MTA Networking Fundamentals Certification Practice Exam
Which one of the following is a second-level domain? A. in-addr.arpa B. .edu C. www.gmetrix.com D. microsoft.com
.edu
You have a subnet mask of 255.255.240.0. What would the CIDR notation be? A. /16 B. /20 C. /24 D. /28
/20
The subnet mask 255.255.255.240 can be written in slash notation as _______________ A. /30 B. /26 C. /28 D. /24
/28
Which IP address in a routing table signifies a default route? A. 127.0.0.1 B. 0.0.0.0 C. 255.255.255.255 D. 1.1.1.1
0.0.0.0
Classful Addressing Class A Class B Class C Class D Class E
0.0.0.0 - 127.255.255.255 128.0.0.0 - 191.255.255.255 192.0.0.0 - 223.255.255.255 224.0.0.0 - 239.255.255.255 240.0.0.0 - 255.255.255.255
Which of the following represents a Media Access Control (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Al:25 D. 127.0.0.1
05:35:AB:6E:Al:25
Which of the following cables match the speeds presented? 1. Cat5 2. Cat2 3. Cat5e 4. Cat3 A. 1 Gbps B. 10 Mbps C. 100 Mbps
1 Gbps --> Cat5e 10 Mbps --> Cat3 100 Mbps --> Cat5
Class A:
1-127 /8
Which layers of the OSI model are considered to be hardware layers? A. 1-2 B. 4-7 C. 1-3 D. 3-7
1-3
An administrator wants to give priority to video conferencing traffic on a router. What should be configured on the router to facilitate this? A. Firewall B. Static routing C. Floating static routes D. QoS
QoS
When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem? A. EMI B. RFI C. network adapter failure D. cable failure
RFI
What of the following is not a characteristic of 802.11n? A. frame aggregation B. channel bonding C. RFI protection D. MIMO
RFI protection
What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network? A. RIP B. OSPF C. BGP D. IGMP
RIP
Which of the following is not a fiber connector? A. FC B. LC C. RJ-45 D. MT-RJ
RJ-45
What is the most common adapter or connector used to connect a computer to a wired network? A. RG6 B. RG58 C. RJ45 D. RJ8
RJ45
What is the frame that is smaller than 64 bytes called? A. JUMBO B. RUNT C. TINY D. MICRO
RUNT
A layer 3 switch is similar to a __________. A. Router B. Repeater C. Hub D. Patch Panel
Router
What is an example of a Layer 3 device that connects multiple computers and networks? A. Packet B. Repeater C. Switch D. Router
Router
You need to divide a network into three subnets. Which Device should you use? A. Router B. Hub C. Segmenter D. Bridge
Router
You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use? A. Hub B. Repeater C. Switch D. Router E. Bridge
Router
_________ is used to send packets from one network to another network. A. Routing B. Transport C. BGP D. Encapsulation
Routing
In the IP Sec the __________ generates encryption and authentication keys. A. SA B. AH C. ARP D. ESP
SA
Which component of IPSec is generates the encryption and authentication keys? A. SA B. AH C. ESP D. MPPE
SA
Which type of networks cables can carry signals over the longest distances? A. Multimode fiber B. Singlemode fiber C. Coaxial D. Twisted-Pair
Singlemode fiber
Which of the following IPv6 addresses is used to identify a node in a site or intranet? A. Local-link B. Site local unicast C. Global unicast D. Anycast
Site local unicast
You are needing to set up a VPN between two companies that are collaborating on a project. Which type of VPN will you set up? A. Site-to-Host B. Site-to-Site C. Host-to-Host D. Host-to-Site
Site-to-Site
___________ securely connects two portions of a private network or two private networks. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN
Site-to-Site VPN
In which physical network topology is each computer connected to a central point? A. Star B. Mesh C. Ring D. Bus
Star
This question requires that you evaluate the underlined text to determine if it is correct. An example of a physical Ring topology would be eight hubs connected to a single switch. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. A. Bus B. No change is needed C. Star D. Mesh
Star
Which type of firewall blocks packets based on rules that are based on IP addresses or ports? A. packet filtering B. stateful packet inspection C. NAT filtering D. Application-level gateway
packet filtering
What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet? A. circuit switching B. connection switching C. packet switching D. network switching
packet switching
X.25 and Frame Relay are examples of what type of WAN technology? A. circuit switching B. connection switching C. packet switching D. network switching
packet switching
Which model has each host have their own security database? A. peer-to-peer B. client/server C. distributive D. sliding
peer-to-peer
All of your users connect to Web sites using Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name? A. FTP B. UDP C. HTTP D. HTTPS
HTTP
Which of these protocols is not a Network Layer Protocol? A. IP B. ICMP C. HTTP D. ARP
HTTP
Which protocol can be used to encrypt packets on the Internet? A. HTTP B. SNMP C. HTTPS D. TFTP
HTTPS
Which metric does Routing Information Protocol (RIP) use to determine the least costly route? A. Delay B. Host ID C. Hop count D. Interface
Hop count
A _________ is a single computer or device that connects to a TCP/IP network. A. Host B. Node C. Access Point D. Laptop
Host (It can also be Node)
________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. A. Hub B. Router C. Firewall D. Switch
Hub
Ping is used to check network connectivity and it makes use of the _____________ protocol. A. IGMP B. RARP C. Proxy ARP D. ICMP
ICMP
What protocol does the ping command use to test network connectivity? A. TCP B. UDP C. ICMP D. FTP
ICMP
Which of the below is a standard for Wireless devices? A. IEEE 802.1 q B. IEEE 802.3 C. IEEE 802.11 D. IEEE 802.3ab
IEEE 802.11
What is used to uniquely identify a host on a TCP/IP network? A. IP address B. MAC address C. bit pattern D. router name
IP address
Layer 3 Switching uses Logical Addresses such as _____ to determine the determine the destination of the packet. A. DHCP servers B. IP addresses C. Domain controllers D. MAC addresses
IP addresses
_________________ is a feature in Windows that can used when want to make a server act like a router. A. RDP B. IP Sec C. DNS D. IP forwarding
IP forwarding
Which of the following utilities is used to display the current TCP/IP configuration of a Windows NT computer? A. FTP B. IPCONFIG C. CONFIG.SYS D. NBTSTAT
IPCONFIG
Which of the following utilities will produce the output as shown in the image below? A. NBTSTAT B. IPCONFIG C. PING D. NETSTAT
IPCONFIG
Which type of port is used to support VLAN traffic between two switches? A. LAN port B. Trunk port C. Virtual port D. WAN port
Trunk port
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users. A. WAN B. VPN C. ISDN D. LAN
VPN
What allows a user to connect to a corporate network using the Internet? A. VPN B. VPC C. PPTN D. IPSec
VPN
What technology can you use temporarily to connect networks from two different companies? A. VPN B. HTTP C. DHCP D. passive router
VPN
Which data transmission method uses a private tunnel over a public network? A. PPTP B. L2TP C. IPsec D. VPN
VPN
Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN
VPN
To test a cable, you would use a _____________. A. Continuity tester B. Patch Tester C. Loopback Plug D. Tone & Probe
Continuity tester
The 802.3an Ethernet network runs at a speed of ____________ A. 10Mbps B. 100 Mbps C. 10 Gbps D. 1 Gbps
10 Gbps
Which type of cable is least susceptible to EMI? A. Coaxial B. UTP C. Fiber Optic D. STP
Fiber Optic
Match each port speed to its definition. 1. 1 Kbps 2. 1 Gbps 3. 1000 Kbps 4. 10 Mbps A. 1,000 bits per sec B. 10,000,000 bits per sec C. 1,000 megabits per sec D. 1 Mbps
1. 1 Kbps --> 1,000 bits per sec 2. 10 Mbps --> 10,000,000 bits per sec 3. 1 Gbps --> 1000 Mbps per sec 4. 1000 Kps --> 1 Mbps per sec
Match each IP address to its corresponding IPv4 address class. 1. Class A 2. Class B 3. Class C 4. Class D A. 224.2.200.35 B. 130.34.3.223 C. 10.123.12.1 D. 199.11.221.4
1. 10.123.12.1 2. 130.34.3.223 3. 199.11.221.4 4. 224.2.200.35
Match each IP address to its appropriate class. 1. Class A 2. Class B 3. Class C 4. Class D A. 224.0.0.2 B. 100.100.1.1 C. 198.126.1.55 D. 170.100.1.5 E. 241.241.241.241
1. 100.100.1.1 2. 170.100.1.5 3. 198.126.1.55 4. 224.0.0.2
You work in the IT Department of a mid-size corporation. The company's network is segmented into several subnets. The layout of the network is similar to the following image: The number of hops a packet must take from the source network to the destination network is... A. 6 B. 4 C. 5 ______ is a common routing protocol that uses hop count. A. EIGRP B. RIP C. OSPF
1. 4 2. RIP
Match each Maximum Data Transfer Rate to a WAN Technology. 1. Dial-up 2. ISDN 3. T1 4. E1 A. 128 Kbps B. 2.048 Mbps C. 1.536 Mbps D. 56 Kbps
1. 56 Kbps 2. 128 Kbps 3. 1.536 Mbps 4. 2.048 Mbps
The local university uses a network layout for their routers similar to the following image: 1. What is the physical topology of this network? A. 6 B. 4 C. 3 2. How many connections are there among the routers? A. Star B. Mesh C. Bus
1. 6 2. Mesh
Match 802.11 standard to its description. 1. Frequency: 2.4 GHz - Data rate: 11 Mbps 2. Frequency: 2.4 GHz - Data rate: 54 Mbps 3. Frequency: 2.4 GHz or 5 GHz - Data rate: 65 - 600 Mbps 4. Frequency: 5 GHz - Data rate: 54 Mbps 5. Frequency range: 5 GHz - Data rate: up to 1.3 Gbps A. 802.11n B. 802.11g C. 802.11ac D. 802.11b E. 802.11a
1. 802.11b 2. 802.11g 3. 802.11n 4. 802.11a 5. 802.11ac
Match each Media Issue with its Description. 1. The gradual loss of a signal over distance 2. Primary problem with CSMA/CD 3. Hearing two radio broadcasts on the same station A. Traffic Collisions B. Crosstalk C. Attenuation
1. Attenuation 2. Traffic Collisions 3. Crosstalk
Which record type should an administrator create to have a more user-friendly name for a host machine? A. ANAME B. ALIAS C. CNAME Which type of record resolves IP addresses to hostnames? A. PTR B. CNAME C. A
1. CNAME 2. PTR
The cable is a ________ cable. A. Crossover B. Straighover C. Rollover In which type of connection would this cable be used? A. Switch to Switch B. Switch to Router C. Switch to PC
1. Crossover 2. Switch to Switch
Match each device with its function. 1. A technology used on Layer 1 of the OSI model to transmit data 2. Uses MAC addressing to determine which port to forward a frame 3. Connects two or more networks using different protocols A. Router B. Layer 2 Switch C. Ethernet D. NIC
1. Ethernet 2. Layer 2 Switch 3. Router
Match each WAN Technology to its corresponding Connection Type. 1. Uses two 64Kbps channels 2. Use connections over shared broadband 3. Uses dedicated phone lines to connect to telco provider offices A. ISDN B. DSL C. Cable modems
1. ISDN 2. Cable modems 3. DSL
Match the network type to the corresponding definition. 1. A global system on interconnected computers. 2. A network restricted to users within an organizations. 3. Provides access to services needed by partners and customers without granting them access to the entire network. A. Internet B. Extranet C. Intranet
1. Internet 2. Intranet 3. Extranet
You work in the IT Department of a small corporation. The company's network is protected by a firewzll and it provides servers within a perimeter network for access by customers and partners. The layout of your network is similar to the following image: The portion of the diagram labeled "A" is the ____ portion of the network. A. Extranet B. Intranet C. Internet The portion of the diagram labeled "B" is the ___ portion of the network. A. Extranet B. Intranet C. Internet The portion of the diagram labeled "C" is the ___ portion of the network. A. Extranet B. Intranet C. Internet
1. Internet 2. Intranet 3. Extranet
Match each function to its layer in the OSI Model. 1. Session Layer 2. Application Layer 3. Physical Layer 4. Presentation Layer 5. Transport Layer 6. Data Link Layer 7. Network Layer A. ASCII, .jpg, mp3 B. User interface to the network C. Keeps conversations (data streams) separate D. Specifies voltage, media speeds, connector pin-outs E. Determines reliable or unreliable delivery F. Determines data route using logical addressing G. Combines bytes into frames; uses MAC addressing H. Word processor, spreadsheets, gaming software
1. Keeps conversation (data streams) separate 2. User interface to the network 3. Specifies voltage, media speeds, connector pin-outs 4. ASCII, .jpg, mp3 5. Determines reliable or unreliable delivery 6. Combines bytes into frames; uses MAC addressing 7. Determines data route using logical addressing
The IP address tested in this ping is the ________ address. A. APIPA B. Default gateway C. Loopback The equivalent IPv6 address is ___. A. ::0 B. ::87 C. ::1
1. Loopback 2. ::1
You need to set up 200 computers on a Class A private network. Which of the following network IDs meet all the criteria of a Class A private network? A. 192.168.1.0 B. 100.10.1.0 C. 10.0.0.0 D. 172.168.0.1
10.0.0.0
Match each Networking Service to its function. 1. Makes a request from a private IP address routable. 2. Allows or blocks data packets 3. Distributes IP addresses 4. Authenticates a user from an external network 5. Uses a public network for private data communication A. NAT B. Remote Access Server C. Firewall D. DHCP E. VPN
1. NAT 2. Firewall 3. DHCP 4. Remote Access Server 5. VPN
Firewalls mainly use user accounts to filter data packets. A. Yes B. No Firewalls can be hardware or soft-based. A. Yes B. No Firewalls are only set up on individual host machines. A. Yes B. No
1. No 2. Yes 3. No
A VLAN is typically configured on a router. A. Yes B. No A router is used to separate multiple networks. A. Yes B. No NAT is the mapping of a private LAN IP address to a public IP address. A. Yes B. No
1. No 2. Yes 3. Yes
AAAA records resolve hostnames to IPv4 addresses. A. Yes B. No A secondary name server gets its data from another name server using a zone transfer. A. Yes B. No Entries in a HOSTS file on a local computer take precedence over DNS A. Yes B. No
1. No 2. Yes 3. Yes
LMHOSTS files resolve hostnames to IP addresses. A. Yes B. No DNS resolves host names to IP addresses. A. Yes B. No CNAME records must be created manually. A. Yes B. No
1. No 2. Yes 3. Yes
Microwave ovens tend to cause interference in wired networks. A. Yes B. No Fluorscent lighting can cause EMI A. Yes B. No Cordless phones can cause interference for wireless networks. A. Yes B. No
1. No 2. Yes 3. Yes
Your friend just got a home router and asked you to set up his computer to use it. You open the IP settings on the computer and see the information shown in the following image: Once the address is set to use DHCP, how should the DNS address be obtained? A. Manually B. Automatically, through DHCP C. Through the Advanced button
1. Obtain an IP address automatically 2. Automatically, through DHCP
Match each Tunneling Protocol to its corresponding TCP/IP port. 1. TCP/UDP port 1723 2. UDP port 1701 3. TCP port 443 A. PPTP B. L2TP C. SSTP D. PPP
1. PPTP 2. L2TP 3. SSTP
Match each Tunneling Protocol to its corresponding method of encryption. 1. MPPE 2. IPSec 3. HTTPS A. SSTP B. PPP C. PPTP D. L2TP
1. PPTP 2. L2TP 3. SSTP
A wireless camera connects directly to a device and sends pictures to it. Which type of connection is this? A. Peer-to-Peer B. Infrasture C. Ad Hoc This type of wireless network lacks security because there is no centralized controlling security. A. Peer-to-Peer B. Infrasture C. Ad Hoc Which type of wireless network is controlled through a wireless access point? A. Peer-to-Peer B. Infrasture C. Ad Hoc What can be disabled on a wireless access point to help secure a wireless network? A. SSID B. QoS C. Filtering of MAC addresses
1. Peer-to-Peer 2. Ad Hoc 3. Infrasture 4. SSID
Match each address type to its appropriate range. 1. 75.0.0.0 - 75.255.255.255 2. 224.0.0.0 - 239.255.255.255 3. 192.168.0.0 - 192.168.255.255 A. Private network addresses B. Multicast addresses C. Public network addresses
1. Public Network 2. Multicast 3. Private Network
Your small business has been growing and so has the number of computers on your network. Your employees are starting to complain that their computers are responding slowly whenever they access network resources. The layout of your LAN is similar to the following image: The physical topology of this network is which kind of topology? A. Star B. Bus C. Mesh Which device change on the network would greatly improve network speed? A. Replace twisted-pair cables with fiber-optic cables B. Replace the hub with a switch C. Replace the hub with a router
1. Star 2. Replace the hub with a switch
The layout of your LAN is similar to the following image: You should use a _____ cable to connect each computer to the hub. A. Crossover B. Straight-through C. Rollover You should use a _____ cable to connect each hub to the switch. A. Crossover B. Straight-through C. Rollover
1. Straight-through 2. Crossover
A user in your computer cannot to the Internet. You execute the ipconfig command on the user's computer and see the results displayed in the following image: The problem is: A. DHCP should be enabled B. The default gateway is a network address C. The default gateway is a broadcast address D. The subnet mask is incorrect The solution is: A. DHCP needs to be enabled B. The default gateway needs to be changed C. The subnet mask needs to be changed
1. The default gateway is a broadcast address 2. The default gateway needs to be changed
A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. You execute the ipconfig command on the user's computer and see the results displayed in the following image: The problem is: A. There is no default-gateway B. The IP address should be on 192.168.1.x network C. The subnet mask is incorrect D. The DNS server is incorrect The solution is: A. Configure a default gateway in the 10.1.3.x network B. Configure a default gateway in the 192.168.1.x network C. Configure a default gateway in the 255.255.255.x network D. Configure a static route
1. There is no default gateway 2. Configure a default gateway in 10.1.3.x network
Match each layer in the OSI Model with the encapsulation state of data. 1. Segment 2. Packet 3. Frame 4. Bit A. Physical Layer B. Session Layer C. Presentation Layer D. Data Link E. Transport Layer F. Network Layer G. Application
1. Transport Layer 2. Network Layer 3. Data Link Layer 4. Physical Layer
The corporation where you work has asked you to telecommute from home two days per week. The access you've been provided to your company network looks similar to the following image: The access you will use to securely connect your home computer to your company intranet is a ... A. IPsec B. VPN C. GRE Which type of VPN is in use in this example? A. Site-to-Site B. Host-to-Host C. Host-to-Site
1. VPN 2. Host-to-Site
Class A Private range is: Class B Private range is: Class C Private range is:
10.x.x.x 172.16.x.x - 172.31.x.x 192.168.x.x - 192.168.255.x
What speed does FDDI use? A. 10 Mbps B. 44 Mbps C. 54 Mbps D. 100 Mbps
100 Mbps
ipconfig /release is the command that deletes an IP address bound to an interface. A. Yes B. No dhcp -renew is the command that acquires an IP address from a DHCP server A. Yes B. No dhcp -release is the command that deletes an IP address bound to an interface A. Yes B. No ipconfig /renew is the command that acquires an IP address from a DHCP server. A. Yes B. No
1. Yes 2. No 3. No 4. Yes
A switch stack multiple physical switches appear as one logical switch. A. Yes B. No Load balancing is limited to routers and is not available on switches. A. Yes B. No Switches can use active-passive load balancing. A. Yes B. No
1. Yes 2. No 3. Yes
Unsecured websites are accessed through port 80 by default. A. Yes B. No Public websites are accessed are accessed through port 25 A. Yes B. No Secured websites are accessed through port 443 by default. A. Yes B. No
1. Yes 2. No 3. Yes
A Firewall can be a hardware device. A. Yes B. No A Firewall can be a software package. A. Yes B. No A Firewall is a special room to protect servers. A. Yes B. No
1. Yes 2. Yes 3. No
A layer 2 switch is also called a bridge. A. Yes B. No A switch floods ports if it does not know where to send a packet. A. Yes B. No A layer 2 switch uses routing tables. A. Yes B. No
1. Yes 2. Yes 3. No
In Static NAT, each private IP address requires a seperate public IP address for mapping. A. Yes B. No In Dynamic NAT, a pool of public IP addresses is used. A. Yes B. No In PAT, at least two public IP addresses are required. A. Yes B. No
1. Yes 2. Yes 3. No
Layer 2 switches use MAC addresses. A. Yes B. No Layer 3 switches use IP addresses. A. Yes B. No Layer 3 switches can use MAC addresses. A. Yes B. No
1. Yes 2. Yes 3. No
TCP is connection-oriented and reliable. A. Yes B. No UDP is connectionless and unreliable. A. Yes B. No IP is connection-oriented and reliable. A. Yes B. No
1. Yes 2. Yes 3. No
You are troubleshooting a friend's computer that will not connect to a specific website on the Internet, yet it can connect to other websites. You can connect to the website with no problems using your smartphone. Using a TCP/IP tool on your friend's computer, you receive the information shown in the following image: Which command was used to generate these results: To solve the connectivity problem, you should clear the computer's memory by executing which command?
1. ipconfig /displaydns 2. ipconfig /flushdns
Use the following screenshot to answer the questions. Which command was run to generate these results? A. netstat -a B. netstate -s C. netstate -p Which command should be run to just show these results for tcp connections? A. netstat -a tcp B. netstat -proto tcp C. netstat -p tcp
1. netstat -a 2. netstat -p tcp
Match each PING command with its result. 1. Assigns a specific number of packets to transmit 2. Continuously pings a remote host until stopped 3. Specifies the size of the packet to transmit 4. Sends four packets to the local loopback address 1. ping -n 2. ping 127.0.0.1 3. ping -l 4. ping -t
1. ping -n 2. ping -t 3. ping -l 4. ping 127.0.0.1
You receive a call from a friend whose computers is unable to connect to the Louvre Museum website located in France. Using a TCP/IP tool, you attempt to contact the website's host from your friends computer and receive the information shown in the following image: Which command-line tool was used to generate these results? A. tracert B. ping C. pathping Which command-line tool should be used if both hops and statistics showing a percentage of dropped packets need to be known? A. pathping B. ping C. netstat
1. tracert 2. pathping
What speed does a T1 run at? A. 1.544 Mbps B. 2.889 Mbps C. 3.101 Gbps D. 2.54 MBps
1.544 Mbps
Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line? A. 1.5 Mbps B. 15.35 Mbps C. 1.544 Mbps D. 1.536 Mbps
1.544 Mbps
Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line? A. 1.536 Mbps B. 1.5 Mbps C. 15.35 Mbps D. 1.544 Mbps
1.544 Mbps
PRI, a form of ISDN, can provide transmission rates of up to ____. A. 1.544Mbps B. 16Kbps C. 128Kbps D. 64Kbps
1.544Mbps
If a 16-port switch has all ports set to 100 Mbps, sharing the same chassis, what is the incoming backplane speed of the switch? A. 800 Mbps B. 1.6 Gbps C. 16 Ghps D. 200 Mbps
1.6 Gbps
This question requires that you evaluate the underlined text to determine if it is correct. A cable that meets the 1000BaseT standard has a maximum length of _1,000_ meters. A. 100 meters B. 250 meters C. 500 meters D. No change is needed.
100 meters
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports? A. 10 meters B. 100 meters C. 480 meters D. 1000 meters
100 meters
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports? A. 100 meters B. 480 meters C. 10 meters D. 1000 meters
100 meters
Which of the following types of network uses terminators? A. 100Base-FX B. 100BaseT C. 10BaseT D. 10Base2
10Base2
Which of the following standards uses twisted pair cabling? A. 10Base5 B. 10BaseT C. 100BaseSX D. 100BaseFX
10BaseT
You are in the proceed of designing a home network for a client. You have decided to make use of 10BaseT cabling. Which of the following options are TRUE with regards to 10 BaseT cabling?! (Choose two.) A. 10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. B. 10BaseT cables are made up of twisted pair cables that are a maximum of 10 meters in length. C. 10BaseT cables allows for the system to operate at 10Mbps. D. 10BaseT cables allows for the system to operate at 100 Mbps.
10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. 10BaseT cables allows for the system to operate at 10Mbps.
What is the maximum speed supported by 802.11b? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps
11 Mbps
POP3
110
What is the loopback IP address? A. 127.0.0.1 B. 198.2.2.3 C. 255.255.255.1 D. 0.0.0.0
127.0.0.1
Which if the below are loopback addresses. Choose all that apply. A. 128.0.0.1 B. 127.0.0.1 C. 127.31.0.1 D. 192.127.0.0
127.0.0.1 127.31.0.1
How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256
128
How many bits is an IPv6 address? A. 32 B. 48 C. 64 D. 128
128
An IPv6 address is __________ in length A. 32 bit B. 64 byte C. 128 bit D. 128 bytes
128 bit
Class B:
128-191 /16
NetBIOS
137-139
IMAP
143
What is the maximum upstream throughput speed supported by VDSL? A. 52 Mbps B. 11 Mbps C. 1.5 Mbps D. 16 Mbps
16 Mbps
SNMP
161
Link Local Addressing
169.254.1.0 - 169.254.254.255.
L2TP
1701
What port does L2TP use? A. 501 B. 1723 C. 1701 D. 443
1701
Loopback Address
172.0.0.0/24
Which of the following are private IP addresses? Each correct answer represents a complete solution. (Choose all that apply.) A. 172.16.255.20 B. 10.1.23.225 C. 155.155.155.155 D. 192.168.1.125
172.16.255.20 10.1.23.225 192.168.1.125
Which of the below is a valid Private IP address in the B class? Choose all that Apply A. 172.33.20. 20 B. 172.26.20.20 C. 172. 16.20.20 D. 192.168.0.0
172.26.20.20 172. 16.20.20
L2TP uses port ________________ A. 443 B. 500 C. 89 D. 1723
1723
PPTP
1723
What port does PPTP use? A. 80 B. 8080 C. 1723 D. 433
1723
Class C:
192-223 /24
You must manually configure a computer with an IP address on the same network as a router. The router's interface is configured as 192.168.1.100 with a subnet mask of 255.255.255.0. Which two are valid IP addresses you could assign the computer? (Choose two.) A. 192.168.1.254 B. 192.168.1.100 C. 192.168.1.5 D. 192.168.100.1 E. 192.168.1.255 F. 192.168.0.10
192.168.1.254 192.168.1.5
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. The company's office has an ISDN connection. This connection is used to connect the network to the Internet. How many channels does an ISDN BRI connection use to send data? A. 2 B. 4 C. 6 D. 1
2
What stage is the World Wide Web in? A. 1.0 B. 1.1 C. 2.0 D. 3.0
2.0
The transmission rate of an Optical Carrier OC-24 is _________________ A. 51.84 Mbps B. 1.244 Gbps C. 9.953 Gbps D. 2.488Gbps
2.488Gbps
Which of the following is not a private address? A. 10.4.24.24 B. 172.16.36.45 C. 192.168.34.3 D. 200.23.34.120
200.23.34.120
You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:0000:2001:0000:0000:0000:0068 would be ______. A. 2001:4860::::68 B. 21:486::21:::68 C. 2001:4860:0:2001:0:0:0:68 D. 2001:4860:0:2001::68
2001:4860:0:2001::68
This question requires that you evaluate the underlined text to determine if it correct. ff00:: is a valid IPv6 address that could be assigned to a host computer. A. No change is needed B. 2003:dead:beef:4dad:23:46:bb:101 C. ::1 D. 2001:db8::
2003:dead:beef:4dad:23:46:bb:101
FTP
21
SSH
22
Class D:
224-239 (Multicast)
Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1
224.0.0.1
How many B channels does an ISDN PRI support? A. 2 B. 8 C. 23 D. 48
23
Telnet
23
The default port used for telnet is: A. 23 B. 25 C. 80 D. 8080
23
Class E:
240-255 (Research)
SMTP
25
What is the maximum number of hosts you can use for each subnet that belongs to a class C address? A. 128 B. 254 C. 256 D. 65,534
254
What is the default subnet mask for a Class B network? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
255.255.0.0
You need to subnet a 192.168.1.0 network using as a Class C network. What will be the subnet mask? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.255 D. 255.255.255.0
255.255.255.0
How many T1 lines are used for a full T3 connection? A. 3 B. 16 C. 2 D. 28
28
RDP
3389
What port does Remote Desktop Services use? A. 443 B. 501 C. 389 D. 3389
3389
Which port does Remote Desktop Protocol use? A. 3389 B. 389 C. 636 D. 443
3389
Windows used the RDP or Remote desktop service to connect to a remote machine. This Remote Desktop services runs on which port? A. 500 B. 3389 C. 443 D. 289
3389
How many layers does the TCP/IP model have? A. 3 B. 4 C. 6 D. 7
4
At what speed does a T3 line run? A. 1.5 Mbps B. 4.5 Mbps C. 44.7 Mbps D. 128 Mbps
44.7 Mbps
What is the bit rate for a North American T3 circuit? A. 6.312 Mbit/s B. 44.736 Mbit/s C. 274.176 Mbit/s D. 400.352 Mbit/s
44.736 Mbit/s
HTTPS
443
HTTPS and other SSID related protocols run on which port? A. 80 B. 443 C. 22 D. 23
443
SMB
445
DNS
53
What port does DNS use? A. 443 B. 389 C. 51 D. 53
53
What is the maximum speed supported by 802.11g? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps
54 Mbps
You work as a Network Administrator for Net World International. You are configuring a local area network (LAN) spanning across various buildings in the company's premises. You decide to use a 1000BASE-SX network. What is the maximum length of the cable segment that can be used? A. 1500 meters B. 100 meters C. 225 meters D. 1000 meters E. 550 meters
550 meters
If you are making a crossover cable and one end is 568A, what should the other end be? A. 568A B. 568B C. 568C D. BOGB
568B
How fast is a DS0 circuit? A. 32 Kbps B. 64 Kbps C. 128 Kbps D. 1024 Kbps
64 Kbps
Which of these ports does DHCP use? A. 80 B. 67 C. 23 D. 500
67
Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101
68.24.78.221
HTTP
80
Which IEEE standard is used for wireless networks? A. 802.2 B. 802.11 C. 802.3 D. 802.5
802.11
Your purchasing department has purchased new 802.11ac wireless routers. You want to make sure all of your wireless devices are compatible with this new router. Besides 802.11ac, which wireless standards will work with these wireless routers? (Choose two answers.) A. 802.11n B. 802.11b C. 802.11a D. 802.11g
802.11n 802.11a
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 802.1X B. WPA2-PSK C. WPA-PSK D. No change is needed
802.1X
For organizations, using ___________ authentication for wireless networks is recommended. A. 802.1d B. 802.1x C. 802.11g D. 802.11x
802.1x
What standard describes CSMA/CD? A. 801.2 B. 802.3 C. 802.5 D. 802.11
802.3
Kerberos
88
What is the local loopback address in IPv6? A. ::87 B. ::0 C. ::127 D. ::1
::1
You are in the process of designing a Ring network for a client. Which of the following is an advantage of a Ring network? A. A Ring network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Ring network, there are no interruptions. C. A Ring network prevents the passing of data packets through an excessive number of nodes. D. The number of nodes in a Ring network has no impact on communication delays.
A Ring network manages the connectivity between workstations without the need of a central node.
A client has requested a network setup for his home. The network has to be cost effective, and easy to extend and implement. Further more, the client wants his workstations connected by a single cable. Which of the following network topologies should you use? A. A star network topology. B. A bus network topology. C. A mesh network topology. D. A ring network topology.
A bus network topology.
Which of the following statements are true regarding VLAN? Each correct answer represents a complete solution. (Choose all that apply.) A. MAC addresses and TCP port addresses are required to define a VLAN. B. A router is required to connect two VLANs. C. A switch is required to create a VLAN. D. It is used to protect network hosts against unauthorized access from a public network.
A router is required to connect two VLANs. A switch is required to create a VLAN.
Which best describes a VPN? A. An encryption protocol B. A secure tunnel used to pass data through the Internet C. Virtual Protocol Name D. A dynamic routing protocol
A secure tunnel used to pass data through the Internet
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. The network is configured on Cisco devices. The network is configured as shown in the image below: Following is a list of the types of cable used in networking: Which of the following options is correct regarding the types of cable used for connecting different networking devices on the network? A. A-4, B-3, C-2, D-1 B. A-3, B-1, C-1, D-4 C. A-1, B-2, C-3, D-4 D. A-2, B-1, C-4, D-3
A-3, B-1, C-1, D-4
Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality? A. SA B. AH C. ESP D. MPPE
AH
In some scenarios when you check the IP address of your PC you see an IP of range: 169. 254. 24.24. Where does this IP come from? A. APIPA B. DHCP C. WINS D. NetBIOS
APIPA
What type of address is 169.254.32.23? A. APIPA B. multicast address C. anycast address D. broadcast address
APIPA
Which protocol is used to translate IP addresses to MAC addresses? A. RARP B. ARP C. DNS D. WINS
ARP
_________________ resolves IP addresses to MAC addresses. A. UDP B. TCP C. ICMP D. ARP E. IGMP
ARP
Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router? A. Peer-to-Peer B. Bridged C. Infrasture D. Ad hoc
Ad hoc
The protocol maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Address Resolution Protocol (ARP). C. Dynamic Host Configuration Protocol (DHCP). D. User Datagram Protocol (UDP). E. Routing Information Protocol (RIP).
Address Resolution Protocol (ARP).
The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP).
Address Resolution Protocol (ARP).
What do routing tables typically use as criteria for determining which routes to include in a routing table? A. Hop Count B. Speed C. Administrative distance D. Metric
Administrative Distance
After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server? A. Register the scope B. Register the server C. Authorize the server D. Register the clients
Authorize the server
Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? A. Get scope registered B. Authorized the server C. Get clients registered D. Get DNS IP registered
Authorized the server
You are in the process of designing a FDDI network for a clients enviroment. Which of the following is TRUE with regards to a FDDI network? A. An FDDI network cannot contain rings that are longer than 100 kilometers respectively. B. An FDDI network can contain rings that exceed 100 kilometers respectively. C. Each ring in a FDDI network can support a maximum of 500 nodes. D. Each ring in a FDDI network can support a maximum of 50 nodes.
An FDDI network cannot contain rings that are longer than 100 kilometers respectively.
The ____ layer provides access to the network for applications and certain user functions. It displays incoming information and prepares outgoing information for network access. A. Transport B. Network C. Physical D. Session E. Data-link F. Application
Application
Which layer in the OSI model covers HTTP, FTP, and RDC? A. Physical B. Session C. Application D. Presentation
Application
Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three answers.) A. Application B. Presentation C. Data Link D. Physical E. Network F. Session G. Transport
Application Presentation Session
In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? A. Blue, Orange, Green, Black B. Black, Orange, Green, Brown C. Blue, Orange, Green, Brown D. Brown, Orange, Green, Black
Blue, Orange, Green, Brown
What is a similarity between Layer 2 and Layer 3 switches? A. Both provide a high level of security to the network. B. Both use logical addressing to forward transmissions. C. Both forward packets onto the network. D. Both allow the implementation of VLANs.
Both allow the implementation of VLANs.
Which of the following devices work at the data link layer of the OSI reference model? Each correct answer represents a complete solution. (Choose two.) A. Bridges B. Switches C. Multiplexers D. Hubs
Bridges Switches
Which of the following functions is not performed by a router? A. Internetwork communication B. Broadcast forwarding C. Packet filtering D. Packet switching
Broadcast forwarding
This question requires that you evaluate the underlined text to determine if it is correct. A Mesh network has to have termination points at both ends of the network. A. No change is needed. B. Ring C. Star D. Bus
Bus
Which of the following network topologies uses a 10Base2 cable? A. Bus B. Mesh C. Star D. Ring
Bus
Which of the following topologies is used by a coaxial cable? A. Wireless B. Bus C. Star D. Mesh
Bus
You are a network consultant for Tech Perfect Inc. You are designing the network of the company. You are required to accomplish the following task: The cabling must support data transfer speed up to 50 Mbit/sec. The cost of cabling must be as low as possible. Which of the following cables will you use? A. CAT 2 B. CAT 5e C. CAT 4 D. CAT 6
CAT 5e
You work as a consultant for Tech Perfect Inc. You are required to design a gigabit network for the company. Which of the following types of cables will you use for the network? A. CAT 3 B. CAT 4 C. CAT 5 D. CAT 6
CAT 6
What mechanism do wireless networks use to access the network? A. CSMA/CD B. CSMA/CA C. token passing D. polling
CSMA/CA
Which of the following channel access methods is used in IEEE 802.11 networks? A. CSMA/CD B. Full duplex C. Token passing D. CSMA/CA
CSMA/CA
What device acts as a high-speed modem for a LAN? A. analog modem B. telco incoming router C. packet switcher D. CSU/DSU
CSU/DSU
Which two of the following WAN technologies are most commonly used to connect home devices to the Internet? (Choose two.) A. T1 B. DSL C. Cable modems D. ISDN E. E1
Cable modems DSL
A ________ is the guaranteed certain amount of information provided by a circuit or line. A. Committed Information Route B. Pivotal Information Route C. Next Hop Policy Route D. Frame x Frame Route
Committed Information Route
Which of the following cables offers more resistance to crosstalk than the other cables? A. Unshielded twisted pair B. Fiber-optic C. Coaxial D. Shielded twisted pair
Fiber-optic
Which of the following types of patch cable is used in a 100BaseT network? A. Cat 3 STP B. Cat 3 UTP C. RJ 58 Coaxial D. Cat 5 UTP
Cat 5 UTP
Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6
Cat 5e
Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6
Cat 5e Cat 6
Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 5e B. Cat 6 C. Cat 3 D. Cat 5
Cat 5e Cat 6
You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6
Cat5e
Your neighbor has asked you to network his home office. He wants a wired connection, not wireless. The network needs to support 1 Gigabit per second speeds. What is the least expensive options that meets this requirement? A. Cat3 B. Fiber Optic C. Cat5e D. Coaxial
Cat5e
Which twisted-pair category runs at 10 Ghps for 55 meters. A. Cat6 B. Cat7 C. Cat6a D. Cat5
Cat6
What is the minimum category of twisted-pair cable you need to support 100 Mbps? A. Category 3 B. Category 5 C. Category 5e D. Category 6
Category 5
You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based network. You are required to create a separate network for a new office constructed in the company's campus. The new network will be based on the 100BASE-TX standard. Which of the following cables will you use for the network? A. Single-mode fiber B. Multimode fiber C. Category 3 UTP D. Category 5 UTP
Category 5 UTP
What is the minimum cabling requirement for a 100BaseTx network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable
Category 5 UTP cable
You work as a network administrator for Tech Perfect Inc. The company has a 100Mbps TCP/Ipbased Windows Server 2003 network. The network is shown in the image below: The company wants to upgrade the network to a gigabit network. Which of the following steps will you take FIRST to accomplish the task? A. Replace the T1 connection with T3 connection. B. Replace the router with bridge. C. Upgrade servers running Windows Server 2003 to Windows Server 2008. D. Change the CAT 5 cable to a CAT 6 cable.
Change the CAT 5 cable to a CAT 6 cable.
You have a host with the address of 180.24.45.120. To what class would this be address be assigned? A. Class A B. Class B C. Class C D. Class D
Class B
You need to set up 750 computers on the same network. Which IP class is the best option? A. Class D B. Class B C. Class C D. Class A
Class B
For IPv4, what class is used for multicasting? A. Class A B. Class B C. Class C D. Class D
Class D
Which model users a central database for authentication? A. peer-to-peer B. workgroup C. client/server D. distributive
Client/Server
In the FDDI network, each network node is connected to a central cabling nexus called a ____. A. Concentrator B. Gateway C. Repeater D. Transceiver E. NIC F. Bridge
Concentrator
What are two characteristics of fiber optic cable? (Choose two.) A. Conducts electricity B. Requires metal conduit C. Supports splicing D. Requires a polish for end connectors
Conducts electricity Supports splicing
You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based routed network. Subnet X and Subnet Y are configured with DHCP servers to provide automatic IP addresses to the client computers in their respective segments. The DHCP server on Subnet Y crashes. You have to immediately configure the network so that the DHCP server in Subnet X can provide DHCP services to the client computers of Subnet Y. The router on the network is not BOOTP enabled. Your solution must involve a minimum of administrative effort and cost. What will you do to resolve the issue? A. Configure a DHCP Relay Agent on Subnet Y. B. Replace the existing router with a BOOTP enabled router. C. Configure a DHCP Relay Agent on Subnet X. D. Install a new DHCP server in Subnet Y.
Configure a DHCP Relay Agent on Subnet Y.
Your IT Director wants you to group all of the Administrative Assistants' computers so they can communicate as if they were on the same network. The challenge is that they are located in different areas of a building. What should you do? A. Reconfigure the entire company onto one large class B subnet B. Connect all the Administrative Assistants to one dedicated switch C. Connect all the Administrative Assistants to one dedicated router D. Configure a VLAN
Configure a VLAN
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based network. You have to configure a wireless LAN on your network. Two separate buildings in front of each other are to be connected wirelessly. Which of the following steps will you choose to accomplish the task? A. Configure one WAP in each building. Place one outdoor Omni antenna in each building. B. Configure one WAP in each building. Place one outdoor Yagi-Uda antenna in one building. Place one outdoor Omni antenna in the other building. C. Lay underground fiber optic cable backbone between the two buildings. Configure Ethernet network including network of both building. D. Configure one Wireless Access Point (WAP) in each building. Place one outdoor Yagi-Uda antenna in each building facing towards each other.
Configure one Wireless Access Point (WAP) in each building. Place one outdoor Yagi-Uda antenna in each building facing towards each other.
You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based network. The network is configured on a Ring topology as in the image below: During a routine checkup on a Monday morning, you find that Server D has failed. You are required to send the server to the manufacturer for getting it repaired. You take out the server from the network. What will be your next step, so that other terminals are not affected? A. Put 50 ohm terminators at Server C and Server E . B. Put a 50 ohm terminator at Server C . C. Put a 50 ohm terminator at Server E . D. Connect Server C and Server E by using a barrel connector.
Connect Server C and Server E by using a barrel connector.
Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? A. Content Addressable Memory B. Control Access Media C. Converged Address Memory D. Control Address Memory
Content Addressable Memory
Which oi the following is a function of a WINS server on a network? A. Assigning virtual memory to the server. B. Assigning IP addresses. C. Converting host names to domain names. D. Converting NetBIOS names to IP addresses. E. Assigning computer names.
Converting NetBIOS names to IP addresses.
To connect similar devices like, switch to switch, what type of cable is used ? A. Console B. Crossover Cable C. Straight through D. Rolled Cable
Crossover Cable
What are three common forwarding methods used by LAN switches? (Choose three.) A. Cut-Through B. ARPA Mapping C. Store-and-Forward D. Packet Switching E. Routing F. Fragment-Free
Cut-Through Store-and-Forward Fragment-Free
In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A. A B. C C. E D. D
D
The below protocol is used to automatically assign or configure an IP address to a client. A. DNS B. ARP C. RIP D. DHCP
DHCP
What feature within Windows allows the server to act as a router? A. IPsec B. DHCP C. IP forwarding D. RDC
DHCP
What protocol automatically configures IP configuration for a client? A. DNS B. DHCP C. WINS D. FTP
DHCP
Which of the following services is required in a routed network to communicate with the DHCP server on another segment? A. DHCP B. RIS C. DNS D. DHCP relay agent E. WINS
DHCP relay agent
What zone is used to publish external websites for an organization? A. intranet B. exanet C. internetwork D. DMZ
DMZ
What provides name resolution between domain names and IP addresses? A. DHCP B. DNS C. ARP D. RPC
DNS
What server is used to translate host names to IP addresses? A. DNS B. WINS C. HOSTS D. DHCP
DNS
You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network? A. APIPA B. WINS C. DNS D. LMHOSTS E. DHCP
DNS
You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network? A. DHCP B. APIPA C. WINS D. LMHOSTS E. DNS
DNS
Which of the following uses pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS
DNS Server
This question requires that you evaluate the underlined text to determine if it is correct. _WAN_ is a connection that uses a dedicated phone line from a customer to a telco provider's office. A. No change is needed B. DSL C. ISDN D. Cable
DSL
What technology uses wires from the telephone company to provide broadband Internet connection? A. cable B. DSL C. FDDI D. Frame Relay
DSL
Which layer in the OSI model do MAC addresses and switches use? A. Physical B. Data Link C. Network D. Transport
Data Link
Which layer of the OSI model includes VLANs? A. Physical B. Data Link C. Network D. Transport
Data-Link
Which of the following is not among the seven layers of the OSI model? A. Data-line B. Application C. Transport D. Presentation E. Physical F. Session
Data-line
Which layer of the OSI reference model is responsible for bridging? A. Data-link B. Physical C. Transport D. Network
Data-link
You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use? A. STP B. coaxial C. fiber D. plenum-rated
Fiber
When a signal degrades as it runs through a wire, you have ________. A. Degradation B. Attenuation C. Cross Over D. Resistance
Degradation
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table? A. Delay B. Bandwidth C. Load D. Frequency
Delay Load Frequency
The default gateway address identifies the: A. Server that will provide name services for the computer. B. Device that will connect the computer to a remote network. C. Device that will connect the computer to the local network. D. Server that will authenticate the user of the computer.
Device that will connect the computer to a remote network.
List the four steps for a client to get an IP address from a DHCP server in the correct order. A. Discovery Offering Request Acknowledge B. Request Offering Discovery Acknowledge C. Discovery Request Offering Acknowledge D. Request Offering Discovery Acknowledge
Discovery Offering Request Acknowledge
What model promises the most processing power? A. centralized computing B. distributive computing C. switching computing D. dumb computing
Distributive computing
The service that resolves fully qualified domain name (FQDN) to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS).
Domain Name Service (DNS).
Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network? A. Dual stack B. Duplexing C. Clustering D. Mirroring
Dual stack
A __________ address is assigned by a DHCP server. A. Static B. Dynamic C. Private Only D. Public Only
Dynamic
In Europe, what circuit would be similar to the T1 found in the United States? A. E1 B. J1 C. T2 D. F1
E1
Which IPsec component includes the most security, including confidentiality? A. SA B. AH C. ESP D. MPPE
ESP
Which of the following is a member of the IPsec protocol suite and provides origin authenticity, integrity, and confidentiality protection of packets? A. PPTP B. AH C. L2TP D. ESP
ESP
Which protocol in IPsec providers both authentication and encryption? a. L2TP b. AH c. ESP d. PPTP
ESP
The IEEE standard 802.3j is used for ___________________ A. Thin Coaxial B. Fiber Optic C. Thick Coaxial D. Twisted Pair
Fiber Optic
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) A. Establishing network speed parameters B. Verifying the client's patch level C. Negotiating algorithms to use D. Exchanging key information
Establishing network speed parameters Verifying the client's patch level
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Leased line B. Ethernet C. Dial-up D. Token ring
Ethernet Leased line
You work as a Network Administrator for On Dot Inc. The company has a Windows 2000-based network. The management wants to install Internet Security and Acceleration (ISA) Server 2000 on the network. This server will connect to the Internet through a T1 line. Which of the following components is required to be installed on the server to accomplish this? A. External network adapter B. Modem C. Router D. ISDN adapter
External network adapter
You work as a Web Developer for WebCrunch Inc. You create a web site that contains information about the company's products and services. The web site is to be used by the company's suppliers only. Which of the following options will you use to specify the nature of access to the web site? A. Intranet B. Internet C. Internet and Intranet D. Extranet
Extranet
Which of the following is an incorrect IPv6 notation? A. FACE.:344:0::3389 B. FACE.122::23:DAC2:3389 C. FACE.122:0:344::23:DAC2:3389 D. FACE.122:0:344:0:23:DAC2:3389
FACE.:344:0::3389
An example that typically uses this topology is ...
FDDI
What device is used to protect one network from another by using filtering packets? A. Firewall B. Point to Point Tunnel C. VPN D. Router
Firewall
What advantage do CAT 5 cables have over fiber-optic cables? A. Support for higher bandwidth B. Flexibility C. Faster transmission of data D. Immunity from EMI
Flexibility
You have executed the NBTSTAT command with the -S parameter from the command-line on your workstation. Which of the following describes the reason for executing this command? A. For the purpose of viewing the names registered locally by NetBIOS applications. B. For the purpose of viewing the current NetBIOS sessions and their status, with the IP address. C. For the purpose of purging the name cache. D. For the purpose of viewing the NetBIOS sessions table converting destination IP addresses to computer NetBIOS names.
For the purpose of viewing the current NetBIOS sessions and their status, with the IP address.
Frame Relay is associated with FECN / BECN, what does FECN stand for________________ A. Frame Elastic Check Notification B. Forward Explicit Congestion Notification C. Frame Explict Compression Notification D. Forward Explict Compression Notification
Forward Explicit Congestion Notification
If a router cannot determine the next hop for a packet, the router will: A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the memory buffer.
Forward the packet to the default route.
What replaced X.25? A. Frame Relay B. ATM C. ISDN BRI D. DSL
Frame Relay
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)? A. SLIP B. X.25 C. Frame relay D. PPP
Frame relay
The unit of measurement on a data link layer is _________________ A. Frames B. Bits C. Packets D. Segments
Frames
In Windows to configure VPN which options do you need to go to? A. CLI command -> start vpn B. Control Panel --> VPN C. From Administrative Tools --> Routing and Remote Access D. None of the above
From Administrative Tools --> Routing and Remote Access
You need to connect a network adapter to a switch. You need the connection to be able to send and receive data at the same time. What type of connection should you use? A. Half duplex B. Gigabit C. Full duplex D. Simplex
Full duplex
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network. Which of the following utilities will you use? A. TRACERT B. TELNET C. PING D. IPCONFIG
IPCONFIG
The ________________ protocol is used to encrypt data in L2TP. A. PAP B. MS-CHAP C. IPSec D. DHCP
IPSec
What protocol is used with L2TP to encrypt data? A. IPSec B. MS-CHAP C. MS-CHAPv2 D. MPPE
IPSec
What protocol is used with L2TP to provide encryption? A. IPSec B. MPPE C. HTTPS D. MSC-CHAP
IPSec
This address is usually written in notation of four octets expressed in decimal and separated by periods. A. NetBIOS B. IPv4 C. IPv6 D. MAC
IPv4
A client has configured their network to support both IPv4 and IPv6. You are explaining the differences between IPv4 and IPv6 to a class of the clients trainee technicians. Which of the following statements are TRUE with regards to these differences? (Choose two) A. IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. B. IPv4 addresses are represented in a colon-hexadecimal format, while IPv6 addresses are represented in a dotted-decimal format. C. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability. D. IPv4 addresses make use of the first 32 bits of IPv6 addresses for interoperability.
IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.
What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231? A. MAC address B. IPv4 C. IPv6 D. anycast address
IPv6
Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ A. IPSec B. ISDN C. PSTN D. Frame Relay
ISDN
Which of the following connection mediums operates at a maximum speed of 128 Kbps? A. T3 B. OC-3 C. ISDN D. T1
ISDN
The clients network consists of a single domain named ABC.com. The clients network connects to the internet via an ISDN connection. Which of the following is TRUE with regards to the ISDN connection? A. ISDN operates at a minimum speed of 128 Kbps. B. ISDN operates at a maximum speed of 128 Mbps. C. ISDN operates at a maximum speed of 128 Kbps. D. ISDN operates at a minimum speed of 128 Mbps.
ISDN operates at a maximum speed of 128 Kbps.
Which two statements are true about layer 2 switches? (Choose two.) A. A switch uses IP address tables to determine where to forward packets. B. Switches are faster than hubs in all circumstances. C. If a switch does not know where to forward a frame, it floods it out all ports. D. Store-and-forward is the fastest switching method available. E. Switches uses MAC address tables to determine where to forward frames
If a switch does not know where to forward a frame, it floods it out all ports. Switches uses MAC address tables to determine where to forward frames
If a router is installed so that it separates DHCP server from its clients, the clients will: A. Immediately lose connectivity to all segments. B. Receive an immediate renew of their lease. C. Be unable to obtain their leases from the server. D. Immediately lose connectivity to the local segment.
Immediately lose connectivity to all segments.
You have been tasked with resolving an Internet name resolution problem. After pinging the DNS server address of the clients ISP, you find that the ISP server is down. You then decide to run the ping-t command from the command line. Which of the following describes the purpose of this command? A. It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted. B. It performs reverse name resolution on the ISP's DNs server IP address. C. It sends Echo Request messages with the Don't Fragment flag in the IP header set to 1. D. It sends Echo Request messages a specified amount of times.
It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted.
What mode users a wireless access point? A. Infrastructure Mode B. Ad Hop Mode C. Bridge Mode D. Forward Tunneling Mode
Infrastructure Mode
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network as shown in the image below: You have configured a DHCP server on Subnet X. This server will provide DHCP lease to the client computers on both the subnets. You find that the clients in Subnet Y are not getting IP address leases from the DHCP server. Which of the following steps will you take to resolve the issue? A. Install the DHCP Relay Agent in Subnet X. B. Install a DNS server in Subnet X. C. Install the DHCP Relay Agent in Subnet Y. D. Install a DNS server in Subnet Y.
Install the DHCP Relay Agent in Subnet Y.
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You configure two Virtual LANs (VLANs) on your network. A router is configured to connect the two VLANs. What will happen if the router fails? A. Inter VLAN communication will be affected. B. The entire network will fail. C. The network will not be affected at all. D. Communication within each VLAN will be affected.
Inter VLAN communication will be affected.
An _________ is the internal network for an organization. A. Internet B. Extranet C. Intranet D. WWW
Internet
The ____________ is the largest WAN in the world. A. Internet B. Intranet C. WWW D. MSDN
Internet
What type of firewall do you use to block access to certain websites or instant messengers? A. Internet content filter B. NIDS C. circuit-level gateway D. NAT filtering
Internet content filter
Which of the following security zones is internal to the company, as well as closest to its internal network? A. Internet B. Extranet C. Intranet D. DMZ
Intranet
You work as a Web Designer for Blue Well Inc. You have to create a Web site for the company. The Web site will be for internal use only and will contain information about policies and procedures of the company. What will be the scope of the Web site? A. Extranet B. Internet C. Utilitarian D. Intranet
Intranet
You are explaining the purpose of a dual stack node on the network. Which of the following suitably represents this explanation? A. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model. B. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the physical layer of the OSI model. C. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the data-link layer of the OSI model. D. It allows an IPv6 asocket to communicate with an IPv4, and IPv6 peer at the session layer of the OSI model.
It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.
Users have reported that they are experiencing network connectivity problems. You decide to run the ping -I command from the command-line. Which of the following describes the purpose of using the ping -I command? A. It allows you to specify a Time To Live for outgoing packets. B. It allows you to specify the type of service. C. It allows you to specify the amount of data to include int he ping. D. It allows you to resolve addresses to host names.
It allows you to specify the amount of data to include int he ping.
You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem? A. It cannot communicate with a DHCP server. B. The DNS servers specified are incorrect or are down. C. NetBIOS over TCP/IP has not been enabled. D. The network card is not connected properly to the network.
It cannot communicate with a DHCP server.
What are two characteristics of the CSMA/CD access method? (Choose two.) A. It checks to see if a collision has been detected. B. It does a round robin search for requests to transmit from all nodes on the network. C. It signals its intent to transmit on the network. D. It waits until the transmission medium is idle.
It does a round robin search for requests to transmit from all nodes on the network. It signals its intent to transmit on the network.
You have recently designed a network for a client, using the fully connected mesh topology. Which of the following is TRUE with regards to this kind of topology? A. It's the connectivity between workstations without the need of a central node. B. It does not require the use of switching or broadcasting. C. It prevents the number of data packets through an excessive number of nodes. D. The number of nodes in a fully connected mesh network has no impact on communication delays.
It does not require the use of switching or broadcasting.
Which of the following statements is true regarding VLAN? A. It increases the number of interfaces available to the network. B. It is applied in case oi RIP routing. C. It configures permissions across the network. D. It enables the user to map port number.
It increases the number of interfaces available to the network.
Which of the following statements is true regarding hybrid network topology? A. It is a combination of more than two similar networks connected through routers. B. It is a combination of two or more similar types of networks connected through a bridge de vice. C. It is a combination of two or more different types of networks topologies. D. It is a network that uses both coaxial and CAT 5 cabling.
It is a combination of two or more different types of networks topologies.
Which of the following statements about a fiber-optic cable are true? Each correct answer represents a complete solution. (Choose three.) A. It has eight wires twisted into four pairs. B. It is immune to electromagnetic interference (EMI). C. It can transmit signals over great distances. D. It uses light pulses for signal transmission.
It is immune to electromagnetic interference (EMI). It can transmit signals over great distances. It uses light pulses for signal transmission.
What are two advantages of using mesh topology in a network. (Choose two.) A. The protocols used are very lightweight with little overhead B. It is self-healing and can still operate when one node breaks down C. Data travels from node to node, with each node in the network handling each packet. D. It is considered more reliable than other networks.
It is self-healing and can still operate when one node breaks down It is considered more reliable than other networks.
Which of the following statements are true about a UTP crossover cable with RJ-45 connectors? Each correct answer represents a complete solution. (Choose two.) A. It is used for establishing a connection between a telephone line and a modem. B. It is used for troubleshooting a network card. C. It is used for establishing a connection between a broadband modem and a PC/router. D. It is used for establishing a connection between two PCs without a hub.
It is used for establishing a connection between a broadband modem and a PC/router. It is used for establishing a connection between two PCs without a hub.
To configure a DHCP server in Windows which of the below is a correct step. A. On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next B. ipconfig /dhcp C. On control Panel --> DHCP Server D. None of the above
On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next
You are designing a network that will have two subnets, named Subnet A and Subnet B, connected to a router. To save cost, ABC.com wants you to make use of an existing router that cannot be configured to support BOOTP. Subnet A will host a DHCP server, while Subnet B will have a DHCP relay agent configured. Which of the following is TRUE with regards to DHCP Relay Agent ? (Choose Two) A. It is used to prevent broadcast traffic across the two subnets. B. It is used to pass broadcast traffic across the two subnets. C. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, whether it is configured on the VPN server or not. D. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.
It is used to pass broadcast traffic across the two subnets. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.
You have recently designed a home office network for a client that includes a switch. Which of the following are TRUE with regards to network switches? A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached C. It operates at the Physical layer of the OSI model. D. It operates at the Data-Link layer of the OSI model.
It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. It operates at the Data-Link layer of the OSI model.
What are the advantages of an ISDN connection over a PSTN connection? Each correct answer represents a complete solution. (Choose all that apply.) A. It offers more bandwidth. B. It provides end-to-end digital communications. C. It provides a faster connection. D. It requires an analog modem.
It offers more bandwidth. It provides end-to-end digital communications. It provides a faster connection.
You are in the process of connecting a 100BASE-SX gigabit Ehternet in a clients office block. Which of the following statements are TRUE with regards to 1000BASE-SX? A. It requires multi-mode fiber optic cable. B. It requires single-mode fiber optic cable. C. It can work over distances in excess of 70 Km. D. The maximum length of a cable segment is 10 Km.
It requires multi-mode fiber optic cable.
Which of the following statements are true about an IPv6 network? Each correct answer represents a complete solution. (Choose all that apply.) A. It uses 128-bit addresses. B. It uses longer subnet masks than those used in IPv4. C. It increases the number of available IP addresses. D. For interoperability, IPv6 addresses use the last 32 bits of IPv4 addresses. E. It provides improved authentication and security.
It uses 128-bit addresses. It increases the number of available IP addresses. For interoperability, IPv6 addresses use the last 32 bits of IPv4 addresses. It provides improved authentication and security.
You have planned to use plenum rated cable for extending your existing LAN. For which of the following reasons, plenum rated cable is used for? Each correct answer represents a complete solution. (Choose all that apply.) A. It provides better bandwidth than normal cable. B. Its outer surface is more resistant to flame than normal cable C. It produces less toxic gas than normal cable in case of fire. D. It provides more throughput than normal cable.
Its outer surface is more resistant to flame than normal cable It produces less toxic gas than normal cable in case of fire.
Port number 88 is used for which of the below protocols? A. NetBIOS B. Kerberos C. IMAP D. POP3
Kerberos
To install IPv6 on your windows computer you need to _____________ A. LAN connection Properties-> Check IPv6 B. using CLI : enable ipv6 C. From Web Browser Properties D. using CLI: ipv6 enable
LAN connection Properties-> Check IPv6
What type of communication at the physical and data link layers of the OSI model? A. Transport B. Routing C. WAN protocols D. LAN protocols
LAN protocols
Which file resolves NetBIOS names to IP addresses? A. HOSTS B. WINS C. DNS D. LMHOSTS
LMHOSTS
___________ creates an unencrypted connection between two network devices. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN
Layer 2 Tunneling Protocol
What is the main criteria used by firewalls to filter traffic? (Choose two answers.) A. Protocols B. User accounts C. Ports D. Applications
Protocols Ports
TCP is used on which layer of the OSI Model? A. Layer 3 B. Layer 4 C. Layer 2 D. Layer 1
Layer 4
Which of the following layers of the OSI model is responsible for establishing communication session between the processes running on different communication entities in a network? A. Layer 5 (Session layer) B. Layer 3 (Network layer) C. Layer 7 (Application layer) D. Layer 2 (Data-link layer)
Layer 5 (Session layer)
In which directions can communicate occur between layers of OSI model? (Choose three.) A. all layers below B. layer directly above C. peer layer in other networked computer systems D. all layers above E. layer directly below F. there is not communication
Layer directly above Peer layer in other networked computer systems Layer directly below
Which feature of Category 5e STP cable reduces external interference? A. Crosstalk B. Shielding C. Length D. Twisting
Length
What is the advantage of UDP over TCP? A. Less Overhead - Faster Performance B. Older - Larger pool of compatible hardware C. TCP is not IPv6 compatible UDP is D. UDP can operate at Layer 1
Less Overhead - Faster Performance
The query protocol used to locate resources on a network is: A. Tracert B. Telnet. C. Lightweight Directory Access Protocol (LDAP). D. User Datagram Protocol (UDP).
Lightweight Directory Access Protocol (LDAP).
You are troubleshooting a server that needs to connect directly to the Internet. After you run an ipconfig/all, you discover the problem. The server has been auto-assigned the IPv6 address FE80::260:8FF:FEC0:98d%4. The server won't connect to the Internet because this is a ______ address. A. Link-local B. Link-Private C. Logic-Link D. Malformed
Link-local
_______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. A. Gateway Address B. IP address C. MAC Address D. None of the above
MAC address
What type of record does DNS use to find a mail service? A. Host (A) DNS record B. Canonical (CNAME) DNS record C. Service (SRV) DNS record D. Mail Exchanger (MX) DNS record
Mail Exchanger (MX) DNS record
One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet.
Make resources available to the Internet.
In a ________ topology, every single computer is connected to every other computer on the network. A. Star B. Ring C. Mesh D. Diamond
Mesh
This question requires that you evaluate the underlined text to determine if it is correct. In a diamond topology, every single computer is connected to every computer on the network. A. Ring B. Mesh C. No change is needed D. Star
Mesh
Which of the following network topologies is the most fault tolerant? A. Ring B. Star C. Bus D. Mesh
Mesh
Which topology is the most redundant and the most expensive? A. star B. ring C. mesh D. bus
Mesh
What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2? A. Microsoft RAS B. Microsoft RRAS C. Microsoft RDC D. Microsoft VPN Server
Microsoft RRAS
Which of the following devices is required for remotely accessing the network through PSTN lines? A. Hub B. Bridge C. Switch D. Modem E. Gateway F. Router
Modem
You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement a(n) _____ address. A. Singlecast B. Multicast C. Broadcast D. Anycast
Multicast
Which are the two main filters firewalls use for data packets. (Choose two answers.) A. User accounts B. Applications C. Protocols D. Ports E. IP Addresses
Protocols Ports
Connecting to a private Network address from a public network requires: A. Dynamic Host Configuration Protocol (DHCP). B. Network Access Protection (NAP). C. Dynamic domain name system (DDNS). D. Network address translation (NAT).
NAT
What is used to remap private addresses to public addresses and back? A. DNS B. DHCP C. WINS D. NAT
NAT
Which of the following services masks internal IP addresses from outside the network? A. DHCP B. NAT C. WINS D. DNS
NAT
Which of the following command-line utilities is used to show the state of current TCP/IP connections? A. TRACERT B. NSLOOKUP C. PING D. NETSTAT
NETSTAT
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use? A. NETSTAT -r B. NBTSTAT -s C. NBTSTAT -r D. NETSTAT -s
NETSTAT -s
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use? A. NETSTAT -r B. NBTSTAT -s C. NBTSTAT -r D. NETSTAT -s
NETSTAT -s
What type of device is used to detect malicious network activities and reports only those issues to the administrator? A. NIDS B. NIPS C. Internet content filter D. NAT server
NIDS
What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity? A. NIDS B. NIPS C. Internet content filter D. NAT server
NIPS
In which OSI layer does routing occur? A. Physical B. Network C. Data Link D. Transport
Network
This question requires that you evaluate the underlined text to determine if it is correct. A router is a device that functions primarily on the Data Link layer of the OSI Model. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. A. Transport B. Network C. No change is needed D. Physical
Network
Which layer in the OSI model covers routing between networks? A. Physical B. Data Link C. Network D. Transport
Network
Which layer in the OSI model is used to verify that data was delivered without error? A. Physical B. Data Link C. Network D. Transport
Network
The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. A. WINS B. DHCP C. Network Address Translation D. FTP
Network Address Translation
A router's static route is set by the: A. Next upstream router. B. Routing protocol. C. Adjacent network. D. Network administrator.
Network administrator.
You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals
Network printer Web server
In a star topology, failure of a central connectivity device does not bring down the entire network. A. Yes B. No
No
Quality of Service (QoS) allows you to assign protocols dynamically. A. Yes B. No
No
A directly connected route has an administrative distance of _0_. A. 1 B. 120 C. 255 D. No change is needed
No change is needed
E1 connections use 32 channels to obtain a top speed of 2.048 Mbps. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed." A. 1.544 Mbps B. No change is needed C. 34.368 Mbps D. 44.736 Mbps
No change is needed
This question requires that underlined text to determine if it is correct. __AAAA__ records resolve hostnames to 128-bit addresses. A. No change is needed B. A C. IPv4 D. IPv6
No change is needed
This question requires that you evaluate the underlined text to determine if it is correct. Dynamic routing is fault tolerant. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. Static routing B. Default route C. Least cost routing D. No change is needed
No change is needed
This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 10.0.1.1 B. 169.254.0.5 C. 192168.1.1 D. No change is needed
No change is needed
This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct A. WPA-AES B. WPA2 C. WPA-PSK D. No change is needed
No change is needed
Which of the following terms is the IPv6 equivalent of a static IP address in IPv4? A. Nontemporary B. Temporary C. Dynamic D. Nondynamic
Nontemporary
What model is used to describe how data communication occurs between hosts? A. server-centric model B. workgroup model C. peer-to-peer model D. OSI reference model
OSI reference model
What routing protocol is the most popular link-state protocol used within a large organization? A. RIP B. OSPF C. BGP D. IGMP
OSPF
Which of the below is a Link state routing protocol? Choose the best fit A. RIP B. IGRP C. EIGRP D. OSPF
OSPF
You have been tasked with installing a routing protocol that monitors the network for routers that have changed their link state. Which routing protocol will accomplish this? A. IGRP B. NAT C. OSPF D. RIP
OSPF
What does X.25 use as its DTE device? A. telco incoming router B. packet switcher C. analog modem D. PAD
PAD
What part of the network is the point where the responsibility of the administrator ends and the telecommunications provider's responsibility begins? A. last mile B. demarc C. router array D. PAD interface
PAD interface
Which version allows for multiple private addresses to share a single public address? A. PAT B. One-to-many NAT C. Dynamic NAT D. Static NAT
PAT
Which oi the following utilities will produce the output as shown in the image below? A. PING B. NETSTAT C. TRACERT D. NBTSTAT
PING
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use? A. NETSTAT B. TELNET C. PING D. TRACERT
PING
Which VPN technology is the most common and the easiest to set up? A. PPTP B. L2TP with IPSec C. SSTP D. CHAP
PPTP
Which of the below are tunneling protocol used by VPN? (Choose two) A. PPTP B. L2TP C. SFTP D. NNTP
PPTP L2TP
Frame Relay and X.25 are a type of ___________________ WAN technology? A. Packet Switching B. Circuit Switching C. Network Switching D. Console switching
Packet Switching
What type of configuration creates a DMZ between two firewalls? (Choose two) A. Gateway Network B. Perimeter Network C. DMZ D. RADIAUS Server
Perimeter Network DMZ
PVCs are associated with Frame Relay, what does PVC stand for _________________________ A. Permanent Virtual Circuit B. Permanent Virtual Class C. Preferable Volunteer Circuit D. Passive Virtual Circuit
Permanent Virtual Circuit
Which layer in the OSI model includes the cable and network adapters? A. Physical B. Session C. Application D. Presentation
Physical
What are the seven layers found in the OSI model, in order? A. Physical - Data Link - Network - Transport - Session - Presentation - Application B. Physical - Data Link - Network - Transport - Session - Application - Presentation C. Physical - Data Link - Transport - Network - Session - Application - Presentation D. Physical - Data Link - Transport - Session - Network - Presentation - Application
Physical - Data Link - Network - Transport - Session - Presentation - Application
What command do you use to test the TCP/IP stack on a computer? (Select three) A. Ping localhost B. Ping 127.0.0.1 C. Ping loopback D. ipconfig /renew
Ping localhost Ping 127.0.0.1 Ping loopback
You are in the process of expanding a clients current LAN setup. You have been instructed to make sure that the cable used is fire safe, and that it emits less toxic fumes. Which of the following options should you use? (Choose two) A. PVC cable. B. Plenum rated cable. C. Fiber-optic cable. D. Carpet Cable.
Plenum rated cable. Fiber-optic cable.
On which layer of the OSI model does encryption take place? A. Data Link B. Presentation C. Application D. Session
Presentation
What layer in the OSI model is used to encrypt data? A. Physical B. Session C. Application D. Presentation
Presentation
____________________ Layer of the OSI takes care of the compression and encryption. A. Physical B. Session C. Presentation D. Transport
Presentation
TCP/IP and IPX/SPX are known as _________ stacks. A. Protocols B. Services C. Layers D. Lenses
Protocols
One reason to incorporate VLANs in a network is to: A. Reduce the number of broadcast domains. B. Increase the number of available Media Access Control (MAC) addresses. C. Increase the number of available IP addresses. D. Reduce the number of nodes in a broadcast domain.
Reduce the number of nodes in a broadcast domain.
Which role needs to be added to Windows Server 2016 in order to enable routing through the server? A. Remote Access B. Remote Desktop Services C. Windows Deployment Services D. Network Controller
Remote Access
Which role needs to be added to Windows Server 2016 in order to enable routing through the server? A. Windows Deployment Services B. Remote Desktop Services C. Network Controller D. Remote Access
Remote Access
You use the ________ to connect to a terminal server. A. Remote Desktop Connection (RDC) B. Remote Desktop Protocol (RDP) C. Remote Session Call (RSC) D. Remote NetBios Connect (RNC)
Remote Desktop Connection (RDC)
What name does Windows Server 2008 R2 use for Terminal Services? A. MS Telnet Server B. MS Primary Services C. MS Thin Server D. Remote Desktop Services
Remote Desktop Services
You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this information? A. RRAS is running B. Remote Desktop Services is running C. The WINS service is running D. The DNS service is running
Remote Desktop Services is running
You have installed a small network at an accounting office. All the computers have gigabit Ethernet NICs. Your router works at 1000mbps. Yet when you measure internet speed, you see it is going at 100mbps maximum. What should you do to fix this? A. Replace the cable with Category 5 cable. B. Replace the cable with fiber optic. C. Replace the cable with Category 6 cable. D. Replace the router.
Replace the cable with Category 6 cable.
Which of the below is not a process in the DHCP DORA? A. Discover B. Offer C. Response D. Acknowledge
Response
Connecting several computers together in a circle without the use of a hub or switch is using a _____ topology. A. Star B. Diamond C. Ring D. Mesh
Ring
Which DNS servers hold complete tables of mappings of Internet addresses to IP addresses? A. Root B. DNSSEC C. External D. Namespace
Root
You are setting up home wireless networking for a writer. She wants to choose a DSL connection. As she frequently uploads manuscripts to her publisher, she wants the fastest upload rate possible. Which DSLs would work? A. ISDN B. HDSL C. ADSL D. SDSL
SDSL
What is used to identify a wireless network? A. network ID B. frequency identifier C. wireless password D. SSID
SSID
___________ allows a remote user to connect to a private network from anywhere on the Internet. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN
SSL VPN
You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6
STP Cat5e
Unicast Multicast Broadcast
Sends data to one device Sends data to two or more devices Sends data to all available devices
Which of the following items are configured on a user workstation for wireless networking? Each correct answer represents a complete solution. (Choose two.) A. MAC Address Filtering B. Service Set Identifier (SSID) C. Encryption D. Security Set Identifier (SSID)
Service Set Identifier (SSID) Encryption
What layer in the OSI model is responsible for logging on and off? A. Physical B. Session C. Application D. Presentation
Session
Which of the below modes are related to Fiber Optic Cable? (Choose two) A. Single Mode B. Multi Mode C. Fiber Mode D. RJ Mode
Single Mode Multi Mode
Which of the following is a characteristic of single-mode fiber? A. Single-mode fiber supports longer distances than multimode fiber. B. Single-mode fiber has increased bandwidth than multimode fiber. C. Single-mode supports only a ring topology. D. Single mode allows multiplexing of electrical and light signals
Single-mode fiber supports longer distances than multimode fiber.
The physical topology of this network is a ...
Star topology
What IPv6 address incorporates IPv4? A. Starting ::ffff: B. Starting 0:0::ffff: C. Ending ::ffff D. Ending 0:0::ffff
Starting ::ffff:
Which type of route is manually configured by an administrator? A. Direct B. Static C. Dynamic D. Floating
Static
_________ is a route that must be manually defined on each router. A. Static B. Dynamic C. Persistent D. Global
Static
_________ uses a clocking circuit to control the timing of communications between two WAN devices such as routers. A. Static Route B. Dynamic Route C. PPTP Route D. Point To Point
Static Route
What do you call a smaller network that is part of a larger network? A. host B. broadcast domain C. cluster D. subnet
Subnet
Classless Addressing
Subnetting a network address Saving IP addresses
A ________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions. A. Switch B. Router C. Repeater D. Hub
Switch
A _________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions. A. Repeat B. Hub C. Router D. Switch
Switch
What do you use to create VLANs? A. router B. switch C. firewall D. proxy server
Switch
What is the most common central device used today to connect computers to a network? A. hub B. switch C. SOHO router D. VPN router
Switch
Which of the following devices works at the data-link layer (layer 2) of the OSI model? A. Router B. Repeater C. Gateway D. Switch
Switch
Which oi the following devices is used to create VLANs In a small network? A. Switch B. Bridge C. Hub D. Repeater
Switch
Which are examples of leased lines? (Choose two answers.) A. T1 B. DSL C. Dial-ups D. Cable broadband
T1 DSL
Andrew works as a Network Administrator for NetTech Inc. He wants to install an Internet connection having a data transmission rate of at least 10 Mbps, in the company's office. Which of the following types of connections will be most suitable? A. ISDN B. T1 C. T3 D. E1
T3
A client has requested the installation of a T3 internet connection for their offices. Which of the following is TRUE with regards to T3 internet connections? A. T3 internet connections have a minimum transmission rate of 64 Mbps. B. T3 internet connections have a minimum transmission rate of 56 Kbps. C. T3 internet connections have a minimum transmission rate of 10 Mbps. D. T3 internet connections have a minimum transmission rate of 128 Mbps.
T3 internet connections have a minimum transmission rate of 10 Mbps.
_________________ is connection-oriented protocol with guaranteed service. A. UDP B. TCP C. ICMP D. ARP E. IGMP
TCP
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. You are configuring an Internet connection for your company. Your Internet service provider (ISP) has a UNIX-based server. Which of the following utilities will enable you to access the UNIX server, using a text-based connection? A. TELNET B. TRACERT C. IPCONFIG D. FTP
TELNET
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem? A. IPCONFIG B. ROUTE C. TELNET D. TRACERT
TRACERT
What are tunnels used to transmit IPv6 address information over IPv4? (Choose two answers.) A. GRE B. VPN C. ISATAP D. Teredo
Teredo ISATAP
Which of the following technologies or services can be used to isolate hosts and segments and to control broadcast traffic? A. VLAN B. Perimeter network C. VPN D. RRAS
VLAN
Which of the following OSI layers is responsible for a reliable connection between two hosts on a TCP/IP network? A. Data-Link layer (layer 2) B. Session layer (layer 5) C. Network layer (layer 3) D. Transport layer (layer 4) E. Physical layer (layer 1)
Transport layer (layer 4)
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped.
The DNS is not resolving.
You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open systems interconnect (OSI) model. You are explaining the Data-link layer. Which of the following best describes the Data-link layer of the OSI model? A. The Data-link layer deals with the transmission and reception of the unstructured raw bit steam over a physical medium. B. The Data-link layer controls the operation of the subnet. C. The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer. D. The Data-link layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.
The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer.
You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open Systems Interconnect model. You are explaining the Transport layer. Which of the following best describes the Transport layer of the OSI model? A. The Transport layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium. B. The Transport layer controls the operation of the subnet. C. The Transport layer deals with error-free trasfer of data frames from one node to another over the physical layer. D. The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications.
The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications.
You have created a physical star network using a hub for testing purposes. One of the links to the hub breaks. What will happen? A. The computer linked to the hub through the link will stop working. B. The entire network will stop working. C. The hub will stop working. D. The affected link will stop working.
The affected link will stop working.
As part of a training exercise, you have been asked to identify the layer that allows applications and a number of user functions access to the network Which of the following options represents your response? A. The document layer. B. The application layer. C. The system layer. D. The Data-link layer.
The application layer.
A client has a small office network. The customer would like to create a virtual LAN on their network. Which of the following components should the customer have to proceed? A. The customer should have a switch. B. The cusotmer should have a modem. C. The customer should have a server. D. The customer should have a router.
The customer should have a switch.
Identify whether the given statement is true or false. "In a token ring network, a patch cable is used to connect two MAUs." A. True B. False
True
Which two statements are true about Microsoft security zones? (Choose two.) A. The default security level for Local intranet and Trusted sites is the same B. The security level for Restricted sites can be changed C. Windows Firewall is the application you must to add or remove websites to security zones D. Adding a website to a security zone blocks access to that website E. Internet Explorer has four security zones
The default security level for Local intranet and Trusted sites is the same Internet Explorer has four security zones
You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. What is the problem? A. The host cannot find a DHCP server. B. The host is set to multicast. C. The host is currently broadcasting. D. The host cannot find a domain controller.
The host cannot find a DHCP server.
You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based Ethernet network. The network contains twenty hosts and a switch. One day, network cable develops a break. What will happen? A. The switch will become offline. B. The whole network will collapse. C. No effect on the connectivity. D. The host directly connected to the cable will not be able to access the network.
The host directly connected to the cable will not be able to access the network.
Identify whether the given statement is true or false. "A switch passes data based on the MAC address." A. True B. False
True
What is the primary disadvantage of a bus topology? A. It consists of one central switch, hub, or computer. B. The network has a single point of failure. C. Each node in the network acts an independent router. D. One node or device contains multiple radio cards or modules.
The network has a single point of failure.
Security is a concern on wireless networks due to: A. The radio broadcast access method. B. Spread spectrum issues. C. Frequency modulation issues. D. The potential for cross-talk.
The radio broadcast access method.
Identify whether the given statement is true or false. "In a bus topology, when a computer transmits its data, the signals travel in both directions on the bus until they reach both ends." A. True B. False
True
Identify whether the given statement is true or false. "In a segmented network, the router prevents broadcasts from being transferred from one segment to another." A. True B. False
True
C:\>ping 66.111.64.227 Pinging 66.111.64.227 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Pingi statistics for 66.111.64.227: Packet: Sent = 4, Received = 0, Lost - 4 (100% Lost). Approximate round trip time: in milli seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms What has happened? A. The IP address of the destination computer is not resolved. B. There is no connectivity between the source and the destination computer. C. The network bandwidth is heavily utilized. D. The hub is not working.
There is no connectivity between the source and the destination computer.
Which of the following statements are true regarding plenum-rated cables? Each correct answer represents a complete solution. Choose all that apply. A. These cables are often coated with Teflon. B. These cables are less expansive than normal cables. C. These cables produce less toxic gas than normal cables in case of fire. D. These cables are used in an enclosed environment.
These cables are often coated with Teflon. These cables produce less toxic gas than normal cables in case of fire. These cables are used in an enclosed environment.
What are three advantages of VLANs? (Choose three.) A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate traffic. D. They are efficient because a single switch can implement only a single VLAN. E. They act as though they are on the same LAN regardless of physical location.
They compartmentalize a network and isolate traffic. They require a router to connect to VLANs on another switch. They act as though they are on the same LAN regardless of physical location.
Which of the following are functions of the application layer of the OSI model? Each correct answer represents a complete solution. (Choose three.) A. To provide protocols for service advertisement B. To provide a user interface for database services C. To provide file, print, and message services D. To provide protocols for service use
To provide protocols for service advertisement To provide file, print, and message services To provide protocols for service use
Which of the following are functions of the application layer of the OSI model? Each correct answer represents a complete solution. (Choose three.) A. To provide a user interface for database services B. To provide protocols for service use C. To provide protocols for service advertisement D. To provide file, print, and message services
To provide protocols for service use To provide protocols for service advertisement To provide file, print, and message services
Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. (Choose two.) A. Wireless LAN (IEEE 802.11b) B. Token ring (IEEE 802.5) C. Ethernet (IEEE 802.3) D. Fiber Distributed Data Interface (FDDI)
Token ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI)
Which layer in the OSI model is included in the TCP/IP model? A. Physical B. Data Link C. Transport D. Application
Transport
Which of the following layers of the OSI model defines the functions of TCP and UDP? A. Data Link B. Physical C. Application D. Transport E. Session
Transport
Which protocol do you use as the transport protocol for a video application? A. TCP B. UDP C. FTP D. RDC
UDP
_________________ is connectionless, message-based protocol with best-effort service. A. UDP B. TCP C. ICMP D. ARP E. IGMP
UDP
What is the most common cable used today? A. UTP B. STP C. Coaxial D. Fiber
UTP
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. The network contains all Cisco connectivity devices. The network is configured as shown in the image below: What is the type of cable A? A. UTP rollover cable B. UTP straight-through cable C. UTP crossover cable D. Serial cable
UTP rollover cable
The three main types of IPv6 addresses are _________________ A. Unicast B. Anycast C. Multicast D. Broadcast
Unicast Anycast Multicast
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008-based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6? Each correct answer represents a complete solution. (Choose all that apply.) A. Unicast B. Broadcast C. Multicast D. Anycast
Unicast Multicast Anycast
Which type of switch is also known as a plug and play switch? A. Virtual B. Multilayer C. Managed D. Unmanaged
Unmanaged
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet. Which of the following actions will the router take to route the incoming packet? Each correct answer represents a part of the solution. (Choose two.) A. Add the path covered by the packet to the routing table. B. Use the routing table to determine the best path to the destination network address. C. Read the destination IP address. D. Use the routing table to determine the best path to the source network address. E. Read the source IP address.
Use the routing table to determine the best path to the destination network address. Read the destination IP address.
A client has requested the configuration of a new internet connection. The client would like her connection to support high-definiation television, as well as voice over IP and general Internet access, over a single connection. Which of the following options should you use? A. ADSL B. IDSL C. HDSL D. VDSL
VDSL
What do you use to isolate a group of computers within your organization? A. WLAN B. WAN C. VLAN D. Internet
VLAN
Which of the following technologies or services can be used to isolate hosts and segments and to control broadcast traffic? A. Perimeter network B. VPN C. RRAS D. VLAN
VLAN
A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to the network. What should you do next? A. Verify that the DHCP service is available. B. Reset the user's password on the server. C. Flush the cache on the DNS server. D. Check your router's current routing tables.
Verify that the DHCP service is available.
In Hyper-V, what is used to separate a virtual network with no Internet connection with one that has an Internet connection? A. NIC B. Virtual switch C. Virtual routers D. Virtual hub
Virtual switch
Which are types of switch ports? (Choose three answers.) A. Managed B. Voice access C. Access D. Trunk E. Unmanaged
Voice Access Access Trunk
Which encryption standard is considered to be the weakest for wireless networks? A. WPA B. AES C. WEP D. WPA2
WEP
Which of the below is a 64 bit Wireless Encryption Protocol? A. AES B. TKIP C. WPA 2 D. WEP
WEP
What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses? A. DNS B. WINS C. DHCP D. LDAP
WINS
_________________ Service in Windows resolves NetBIOS names to IP addresses. A. WINS B. DHCP C. DNS D. ARP
WINS
A client would like to connect his two home computers, You need to solve the problem without the use of unnecessary hardware. Which of the following actions should you take? A. You should make use of a hub and a UTP crossover cable with RJ-45 connectors. B. You should make use of a hub and a UTP crossover cable with RJ-11 connectors. C. You should make use of a UTP crossover cable with RJ-45 connectors. D. You should make use of a UTP crossover cable with RJ-11 connectors.
You should make use of a UTP crossover cable with RJ-45 connectors
This question requires that you evaluate the underlined text to determine if it is correct. WEP provides the strongest encryption for a wireless network. A. RADIUS B. WPA C. No change is needed D. WPA2
WPA2
Which is the most secure encryption used in wireless networks? A. WEP B. WPA C. WPA2 D. 802.1x
WPA2
Which two types of servers are typically placed in a perimeter network? A. Web server B. File server C. Print server D. Email server
Web server Email server
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS? A. well-known ports B. registered ports C. dynamic ports D. private ports
Well-known ports
You are in the process of designing a Star network for a client. Which of the following is an advantage of a Star network? A. A star network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Star network, there are no interruptions. C. A Star network allows the passing of data packets through an excessive number of nodes. D. Failure of the central hub has no impact on a Star network.
When you connect or remove devices on the Star network, there are no interruptions.
A service that resolves NetBIOS names to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Windows Internet Name Service (WINS). D. Address Resolution Protocol (ARP).
Windows Internet Name Service (WINS).
What is the central device used in wireless LANs? A. Wireless Access Point B. CSA/CDM Connector C. Wireless Switch D. MDU
Wireless Access Point
You need to connect three wireless networks together: an 802.11a, an 802.11g, and an 802.11n. Which wireless tool should you use to accomplish this task? A. Wireless router B. Wireless network adapter C. Wireless bridge D. Wireless Access Point
Wireless bridge
Which of the below two tools can be used to capture and analyze traffic? A. Wireshark B. Kiwi syslog C. dumpster diving D. tcpdump
Wireshark tcpdump
A client is planning to replace their existing network cabling. They have requested that the replacement cabling meet the following requirements: It must be unaffected by electromagnetic interference. It must be able to transmit data over vast distances. wich of he following actions should you take? A. You should make use of Coaxial cable. B. You should make use of fiber-optic cable. C. You should make use of Shielded Twisted-Pair cable. D. You should make use of Unshielded Twisted-Pair cable.
You should make use of fiber-optic cable.
In a star topology, a bad cable affects only two interfaces. A. Yes B. No
Yes
In a star topology, a central connection point allows for flexibility and scalability. A. Yes B. No
Yes
Quality of Service (QoS) allows you to control bandwidth. A. Yes B. No
Yes
Quality of Service (QoS) allows you to define the priority traffic on the network. A. Yes B. No
Yes
You have been tasked with making sure that a clients network includes a server that converts NetBIOS names to IP addresses. Which of the following actions should you take? A. You should consider adding a DHCP server to the clients network B. You should consider adding a DNS server to the clients network C. You should consider adding a Web server to the clients network D. You should consider adding a WINS server to the clients network
You should consider adding a WINS server to the clients network
A clients network is made up of two network segments, named Subnet A and Subnet B. DHCP clients are located on Subnet A. A DHCP server on Subnet B. You need to make sure that DHCP clients are able to connect to the server. Which of the following actions should you take? A. You should make sure that the RRAS service is configured. B. You should make sure that WEb service is configured. C. You should make sure that the DNS service is configured. D. You should make sure that the DHCP relay agent service is configured.
You should make sure that the DHCP relay agent service is configured.
You have been instructed to design a TCP/Ip-based network. you need to configure the use of a suitable name resolution strategy that makes provision for Windows and Unix computer on the network. Which of the following actions should you take? A. You should make use of DNS as the name resolution strategy. B. You should make use of NetBIOS as the name resolution strategy. C. You should make use of DHCP as the name resolution strategy. D. You should make use of Peer Name Resolution Protocol as the name resolution strategy.
You should make use of DNS as the name resolution strategy.
What type of network can you set up that is another company's internal network? A. intranet B. extranet C. internet D. DMZ
extranet
The wireless adapter has an IP address configured: A. manually B. through DHCP C. through APIPA
through AIPA
What type of address is 202.23.2.255? A. multicast address B. broadcast address C. unicast address D. anycast address
broadcast address
What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking? A. proxy server B. application firewall C. NAT filtering D. circuit-level gateway
circuit-level gateway
If you want to connect a computer directly to another computer without using a switch, you use a __________. A. straight-through cable B. crossover cable C. laplink cable D. rollover cable
crossover cable
What do you call it when electrical signals jump to another set of wires? A. EMI B. RFI C. crosstalk D. jump it is
crosstalk
One purpose of a perimeter network is to: A. make resource available to the intranet. B. link campus area networks (CANs). C. link local area networks (LANs). D. make resources available to the Internet.
make resources available to the Internet.
What defines the nearest router for a host? A. subnet mask B. default gateway C. DNS server D. WINS server
default gateway
What ports are defined above 49,152? A. well-known ports B. registered ports C. dynamic ports D. sliding ports
dynamic ports
What command do you use to connect to a FTP server to download a file? A. nslookup B. ssh C. telnet D. ftp
ftp
Which of the following does a switch use for increased performance? A. simplex B. half duplex C. full duplex D. sliding duplex
full duplex
When a packet traverses a network, each router is a _____. A. jump point B. CSU/DSU C. jump switch D. hop
hop
A node within a local area network (LAN) must have a network interface and a: A. resource to share. B. host address. C. network account. D. table of all network nodes
host address.
After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. A. ifconfig B. traceroute C. ping D. ipconfig
ipconfig
What command displays the IP address, subnet mask, and default gateway of the system you are currently on? A. ipconfig B. ping C. tracert D. nslookup
ipconfig
The ______________ command in Windows CLI will remove the IP address learnt from DHCP. A. ipconfig /renew B. ipconfig / release C. netstat / release D. ping -a
ipconfig / release
What command do you use to display the MAC address on a system? A. ipconfig /all B. pathping -m C. route /showmac D. nbstat -r
ipconfig /all
Which command-line tool is used to display IP address information and, where applicable, DHCP server information? A. ping -d B. ipconfig C. ipconfig /all D. ping
ipconfig /all
You are required to find the MAC address of you own computer. Which of the below command is used? A. ipconfig /all B. ipconfig -an C. netstat -an D. ipconfig
ipconfig /all
You need to find the MAC address of the network adapter for the computer you are currently working on. What command line command will give you the information you need? A. ipconfig B. grep C. ipconfig /all D. arp
ipconfig /all
What command do you use to register the computer's name and IP address with the nearest DNS server? A. ipconfig /renew B. ipconfig /renew all C. ipconfig /flushdns D. ipconfig /registerdns
ipconfig /registerdns
What command do you use to release the IP configuration handed out by a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release
ipconfig /release
What command do you use to retrieve or update your DHCP assigned configuration? A. ipconfig /flushdns B. ipconfig /all C. ipconfig /release D. ipconfig /renew
ipconfig /release
What command do you use to reacquire IP configuration from a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release
ipconfig /renew
What command do you use to clear the DNS cache on a local system? A. ipconfig /registerdns B. ipconfig /cleardns C. ipocnfig /flushdns D. ipconfig /releasedns
ipocnfig /flushdns
When trying to protect your network, you should create your secure network based on _______. A. multiple content filters B. a master firewall that all traffic flows through C. a NAT firewall and a proxy server D. layers
layers
What type of address is used to send a single set of packets to multiple hosts? A. multicast address B. broadcast address C. unicast address D. anycast address
multicast address
What command clears the NetBIOS name cache table? A. nbtstat -r B. nbtstat -R C. nbtstat -RR D. nbtstat -s
nbtstat -R
Which of the below command will help remove IP address from CLI? A. ipconfig B. removeIP C. netdom D. netsh
netdom
What command do you use to display and modify the network configuration of a local computer? A. netsh B. netstat C. telnet D. nbtstat
netsh
What command do you use to display active TCP or UDP connections? A. nbtstat B. netstat C. ipconfig D. nslookup
netstat
What command is used to display NetBIOS over TCP/IP statistics? A. nbtstat B. netstat C. ipconfig D. nslookup
netstat
The ___________ command is used to check the connection status to and from your computer. A. netstat -an B. ping -t C. arp -a D. tcpdump
netstat -an
What command displays Ethernet statistics? A. netstat -e B. netstat -x C. netstat -q D. netstat -t
netstat -e
What type of server does Active Directory run on? A. file server B. print server C. database server D. network controller
network controller
You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use? A. ping -a B. ping -4 C. ping -l D. ping -t
ping -l
What option do you use to ping constantly until you stop it? A. ping -t <host> B. ping -q <host> C. ping -r <host> D. ping -s <host>
ping -t <host>
What command do you use to test a system's IPv4 protocol stack? A. ping 127.0.0.1 B. ping self C. ping 255.255.255.255 D. ping default gateway
ping 127.0.0.1
What type of cable should be used as part of a fire code for a building? A. STP B. PVC C. heat protected D. plenum-rated
plenum-rated
What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future? A. NAT server B. stateful packet inspector C. proxy server D. NIDS
proxy server
You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use? A. punch-down tool B. zip tool C. wire wedge D. soldering iron
punch-down tool
Tracert is used to: A. report the shortest route between different networks. B. manage routing tables dynamically. C. manage session-oriented connections between nodes. D. report the route taken by packets across an IP network.
report the route taken by packets across an IP network.
What topology does FDDI use? A. bus B. star C. ring D. mesh
ring
What command is used to add static routes to a Windows computer? A. nslookup B. telnet C. route D. nbtstat
route
What command do you use to display the routing table on a local system? A. route display B. route table C. route local D. route print
route print
What is the primary disadvantage of X.25? A. digital circuit B. small data payloads C. circuit switching D. slow speeds
slow speeds
What technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network? A. stateless packet inspection B. stateful packet inspection C. NAT filtering D. application-level gateway
stateful packet inspection
What command can you use to connect to a mail server so that you can test SMTP? A. ftp B. nslookup C. telnet D. nbtstat
telnet
What command do you use to connect to a remote computer so that you can execute commands? A. ftp B. nslookup C. telnet D. nbtstat
telnet
Which DMZ configuration uses one firewall with three interfaces? A. back-to-back configuration B. three-leg perimeter configuration C. basic configuration D. perimeter configuration
three-leg perimeter configuration
The Ethernet adapter has an IP address configured: A. manually B. through DHCP C. through APIPA
through AIPA
What command tests network connectivity while showing you each hop along the way and the degree of packet loss? A. ping B. pathping C. nbtstat D. tracert
tracert
What command tests network connectivity while showing you each hop along the way? A. ping B. nslookup C. nbtstat D. tracert
tracert
What type of communication is sent to a single designated host? A. unicast B. broadcast C. multicast D. anycast
unicast
When you have multiple circuits connected to a site, the entire circuit is known as a ___________. A. virtual circuit B. emulated circuit C. joined circuit D. multitasked circuit
virtual circuit