used? A. SSL B. WEP C. WPA D. IPSec

C

A technician is dispatched to a house where the user reports intermittent problems with their wireless network. Which of the following is the MOST likely cause of dropoffs? A. Cellular phones B. Poor cable connection C. Cordless phones D. Lighting

C

100BaseTF uses which of the following types of cabled medium? A. Ethernet implementation over ThinNet B. Ethernet implementation over coaxial C. Ethernet implementation over ThickNet D. Ethernet implementation over fiber

D

A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords? A. WPA TLS B. 64bit WEP C. 128bit WEP D. WPA PEAP

D

A technician is setting up a public server for their company. The IP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server? A. 255.255.255.255 B. 255.255.0.0 C. 255.255.255.0 D. 255.0.0.0

D

A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver, error code 2.Which of the following would resolve this? A. Flush the DNS Cache. B. Install NetBEUI. C. Release the IP Address. D. Install the TCP/IP protocol

D

A user is having connectivity issues at multiple locations when using the RJ45 port on the laptop. A technician wants to know if the CAT5e cable is the source of the problem. Which of the following should the technician use to troubleshoot the issue? A. Toner probe B. Cable stripper C. Protocol analyzer D. Cable tester

D

An administrator needs to find out a specific NICs MAC address, the IP address of the NIC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer? A. ping B. netstat C. nbtstat D. arp

D


Conjuntos de estudio relacionados

NR 464 - Exam 1 (Saunders) - Liver, Pancreas, Gallbladder

View Set

Women's health/Disorders & Childbearing

View Set

Pharm. Chap. 17 Adrenergic Agonists

View Set

ESL - ESL3 - Level 3 - English Language Vocabulary for ALL Speakers

View Set

CHEM 2211L Experiment 1 - Recrystallization: Identification of a Impure Unknown

View Set

DoD Cyber Awareness 2023 (Knowledge Check)

View Set

Combo with GMAT Math 1 and 19 others

View Set

INS test 41) Which of the following statements is (are) true with respect to annuities? I. Annuities are the opposite of life insurance. II. The fundamental purpose of annuities is to replace lost income in case of premature death. A) I only B) II only C)

View Set

Windham Rad Program Patient Care

View Set