Practice Network+ 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following protocols could be used in a peer-to-peer topology? A. NetBIOS B. IGMP C. RADIUS D. TACACS

+B

After adding a new cable segment to the network, the technician should: A. Update the disaster recovery plan. B. Document the changes in the business continuity plan. C. Update the wiring schematics. D. Create a new baseline document

C

An administrator has a networking closet on the first floor of a building with all of the network and communication equipment. However, the telephony provider installed the communications line in the basement. Which of the following needs to be extended to connect the line to the networking closet? A. Smart jack B. Demarcation point C. Patch panel D. Router

C

An administrator is troubleshooting network connectivity and would like to view the path that packets are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use? A. nslookup B. route C. traceroute D. ping

C

An administrator suspects that packets to an IP address are being dropped over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets? A. ping B. nslookup C. traceroute D. netstat

C

Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response? A. 1 and 2 B. 2 and 3 C. 3 and 6 D. 5 and 6

C

Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used? A. Straight B. Rollover C. Crossover D. Loopback

C

Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution? A. Request another class C IP scope from the ISP. B. Switch to static IP addressing. C. Change the subnet mask to 255.255.254.0. D. Add a router to connect both networks

C

Where would a technician MOST likely place the company MX and A records? A. Proxy server B. Load balancer C. DNS server D. Firewall

C

Which of the following BEST explains the function of OSI layer 4? A. Connecting hosts on the same segment B. Specifying signal timing and amplitude C. Reliable delivery of packets D. Routing packets across segments

C

Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WEP? (Select TWO) A. IP address B. Name servers C. SSID D. Subnet mask E. Shared key

C

Which of the following authentication mechanisms on a wireless network uses a separate network authentication server? A. Kerberos B. TKIP C. RADIUS D. WEP

C

Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and broadcast addresses on network clients and workstations? A. Networkbridge B. Layer 2 switch C. DHCP server D. Smart jack

C

Which of the following classes is the address 208.177.23.1? A. Class A B. Class B C. Class C D. Class D

C

Which of the following command line tools can be used to display listening sockets and established connections on the local computer? A. nslookup B. nbtstat C. netstat D. ipconfig

C

Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly together? A. Collision B. Attenuation C. Crosstalk D. Open circuit

C

Which of the following describes how original network diagrams contained in the documentation should be maintained? A. Used only to satisfy a network upgrade checklist requirement B. Used as a point-in-time reference but never relied upon C. Regular audits to ensure that diagrams remain accurate D. Considered to be the only source-of-truth of the network state

C

Which of the following is a correct Ethernet MAC address? A. 12:7H:45:89:9F:65 B. 16-15-4D-31-59-5J C. 11:34:7A:88:0C:DB D. 12-88-FF-9X-58-9E

C

Which of the following is a direct advantage of having wireless standards? A. Increased use of wireless spectrum B. Greater device security C. Interoperability between devices D. Increased number of protocols can be used

C

Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss? A. 100 feet (30.5meters) B. 207 feet (63.1 meters) C. 328 feet (100 meters) D. 358 feet (109.12meters)

C

Which of the following is the metric used for OSPF? A. Latency B. Cost C. Bandwidth D. Next hop

C

Which of the following network access security methods involves the analysis of a physical hardware addresses? A. IP filtering B. L2TP C. MAC filtering D. RAS

C

Which of the following protocols is the MOST secure for transferring network device configurations? A. TFTP B. FTP C. SCP D. RCP

C

Which of the following routing algorithms would provide the fastest convergence time? A. A distance-vector algorithm B. A static algorithm C. A link-state algorithm D. A path-vector algorithm

C

Which of the following would a technician set up for a building to building within a campus? A. ESD B. MDF C. IDF D. EMI

C

Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network? A. Dial-in access B. RDP access C. IPSec VPN D. SSL VPN

D

The task of replacing hubs with switches reduces retransmissions by increasing which of the following? A. Frequency domains B. Broadcast domains C. Domain kiting D. Collision domains

D

Where does the responsibility for maintenance and support shift from the telecommunication company to the customer? A. Central office B. Where the telecommunication lines enter the building C. Smart jack D. Demarc

D

Which of the following can be used to find the location of a cable short? A. Multimeter B. CSU/DSU C. Protocol analyzer D. TDR

D

Which of the following commands is MOST appropriate to determine whether a network interface is up or down? A. SNORT B. ISAKMPD C. ARP D. IFCONFIG

D

Which of the following device can connect multiple workstations, support VLANs, and function as a router? A. Repeater B. Switch C. Hub D. Multilayer switch

D

Which of the following is a commonly used protocol for VoIP network communication? A. SNMP B. SSH C. DNS D. RTP

D

Which of the following is an acceptable method for deciding placement of wireless access points? A. Where there are electrical service and network connections available B. Every300 feet (91 meters) C. In the middle of each room D. A site survey

D

Which of the following protocols uses port 143 by default? A. NTP B. SNMP C. SSH D. IMAP4

D

Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

D

Which of the following technologies can prevent a department's network broadcast from propagating to another department's network if they are located on the same switch? A. A hub B. A firewall C. A trunk D. A VLAN

D

Which of the following tools is used to connect analog telephony wire pairs to a block, such as a 110 or 66 block? A. Butt set B. Protocol analyzer C. Toner probe D. Punch down tool

D

Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a cubicle corresponds to a given RJ-45 jack in a patch panel? A. Punch-down tool B. Spectrum analyzer C. Toner probe D. Multimeter

D

Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80? A. netstat -at B. netstat -aupn C. netstat -r D. netstat -v E. netstat -p tcp

E

A client attempts to connect to a network resource and is given an error message about their access being restricted. Which of the following BEST describes the reason for denial? A. The user's account failed to authenticate with correct permissions. B. The user's account is disabled. C. The network resource is unavailable. D. The user is not connected to the network

A

A company needs to perform stateful packet filtering on the core network. Which of the following network devices would BEST be suited to match this equipment? A. Firewall B. Proxy C. Router ACLs D. DHCP server

A

A media converter is also known as a: A. transceiver. B. hub. C. modem. D. repeater

A

A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch panel? A. Cable crimper B. Punch down tool C. Toner probe D. Multimeter

A

A user calls network support and reports that email is not working. Which of the following should the technician do FIRST? A. Ask the user what operation was performed, what the expected result was, and what the actual result was. B. Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network administrator if needed. C. Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent. D. Determine which mail hub the user was connected to and perform a graceful restart

A

A user is reporting issues connecting to the corporate web server. When analyzing the output from a packet sniffer an administrator sees: Client-Server SYN Server ->Client ACK Client-> Server RST Which of the following is the user experiencing? A. The client is prematurely closing the connection. B. The server is failing to properly respond. C. The 3-way handshake is complete but the browser is unresponsive. D. The server is prematurely closing the connection

A

After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass. Which of the following terms BEST describes this firewall behavior? A. Stateful inspection B. Intrusion detection C. Content filtering D. Passive fingerprinting

A

An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed? A. Bandwidth shaper B. Intrusion detection C. Proxy server D. Load balancer

A

An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use? A. Multimode fiber B. RG-6 copper C. Single-mode fiber D. CAT6 copper

A

An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use? A. Physical network diagram B. Baseline configurations C. Security policy D. CAT5 wiring schematics

A

An end user is able to connect to a wireless network and is able to browse the internet, yet is unable to access network servers. Which of the following is the MOST likely cause of the problem? A. The end user is connected to the incorrect wireless network. B. The device is configured with an incorrect subnet mask. C. There is a problem with the DNS server. D. The network card is malfunctioning

A

The primary goal of implementing network QoS features is A. Provide predictable network performance. B. Increase network throughput. C. Prevent undesirable network traffic from entering the network. D. Provide fault tolerance to the network design

A

To ensure that VoIP phones are provided with power without using independent power supplies, switches on the network must have which of the following features? A. PoE B. VLAN tagging C. PPPoE D. Spanning tree

A

Which of the following allows an administrator to view malicious activity after it has taken place? A. IDS B. IPS C. Port scanner D. Packet sniffer

A

Which of the following commands can be used to find the MAC address of a connecting router? A. arp B. traceroute C. ping D. ping sweep

A

Which of the following exchanges routing information between two autonomous systems? A. EGP B. OSPF C. IGP D. EIGRP

A

Which of the following is a best practice when implementing a basic wireless network? A. Disabling ESSID broadcast B. Configuring encryption with a WEP key and labeling the key on the WAP C. Adding two access points per area of service D. Not configuring the ESSID point

A

Which of the following is a secure way to transfer files from one device to another? A. SFTP B. SNMPv3 C. TFTP D. FTP

A

Which of the following is the MOST appropriate policy for updating physical network diagrams? A. Update whenever a connection is changed. B. Update after new personnel are hired. C. Update before regularly scheduled network audits. D. Update after weekly network support team review

A

Which of the following methods is used in creating an ACL? A. IP filtering B. PPPs C. Content filtering D. VPNs

A

Which of the following network protocols is used for sending outbound email from a host? A. SMTP B. POP C. RTP D. IMAP

A

Which of the following ports would be commonly used for FTP traffic? A. 20 B. 22 C. 23 D. 25

A

Which of the following standards provides port authentication? A. 802.1x B. 802.11 C. 802.1q D. 802.2

A

Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed? A. SNMP trap B. History log C. System log D. SNMP agent

A

A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network devices? (Select TWO). A. Server B. Workstation C. Printer D. Hub E. Laptop

A,C

Which of the following are more secure file transfer alternatives to using FTP? (Select TWO). A. SFTP B. HTTP C. SNTP D. RCP E. SCP

A,E

A small company needs to temporarily extend its call center by ten employees. The company decides to rent office space on the opposite side of the building; the two spaces are 400 feet (122 meters) apart. Which of the following is the MOST cost effective solution? A. Install a new T1 line for that office. B. Use a wireless repeater and a WAP. C. Connect the two offices with fiber. D. Install gigabit switches and run Ethernet

B

A technician would use a logical network diagram to determine the number of: A. Cables in the network. B. Broadcast domains on the network. C. Switches on the network. D. Users on the network

B

An administrator would like to evaluate network traffic. Which of the following tools should the administrator use? A. OTDR B. Protocol analyzer C. Certifier D. Toner probe

B

Internet-working devices operate at OSI layer: A. 2 B. 3 C. 4 D. 5

B

VLANs occur at which of the following layers of the OSI model? A. 1 B. 2 C. 3 D. 4

B

Which of the following WAN technologies allows for the fastest connection? A. ADSL B. SONET C. T1 D. OC-12

B

Which of the following WAN technologies requires fiber optics? A. POTS B. SONET C. ADSL D. PSTN

B

Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)? A. Coaxial B. Ethernet C. Serial D. Fiber

B

Which of the following connectors can be used for serial connections? A. SC B. RS-232 C. BNC D. ST

B

Which of the following describes an email that is sent to users with web links that direct them to malicious websites? A. Viruses B. Phishing C. Rogue access points D. Man-in-the-middle

B

Which of the following devices can be used to breakup a broadcast domain? A. Unmanaged switch B. Router C. DHCP server D. Bridge

B

Which of the following is the GREATEST concern when using an orbital satellite WAN link? A. Collisions B. Latency C. Duplex D. Cable length

B

Which of the following methods is used to provide access to a VPN? A. IGP B. PPTP C. PPP D. RAS

B

Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs? A. 100Base-FX B. 10GBase-SR C. 10GBase-ER D. 10GBase-SW

B

Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user? A. Baseband B. Broadband C. Satellite D. POTS

B

Which of the following ports does IPSec use, by default? A. 53 B. 500 C. 3389 D. 8080

B

Which of the following protocols has similar functionality to Telnet but operates more securely than Telnet? A. TFTP B. SSH C. SNAT D. RSH

B

Which of the following tools can be used to determine the MAC address of a machine on the local subnet? A. ping B. arp C. host D. dig

B

Which of the following wiring standards would MOST likely be used to connect a single network node to a switch? A. Loopback B. Straight C. Rollover D. Crossover

B

Which of the following protocols are commonly used for VoIP? (Select TWO). A. NPP B. SIP C. HSRP D. RTP E. NNTP

B,D

A workstation on the network can ping hosts on the network but it cannot ping any addresses on the internet. Other hosts on the same network can connect to the internet. Which of the following should the technician check? A. The DNS server entries B. The network card C. The default gateway D. The hosts file

C

A LAN support team is installing new cables when all networked applications slow and then stop working. Switches in the server room show all connected ports at 100% activity. Which of the following has MOST likely occurred? A. Cable run has a short. B. New switch port is in wrong VLAN. C. Switching loop. D. Cable run has a break

C

A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem? Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic A. Reverse ARP failure B. IP address conflict C. MAC spoofing D. Static ARP entries

C

A network administrator would MOST likely use a port scanner to do which of the following? A. Capture incoming network packets to port 80 on a workstation. B. Trace a physical network port through a building. C. Remotely test a firewall configuration on a server. D. Report the link speed and duplex of all ports on a switch

C

A new LAN switch is installed with on fiber ports. Which of the following would a technician need on the new switch to allow compatibility to the existing fiber network? A. Router B. Repeater C. Media converter D. Hub

C

A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps should be done FIRST to diagnose the problem? A. Escalate the problem to administrative technician. B. Compare wiring schematics to industry standards. C. Identify symptoms and draw a network diagram. D. Use a port analyzer to determine network topology

C

A network has four switches; each switch has a physical link to all other switches. Which of the following topologies is being used? A. Ring B. Point-to-multipoint C. Star D. Mesh

D

A network with twenty clients needs to view a video file. Which of the following should be configured on the client's computers to reduce network traffic? A. Class C addresses B. Class A addresses C. Broadcast D. Multicast

D

A private AS number is useful in which of the following situations? A. Internet multihoming with multiple carriers B. Isolated network at a single site C. Enterprise network without redundant links D. Internet multihoming with all ISPs in same BGP area

D

A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this? A. 802.1ad B. TKIP C. WPA2 D. 802.1x

D

A user contacts a technician and states, "The network is down." After further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem? A. Have the user ping the default gateway. B. Unplug and then plug the network cable back in. C. Reboot the core router. D. Have the user run netstat

D

After receiving network problem reports from users, the technician notices that the router is rebooting itself several times a day. Which of the following would the technician do NEXT to further diagnose this problem? A. Test the router's connection with a throughput tester. B. Replace the router's memory and CPU. C. Install redundant network connections to the router. D. Review the router's event logs

D

An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following could be used to accomplish this connection? A. Smart jack B. Optical media C. Token ring D. Media converter

D

An administrator wants to connect users at three branch offices to the main office through the internet. Which of the following devices should the administrator install at the main office to BEST accomplish this goal? A. IPS sensor B. Proxy server C. Layer 2 switch D. VPN concentrator

D

An application layer firewall is MOST beneficial when used with which of the following protocols? A. VoIP B. GRE C. HTTP D. SNMP

D


Kaugnay na mga set ng pag-aaral

GU Pediatrics Practice Questions

View Set

Fin 325 Exam 1 practice questions

View Set

DH Theory II Exam 1 SQ's (1, 2...)

View Set

Chapter 10: The Nervous System: Introduction. Quiz.

View Set

Mathematics 700 Fundamentals - Unit 9: Measurement and Area CIRCUMFERENCE

View Set