BEST NETWORK+ N10-007 STUDY GUIDE 2019

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? A HBA allocation B SAN snapshots C Virtual SAN D VLAN

C

What site provides a nearly identical level of service with virtually no downtime? A Warm B Remote C Hot D Cold

C

What topology is seen in WAN networks and was designed to increase the redundancy of the communications? A Star B Ring C Dual Ring D Bus

C

You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy? A EAP-PEAP B Cisco LEAP C EAP-TLS D WEP

C

Identify the distance limitation of a 1000BASE-T Ethernet network. A 500 m B 2 km C 100 m D 185 m

C

Which type of network would be set up in an office for computers and mobile devices that do not comply with the company's NAC policies? A Quarantine network B Guest network C Wireless network D VPN

A

A company has an 802.11b wireless network deployed to allow mobile devices to connect to the network. Which frequency band is used in this network? A 2.4 GHz B 900 MHz C 5 GHz D 2.9 GHz

A

A company procedure calls for using the IPv4 and IPv6 loopback addresses as part of the troubleshooting process. Which of the following explanations best represents the purpose of this tool? A To provide an IP address for testing the local IP stack without a physical network connection B To provide an IP address to check interface drivers and hardware C To provide an IP address to determine minimum round-trip performance for packets D To provide an IP address for testing the local IP stack through the network interface E To provide an IP address that is always available even in the absence of a network

A

A contractor is unable to connect to your wireless network using his 802.11g wireless adapter. What is the most likely problem? A You have an 802.11a network. B You are using an incorrect channel on your network. C You have an 802.11n network. D You have an 802.11b network.

A

A hacker has called a company employee and learned the employee's user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered? A Social engineering B Buffer overflow C Denial of service D Brute force

A

A lack of bandwidth can lead to which QoS issues? (Choose three.) 1) packet drops 2) prioritization 3) jitter 4) delay A 1,3,4 B 1,2,4

A

A router that drops a packet exceeding a router interface's MTU size, when that packet has its "don't fragment" bit set, is called which of the following? A Black hole router B Route reflector C Null hop D Zero point router

A

A switch has 12 ports. How many collision domains does the switch have? A 12 B none C 1 D 2

A

A user in the Engineering department is unable to log on to the network. The network has eight subnets and uses TCP/IP. There have been no other complaints from other departments. Which steps should help you isolate the cause of the problem? Each correct answer represents a complete solution. Choose all that apply. 1) Configure a WINS server. 2) Replace all the patch cables. 3) Establish whether other local-segment users are having the same problem. 4) Ping the server. A 3 & 4 B 1 & 2

A

An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. Which of the following would be the best method for him to do this? A IPAM B ARP table C MAC reservations D DHCP relay

A

As part of monitoring network traffic, you need to determine the payload that is produced by using IPSec in tunnel mode with the AH protocol. Which of the following best describes this payload? A An encapsulated packet that is digitally signed B An unencapsulated packet that is digitally signed C An unencapsulated packet that is encrypted D An encapsulated packet that is encrypted

A

Automating the management and configuration of many different network devices, thanks to a centralized controller, refers to what technology? A software-defined networking B virtualized networking C Content distribution D Internet of things

A

Computer A needs the IP address of Computer B, but Computer A only knows Computer B's FQDN. Which of the following is most likely to contain this information? A Forward zone B Reverse zone C External DNS D Internal DNS

A

Employees must use a combination photo identification and security key card to enter a company office building. What is a secure method of determining whether an employee who lost a key card should be allowed to enter the office building? A Place digitized photographs of the employees in employee records. B Require employees to sign a log book. C Allow employees to enter the building without a key card. D Require a second key card to gain access to the company data center.

A

For a new office space, you have been asked to choose a best cost solution for providing wireless network access for up to 60 employees. Your boss has informed you that there will be mix of 802.11n and 802.11ac devices in use. The maximum distance from the WAP to any user is 150 ft (approx. 46M). Which kind of wireless access point should you buy? A 802.11n B 802.11ac C 802.11g D 802.11b E 802.11a

A

From the following list, identify the detection methods commonly used by IPS sensors. (Choose three.) 1) Policy-based 2) Distribution based 3) Signature based 4) Behavioral based A 1,3,4 B 1,2,4

A

How many channels on an Ē circuit are available for voice, video, or data? A 30 B 24 C 23 D 32

A

IP addresses reside at which layer of the OSI reference model? A Network layer B Transport layer C Data link layer D Session layer

A

ISDN is considered to be what type of WAN connection? A Circuit switched connection B Dedicated leased line C Cell-switched connection D Packet-switched connection

A

Identify the broad categories of SNMP message types. (Choose three.) 1) trap 2) get 3) put 4) set A 1,2,4 B 1,3,4

A

Identify the four layers of the TCP/IP stack. 1) Session 2) Transport 3) Internet 4) DLL 5) Network 6) Application 7) Network Interface layer A 2, 3, 6 & 7 B 1, 2, 3 & 4

A

If you successfully ping from host A to host B, what can you conclude about host A? A OSI layers 1-3 are functional B OSI layers 1-7 are functional C You can conclude that ICMP traffic can reach host b D OSI layers 1-4 are functional

A

In the absence of STP, what issues might result from a Layer 2 loop in a network? (Choose two.) 1) MAC address table corruption 2) broadcast storms 3) packet fragmentation 4) A router's interface MTU decrementing A 1 & 2 B 3 & 4

A

Management has asked you to ensure that any traffic through the external firewall is allowed as long as it is the result of a previous connection. Which type of firewall performs this assessment when it first encounters traffic? A Stateful firewall B Packet-filtering firewall C Circuit-level proxy firewall D Application-level proxy firewall

A

Management has asked you to investigate upgrading your company's network from IPv4 to IPv6. What are valid reasons you should give for performing this upgrade? Each correct answer represents a complete solution. Choose two. 1) IPv6 provides approximately 10 times more host addresses than IPv4. 2) Routing traffic is increasingly difficult due to the rapid growth of the Internet. 3) IPv4 is too slow for Internet traffic. 4) IPv4 addresses are being depleted at an increasing rate. A 2 & 4 B 1 & 3

A

Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system? A A diversity antenna system avoids multipath distortion. B A diversity antenna system increases the transmission power. C A diversity antenna system increases the coverage area. D A diversity antenna system adds more bandwidth.

A

Management has decided to renovate a portion of the office. You have been asked to relocate several computers and other network devices in the renovation area to another part of the building. After relocating the computers and devices, you document the new location. What is the term used to describe the actions you took? A Asset management B SLA C NAC D Baseline

A

Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide? A Baselines B Procedures C Standards D Guidelines

A

Prior to deploying a new wireless access point at a retail store that is located in a strip mall, you decide to perform a site survey. Which statements describe the purpose of doing this? 1) To find out the server processing speed required 2) To find the frequency and power settings to be used on access points 3) To calculate the number of access points required for the coverage area 4) To calculate the hop count to the gateway 5) To find out the required Internet bandwidth A 2 & 3 B 3 & 4

A

Refer to the exhibit. Examine the output shown. What is the address that information is sent to if it is determined that the remote address is on a different subnet? A 192.168.1.1 B 8.8.8.8 C 255.255.255.255 D 192.168.1.19 EXHIBIT Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : C8-60-00-BE-99-4C DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::c441:3b73:36aa:9b51%11(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.19(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 248012800 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-18-3D-D6-B6-C8-60-00-BE-99-4C DNS Servers . . . . . . . . . . . : 8.8.8.8 8.8.4.4 NetBIOS over Tcpip. . . . . . . . : Enabled

A

Refer to this exhibit. What is the output shown? Interface: 192.168.1.19 --- 0xb Internet Address Physical Address Type 192.168.1.1 00-23-97-6f-72-be dynamic 192.168.1.2 90-84-0d-ee-26-ad dynamic 192.168.1.7 78-e7-d1-bf-33-a8 dynamic 192.168.1.10 d8-30-62-34-b0-77 dynamic 192.168.1.13 00-90-a9-d0-c8-b5 dynamic 192.168.1.14 84-8f-69-f5-5f-3d dynamic 192.168.1.16 20-c9-d0-44-96-41 dynamic 192.168.1.21 00-1b-78-6d-76-fc dynamic 192.168.1.25 a8-86-dd-ac-a5-a5 dynamic 192.168.1.36 00-90-a9-01-bb-04 dynamic 192.168.1.56 68-5b-35-cf-28-1d dynamic 192.168.1.128 38-aa-3c-1f-07-c1 dynamic 192.168.1.202 f0-27-65-f6-b3-b3 dynamic 192.168.1.255 ff-ff-ff-ff-ff-ff static 224.0.0.2 01-00-5e-00-00-02 static 224.0.0.22 01-00-5e-00-00-16 static 224.0.0.251 01-00-5e-00-00-fb static 224.0.0.252 01-00-5e-00-00-fc static 224.0.1.60 01-00-5e-00-01-3c static 239.255.255.250 01-00-5e-7f-ff-fa static A the ARP cache information B the netbios name cache C the routing table D the NAT table

A

See Image: IMAGE Workstations A4 and A5 were recently added to the network. Since the clients have been added, the network has been running very slowly. Which two conditions could be causing this problem? Each correct answer represents a complete solution. Choose two. 1) You have exceeded your network server access limits. 2) The bus network might be missing a terminator. 3) A connector is loose. 4)You exceeded the maximum number of computers allowed on the network. A 2 & 3 B 1 & 4

A

The binary number 10110100 has what decimal equivalent? A 180 B 172 C 190 D 114

A

The company network that you administer has four LANs: accounting, receiving, shipping, and development. Each LAN is connected to the other LANs by a router. The user of the computer named LeadDev on the development LAN reports that he cannot connect to a computer named DevServ, which is also on the development LAN. The user of a computer named Shipmaster on the shipping LAN reports that she can connect to the DevServ computer. Which situation is the most likely cause of the connectivity problem? A The network cable is disconnected from the NIC on the LeadDev computer. B The NIC in the DevServ computer is defective. C The router is defective. D The Shipmaster computer has a faulty NIC.

A

The network you administer is organized according to the following image: IMAGE ElliotA, KateB, and PayR are workstations. FileSrv is a file server, and WebSrv is a Web server. FRW1 and FRW2 are firewalls. WebSrv is on a demilitarized zone (DMZ) that is maintained between the two firewalls. Router1 connects the network to the Internet. Remote users on the Internet connect to WebSrv, and some remote users on the Internet are allowed to gain access to files on FileSrv. Users report a network connectivity problem, so you test network connectivity. ElliotA can connect to KateB and FileSrv. KateB can connect to WebSrv. WebSrv can connect to PayR and FileSrv. FileSrv cannot connect to Router1, but FileSrv can connect to FRW1 and FRW2. Internet users can connect to Router1, but they cannot connect to WebSrv. What is most likely causing the connectivity problem on the network? A The cable that connects Router1 to FRW2 is not properly connected to FRW2. B Router1 is overloaded with network traffic. C Router1's connection to the Internet is down. D The port on Hub1 that connects FileSrv to the hub is not able to send or receive data. E FRW1 is configured with an invalid IP address.

A

WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain-text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called? A Initialization vector B Chips C Orthagonol Descriptor D Session key

A

What DSL variant has a distance limitation of 18,000 ft. between a DSL modem and its DSLAM? A ADSL B SDSL C VDSL D HDSL

A

What command produced the following snippet of output? OUTPUT OMITTED... ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62169 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;pearsonitcertification.com. IN A ;; ANSWER SECTION: pearsonitcertification.com. 10800 IN A 64.28.85.25 ;; Query time: 202 msec ;; SERVER: 192.168.1.1#53(192.168.1.1) ;; WHEN: Wed Jun 1 20:41:57 2011 ;; MSG SIZE rcvd: 60 OUTPUT OMITTED... A dig pearsonitcertification.com B traceroute -d pearsonitcertification.com C nbtstat pearsonitcertification.com D netstat -a pearsonitcertification.com

A

What device, traditionally used by telephone technicians, enables you to tap into a phone line to, for example, check a line for dial tone? A Butt set B Tester C Fox and Hound D TDR

A

What does the term asymmetric mean in DSL? A the upload and download speed differ B the upload and download speed are identical C the provider cannot transmit when it's receiving from the customer D the provider transmits on a different path

A

What is a physical barrier that acts as the first line of defense against an intruder? A A fence B A mantrap C A turnstile D A lock

A

What is another term for a demilitarized zone (DMZ)? A Screened subnet B Screened host C Dual-homed firewall D Virtual private network (VPN)

A

What is the IEEE standard for link aggregation? A 802.3ad B 802.1d C 802.3af D 802.1q

A

What is the data rate of an OC-3 connection? A 155.52 Mbps B 159.25 Gbps C 51.84 Mbps D 622 Mbps

A

What is the main purpose of a VPN concentrator? A To terminate the VPN tunnels B To manage Internet requests and cache Web content C To provide dynamic IP addresses D To resolve host names and IP addresses

A

What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard? A 15.4W B 26.4W C 32.4W D 7.7W

A

What is the most common topology seen with a DMVPN? A Hub & Spoke (partial mesh) B Full mesh C Ring D Bus

A

What is the network address and subnet mask of a default route? A 0.0.0.0/0 B 255.255.255.255/32 C 0.0.0.0/32 D 255.255.255.255/0

A

What is the prefix notation for a subnet mask of 255.255.255.240? A /28 B /29 C /20 D /24

A

What locally significant identifier is used by a Frame Relay network to reference a virtual circuit? A DLCI B TEI C MAC D VPI/VCI

A

What specialized network device is commonly used to load-balance traffic across multiple servers in a group? A Content Switch B Firewall C DNS Server D Content Engine

A

What switch feature allows you to connect a network sniffer to a switch port and tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected? A Port mirroring B Port redirect C Port interception D Port duplexing

A

What technology allows for the automatic assignment of the host portion of an IPv6 address? A EUI64 B Neighbor Discovery C Anycast D Dual stack

A

What type of IPv4 address is 239.1.2.3? A Multicast B Unicast C Experemental D Private use only

A

What type of backup solution is a point-in-time, read-only copy of data? A Snapshot B Virtual C Differential D Incremental

A

What typically enables a social engineering attack to occur? Each correct answer represents a complete solution. Choose two. 1) Gullibility 2) Encryption 3) Believable language 4) The deletion of key files A 1 & 3 B 2 & 4

A

What variation of network address translation (NAT) automatically assigns an inside global address from a pool of available addresses? A DNAT B Both DNAT and PAT C SNAT D PAT

A

When you're using the 2.4GHz band for multiple access points in a WLAN found in the United States, which nonoverlapping channels should you select? (Choose three.) 1) 10 2) 6 3) 5 4) 1 5) 0 6) 14 7) 11 A 2,4,7 B 1,2,4

A

Which DSL technology provides the highest data rate? A VDSL B SDSL C HDSL D ADSL

A

Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network? A Authentication server B Supplicant C Authenticator D Access point

A

Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data? A Baseband B Broadband C Simplex D Time-division multiplexing

A

Which attack involves the use of multiple computers with the purpose of denying legitimate access to a critical server? A Distributed denial-of-service (DDoS) attack B Land attack C Ping of Death attack D Denial-of-service (DoS) attack

A

Which is not a typical best practice found in a password policy? A Use of upper and lower case letters only B password uniqueness C no usage of proper names D password expiration

A

Which malicious software relies on other applications to execute and infect the system? A A virus B A Trojan horse C A logic bomb D A worm

A

Which network infrastructure device primarily makes forwarding decisions based on Layer 2 MAC addresses? A Switch B Hub C Multilayer switch D Router

A

Which of the following WAN technologies use unshielded twisted pair (UTP)? (Choose three.) 1) DSL Modem 2) POTS dialup modem 3) Cable modem 4) IDSN A 1,2,4 B 1,3,4

A

Which of the following allows a user to authenticate only once in order to gain access to multiple systems, without requiring the user to independently authenticate with each system? A SSO B Multifactor Authentication C TFA D EAP

A

Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN? A disabling SSID broadcast B pre-shared key C 802.1 x D MAC address filtering

A

Which of the following are characteristics of RADIUS? (Choose two.) 1) UDP 2) TCP 3) Only encrypts password in an Authentication packet 4) Encrypts an entire authentication packet A 1 & 3 B 1 & 2

A

Which of the following are common sources of wireless network radio frequency interference (RFI)? (Choose three.) 1) Game consoles 2) Baby monitors 3) Microwave ovens 4) Fax machines A 1,2,3 B 2,3,4

A

Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (Choose two.) 1) APIPA 2) BOOTP 3) DHCP 4) Zeroconf A 2 & 3 B 1 & 4

A

Which of the following commands is used on a UNIX host to generate information about each router hop along the path from a source to a destination? A traceroute B ping -r C tracert D ping -t

A

Which of the following comprise a simplified troubleshooting flow? (Choose three.) 1) Problem resolution 2) Problem monitoring 3) Problem diagnosis 4) Problem report A 1,3,4 B 1,2,4

A

Which of the following copper connector types is an eight-pin connector found in most Ethernet networks? A RJ-45 B DB9 C RJ11 D F Connector E BNC

A

Which of the following indicates the largest number of bytes allowed in a frame? A MTU B CSMA/CD C PDU D CSMA/CA

A

Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15? A RIP B IS-IS C BGP D OSPF

A

Which of the following options are relevant to network segmentation when using switches? Each correct answer represents a complete solution. Choose all that apply. 1) VLANs 2) ARP tables 3) MAC address tables 4) Tagging and untagging ports A 1 & 4 B 2 & 3

A

Which of the following physical LAN topologies requires the most cabling? A Star B WLAN C Bus D Ring

A

Which of the following statements are true regarding VLANs? (Choose two.) 1) For traffic to pass between two vlans, traffic must be routed 2) Because of the switch's MAC address table traffic does not need to be routed between the vlans 3) A Vlan has a single collision domain 4) A Vlan has a single broadcast domain A 1 & 4 B 2 & 3

A

Which piece of test equipment can you use to test the throughput of a Cat 5 cable? A Cable certifier B BERT C Multimeter R OTDR

A

Which protocol is categorized as an Exterior Gateway Protocol (EGP)? A BGP B RIP C IS-IS D OSPF

A

Which security technique uses wireless technologies to create an invisible boundary around some point? A Geofencing B War driving C TKIP D WPÁ

A

Which term is most commonly used to describe equipment that creates a demilitarized zone (DMZ)? A Firewall B Router C Active hub D Passive hub

A

Which term is used to describe the ability to respond to a single point of failure on a network? A Fault tolerance B RAID C Loopback D Clustering

A

Which two guidelines are the best to implement for passwords according to CompTIA guidelines? Each correct answer represents a complete solution. Choose two. 1) Ensure that passwords are only constructed of only alphanumeric characters. 2) Configure passwords to change periodically. 3) Ensure that passwords change rarely or never change. 4) Create passwords that contain at least one symbol. 5) Ensure that passwords are at least 15 characters in length. A 2 & 4 B 3 & 5

A

Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks? A Signature-based IDS B Behavior-based IDS C Anomaly-based IDS D Network-based IDS

A

Which type of network is based on network clients sharing resources with one another? A Peer-to-peer B Client-peer C Client/Server D Peer-to-server

A

While reviewing recent performance reports from your network devices, you notice that there are a high number of corrupt packets reaching a router named Router34. What is most likely happening to them? A The packets are being dropped. B The packets are being forwarded to the next router upstream. C The packets are causing the interface to reset. D The packets are causing the duplexing method to change.

A

You administer a LAN. You want to encrypt TCP/IP communications on the LAN. The protocol that you use for encryption should be able to encrypt entire data packets, and the protocol should be able to operate in both tunnel mode and transport mode. Which protocol should you use to encrypt data on the network? A IPSec B L2TP C Kerberos D IPX

A

You administer computers on an Ethernet 100BaseTX network, which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4. Both computers are configured with the subnet mask 255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst. You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst. You suspect that there is a problem with one of the routers between RemoteWkst and the network you administer. Which TCP/IP utility should you use to troubleshoot this connectivity problem? A The tracert utility B The nslookup utility C The ipconfig utility D The arp utility

A

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices? A SNMP B Telnet C SMTP D ARP

A

You administer your company's network, which is connected to the Internet. A firewall is configured between the company network and the Internet. You want to prevent users on the Internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent Internet users from entering the company's network on that port? A 80 B 119 C 23 D 21

A

You are analyzing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this protocol use? A TCP port 143 B UDP port 143 C UDP port 110 D UDP port 25 E TCP port 110 F TCP port 25

A

You are deploying fiber optic links and connections on a local area network. You need to ensure proper and efficient data communications. Which of the following transceiver or fiber optics characteristics are essential? Each correct answer represents a complete solution. Choose all that apply. 1) Multimode 2) Half duplex 3) Full duplex 4) Simplex cables 5) Duplex cables 6) Single-mode A 1,3,5 B 2,4,6

A

You are examining the packets captured on your network. You notice some communication between your Cisco router and someone from outside your network. The packets indicate that the communication is occurring over TCP port 23. Which protocol is being used? A Telnet B TFTP C SSH D FTP

A

You are implementing a SOHO network for a small business. The business owner has asked that you implement a 1 gigabit per second (Gbps) network. Which Ethernet standard specifies a data transfer rate of 1 Gbps? A 1000BaseT B 10Base2 C 10BaseT D 100BaseFX

A

You are installing a second wireless access point in your office. When you place the second wireless access point, you notice it is experiencing interference intermittently. You want to prevent the interference. Which method would not prevent interference? A Increase the signal strength of the new wireless access point. B Move the new wireless access point. C Change the channel used on the new wireless access point. D Decrease the signal strength of the new wireless access point.

A

You are installing the wiring for a small office. You want to connect the fifty computers in the office to the switch. The Cat6 cables that you plan to use have RJ-45 connectors on both ends. Which component should you use? A Patch panel B 66 blocks C 110 blocks D Demarcation extension

A

You are investigating possible unauthorized access to a Windows Server 2008 computer. The first step in your company's investigation policy states that the current network connections must be documented. Which command should you use? A Netstat B Tracert C Ipconfig D Ping

A

You are setting up an 802.11a wireless network in an office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they all choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort. What should you do? A Start each wireless access point at a separate time. B Reduce the signal strength on each access point. C Manually configure each of the access points to use channels 1, 6, and 11, respectively. D Increase the distance between the wireless access points to at least 20 meters.

A

You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the Internet. Upon troubleshooting the problem, you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the Internet. What is causing some of the wireless computers to be able to access other wireless computers only? A The computers are configured to operate in ad hoc mode. B The computers are configured with the wrong subnet mask. C The computers are configured with static IP addresses. D The computers are configured to operate in infrastructure mode.

A

You are the network administrator for an organization whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation? A Cost B Hop count C Delay D MTU

A

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following image: IMAGE Workstation A2 cannot connect to Server B. Workstation B2 can connect to Server B. Workstation A2 can connect to Server A. Which command should you run from Workstation A2 to test the connection from Workstation A2 to Server B? A Ping 137.17.0.1 B Ipconfig 137.17.0.1 C Tracert 137.17.0.2 D Ping 137.17.0.2

A

You are the network administrator for your company. One of your trainees configured the company's network. However, the network is not working. You ran the ipconfig command on Host A and found that the subnet mask on Host A is not properly configured. The network is shown in the following image: IMAGE IP Address 172.32.2.3 Which subnet mask should you configure on Host A to solve the problem? A 255.255.254.0 B 255.255.192.0 C 255.255.240.0 D 255.255.0.0

A

You are troubleshooting a connectivity problem with a computer named Computer1 on a network that has a router with the IP address 192.168.10.1. The network uses a non-subnetted Class C IP address range. Computer1 is configured with an IP address of 192.168.10.255 and a default gateway address of 192.168.10.1. The computers on the network are configured with the subnet mask 255.255.255.0. Computer1 cannot connect to the other nodes on the network. The link lights on Computer1's network interface card (NIC) are lit. What is most likely causing the connectivity problem? A Computer1's IP address B The subnet mask used on the network C The router's IP address D Computer1's default gateway address E Computer1's NIC

A

You are wiring a small office for a client. The client has purchased several 568A and 568B wall jacks and enough 568A wiring cables to attach all devices correctly. You want to configure the network for ease of administration. What should you do? A Use only the 568A wall jacks. B Purchase 568B wiring cables. C Use both the 568A and 568B wall jacks. D Use only the 568B wall jacks.

A

You are working with a company that has a Fast Ethernet 100Base-TX network. You will be adding several new network segments to the current network. Which standards apply to this company's network? Each correct answer represents a complete solution. Choose three. 1) Maximum segment length of 100 meters (328 feet) 2) Maximum segment length of 412 meters (1,352 feet) half-duplex 3) Media interface connectors (MIC) or Subscriber connectors (SC) 4) 100 Mbps data-transmission rate 5) Two pairs of Category 5 UTP cabling 6) Four pairs of Category 3, 4, or 5 UTP cabling A 1,4,5 B 2,4,5

A

You company currently has no defined policies or procedures regarding software patches. After researching, you find that software on some computers has been patched, but the patching is spotty at best. You need to prepare a software update patch policy to present to upper management. You need to determine when to install a software patch on a production server. Which of the following is correct? A After the patch has been tested locally B When the patch is in beta format C Before the patch has been tested D Immediately after the patch is released

A

You connect a home computer to a BRI ISDN line. The Bandwidth On Demand Interoperability Group (BONDING) protocol is used to combine the channels. What is the maximum data transfer rate of the B channels? A 128 Kbps B 56 Kbps C 1.544 Mbps D 44.736 Mbps

A

You have been asked to create several TIA/EIA 568A wiring cables for your network. Which color wire should be placed in Pin 1? A Green/White B Orange/White C Orange D Green

A

You have been asked to implement a protocol that will manage the fully qualified domain name (FQDN) to IP address mappings. Which protocol should you implement? A DNS B SSH C WINS D DHCP

A

You have been asked to implement a wireless network in a shared office building in a signal-rich environment. A wireless scan of the environment on your target floor shows you that the 5 GHz frequencies are not widely used in that building. Which of the following 802.11 WiFi networking technologies should you choose in this scenario? Each correct answer represents a complete solution. Choose three. 1) 802.11b 2) 802.11g 3) 802.11n 4) 802.11ac 5) 802.11a A 3,4,5 B 2,4,5

A

You have been called to assist a user with a network connectivity problem. The user is unable to access an application stored on a server. You want to determine if this problem is network-wide or a workstation problem. Which step should be taken to make this determination? A Try opening the application from other workstations. B Try opening other applications on the user's workstation. C Reset the user's rights/permissions for the application. D Shut down the server and reset the network.

A

You have been called to troubleshoot a workstation problem in the oldest building on your company's corporate campus. The network workstations in that building are unreliable. When the room lights are on, connectivity is lost, but when the room lights are off, the network is functional. Upon arrival, you quickly survey the work environment. You observe the following conditions: Lighting consists mainly of fluorescent lights. Temperature is 65 degrees. Fahrenheit (18 degrees Celsius). Humidity is 75%. Employees own space heaters, but they are not using them. Electrical outlets appear outdated. What is most likely causing the loss of connectivity? A Fluorescent lighting in the room B Voltage fluctuation in the outlets C Defective network hubs D Low temperature

A

You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network, you decide to implement two subnets on the network. What are valid reasons for implementing subnets on an IP network? Each correct answer represents a complete solution. Choose two. 1) To reduce congestion by decreasing network traffic 2) To configure a greater number of hosts 3) To increase network security 4) To reduce congestion by increasing network media bandwidth 5) To use more than one server on each segment of an IP LAN A 1 & 3 B 2 & 3

A

You have been hired as the network administrator for your company. The departing network administrator explains that your company uses an authentication server (AS) and a ticket-granting server (TGS) to provide authentication. Which technology is the company using? A Kerberos B TCP C HTTPS D SSL

A

You have configured a new file server for your company. Now you have been tasked with configuring the appropriate access control lists (ACLs) on all the file server folders. Which two principles affect the design of ACLs? Each correct answer represents a complete solution. Choose two. 1) Single sign-on 2) Least privilege 3) Need to know 4) SESAME 5) Kerberos A 2 & 3 B 1 & 5

A

You have decided to implement a firewall between your company's network and the Internet. What does a firewall software solution typically provide? Each correct answer represents a complete solution. Choose three. 1) L2 cache 2) L1 cache 3) IP proxy services 4) HTTP proxy services 5) Packet filtering A 3,4,5 B 2,3,4

A

You have recently discovered that your company is not maintaining system logs as per the adopted company procedures. You need to decide if the company procedures should be modified, or if the system logs should be maintained as per the procedures. Which statement is an accurate reason for following the company procedures? A Logging helps an administrator to detect security breaches and vulnerable points in a network. B Logging provides audit trails, but increases the risk for security violations. C Logging prevents security violations, but only deals with passive monitoring. D Logging provides access control by authenticating user credentials.

A

You have recently moved several servers that contain confidential information onto a DMZ. What is the most likely valid reason for doing this? A Compliance with federal and state regulations B Bandwidth improvement for all confidential information transactions C Encryption of all confidential transaction D Isolation of all confidential transactions

A

You have reconfigured your network to change the cable type used on one of your subnets from Cat5 to Cat6. Which change configuration management documentation should you revise? Each correct answer represents a complete solution. Choose all that apply. 1) Physical network diagram 2) Logical network diagram 3) Wiring schematic 4) Network baseline A 1 & 4 B 2 & 3

A

You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the best description of the result of your actions? A Network devices will now operate in full-duplex mode. B Network devices will now operate in half-duplex mode. C The switch ports will now operate at a higher port speed. D The switch ports will now operate at a lower port speed.

A

You have several computers in your network that are located behind a firewall. The computers are unable to obtain a dynamic IP address from the DHCP server. You suspect that the firewall is configured to block the DHCP traffic. Which port must be open on the firewall to allow the traffic? A UDP port 67 B TCP port 53 C UDP port 53 D TCP port 67

A

You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do? A Implement an active/active cluster. B Implement an active/passive cluster. C Implement Quality of Service (QoS). D Implement traffic shaping.

A

You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? Each correct answer represents a complete solution. Choose all that apply. 1) Configure each router as a scope option for its appropriate scope. 2) Configure the DNS server as a server option. 3) Configure the DNS server as a scope option for each scope. 4) Configure each router as a server option. A 1 & 2 B 3 & 4

A

You must decide whether to purchase 110 blocks or 66 blocks for the wiring in a new building. Which statement is not an advantage of a 110 block over a 66 block? A A 110 block does not use a punch-down tool. B A 110 block supports both telephone and data networks. C A 110 block requires less space. D A 110 block supports higher frequencies.

A

You need to assign a virtual IP address to an Internet server. What are valid reasons for doing so? Each correct answer represents a complete solution. Choose all that apply. 1) To permit a single network interface to service multiple incoming service requests 2) To permit the same address to access multiple domain names 3) To permit multiple servers to share the same address 4) To provide a generic address for immediate access 5) To eliminate host dependencies on specific, individual network interfaces A 2,3,5 B 1,3,5

A

You need to check for open circuits and short circuits on your network. Which tool should you use? A Cable tester B Protocol analyzer C Toner probe D Butt set

A

You need to connect a computer to a 100BaseTX Fast Ethernet network. Which of the two following elements are required? Each correct answer represents a complete solution. Choose two. 1) Fiber-optic cable 2) RG-59 cable 3) BNC T connectors 4) RJ-11 connectors 5) RJ-45 connectors 6) CAT5 UTP cable A 5 & 6 B 1 & 2

A

You need to deploy a fiber distribution panel offer for datacenter, remote office, or local area networking use. Which of the following features are not important for such uses? Each correct answer represents a complete solution. Choose all that apply. 1) Cable storage 2) Cable splices 3) Support for SFP+ 4) Cable termination 5) Support for GBIC connectors 6) Bulkhead adapters and receptacles A 3 & 5 B 2 & 4

A

You need to deploy wireless access points in a college environment. You want to deploy a solution that will provide the shortest range and the most non-overlapping channels to prevent interference. Which wireless standard should you deploy? A 802.11g B 802.11b C 802.11a D 802.11x

A

You need to display protocol statistics and connections using NetBIOS for a Windows computer. Which utility should you use? A Nbtstat B Ping C FTP D Arp

A

You need to implement Spanning Tree Protocol (STP) to prevent network loops when more than one path can be used. Which two devices could you deploy? Each correct answer represents a complete solution. Choose two. 1) Routers 2) Hubs 3) Bridges 4) Switches A 3 & 4 B 1 & 2

A

You need to implement an independent network within your private LAN. Only users in the Research and Development department should be able to access the independent network. The solution must be hardware based. Which type of network should you deploy? A A virtual local area network (VLAN) B An extranet C A demilitarized zone (DMZ) D A virtual private network (VPN)

A

You need to verify a network's transmission speed. Which tool should you use? A Throughput tester B Connectivity software C Bit-error rate tester D Loopback plug

A

You want to install a device between your company's private network and the Internet that will prevent users on the Internet from transferring HTTP messages into the company's network. Which device should you install? A A firewall B A bridge C A hub D A router

A

You want to trace a signal from one end of a 100BaseT UTP cable to the other. Which tool will help you input a test signal that can be traced through the cable? A Tone generator B Crossover adapter C Signal generator D Tone locator

A

You work for a company that deploys wireless networks for your customers. You have been asked to deploy wireless range extenders for several companies. For which of the following situations does deploying a wireless range extender make sense? A For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access B For a deli dining area in a grocery store, where up to 35 patrons may need wireless access at the same time C For a new branch office opening 7 km away from the main office, where 5-10 users will need wireless network access at the same time DTo add wireless coverage for an office expansion to 10th floor, where up to 40 users might need wireless access at the same time E For the back porch of a coffee shop where as many as 30 users might need wireless network access at the same time

A

Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations? A The ipconfig command B The ping command C The arp command D The tracert command

A

Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflicts. Which action should you perform? A Implement a DHCP server. B Change the MAC address for each network interface card. C Manually configure IP addresses on each computer. D Increase the TCP window size.

A

Your company has decided to implement IPSec for all remote connections. Which three statements are true of Internet Protocol Security (IPSec)? Each correct answer represents a complete solution. Choose three. 1) IPSec uses encapsulation security payload (ESP) and authentication header (AH) as security protocols for encapsulation. 2) The IPsec framework uses L2TP as the encryption protocol. 3) The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions. 4) IPSec ensures availability of information as a part of the CIA triad. 5) IPSec can work in either in tunnel mode or transport mode. A 1,3,5 B, 2,4,5

A

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. All wireless clients will run the Windows operating system. What should you implement? Each correct answer represents a complete solution. Choose all that apply. 1) A wireless access point 2) Static IP addresses 3) APIPA 4) Infrastructure mode 5) Ad hoc mode A 1 & 4 B 2 & 3

A

Your company has recently replaced all the shielded twisted pair (STP) and unshielded twisted pair (UTP) cable with fiber optic cable. You need to purchase a device to determine the length of the cables used on your network. Which tool do you need? A OTDR B TDR C Butt set D Toner probe

A

Your company implements a honeypot as intrusion prevention. Management is concerned that this honeypot would be considered entrapment and has asked you to ensure that entrapment does not occur. Which situation should you prevent? A Downloads on a honeypot B Web browsing on a honeypot C Open services on a honeypot D Open ports on a honeypot

A

Your company is considering converting to the use of IPv6 addresses. What are the three types of Internet Protocol version 6 (IPv6) addresses? Each correct answer represents a complete solution. Choose three. 1) Multicast 2) Anycast 3) Dual-cast 4) Broadcast 5) Unicast A 1,2,5 B 1,3,5

A

Your company is located in Charlotte, North Carolina. Management has decided to deploy multiple 802.11a WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment? A Eight B Eleven C Four D Three

A

Your company needs to be able to provide employees access to a suite of applications. However, you do not want the employees to install a local copy of the applications. Which method should you use to deploy the suite of applications? A SaaS B Virtualization C PaaS D IaaS

A

Your company wants to implement a WLAN. You are researching the different wireless options and want to implement the WLAN technologies that are least affected by multipath distortion. Which WLAN transmission technologies are least affected by multipath distortion? Each correct answer represents a complete solution. Choose two. 1) Wi-Fi 2) 802.11a 3) 802.11b 4) 802.11g A 2 & 4 B 1 & 3

A

Your company's WAN connects networks in New York, Atlanta, Dallas, and Boston. Each city is directly connected to every other city. Which physical topology is used for your WAN? A Mesh B Ring C Star D Bus

A

Your database administrator needs accurate time-stamping for purchases. Which of the following is would you implement? A NTP B CoS C Lease time D SRV

A

Your network contains several virtual LANs (VLANs). What is a benefit of using this technology? A It allows networks to be segmented logically without being physically rewired. B It allows users on a LAN to communicate with remote networks. C It connects small networks together to form a single large network. D It allows users from different segments to communicate with each other.

A

Your wireless network has come under attack in recent weeks. A technician suggests that you implement 802.1x security instead of 802.11 WEP security in the wireless network. What is the advantage of using 802.1x security over 802.11 WEP security? A 802.1x security generates dynamic encryption keys. B 802.1x security uses one-way authentication. C 802.1x security uses a 32-ASCII-character SSID. D 802.1x security uses static WEP keys for encryption.

A

ou administer a LAN for your company. The LAN is connected to the Internet through a T1 connection. The network you administer is displayed in the following image: IMAGE The link light on the hub for the cable that connects the hub to the router is not lit. The link lights on the hub for Workstation A and the Server computer are lit. Workstation A and Server can communicate with one another, but neither of these computers can communicate with the Workstation B computer. Workstation B can connect to the Internet through the modem, but Workstation B cannot communicate with either Workstation A or Server. Which device is most likely causing the communications problem? A The router B The hub C The modem D Workstation A

A

ou have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? Each correct answer represents a complete solution. Choose all that apply. 1) Microwave ovens 2) Cable TV cabling 3) Electrical wiring 4) Cordless phones A 1 & 4 B 2 & 3

A

You need to create an encrypted remote terminal connection with a UNIX computer. Which protocol should you use? A SCP B Telnet C SSH D FTP

C

If a WLAN does not need a user to give credentials to associate with a wireless AP and access the WLAN, what type of authentication is in use? A WEP B SSID C Open D IV

C

You need to increase the area that is covered by your wireless network to include another building. You decide to use a signal bounce. All of the following could help with this issue except what? A Reflectors B Encryption C Channel bonding D Repeaters

B

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use? A Crossover cable B Rollover cable C Straight-through cable D Patch cable

B

You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department? A Router B Bridge C Repeater D Gateway

B

A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network? A MAN B PAN C CAN D WAN

B

A server on your network contains several virtual servers. However, the server contains a single NIC. Which statement most likely describes the communication from this server? A It transmits data from multiple MAC addresses. B It transmits data from multiple IP addresses. C It transmits data using IPv4. D It transmits data using IPv6.

B

A suburban office location for your company is located next door to a regional airport, where a US government regional weather radar system is also housed. You are tasked with setting up a wireless 802.11ac network in that location. You must select a range of 80 MHz channels for that network to use. Furthermore, some of the devices on that network have 802.11n wireless interfaces. Which of the following channels should you use on your network? Each correct answer represents a complete solution. Choose two. 1) Channels 100-144 2) Channels 149-161 3) Channel 165 4) Channels 36-48 5) Channels 52-64 A 1 & 3 B 2 & 4

B

A user in the Engineering department is unable to log on to the network. The network has eight subnets and uses TCP/IP. There have been no other complaints from other departments. Which steps should help you isolate the cause of the problem? Each correct answer represents a complete solution. Choose two. 1) Ping the server. 2) Configure a WINS server. 3) Replace all the patch cables. 4) Establish whether other local-segment users are having the same problem. A 2 & 3 B 1 & 4

B

A user is complaining that she cannot log on to the network server. What specific steps should you take to locate the problem? Each correct answer represents a complete solution. Choose three. 1) Ask the user reporting the problem to reboot her workstation. 2) Have a user on the local segment try to log on to the server. 3) Have a user on a remote segment try to log on to the server. 4) Reboot the network server. 5) Ping the server. A 1,3,5 B 2,3,5

B

A user named Luther reports that he cannot log on to the network from his workstation. You attempt to use your administrator credentials to log on to the network from Luther's computer, but you cannot. Both you and Luther can log on to the network from your workstation. Your workstation and Luther's workstation are connected to the same hub. What is most likely causing the connectivity problem on Luther's workstation? A The hub that connects Luther's workstation to the network is defective. B The NIC in Luther's workstation is defective. C Luther is typing an incorrect user name when he attempts to log on to the network from his workstation. D Luther is typing an incorrect password when he attempts to log on to the network from his workstation.

B

An incident response policy often ends with which phase? A Eradicate B Review C Contain D Prepare

B

As a network administrator, you understand that there are many types of addresses used in networks, including Data Link layer addresses and network addresses. You need to explain to a new network technician the difference between these two types of addresses. What is the most significant difference? A The Data Link layer address of a device is configured by the network administrator, whereas the network address is set by the IEEE. B Data Link layer addresses are MAC addresses for unique identification, whereas network addresses are a Network layer component. C Data Link layer addresses use fewer bytes of memory than network addresses. D Data Link layer addresses refer to logical devices, whereas network addresses refer to physical devices.

B

Currently, your company uses IPv4 across its enterprise. Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4? Each correct answer represents a complete solution. Choose two. 1) Header fields have been made mandatory to reduce processing requirements. 2) A new type of address is used to deliver a packet to a specific address node. 3) The IP header options allow more efficient forwarding and less rigid length limits. 4) The IP address size increased from 128 bits to 156 bits with simpler auto-configuration of addresses. 5) The IP address size is increased from 64 bits to 128 bits with simpler auto-configuration of addresses. 6) Some header fields have been dropped or made optional. A 2 & 6 B 3 & 6

B

During a recent network redesign meeting, one team member suggested that you implement a device that operates at both the Data Link layer and the Network layer of the OSI model. Which device operates at both of these layers? A A router B A brouter C A bridge D A hub E A repeater

B

For your current deployment, you need an antenna with 360 degrees radiation in the horizontal plane to use for point-to-multipoint WLAN deployment. Which type of antenna should you deploy? A Parabolic dish antenna B Omnidirectional antenna C Yagi antenna D Patch antenna

B

Given the following network address translation (NAT) topology, identify the IP address that is the outside global IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.) A 172.16.1.2 B 10.1.2.3 C 192.168.1.2 D 192.168.1.1 E 172.16.1.1 Explanation: The term "outside global" refers to a public (that is, "global") IP address of a device on the "outside" of the network. In this case, the IP address of 10.1.2.3 (the IP address of the Server) is an outside global address.

B

Identify the well-known UDP port number for NTP. A 143 B 123 C 69 D 53

B

Identify three e-mail protocols. 1) POP3 2) SMTP 3) SNMP 4) IMAP4 A) 1, 3 & 4 B) 1, 2 & 4

B

Identify two advantages of a hub-and-spoke WAN topology as compared to a full-mesh WAN topology. 1) More scalable 2) Optimal routes 3) Lower cost 4) More redundancy A 1,2 & 3 B 1 & 3

B

Identify two differences between an Ethernet bridge and an Ethernet switch. (Choose two.) 1) bridges typically oprerate faster than switches 2) switches use ASICS to make forwarding decisions where as Bridges make their own forwarding decisions in software 3) Bridges can base their forwarding decision on logical Network layer addresses 4) switches usually have higher port densities than bridges A 1 & 3 B 2 & 4

B

If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision? A Each device randomly picks a priority value and the device with the highest value transmits B Each device that's a random back off timer and the device will attempt retransmit after the timer expires C Each device compares it's priority value (determined by IP address) with it's own and the device with the highest priority value transmits D Each device waits for Clear to Send (CTS) signal from the switch

B

In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies, to simultaneously flood a target system with traffic? A Buffer overflow B DDoS C DoS D TCP SYN Flood

B

You are a network administrator for a Windows Server 2012 domain. Recently, you have noticed network performance issues when Microsoft operating systems and applications release new service packs or updates. All server and client computers are configured to automatically download and install any updates. You need to deploy a solution that will reduce the network performance issues when these updates are released. What should you do? A Change the configuration of all computers to never check for updates. B Deploy a centralized Windows Software Update Services server that will download and deploy the updates, and deploy a group policy that ensures that all servers and clients obtain their updates from the centralized server. C Change the configuration of all computers to check for updates but wait for the user to download and install them. D Change the configuration of all computers to download updates but wait for the user to install.

B

Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.) A R1 B Server 1 C Client A D all devices have valid IP addresses ANSWER: The network shown has subnetted the 192.168.1.0 network using a 25-bit subnet mask (that is, 255.255.255.128). To determine which device (if any) is assigned an incorrect IP address, you need to determine the subnets created by the 25-bit subnet mask applied to the 192.168.1.0 network. Step 1. The interesting octet for a 25-bit subnet mask is the fourth octet, because the fourth octet is the last octet to contain a 1 in the 25-bit subnet mask (that is, 11111111.11111111.11111111.10000000, which could alternately be written as 255.255.255.128). Step 2. The decimal value of the fourth octet in the subnet mask is 128. Therefore, the block size is 128 (that is, 256 - 128 = 128). Step 3. The first 192.168.1.0 subnet is 19.168.1.0/25 (that is, with the 1 borrowed bit in the fourth octet set to 0). Step 4. Beginning with the first subnet of 192.168.1.0/25 and counting by the block size of 128 in the interesting octet yields the following subnets (where the fourth octet is incremented by 128): 192.168.1.0/25 192.168.1.128/25

B

SNMP uses a series of objects to collect information about a managed device. The structure, similar to a database, containing these objects is referred to as what? A RIB B MIB C DUAL D LSA

B

The network you administer has two LANs connected by DSL routers through the Internet, as depicted in the following image: IMAGE Client4 cannot connect to Client5. Client3 cannot connect to Client4, but Client3 can connect to Client2. Client2 can connect to Server1, and Client1 can connect to Server2. Which device is most likely causing the connectivity problem on the network? A Hub A B Hub B C Client3 D DSLRouter A E DSLRouter B

B

What Ethernet switch feature allows a port to automatically determine which of its leads are used for transmitting data and which of its leads are used for receiving data? A UTP B MDIX C STP D LAPD

B

What IoT technology is specialized for monitoring sensor data and is ultimately led by Garmin? A Bluetooth B Ant+ C Zwave D RFID

B

What NAT IP address is a public IP address that maps to an inside device? A Outside local B Inside global C Inside local D Outside global

B

What can be used by a hacker to implement a social engineering attack on a network? A A packet sniffer B A telephone C A multimeter D A remote-control package

B

What device operates at Layer 3 of the OSI model? A Hub B Router C WAN link D Switch

B

What is a correct description of a honeypot system? A A tool used to detect alterations in system files B A computer used to entice an attacker C A type of attack in which the target system is flooded with unauthorized service requests D A test methodology used to reveal vulnerabilities

B

What is the administrative distance of OSPF in a Cisco network? A 200 B 110 C 120 D 170

B

What is the aim of security awareness training? A All employees in the IT department should be able to handle social engineering attacks. B All employees must understand their security responsibilities. C All employees in the IT department should be able to handle security incidents. D All employees excluding top management should understand the legal implications of loss of information.

B

What is the class of IP address 192.168.1.0 /24? A Class D B Class C C Class B D Class A

B

What is the range of well-known TCP and UDP ports? A 16,384-32,768 B Below 1024 C Below 2048 D Above 8192

B

What is the size of an MPLS header? A 16 bits B 32 bits C 4 bits D 8 bits

B

What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver? A SPT switchover B IGMP C PIM-DM D PIM-SM

B

What option would you specify after the ipconfig command to display the IP address of a Windows PC's DNS server? A /fqdn B /all C None of these is needed D /full

B

What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network? A ICMP B ARP C IGMP D TTL

B

Which DNS record type includes SPF and DKIM records? A SRV B TXT C PTR D MX

B

Which Ethernet switch feature allows an Ethernet switch to make a copy of frames seen on one switch port and send those copies out of another Ethernet switch port? (NOTE: This feature is often used to allow a network analyzer connected to one switch port to see traffic present on a different switch port.) A VTP B Port mirroring C PoE D STP

B

Which TCP port is the well-known port assigned to SSL? A 119 B 443 C 20 D 80

B

You are a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PPTP server has been configured on each LAN. Which protocol should you use to establish a connection between the PPTP servers? A Telnet B PPP C HTTP D SLIP

B

You are a network administrator. A user named Wendy uses a computer named Client1. Wendy reports that she cannot connect to other computers on the 100BaseTX Ethernet network that is depicted in the following image: IMAGE You test Client1 and the other computers connected to Hub A and Hub B, and you determine that only Wendy cannot connect to the network. What is most likely causing the connectivity problem in this scenario? A A broadcast storm is emanating from the NIC in Client4. B The NIC in Client1 is defective. C Hub A is defective. D Hub B is defective.

B

You are a system administrator. A user calls you complaining that he cannot log on to the network. What are two questions you should ask first when troubleshooting the problem? Each correct answer represents a complete solution. Choose two. 1) How much memory does your computer have? 2) Can the problem be duplicated? 3) Is the computer plugged in? 4) Are other users also experiencing the same problem? A 1 & 3 B 2 & 4

B

Which Windows commands could have produced the following output? (Choose two.) ========================================================================= Interface List 20...00 0c 29 3a 21 67 ......Intel(R) PRO/1000 MT Network Connection #2 11...00 0c 29 3a 21 5d ......Intel(R) PRO/1000 MT Network Connection 1........................... Software Loopback Interface 1 12...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter 13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface ========================================================================= IPv4 Route Table ========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 172.16.202.2 172.16.202.128 10 0.0.0.0 0.0.0.0 172.16.202.2 172.16.202.129 10 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306 172.16.202.0 255.255.255.0 On-link 172.16.202.128 266 172.16.202.0 255.255.255.0 On-link 172.16.202.129 266 172.16.202.128 255.255.255.255 On-link 172.16.202.128 266 172.16.202.129 255.255.255.255 On-link 172.16.202.129 266 172.16.202.255 255.255.255.255 On-link 172.16.202.128 266 172.16.202.255 255.255.255.255 On-link 172.16.202.129 266 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306 224.0.0.0 240.0.0.0 On-link 172.16.202.129 266 224.0.0.0 240.0.0.0 On-link 172.16.202.128 266 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306 255.255.255.255 255.255.255.255 On-link 172.16.202.129 266 255.255.255.255 255.255.255.255 On-link 172.16.202.128 266 1) netstat -a 2) nbtstat -r 3) netstat -r 4) route print A 1,2 B 3,4

B

Which connection type allows for connections of up to 44.736 Mbps? A T1 B T3 C E3 D E1

B

Which metric is used by the Routing Information Protocol (RIP) Version 2 protocol to determine the network path? A Delay B Hop count C Bandwidth D Convergence

B

Which of the following UNIX commands can be used to check FQDN-to-IP-address resolution? (Choose three.) 1) host 2) nslookup 3) netstat 4) dig A 1,3,4 B 1,2,4

B

Which of the following Windows commands enables you to display NetBIOS over TCP/IP information? A dig B nbtstat C route D netstat

B

Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two.) 1) Reverse path forwarding check (rpf) 2) Split horizon 3) Poison reverse 4) Rendezvous point A 1 & 2 B 2 & 3

B

Which of the following categories of UTP cabling are commonly used for 1000BASE-T networks? (Choose two.) 1) Cat 6f 2) Cat 5 3) Cat 5e 4) Cat 6 A 1 & 4 B 3 & 4

B

Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1? A ping 10.1.1.1 (none of these are required bc the default is five already) B ping -c 5 10.1.1.1 C ping -t 5 10.1.1.1 D ping 10 10.1.1.1

B

Which of the following is a value measuring the power of a wireless signal? A CSMA/CA B RSSI C SSID D RFI

B

Which of the following is most likely the first step in a structured troubleshooting methodology? A Create a post-mortem report B Define the problem C Hypothesize the probable cause D Create an action plan

B

Which of the following is used by IEEE 802.11n to achieve high throughput using multiple antennas for transmission and reception? A LACP B MIMO C DSSS D FHSS

B

Which of the following protocols are most commonly used to provide security for an HTTPS connection? (Choose two.) 1) PPTP 2) TLS 3) L2TP 4) SSL A 1 & 2 B 2 & 4

B

Which of the following security solutions consists of software running on a host to protect that host against a collection of well-known attacks? A NIPS B HIPS C NIDS D L2F

B

Which of the following technologies implements packet tagging in a LAN? A Traffic shaping B CoS C Diffserv D QoS

B

Which standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i? A TKIP B WPÁ C WEP D MIC

B

Which suppression methods are recommended for a fire in a facility that involves paper, laminates, and wooden furniture? Each correct answer represents a complete solution. Choose two. 1) Halon 2) Water 3) Soda acid 4) Dry powder A 1 & 4 B 2 & 3

B

Which well-known port is used to forward e-mail on the Internet between e-mail servers? A 161 B 25 C 23 D 110

B

Which wireless communications mode enables wireless devices to communicate directly with each other? A Infrastructure B Ad hoc C Tunnel D Transport

B

Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy? A Bluetooth B Mesh C Ad hoc D Infrastructure

B

While an IPsec tunnel is being established, the peers at each end of the tunnel determine whether or not a certain feature should be used. This feature makes sure that a session key will remain secure, even if one of the private keys used to derive the session key becomes compromised. What is the name of this feature? A ISAKMP B Perfect forward secrecy (PFS) C Diffie-Hellman (DH) D Security Association (SA)

B

While performing routine network maintenance, you discover that one device on your network is operating in half-duplex mode. All the other devices on your network operate in full-duplex mode. What would this condition cause between the half-duplex device and the other devices? A It would have no effect. B Slower communication C Faster communication D No communication

B

While troubleshooting a network outage on a 10GBaseSW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is most likely the issue? A Dirty connectors B Maximum cable length exceeded C Bend radius exceeded D RF interference caused by impedance mismatch

B

You administer computers on a Windows network. You suspect a problem with automatic NetBIOS name resolution on a Windows 7 computer on the network. Which command should you use to troubleshoot the name resolution problem? A The tracert dnsname command B The nbtstat -r command C The ipconfig /all command D The netstat command

B

You are configuring a new small office home office (SOHO) at a small insurance office. After documenting the network requirements, you decide to use Network Address Translation (NAT) so that only one public address will be needed. You want to use the IANA-designated private IP address range that provides host IP addresses with a maximum of 16 bits. What is a valid host IP address in this range? A 172.30.250.10 B 192.168.0.1 C 10.251.250.100 D 11.0.1.0

B

You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered? A Screened subnet B Dual-homed firewall C Bastion host D Screened host

B

You are explaining the function of a multi-layer switch to several junior administrators. On which data can multi-layer switches make routing decisions? Each correct answer represents a complete solution. Choose all that apply. 1) protocol 2) IP address 3) MAC address 4) port number A 1,2,3 B 1,2,3,4

B

You are looking at implementing several different 10GBase networks. You need to implement the one that offers the longest cable run because of the distances you must cover for your company's network. Which 10GBase specification should you select? A 10GBaseLX4 B 10GBaseER C 10GBaseLR D 10GBaseSR

B

You are nearing the completion of a project that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, now you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first? A Enable NetBIOS over TCP/IP. B Delete the HOSTS file on each workstation. C Configure DHCP to supply a different range of IP addresses to the workstations. D Import the workstations' names and address mappings to DNS.

B

You are responsible for ensuring that unnecessary protocols are not running on your network. You need to determine which protocols operate at the Transport layer of the OSI model. Which of the following protocols should you list? Each correct answer represents a complete solution. Choose two. 1) IP 2) HTTP 3) UDP 4) TCP 5) IPX A 1 & 2 B 3 & 4

B

You are the network administrator for a manufacturing company. Technicians that work on computers used on the manufacturing floor may come into contact with dangerous chemicals. You need to understand which chemicals they will come into contact with and their associated safety issues. What should you consult? A ACL B MSDS C HVAC D ESD

B

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following image: IMAGE Workstation A2 is experiencing delays accessing Server B. Which utility should you run from Workstation A2 to determine the source of the slowdown? A Ping B Tracert C Ipconfig D Netstat

B

You are troubleshooting a network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use? A The arp command B The ipconfig /all command C The tracert command D The ping command

B

You are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the WAN. They were able to access the entire WAN earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the WAN. You have been able to gather information about the problem, duplicate the problem, question the users, and adequately establish the symptoms of the problem. What should you do next? A Recognize the potential effects of the solution. B Establish what has changed. C Test the result. D Select the most probable cause.

B

You are using DSL to connect to the Internet. You recently set up firewall software to protect your computer's resources from external users. After setting up the firewall software, you can no longer access Web sites by name. What is the problem? A You do not have a static IP address. B Your firewall software is blocking port 53. C Your firewall software is blocking port 25. D You have a DHCP server on the network.

B

You are working on the 196.11.200.71/18 client in a network. What is the base network ID for this network? A 196.11.200.71 B 196.11.192.0 C 196.0.0.0 D 196.11.0.0 E 196.11.200.0

B

You are working to convert a 10BaseT network to a 1000BaseT network. This conversion includes replacing all cabling, network devices, and network interface cards (NICs). Next year, you also have a planned building renovation where departments will be relocated to different areas within the building. However, that renovation should involve minimal network hardware changes. When you start the conversion, you have a hard time determining where each wall plate terminates at the patch panels. You decide to follow better design procedures to make future upgrades or troubleshooting easier and also to ensure that next year's move goes more smoothly. However, your solutions should minimally impact the current network structure. Which best practices should you implement during the conversion? Each correct answer represents a complete solution. Choose two. 1) Implement port labeling. 2) Implement device naming conventions. 3) Implement patch panel labeling. 4) Implement an SLA. 5) Create a physical network diagram. 6) Create a logical network diagram. A 2 & 3 B 1 & 3

B

You are working with your support specialists on expanding your company's existing network. You need to determine the actual network interfaces used on all network devices. Which configuration management documentation should you consult? A Wiring schematics B Physical network diagram C Network baseline D Logical network diagram

B

You decide to implement a DHCP server on your network. What is the purpose of a DHCP scope? A It is the temporary assignment of an IP address. B It is the range of IP addresses that a DHCP server can temporarily assign. C It is an IP address that cannot be assigned. D It is an IP address that is set aside for a certain device.

B

You decide to install an 802.11a wireless network in your company's main building. Which frequency band is used in this network? A 2.4 GHz B 5 GHz C 900 MHz D 2.9 GHz

B

If a network has the five nines of availability, how much downtime does it experience per year? A 26 mins B 12 mins C 5 mins D 30 mins

C

You have been asked to research the different firewall types and make recommendations on which type(s) to implement on your company's network. You need to document how the firewalls affect network performance. Which type of firewall most detrimentally affects network performance? A Stateful firewall B Application-level proxy firewall C Packet-filtering firewall D Circuit-level proxy firewall

B

You have been given a drawing that shows the flow of network communication with symbols to indicate equipment function. Which type of configuration management documentation have you been given? A Network baseline B Wiring schematic C Logical network diagram D Physical network diagram

B

You have been hired as a network administrator for a large corporation. This network includes a large number of switches that must be identically configured. In the past, this information has been configured manually. You want to automatically propagate the VLAN information to all switches on the LAN. What should you use? Each correct answer represents a complete solution. Choose two. 1) Link aggregation 2) STP 3) VTP 4) 802.1q A 1 & 2 B 3 & 4

B

You have changed the IP address scheme for two of your company's networks. In addition, the names of two servers have changed. Which change management documentation should you revise? A Logical network diagram B Physical network diagram C Wiring schematic D Network baseline

B

You have decided to implement 802.1q. What does this standard do? A It forwards traffic based on priorities. B It implements VLAN trunking. C It implements STP. D It implements MAC filtering.

B

You have decided to implement ISAKMP. What is provided by this technology? A A Microsoft protocol that establishes sessions with other computers B A protocol that works with IPSec to establish a secure session C A Citrix protocol used in application server environments D A protocol that encapsulates PPP within Ethernet frames

B

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war-driving methods. You need to protect against this type of attack. What should you do? Each correct answer represents a complete solution. Choose all that apply. 1) Configure the WEP protocol to use a 128-bit key. 2) Configure the network to use authenticated access only. 3) Disable SSID broadcast. 4) Change the default SSID. A 1,2,4 B 2,3,4

B

You have installed a new MAU on your Token Ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate? A The Transport layer B The Physical layer C The Data Link layer D The Network layer

B

You have recently been hired as a network administrator. After starting your new job, you discover that the network devices are not being monitored on a regular basis. You need to deploy a technology or protocol that will provide this service. Which protocol or technology should you deploy? A SMTP B SNMP C DNS D DHCP

B

You have recently been hired as a network administrator. Soon after starting at the new company, you realize that not all appropriate network documentations has been created. Specifically, you need to set for the network rules, including the who, what, and when of the rules. Which configuration management documentation should you create? A Baselines B Policies C Regulations D Procedures

B

You have several switches and routers on your company's network. The switches are not experiencing any problems. However, one of the routers is not correctly routing packets based on IP addresses. At which layer of the OSI model does the problem device operate? A Transport B Network C Session D Physical E Data Link

B

You have two wireless networks in your building. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do? A Change the two wireless networks to WPA2. B Periodically complete a site survey. C Disable SSID broadcast for the two wireless networks. D Change the two wireless networks to WEP.

B

You install a network analyzer to capture your network's traffic as part of your company's security policy. Later, you examine the captured packets and discover that the only packets that were captured are from Subnet 1. You need to capture packets from all four subnets on your network. Two routers are used on your network. What could you do? Each correct answer represents a complete solution. Choose two. 1) Install the network analyzer on all four subnets. 2) Install a port scanner. 3) Install the network analyzer on the firewall. 4) Install the network analyzer on a router. 5) Install a distributed network analyzer. A 2 & 5 B 1 & 5

B

You installed a network in a company executive's home office to allow her to securely access the corporate network and work from home. It has worked properly for three months, but now she says that it is broken. What should you do first to troubleshoot this problem? A Establish a plan of action. B Identify the problem. C Test the theory to determine cause. D Establish a theory of probable cause.

B

You instruct a user to issues the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? Each correct answer represents a complete solution. Choose two. 1) When the no ip directed-broadcast command has been issued in the router interface local to the client, and no IP helper address has been configured on the router between the client and the DHCP server 2) When no IP helper address has been configured on the router between the client and the DHCP server 3) When recent scope changes have been made on the DHCP server 4) When the result of running the ipconfig /all command indicates a 169.254.163.6 address A 1 & 2 B 3 & 4

B

You must send commands to a remote router and you are communicating over an unsecure channel. What protocol should you use? A HTTP B SSH C Telnet D FTP

B

You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port. Which switch feature should you use? A PoE B Port mirroring C Trunking D Spanning tree

B

You need to determine the length of a network cable. Which device should you use? A A tone generator B A TDR C A crossover cable D A hardware loopback

B

You need to display the current IP configuration of a Windows 7 computer. Which command should you use? A Tracert B Ipconfig C Winipcfg D Netstat

B

You upgrade the operating system on several servers on your network. Which change management documentation should you revise? Each correct answer represents a complete solution. Choose all that apply. 1) Physical network diagram 2) Network baseline 3) Wiring schematic 4) Logical network diagram A 3 & 4 B 1 & 2

B

You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? Each correct answer represents a complete solution. Choose two. 1) The application will automatically retransmit the packets. 2) The protocol will automatically retransmit the packets. 3) The application will drop the packets. 4) The protocol will drop the packets. A 2 & 3 B 1 & 4

B

Your company has a main office and three branch offices throughout the United States. Management has decided to deploy a cloud solution that will allow all offices to connect to the same single-routed network and thereby connect directly to the cloud. Which of the following is the best solution? A Site-to-site VPN B MPLS VPN C P2P D Client-to-site VPN

B

Your company has decided to implement either a 1000Base-LX or 1000-Base-SX network. Which type of cable should you use? A Coaxial B Fiber optic C UTP D STP

B

Your company has implemented a firewall that only examines the packet header information. Of which type of firewall is this an example? A Application-level proxy firewall B Packet-filtering firewall C Stateful firewall D Kernel proxy firewall

B

Your company is researching different wireless antennas. Antennas that you research are high-gain antennas. Which statement describes a property of high-gain antennas? A High-gain antennas are best suited for point-to-multipoint bridging. B High-gain antennas provide a small vertical beamwidth. C High-gain antennas provide a wide coverage area. D High-gain antennas avoid multipath distortion.

B

Your company owns a single physical server. You need to ensure that Web services are hosted in a Linux environment while Active Directory services are hosted in a Windows environment. In addition, you need to ensure that these services are hosted on different broadcast domains. What should you do? A Implement virtual servers and PBXs. B Implement virtual servers and switches. C Implement virtual desktops and servers. D Implement virtual desktops and switches.

B

Your company uses a single global IP address that maps to the company's local IP addresses. When requests are sent from the internal network to destinations outside the company, those requests are mapped from the IP address of the local host that made the request to the global IP address. Which term describes this process? A Network File System (NFS) B Network Address Translation (NAT) C Network Access Server (NAS) D Network Access Point (NAP)

B

Your company's network experienced some recent performance issues that you resolved with a lot of effort. After resolving the problem, you decide to start monitoring network performance. You have selected the network performance tool that you will use. What must you do first? A Determine where the bottlenecks are. B Capture the baselines. C Examine the logs to determine where to deploy the tool. D Measure the current available bandwidth.

B

Your network contains four segments. You need to connect two or more of the LAN segments together. Which network devices can you use? Each correct answer represents a complete solution. Choose all that apply. 1) Repeater 2) Bridge 3) Switch 4) Router 5) Hub 6) Wireless Access Point A 1,3,5,6 B 2,3,4,6

B

Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is authenticated? A AS B TGT C TGS D KDC

B

ou have been hired as a network consultant by a company. You discover that the network's signal strength greatly weakens as traffic travels over the network medium due to absorption and scattering. What is the term for this tendency? A Intermodulation distortion B Attenuation C EMI D Refraction E Harmonic distortion

B

How many WAN links are required to create a full mesh of connections between five remote sites? A 20 B 5 C 10 D 15 Hint: Remember, the formula for the number of connections required for the full-mesh topology is n(n-1)/2, where n is the number of nodes. So, in this case, 5(5-1)/2 is 10.

C

A consultant recommends that your company implements an appliance firewall. To which type of firewall is this referring? A Embedded B Application C Hardware D Software

C

A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy? A APIPA B NAT C PAT D DHCP

C

A notification that a specific operation failed to complete successfully is classified as what syslog severity level? A Critical (2) B Errors (3) C Warnings (4) D Informational (6)

C

A router has 12 ports. How many broadcast domains does the router have? A 1 B 2 C 12 D none

C

A toner probe is also known as what? A OTDR B Tip and Ring C Fox and Hound D TDR

C

A user is complaining that she cannot log on to the network server. What should you do first to resolve the problem? A Ask the user reporting the problem to reboot her workstation. B Reboot the network server. C Establish whether other users are experiencing the same problem. D Ensure that network server-access limits have not been exceeded.

C

A user notifies you regarding the features that are available with his computer's video card. He says that the video card's manufacturer has several new features for the video card that he is unable to locate or use. He needs access to these features. What should you do? A Check for firmware updates. B Check for operating system updates. C Check for driver updates. D Upgrade the operating system.

C

As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? A Session B Network C Physical D Transport

C

During a recent network breach, a help desk technician identifies the IP address of the computer that is affected. When you ask for the address, he gives you the following binary address: 11000000 10101000 00101100 00011000 What is the IP address? A 192.168.45.24 B 192.168.45.25 C 192.168.44.24 D 192.168.44.25

C

For a branch office network deployment, you have been asked to select network switches for the wiring center in your office building. You need a solution that does not rely on the availability of wall outlets to plug in IP-attached surveillance cameras, IP phones, and wireless access points near the RJ-45 wall jacks where those devices will be attached to the network. Which of the following options within a switch will solve this problem? A Green, energy efficient fanless chassis B QoS Support C PoE D Configuration files for most common devices E Web-based UI for setup and configuration

C

How big is the payload part of an ATM cell? A 64 bytes B 5 bytes C 48 bytes D 53 bytes

C

How can the following IPv6 address be condensed? 2009:0123:4040:0000:0000:000:000A:100B A 2009::123:404:A:100B B 2009:0123:4040::0::000A:100B C 2009:123:4040::A:100B D 2009::123:404:A:1B

C

If a routing table contained multiple routes for the same destination, which were inserted by the following methods, which route will the router use to reach the destination network? A The route inserted by OSPF. B The route inserted by BGP. C The route configured as a static route. D The route inserted by RIP.

C

In the context of physical security, which statement related to security guard personnel is most appropriate? A Security guard personnel are a cost effective countermeasure to reduce physical security risk. B Security guard personnel are one of the administrative controls in a layered security architecture. C Security guard personnel are the most expensive countermeasure for reducing the physical security risk. D Security guard personnel act as the last line of defense in securing the facility infrastructure.

C

Management has decided to implement a small private network for guests. The network will consist of Windows 7 computers that will only be able to access the other computers on the private network. You recommend that the small private network use APIPA addresses. Which of the following is a valid APIPA address? A 172.16.4.36 B 192.168.16.45 C 169.254.2.120 D 10.1.1.131

C

One error occurred during the transmission of 8 bits. What is the BER? A .0125 B .25 C .125 D .025

C

Recently, you have noticed that segments of data are arriving at their destination with errors. You need to examine the appropriate OSI layer for the reliable delivery of segments without error. Which OSI layer is responsible for this? A Data Link B Application C Transport D Network

C

The network diagram is shown in the following image: IMAGE The workstations on the network cannot connect to the Internet. You can ping the router from the Internet. The workstations and server can connect to each other. Where is the problem most likely to exist? A Between the router and the Internet B Between the server and the network C Between the router and the server D Between the server and the workstations

C

To what subnet does a host with an IP address of 172.16.155.10/18 belong? A 172.16.0.0/18 B 172.16.96.0/18 C 172.16.128.0/18 D 172.16.154.0/18

C

Users are reporting Internet connectivity issues. After researching, you discover that the routing protocols in use on your network are experiencing routing loops. You must prevent this from happening. What should you do? A Reconfigure your routers so that only a single routing protocol is used throughout the network. B Test all of the routing interfaces to determine which is experiencing problems. C Implement split horizon. D Replace the routers on your network.

C

Users on your network have access to the Internet. As more users access the Internet, bandwidth starts to diminish, causing Web pages to load slowly. After looking at the Web server logs, you have noticed that many of the same Web sites are being accessed by multiple users. What should you do to improve your company's Internet bandwidth? A Implement a WINS server. B Implement a DNS server. C Implement an HTTP proxy server. D Implement an IP proxy server.

C

What attack is also considered to be a social engineering attack? A A backdoor B A logic bomb C An e-mail hoax D A Trojan horse

C

What command produced the following snippet of output? OUTPUT OMITTED... lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 inet6 fd4e:f9d5:c34e:acd1:5a5:caff:fefa:1551 prefixlen 128 gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 ether 58:55:ca:fa:15:51 inet6 fe80::5a5:caff:fefa:1551%en0 prefixlen 64 scopeid 0x4 inet 192.168.1.245 netmask 0xffffff00 broadcast 192.168.1.255 media: autoselect status: active OUTPUT OMITTED... A ipconfig /all B ifconfig /all C ifconfig

C

What is a best practice to prevent you from damaging a circuit board with static from your body? A Ground the circuit board B Stand on a carpeted floor while working on the circuit board C Wear an esd wrist strap D Apply antistatic spray on the circuit board

C

What is a snapshot of performance on a typical usage level for the network? A Incremental report B SLA C Baseline D Differential report

C

What is the binary representation of the decimal number 117? A 01101001 B 10110110 C 01110101 D 10110101

C

What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server? A DHCPOFFER B DHCPACK C DHCPDISCOVER D DHCPREQUEST

C

What is the maximum number of possible nodes for /27 CIDR mask? A 14 B 64 C 30 D 32

C

What is the maximum recommended one-way delay for voice traffic? A 75 ms B 100 ms C 150 ms D 25 ms

C

What is the purpose of a pointer (PTR) DNS record? A It contains an alias for an existing A record. B It contains information regarding a particular DNS zone's start of authority. C It maps an IP address to a hostname. D It maps a hostname to an IPv4 address. E It maps a hostname to an IPv6 address. F It maps a domain name to an e-mail server.

C

What is typically the problem when a host is unable to browse the Internet using domain names? A duplicate IP address B mismatched MTU C incorrect DNS configuration D incorrect default gateway

C

What is typically used to conceal the nature of a social engineering attack? A Excess bandwidth B Encryption C Believable language D Users' good intentions

C

What kind of network is used by many cable companies to service their cable modems and has both fiber-optic and coaxial cabling? A DOCSIS B Composite C HFC D Head-end

C

What mode of NIC redundancy has only one NIC active at a time? A Publisher/subscriber B Active-subscriber C Active-standby D Client-server

C

What protocol is used by the ping command? A IGMP B PIM C ICMP D RTP

C

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)? A Weight B SPF Algorithm C Administrative distance D Metric

C

What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses? A Posture Monitor B Profile scanner C Vulnerability scanner D Honeypot

C

Which PPP authentication method offers one-way authentication and sends credentials in clear text? A WEP B CHAP C PAP D MS-CHAP

C

Which WAN technology offers the highest potential bandwidth? A FDDI B Frame Relay C OC-3 D T3 E E3

C

Which agreement would need to be read carefully and signed by a network administrator (not an end user in the Sales department)? A AUP B Vacation policy C PUA (privileged user agreement) D NDA

C

Which device makes traffic-forwarding decisions based on MAC addresses? A Multiplexer B Switch C Router D Hub

C

Which feature provides varying levels of network bandwidth based on the traffic type? A Load balancing B Traffic shaping C QoS D Fault tolerance

C

Which is not an area typically targeted by a data loss prevention policy? A Client level B Network level C Cloud level D Storage level

C

Which media-access method does the 802.11 standard specify for wireless networks? A Token-passing B CSMA/CD C CSMA/CA D Demand priority

C

Which of the following is a VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls? A MX B IMAP C SIP D RJ-45

C

Which of the following is a connectionless transport layer protocol? A IP B TCP C UDP D H.323

C

Which of the following is a continually changing document that dictates a set of guidelines for network use? A syslog report B post mortem report C security policy D QoS

C

Which of the following mechanisms is considered a link-efficiency tool in QoS? A WRED B traffic shaping C LFI D CBWFQ

C

Which of the following provides the media (wired or wireless) to facilitate the transfer of data? A Router B Server C LAN D Client

C

Which of the following systems would be best isolated on a separate network segment? A RADIUS B VoIP C Legacy systems D Kerberos

C

Which of these would a hospital group use to connect its various neighborhood offices to the main facility when all are located within the same city or region? A WLAN B LAN C MAN D WAN

C

Which option allows you to define which protocols are allowed to traverse the router, whether the traffic is inbound or outbound? A Packet switching B Distributed switching C Access control lists D Software-defined networking

C

Which option is a method of providing physical security for a network? A The use of passwords B The use of public keys C The use of security badges D The use of message digests

C

Which protocol is not capable of preventing a man-in-the-middle attack? A HTTPS B SSH C RSH D IPSec

C

Which protocol supports a secure connection to a remote host via terminal emulation software? A SFTP B FTP C SSH D Telnet

C

Which statement is true of a network-based intrusion detection system (NIDS)? A A NIDS does not analyze real-time information. B A NIDS generates a finite number of alarms. C A NIDS cannot detect an intruder who is logged on to a host computer. D A NIDS is active while gathering data over the network.

C

Which technology provides centralized remote user authentication, authorization, and accounting? A DMZ B VPN C RADIUS D Single sign-on

C

Which type of cable might be required for installation in a drop ceiling, which is used as an open-air return duct? A Twin-axial B Riser C Plenum D Multimode

C

Windowing is provided at what layer of the OSI reference model? A DLL B Network C Transport D Physical

C

You administer a 100BaseTX Ethernet network that is configured to use the TCP/IP network communications protocol. You have installed a firewall between the network and the Internet. Currently ports 80, 20, and 21 are open on the firewall. You want to allow only SMTP and POP3 communications between the network and the Internet. Which configurations should you make on the firewall? A Close ports 20 and 21, and open port 25. B Close port 80 only. C Close ports 20, 21, and 80, and open ports 25 and 110. D Close ports 21 and 80, and open port 110.

C

You administer a LAN that uses TCP/IP as its network communications protocol. You want to view the number of UDP packets that will be sent to SERVER_1 from CLIENT_A. Which tool should you use to view this information? A Monitor.nlm B A hardware loopback C A protocol analyzer D Performance Monitor

C

You administer a TCP/IP network that is not subnetted. One of the network hosts has the following IP address: 130.250.0.10 What is the network ID of the network you administer? A 130.250.255.255 B 255.255.255.255 C 130.250.0.0 D 128.0.0.0

C

You administer a TCP/IP network. You want to enable the hosts on your network to be automatically configured with IP configurations, such as IP address, subnet mask, and default gateway address. The IP configurations should be leased to the clients for a limited time. Which protocol should you use to accomplish this task? A IPP B SMTP C DHCP D BOOTP E HTTP

C

You administer a network for your company. You determine that there is a network connectivity problem on one of the computers on the network. You re-create the problem and determine that the problem is located in the NIC. You establish a theory of probable cause. Which step should you take next to troubleshoot the problem? A Implement a correction plan. B Form a correction plan. C Test the theory. D Provide feedback to the users of the computer.

C

You need to configure IPSec to digitally sign and encapsulate each packet within another packet. Which of the following should you implement? A ESP protocol in transport mode B ESP protocol in tunnel mode C AH protocol in tunnel mode D AH protocol in transport mode

C

You administer a small 100BaseTX Fast Ethernet network for your company. Users report that the network is responding very slowly to user requests, and you conclude that the NIC in the John1 computer is causing a broadcast storm. What would lead you to this conclusion? A The traffic link light on the hub port that is connected to the NIC in John1 is constantly off. B The power light on the NIC in John1 is constantly off. C The traffic link light on the NIC in John1 is constantly on. D A protocol analyzer indicates that John1 is occasionally transmitting data packets.

C

You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer physically to the RJ-45 jack in the wall. What tool should you use to splice the end of the cable to an RJ-45 connector? A Optical tester B Time domain reflectometer C Wire crimper D Pliers

C

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security to protect against wireless attack. However, you must provide support for older wireless clients. Which protocol should you choose? A WEP B WPA2 C WPA D WAP

C

You are setting up a 10-Mbps SOHO network at a residence. What is the lowest category or level of UTP cable that you should use as transmission medium for a small LAN communicating in the 10-Mbps range? A Category 2 B Category 1 C Category 3 D Category 5 E Category 4

C

You are setting up your company's VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which of the following possibilities do you want to eliminate first? A H.323 protocol support has not been selected. B Check to make sure system updates have been applied. C The call terminates on an analog endpoint. D Echo cancellation has been misconfigured or has not been applied. E Compression mode setting differs between caller and receiver devices.

C

You are troubleshooting a computer that has the IP address of 196.22.14.42. To which network class does the IP belong? A Class D B Class E C Class C D Class A E Class B

C

You are troubleshooting a connectivity problem on an Ethernet network that contains both NetWare and Windows servers. A Windows 7 client cannot connect to the Internet or any network resources. However, other computers on the same subnet as the client can access network resources and the Internet. You issue the ipconfig command at the workstation and find that the IP address is 169.254.184.25 and the subnet mask is 255.255.0.0. This IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. What is the most likely problem? A The client obtained the IP address from a Windows server. B The client obtained the IP address from a DHCP server it found on the Internet. C The client selected the IP address using APIPA. D The client obtained the IP address from a NetWare server.

C

You are troubleshooting a network problem in which users cannot connect to the Internet. The network diagram is as shown. Figure 1 The activity lights on the hubs' ports connected to the router and the lights on the router's ports connected to the hubs are not lit. All other lights on both devices are lit. Which component is most likely to have failed? A Hub B NIC C Router D Modem

C

You company want to allow remote users to access their Windows network remotely if their network is not connected to the Internet. Which of the following should you implement? A PPTP B SSL C RAS D DHCP

C

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue? A Enable channel bonding. B Install another wireless access point that uses the same non-overlapping channel and a different SSID. C Install another wireless access point that uses a different non-overlapping channel and the same SSID. D Disable channel bonding.

C

You have been asked to implement a Voice over Internet Protocol (VoIP) on your company's network. Which protocol should you use? A TLS B ARP C SIP D SSH

C

You have been handed a document that details the steps to take to update the network drivers. Which type of change management document do you have? A Policies B Baselines C Procedures D Regulations

C

You have been hired as a consultant for the medium-sized business. As part of your duties, you need to make recommendations on changes to the network. You decide that you want to install agents on the network devices to monitor network traffic and record the behavior of network components. You will then use the statistical data gathered to make your recommendations. Which standard should you deploy? A SMTP B X.25 C SNMP D Token Ring

C

You have been hired as a network security consultant. The company that hires you has had multiple incidents where their wireless network has been breached by hackers. You find out that they have a RADIUS authentication server that they use for the corporate VPN. You decide to recommend using RADIUS authentication for the wireless network. Which WPA version should you suggest? A WPA2 B WPA-PSK C WPA-Enterprise D WPA

C

You have been hired as a new network administrator for your company. In your first week, you discover a device that uses a security policy to filter and examine packets coming into a network to determine whether to forward the packet to its destination. This device is not depicted on the company's network layout diagram. Which device is this? A Switch B Hub C Firewall D Router

C

You have recently been hired by a small company to assess its network security. You need to determine which TCP/IP ports are open on the network. Which tool should you use? A A wardialer B Whois C A port scanner D A packet analyzer

C

You must decide the type of identification and authentication that will be used on a new company's network. You must obtain approval on the authentication type from management. What is the most common form of identification and authentication? A Smart cards B Biometrics C User identification with reusable password D Two-factor authentication

C

You need to check an IP connection end-to-end at the Network layer. Which tool should you use? A Trace B Show C Ping D Telnet

C

You need to implement a wireless network for a client. You have two 802.11a, two 802.11b, and two 802.11g wireless access points. You need to implement three wireless networks that can communicate with each other. Which wireless access points should you use? A The 802.11a and 802.11g wireless access points B The 802.11a and 802.11b wireless access points C The 802.11b and 802.11g wireless access points D You can use all of them together.

C

You need to implement a wireless network to provide users in an outdoor sitting area with Internet connections. Which signal-absorbing obstructions should be noted when performing a WLAN site survey? A Microwave ovens B Local telephone lines C Trees D Plastic material

C

You need to provide terminal emulation and remote login capability for one of the servers on your network. Which Process/Application layer protocol should you use? A SMTP B Tracert C Telnet D FTP E TFTP

C

You notice that several ping requests have been issued on your network in the past couple of hours. Which protocol responds to these requests? A TCP B RARP C ICMP D ARP

C

You notice that the new cabling that was purchased is rated as "plenum". What does this indicate about the cable? A It is not Layer 2 protocol-dependent. B It cannot be tapped without detection. C It will not produce toxic gas when it burns. D It is rated for speeds of 1000 Mbps.

C

You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this? A Physical device addressing B Distance vector addressing C Logical network addressing D Link-state addressing

C

You use a computer on a TCP/IP network to transfer data through well-known TCP port 80. Which protocol is most likely being used to transfer data? A POP3 B FTP C HTTP D SMTP

C

You want to enable port authentication on your network switches. On which setting is port authentication based? A Protocol B IP address C MAC address D Port number

C

You will have a very small wiring closet for your routers. While the company will use fiber-optic cabling, you would like to use the smallest form connector to conserve space. The connector you plan to use should be roughly half the size of the other connectors. Which fiber-optic connector should you use? A ST B SC C LC D BNC

C

Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company's users must be able to connect to the partner's network quickly and reliably. Support for voice, data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible while providing enough bandwidth for your company's employees. What should you implement? A FDDI B ISDN C T1 D ATM

C

Your company decides to implement a WLAN for usage by visitors. Management has requested that you implement a WLAN that supports a maximum of 11 Mbps data rate. Which WLAN technology supports this data transmission rate? A 802.11g B 802.11e C 802.11b D 802.11a

C

Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must to communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network? A IP-ISDN adapter B IP-PBX adapter gateway C VoIP-PSTN gateway D PBX system E Internet modem

C

Your company operates a fleet of panel trucks, each with a built-in cellular base station for voice and data communications. You are required to upgrade the wireless equipment used in 18 vehicles. You do not want to install obsolete equipment. Which of the following cellular technologies is most likely to be obsolete? A EDGE B CDMA C TDMA D LTE E GSM

C

Your company periodically exchanges confidential information with a third party via a single server at each company. Management has recently become concerned that communications between the two servers have been intercepted and read. You have been asked to ensure that messages between the two authenticated computers are encrypted to prevent attackers from reading the messages. Which protocol should you use? A TFTP B UDP C TLS D DNS

C

Your network is experiencing a problem that a technician suspects is concerning a Cisco router. The technician provides you the following command results: 1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec Which Cisco command produced the results you were given? A Tracert B Ping C Traceroute D Extended ping

C

Your organization has responded to a security incident. The breach has been contained, and all systems have been recovered. What should you do last as part of the incident response? A Investigation B Triage C Post-mortem review D Analysis

C

Your organization has several VLANs implemented on its network. The VLANs operate across several switches. What do all users on a VLAN have in common? A TCP/IP subnet B Cable segment C Broadcast domain D Collision domain

C

You are the network administrator for a healthcare organization. Recently several federal and state government laws have been enacted which will affect network operations. Which change management documentation should record this information? A Baselines B Policies C Procedures D Regulations

D

A broken copper strand in a circuit is known as which of the following? A Split pair B Short C Impedance D Open

D

A client with an IP address of 172.16.18.5/18 belongs to what network? A 172.16.128.0/18 B 172.16.96.0/18 C 172.16.64.0/18 D 172.16.0.0/18

D

A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network? A WAN B CAN C PAN D MAN

D

A hacker has used a packet sniffer to attack your company's network. What can a hacker accomplish by using this technique? A Initiating a social engineering attack B Spreading a virus on a network C Inserting a Trojan horse on a network server D Collecting data on network traffic

D

A network technician contacts you regarding what he believes is suspicious behavior on the network. He has noticed communication over TCP port 123 between his computer and a server on the Internet. Which protocol is causing this communication? A FTP B SSH C SMTP D NTP

D

A router operating at Layer 3 primarily makes its forwarding decisions based on what address? A Source MAC B Source IP C destination Mac D destination IP

D

A user reports that a legacy system is no longer responding. After researching, a technician reports that the system has been flooded with ICMP packets larger than 65,535 bytes. This is most likely the result of which type of attack? A ARP issues B Backdoor access C Malware D Ping of death

D

An eight-port hub receives a signal through port five. That signal is then sent back out through ports one, two, three, four, six, seven, and eight without any signal regeneration. Which type of hub has been described? A Switching hub B Active hub C Hybrid hub D Passive hub

D

An employee shows you a Web site that publishes the SSIDs and passwords for private wireless networks in your area. The information on your company's wireless network is included. Of which type of attack is this an example? A Evil twin B WPA cracking C WEP cracking D War chalking

D

Consider the following output: C:\> arp -a Interface: 172.16.202.128 --- 0xb Internet Address Physical Address Type 172.16.202.2 00-50-56-fd-65-2c dynamic 172.16.202.255 ff-ff-ff-ff-ff-ff static 224.0.0.22 01-00-5e-00-00-16 static 224.0.0.252 01-00-5e-00-00-fc static 255.255.255.255 ff-ff-ff-ff-ff-ff static What is the MAC address corresponding to the IP address of 172.16.202.2? A XXXX0016 B XXXX00FC C XXXXFFFF D XXXX652C

D

During a recent troubleshooting incident, you discovered a problem with some network transmission media. The communication over the media was distorted. Which issue most likely caused this problem? A Attenuation B Crosstalk C ESD D EMI

D

IMAGE Which transmission medium is shown in the image? A UTP B STP C Fiber-optic D Coaxial

D

Identify the Simple Network Management Protocol (SNMP) component that defines the structure of SNMP management objects A SNMP agent B SNMP manager C SNMP trap D MIB Explanation Information about a managed device's resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device's Management Information Base (MIB).

D

Identify the congestion-avoidance mechanism from the following list of QoS tools. A RSVP B LLQ C cRTP D RED

D

If your IPv6 host uses IPv6 Stateless Address Autoconfiguration, how does it install a default IPv6 route? A Broadcasting B Dual stack C Tunneling D Router advertisement

D

In PKI, what is the entity that signs a certificate? A A subject B A verifier C A principal D An issuer

D

In a topology running STP, every network segment has a single ______________ port, which is the port on that segment that is closest to the root bridge in terms of cost. A Non-designated B Non-root C Root D Designated

D

In cable modem technologies, the frequencies dedicated to data transmission are specified by what? A Modem B DSLAM C CSU/DSU D DOCSIS

D

Management at your company has recently become very concerned with interference or signal capture via the network cabling. You must advise them on which type of network media is the least susceptible to interference or signal capture. Which type provides this? A Coaxial B Shielded twisted-pair C Unshielded twisted-pair D Fiber-optic

D

Management has stipulated that you must use unshielded twisted-pair (UTP) category consists of four twisted pairs of copper wire that is certified for transmission rates of up to 100 Mbps for the new guest network you are setting up. Which cabling category should you use? A Category 2 B Category 3 C Category 4 D Category 5 E Category 1

D

Technicians have recently reported to you that the type of lighting in your company's building can affect the network communication. Which of the following statements is true? A Incandescent bulbs emit high frequency electromagnetic waves that can resonate with 100 Mbps transmissions, causing them to amplify beyond the capacity of the media. B The outer jacket of UTP and STP cable deteriorates when exposed to some types of fluorescent lighting. C Halogen lights emit a full spectrum of light that can interfere with fiber-optic transmissions. D Fluorescent lighting fixtures emit high levels of EMI.

D

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following image: IMAGE Which command should you run from Server B to determine whether the default gateway address is properly configured? A Ipconfig 129.68.0.1 B Ipconfig ServerB C Ipconfig /renew D Ipconfig /all

D

The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (CAT 5 UTP) cable. You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem? A replacing the 15-meter patch cable with a 10-meter patch cable B replacing the CAT 5 UTP with CAT 3 UTP C replacing the CAT 5 UTP with CAT 1 UTP D replacing the 15-meter patch cable with a 3-meter patch cable

D

To improve security, you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change, users report that they cannot access any Web sites hosted on Web1 by using their fully qualified domain names (FQDNs). However, they can access other Web sites that are hosted on other Web servers by using their FQDNs. What is causing this problem? A The local area network (LAN) is down. B HTTPS is not a supported protocol. C The DNS server is down. D The new Web address starts with https instead of http.

D

WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN? A Enterprise mode B BSS C Personal mode D IBSS

D

What Microsoft Windows application enables you to view a variety of log types, including application, security, and system logs? A Performance Monitor B MMC C Control Panel D Event Viewer

D

What NAT variation automatically assigns an inside global address from a pool of available addresses? A PAT B GNAT C SNAT D DNAT

D

What class of address is used for experimental purposes? A C B D C M D E

D

What feature allows a firewall to permit traffic to flow from a trusted network (for example, a corporate intranet) to an untrusted network (for example, the Internet) and then allow return traffic for that session, while blocking sessions initiated on the untrusted network? A packet filtering B implicit deny all instruction C demilitarized zone D stateful inspection

D

What is often the last stage of a system life cycle used in the network? A Phase-out B Development C Support D Disposal

D

What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged? A Default VLAN B Management VLAN C VLAN 0 D Native VLAN

D

What network type would help facilitate communications when large video or audio files need to be housed and transferred through the network? A WLAN B CAN C PAN D SAN

D

What performance optimization technology uses a network appliance, which can receive a copy of content stored elsewhere (for example, a video presentation located on a server at a corporate headquarters), and serves that content to local clients, thus reducing the bandwidth burden on an IP WAN? A Load balancer B LACP C Carp D Content Engine

D

What piece of test equipment enables you to locate a break in a fiber-optic cable? A TDR B Cable certifier C Crimper D OTDR

D

What should you follow closely when installing new network equipment? A Certified training courses B YouTube videos C IETF guidelines D The installation and maintenance guides

D

What technology do WLANs use to decide when they gain access to the wireless media? A SPF B DUAL C RSTP D CSMA/MA

D

What type of antenna, used in wireless APs and wireless routers in SOHO locations, radiates equal power in all directions? A Parabolic B Yagi C Unidirectional D Omnidirectional

D

What type of wireless topology features the use of access points to facilitate network communications? A Mesh B Ad hoc C Ring D Infrastructure

D

When extending the range for a 2.4GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap should you recommend for these adjacent cells? A 5-10% B 20-25% C 15-20% D 10-15%

D

Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses the 2.4GHz band? A 802.11n B 802.11a C 802.11b D 802.11g

D

Which RADIUS implementation was created to deal with Voice over IP (VoIP) and wireless services? A TACACS B XTACACS C TACACS+ D Diameter

D

Which attack involves impersonating the identity of another host to gain access to privileged resources that are typically restricted? A Teardrop B SYN flood C Spamming D Spoofing

D

Which component of a computer use policy should state that the data stored on a company computer is not guaranteed to remain confidential? A Acceptable use B Information ownership C Computer ownership D No expectation of privacy

D

Which condition might indicate that a network is undergoing a DoS attack? A A significant decrease in network traffic B A slight decrease in network traffic C A slight increase in network traffic D A significant increase in network traffic

D

Which hacker attack can be perpetrated by hijacking a communications session between a Web browser and a Web server? A SYN Attack B Ping of Death C Brute force D MITM

D

Which layer of the OSI reference model contains the MAC and LLC sublayers? A Physical layer B Transport layer C Network layer D Data link layer

D

Which of the following QoS mechanisms is considered an IntServ mechanism? A RED B cRTP C LLQ D RSVP

D

Which of the following can be manipulated to reduce network traffic? A MAC reservations B Lower TTL C NTP D Increased lease time

D

Which of the following is a security implication if your company uses a public cloud deployment? A Security issues are the sole responsibility of the company's personnel. B The local ISP and power grid can impact the availability of resources stored on the cloud. C Surges in demand require that company resources will need to be adjusted accordingly. D Other tenants can gain physical access to the resources that store your company's data.

D

Which of the following is a symmetric encryption algorithm available in 128-bit, 192-bit, and 256-bit key versions? A TKIP B RSA C 3DES D AES

D

Which of the following is an IPSec protocol that provides authentication and integrity services but does not support encryption? A ESP B IKE phase I C IKE phase III D AH (Authentication Header)

D

Which of the following is an advantage of a peer-to-peer network, as compared with a client/server network? A Better performance B Simplified administration C More scalable D Less expensive

D

Which of the following remote access security technologies performs authentication through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client, where the three-way handshake allows a client to be authenticated without sending credential information across a network? A Kerberos B RADIUS C TACACS+ D CHAP Hint Challenge-Handshake Authentication Protocol (CHAP) performs a one-way authentication for a remote access connection. However, authentication is performed through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client. The three-way handshake allows a client to be authenticated without sending credential information across a network.

D

Which of the following routing protocols is an EGP? A IS-IS B RIP C OSPF D BGP

D

Which of the following topologies offers the highest level of redundancy? A Hub and spoke B Bus C Partial mesh D Full mesh

D

Which of these has helped reduce wiring, weight, and cost in industrial applications? A SAN B PAN C MAN D CAN

D

Which open standard creates a redundancy group to share an IP address? A NAT B LACP C HSRP D CARP

D

Which social engineering attack is typically considered the most dangerous? A Trojan horse B Social engineering C Dumpster diving D Physical penetration

D

Which system or device detects network intrusion attempts and controls access to the network for the intruders? A Firewall B IDS C VPN D IPS

D

Which technology allows using label switching for routing frames? A Circuit-switching B Packet-switching C Point-to-multipoint D MPLS

D

Which technology is widely used in home automation, such as smart lights, locks, and thermostats? A Ant+ B Bluetooth C NFC D Z-Wave

D

Which unsecure protocol do Web browsers use to access documents on the World Wide Web? A IP B ARP C FTP D HTTP

D

While designing an IPv6 addressing scheme for your network, you decide to use EUI for the host portion of each node's address. You need to derive a 64-bit EUI address for the hosts on your network as part of the overall IPv6 address for each node. What should you do? A Use the host's MAC address with all 1s (FFFF) inserted in the middle. B Use the host's MAC address preceded by 16 zero bits at the beginning. C Use the host's MAC address, and repeat the first two bytes of that address at the end. D Use the host's MAC address with FFFE inserted in the middle, and invert the seventh most significant bit in the MAC address. E Use the host's MAC address with FFFE inserted in the middle.

D

You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do? A Reinstall the network adapter. B Replace the network adapter. C Re-route the network cable. D Replace the network cable.

D

You are a system administrator. A user calls you complaining that every time she tries to log on to the network, she gets an error message. Other users are not having any problems. Which question is best to ask first when attempting to troubleshoot the problem? A How much memory is installed in your computer? B What is your username and password? C Have you rebooted your computer? D Which error message do you receive?

D

You are deploying a virtual private network (VPN) for remote users. You want to meet the following goals: The VPN gateway should require the use of Internet Protocol Security (IPSec). All remote users must use IPSec to connect to the VPN gateway. No internal hosts should use IPSec. Which IPSec mode should you use? A This configuration is not possible. B Gateway-to-gateway C Host-to-host D Host-to-gateway

D

You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the network? A 1000BaseSX B 100BaseFX C 10BaseT D 1000BaseCX

D

You are implementing an 802.11g wireless network in your office. What is the maximum number of wireless access points that you can implement within 30 meters of each other? A Two B Four C Five D Three

D

You are implementing several switches on your network. The network contains client computers that run both Internet Protocol (IP) and Internetwork Packet Exchange (IPX). To increase network efficiency, you need to configure the switches so that the two different types of traffic are isolated. Which type of virtual local area network (VLAN) should you implement? A Frame-tagging VLAN B Subnet-based VLAN C Port-based VLAN D Protocol-based VLAN

D

You are installing a known good NIC in a computer, and a spark jumps from your hand to the NIC. You install the NIC and discover that the NIC no longer operates correctly. What has most likely caused the NIC to malfunction? A EMI B A power sag C RFI D ESD

D

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped. Which command should you use to accomplish this task in the most efficient manner? A Tracert B Extended ping C Ping D Traceroute

D

You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next? A Replace all the patch cables. B Document the problem and the solution. C Have other users reboot their workstations. D Connect to the network and try to transfer a file.

D

You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are shown below: Adapter address: 00-10-4B-DE-F5-D8IP address: 192.168.1.40Subnet mask: 255.255.255.0Default gateway: 0.0.0.0You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem? A Incorrect IP address B Incorrect subnet mask C Invalid Ethernet adapter D Missing default gateway

D

You have a subnet that contains a computer with the IP address 172.16.5.2/23. You need to send a message to every computer on the network where that computer resides. Which subnet is that IP address a member of, and what is the broadcast address for that subnet? A subnet: 172.16.0.0, broadcast: 172.16.7.255 B subnet: 172.16.2.0, broadcast: 172.16.5.255 C subnet: 172.16.5.0, broadcast: 172.16.5.255 D subnet: 172.16.4.0, broadcast: 172.16.5.255

D

You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with a SONET network. Which of the following should you implement? A 10GBaseLR B 10GBaseLX4 C 10GBaseSR D 10GBaseSW

D

You have been hired as a network technician. As part of your technician's kit, you have been issued a basic digital multimeter with no extra probes. What is the primary function of this device? A Connects RJ-45 jacks to an Ethernet cable B Measures the light signal energy C Measures the temperature of a chip on motherboard D Tests voltage

D

You have decided to implement a network protocol analyzer on your company's network. Which job is not performed by this tool? A Provide network activity statistics B Identify source and destination of communication C Identify the types of traffic on the network D Detect active viruses or malware on the network

D

You have decided to implement frame tagging in a port-based switching network. What does this technique ensure? A That the VLANs are implemented based on protocol B That the VLANs are implemented based on subnet C That the VLANs are implemented based on port D That a single VLAN can be distributed across multiple switches

D

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network? A Switching loops B Broadcast storms C Improper termination D Collisions

D

You have recently added a new Windows 8 computer to your IPv6 network. Because your network is small, you currently use static IP addressing. You record the IPv6 address of the new Windows 8 computer. What is the shortest possible notation of it IPv6 address as shown below? 2001:0DB8:0000:0001:0000:0000:0000:F00D A 2001:0DB8:0:1::F00D B 2001:DB8:0:1:0:0:0:F00D C 2001:DB8::1::F00D D 2001:DB8:0:1::F00D

D

You have recently been hired by a company as its network administrator. Currently, all service packs and security updates are deployed directly to the computers and applications that need them. Last month, this resulted in a server outage of four hours because of a bug in a security update. Management wants to prevent issues with any future updates. You need to recommend a solution to this problem. What recommendation should you make? A Deploy the updates from a central server. B Deploy system restore on all computers. C Deploy a guest network. D Deploy a test lab.

D

You have recently implemented DNS on a small company network. However, you discover that the internal DNS server is having trouble communicating with external DNS servers. Which well-known UDP port does this protocol use? A 80 B 110 C 161 D 53

D

You must propose a cabling scheme for your company's new location. Several departments are located on the same floor with a maximum distance of 61 meters (200 feet) between departments. You want a relatively easy, low-cost installation with simple connections. Which type of cabling would you propose? A ThinNet B ThickNet C Fiber-optic D Twisted-pair

D

You need to collect management information on the routers and switches used on your company's network. You decide to use SNMP. What is the name of the software component that runs on a managed device when you deploy this technology? A NMS B MIB C SNMP manager D SNMP agent

D

You need to connect wireless devices to a wired local area network. Which device should you implement? A Gateway B CSU/DSU C Wireless NIC D Access Point

D

You need to create a cable that will allow you to get a link light on your network interface card (NIC) when the NIC is not plugged into a hub or switch. Which type of cable should you use? A Crossover cable B Straight-through cable C Rollover cable D Loopback cable

D

You need to ensure that the Web server always receives the same IP address from the DHCP server. What should you do? A Create a scope option. B Create a DHCP exclusion. C Create a DHCP scope. D Create a DHCP reservation.

D

You need to implement a data center for your company. In this data center, you plan to implement inter-rack connections that are limited to 25 meters (82 feet). Which Ethernet standard should you implement? A 100Base-T4 B 100Base-FX C 1000Base-TX D 1000Base-CX

D

You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use? A Tracert B Ping C Nbtstat D Netstat

D

You want to determine the route a packet takes to reach a remote system. Which Windows utility should you use? A Ipconfig B Netstat C Telnet D Tracert

D

Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use? A /28 B /24 C /26 D /27

D

Your company has decided to implement an acceptable use policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy? A Which method administrators should use to back up network data B The sensitivity of company data C Which users require access to certain company data D How users are allowed to employ company hardware

D

Your company has decided to implement unified communication. You have been asked to implement a VoIP network. You need to connect the VoIP network to your company's PBX. What should you implement? A Multicast B Unicast C DSCP D UC gateway E UC server F QoS

D

Your company has recently leased the office next door to the one currently being used. Both offices will be used. The current office has a Cat 6 network installed. The new office has a fiber network installed. You need to connect the networks of the two offices. Which device should you use? A Gateway B CSU/DSU C Modem D Media converter

D

Your company is located in Atlanta, Georgia. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment? A Five B Eight C Eleven D Three

D

Your company needs to deploy a wireless network to allow users to connect to the network using mobile devices. You are concerned that the radio signal will not cover the amount of area you need. Another technician instructs you to research the angle of radiation of the wireless access point's antenna. Which term is used to refer to this? A Bandwidth B Sensitivity C Gain D Beamwidth

D

Your company plans to redesign its network in the coming months. As part of this redesign, a guest network will be set up to allow any guests to have Internet access. This guest network will be a public network that it isolated from your private corporate network. What does this network segmentation provide? A Link aggregation B High availability through redundancy C Improved network performance for internal personnel D Improved security through isolation

D

Your company wants to upgrade its twisted pair (TP) cable network to handle up to 10 GB data rates over the same distances (up to 90 meters) from switches to network nodes. Which TP category type must the company deploy to meet its requirements? A Cat4 B Cat5e C Cat3 D Cat6a E Cat6

D

Your company's networking team wants to deploy 10 Gbps Ethernet (10GbE) over fiber optic cables for its core or backbone network segments. Which of the following types of transceivers are they most likely to plug directly into their switches, routers, and server network adapters? A QSFP B GBIC C CFP D SFP+ E SFP

D

Your company's security policy states that passwords should never be transmitted in plain text. You need to determine if this policy is being followed. Which tool should you use? A Password cracker B Vulnerability scanner C Network mapper D Protocol analyzer

D

Your manager suspects that your network is under attack. You have been asked to provide information regarding traffic flow and statistical information for your network. Which tool should you use? A Port scanner B Penetration test C Vulnerability test D Protocol analyzer

D

Your network contains a DHCP server. While performing routine maintenance, you discover that the DHCP server has the following types of options configured: server options, scope options, reserved client options, and class options. Which of these types of options takes precedence? A Class options B Scope options C Server options D Reserved client options

D

Your network uses a single switch that divides your network into three virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do? A Create a subnet-based VLAN on both switches. B Create a protocol-based VLAN on both switches. C Create a port-based VLAN on both switches. D Implement frame tagging on both switches.

D

Your organization has both UTP and STP cabling available for wiring a new building. What is the main difference in the physical composition of these cables? A Separators between the wire pairs B Number of twists in the wires C Wire gauge D Shielding

D

Your organization has several wireless access points located in the building. Access point usage is based on department membership. Many users report that they are able to see multiple access points. You research this issue and discover that their computers are not connecting to the appropriate access point due to an SSID mismatch. You must ensure that the computers connect to the correct access point if that access point is available. Computers should be able to connect to other access points only if their main access point is down. What should you do? A Reduce the signal strength on the wireless access points. B Configure MAC filtering on the wireless access points. C Ensure that the wireless access points in close proximity use different channels. D Configure the preferred wireless network on the user's computer.

D

ou have been hired as the network administrator. The company's network consists of several subnetworks located in various locations across the southeast United States. You want to deploy switches across the different locations so that you can implement virtual local area networks (VLANs). What is the primary benefit of this implementation? A Users are grouped by their geographical locations. B VLANs provide switchless networking using virtual addresses. C Users in a single geographical location can be micro-segmented. D Users can be grouped by their work functions, by shared applications or protocols, or by department, regardless of their geographical location.

D

One of your branch offices is located on two non-adjacent floors in an office building. You have been given permission to route a communications link between the two floors using existing conduit in the building's elevator shaft. Your current cabling plan calls for TP wiring on each of the two floors, but the distance between them is more than 90 meters. You need to interconnect the two floors using fiber optic cable in the cheapest manner possible. Which of the following should you deploy between the wiring centers on each floor? A Hubs B Switches C Firewalls D Routers E Media converters F Modems

E

Which type of topology is shown? (Every computer connected to another) A Wireless B Ring C Star D Bus E Mesh

E

You administer a network for your company that has three subnets. The network is configured as depicted in the following image: IMAGE You recently installed a computer named Unit1 on the network, and you configured Unit1 with the IP address 200.10.1.2/24. The user on Unit1 reports that he cannot use Domain Name System (DNS) names to contact any computers on the network. The user also reports that he can only contact other computers on the 200.10.1.0/24 subnet; he cannot connect to computers on the 200.10.2.0/24 subnet or the 200.10.3.0/24 subnet. You review the TCP/IP settings on Unit1 and discover that a default gateway address is not configured. You want to configure a default gateway address on Unit1 so that the user can connect to the DNS server and to computers on the other subnets in the network. Which address should you configure as the default gateway address? A 200.10.2.2/24 B 200.10.2.1/24 C 200.10.2.0/24 D 200.10.1.0/24 E 200.10.1.1/24 F 200.10.3.3/24 G 200.10.3.1/24

E

You are asked to acquire address space for a new network that must accommodate at least 12 subnets, each with at least 2,048 nodes. A total of 25,576 IP addresses are needed, but the available address space should leave some room for growth in each subnet, and for the number of subnets to double (or more). The network must also support IPsec to the endpoints for security reasons. Which of the following options provides the best fit while minimizing costs? A Private IPv4 Class A network (10.0.0.0) B Public IPv4 Class B network, purchased on the open market C IPv6 network with a /64 global routing prefix D IPv6 network with a /48 global routing prefix E IPv6 network with a /56 global routing prefix

E

You have been asked to evaluate and choose a wireless access point for your workplace. Your solution will be used in a busy work area with a constant load of 10 or more active users all day long. You decide to implement a MU-MIMO device instead of a MIMO device. Which of the following reasons best states why you should do this? A MU-MIMO is faster and more capable than MIMO. B MU-MIMO supports more users than MIMO. C There is no advantage to choosing MU-MIMO in this situation. D MU-MIMO offers higher bandwidth and better throughput than MIMO. E MU-MIMO permits multiple devices to send/receive wireless data simultaneously, while MIMO does not.

E

Your company wants to use the private Class B network designation of 172.17.0.0/20. You have been asked to divide it up into six subnets. Two subnets should have 512 nodes and four more subnets have 256 nodes already established. While a total of 2,048 IP addresses are needed, the design should leave some room for growth in each subnet. What is the correct way to subnet this network? A Allocate two networks with /24 masks, and the remaining four with /25 masks. B Allocate two networks with /23 masks, and the remaining four with /24 masks. C Allocate two networks with /21 masks, and the remaining four with /22 masks. D Allocate two networks with /20 masks, and the remaining four with /22 masks. E Allocate two networks with /22 masks, and the remaining four with /23 masks.

E


Ensembles d'études connexes

Group Life Insurance (Lesson 13)

View Set

Earth Science CK-12 Chapter 2 *updated

View Set

ATI - Medical-Surgical: Musculoskeletal, Gastrointestinal, Immune and Infectious

View Set