COMBO - Crucial Net+ N10-006
Firewall A firewall will allow you to filter a network or areas of a network based on ports as well as the data inside of each packet.
11) Which devices can block ports and filter data on a network? A) Repeater B) Firewall C) Switch D) Hub
( UPS) Uninterruptible Power Supply During a power outage, an Uninterruptible Power Supply (UPS) will allow the user time to safely save progress and power down the system.
17) A device designed to provide emergency power during an unexpected main power source outage is called: A) UPS B) PoE C) SVC D) PSU
Presentation layer compresses to reduce the number of bits needed to transmit over the network.
4) In the Open Systems Interconnect (OSI) model, data compression takes place at the: A) Session layer B) Presentation layer C) Network layer D) Physical layer
Arp Arp (Address Resolution Protocol) queries a network to find the MAC Address for an IP Address. The Windows command to use ARP is easy, it's just 'arp'!
4) What command will allow you to determine the MAC Address of a local print server? A) Ping B) Nbstat C) Arp D) Dig
Simple Mail Transfer Protocol (SMTP) transfers emails between servers using TCP 25.
8) Which port is used by SMTP? A) 88 B) 143 C) 110 D) 25
WLAN A Wireless Local Area Network (WLAN) is a network connected through WiFi or another radio frequency.
9) A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is commonly referred to as: A) MAN B) WLAN C) LAN D) VLAN
Shielded Twisted Pair (STP) is an Ethernet cable that is wrapped in a Electromagnetic Interference (EMI) resistant jacket. Therefore, the purpose of using STP over UTP is to protect against EMI.
9) What is the purpose of using STP ethernet cables instead of UTP ethernet cables? A) Protects against optical interference B) STP cables are fire resistant C) Protects against EMI D) STP cables allow data to travel farther distances
Bus In a bus topology, all the workstations connect to one backbone. If the backbone fails, the entire network will go down.
5) In which type of network topology do the main network cables become a single point of failure? A) Star B) Full mesh C) Bus D) Partial mesh
RIP (Routing Information Protocol) and OSPF (Open Shortest Path First): are two examples of routing protocols. Routing protocols exchange network routes between routers to form a network map or diagram
5) RIP and OSPF are examples of what? A) Authentication protocols B) Encryption algorithms C) Hashing algorithms D) Routing protocols
Banner grabbing is used by administrators and intruders. They use this technique to check for open/exploitable ports.
5) The practice of connecting to an open port on a remote server to gather more information about the service running on that port is known as: A) Bluejacking B) Banner grabbing C) Session hijacking D) EDiscovery
Network Layer 3, the network layer, is the OSI model layer that uses logical (IP) addressing.
1) Which OSI model layer is used for logical addressing? A) Physical B) Transport C) Data Link D) Network
WPA2 WPA2 (WiFi Protected Access v2) supports the use of AES (Advanced Encryption Standard) for encryption.
14) Which wireless encryption protocol supports the AES cipher? A) WEP B) WPA2 C) TKIP D) 802.3
Ipconfig The ipconfig command will present you with information on all NIC's on a computer or server.
17) You need to confirm the configuration of a NIC, what command should you use? A) Ping B) Msconfig C) Dxdiag D) Ipconfig
(LACP) Link Aggregation Control Protocol Link Aggregation Control Protocol (LACP) will combine multiple physical ports into one logical one. This is used to provide redundancy and minimize downtime.
19) Which of the following solutions enables combining several physical ports into a single logical channel? A) RSTP B) VRRP C) LACP D) HSRP
Nbtstat Nbtstat will query the network for hostnames, while nslookup queries for domain name to IP. Nbtstat is often found only on 64 bit (not 32 bit) Windows Operating Systems.
2) Which command will give you a list of host names connected to the local network? A) Nslookup B) Hostname C) Arp D) Nbtstat
Full duplex transmission is when transmission between two parties can happen in both directions, simultaneously.
20) In full duplex communication, information can pass? A) One way B) Two way, but only one at a time C) Two way, simultaneously D) None of the above
255.255.0.0 The IP begins with 172.16., this means it will be a class B network address. The default subnet mask for a class B 255.255.0.0
20) What would the default subnet mask for the IP 172.16.24.45 be? A) 255.0.0.0 B) 0.0.0.255 C) 255.255.255.0 D) 255.255.0.0
10.1.45.3 In IPv4 addressing the 10.0.0.0 - 10.255.255.255 range is the private IP range for Class A addresses.
20) Which of the following is a Class A private IP address? A) 4.4.4.4 B) 10.1.45.3 C) 192.168.1.1 D) 172.31.45.189
Arp The arp command display and modifies entries in the Address Resolution Protocol (ARP) table, which contains IP and MAC Addresses.
4) When configuring a wireless access point, Alex, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A) Ping B) Dig C) Arp D) Mac-table
TTL Time To Live (TTL) is the lifetime of the data being passed over the network before the information is dropped. This is to prevent an indefinite loop.
7) A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called: A) SPB B) TTL C) MTU D) VTC
NMAP Network Mapper (NMAP) is a security scanner used to discover hosts and services on a computer network.
7) Which of the following network tools is used to identify running services on host devices? A) IDS B) IPS C) NMAP D) Firewall
Port 443 HTTPS uses TCP port 443 and HTTP uses TCP port 80
9) Your company wants to allow only HTTPS traffic to a web server, what port should be allowed? A) 80 B) 8080 C) 443 D) 22
NAT (Network Address Translation) allows a router to translate IPs, both statically and dynamically. This allows an entire private network to share a single or group of public IP's to access the internet.
15) Which of the following can translate IP Addresses, allowing for private IP's to traverse the Internet? A) NAC B) NAT C) DMZ D) IPv6 tunneling
Virtual Private Network (VPN) A Virtual Private Network (VPN) is used to have a secure connection over a public network.
1) A system that uses a public network (Internet) as a means for creating private encrypted connections between remote locations is known as: A) Personal Area Network (PAN) B) Virtual Local Area Network (VLAN) C) Integrated Services Digital Network (ISDN) D) Virtual Private Network (VPN)
Class B begins at 128 and ends with 191.255.255.255. While answer B is class A, then class C, and D respectively.
1) What is the leading octet value range for an IPv4 address belonging to a class B network? A) 128 - 191 B) 1 - 126 C) 192 - 223 D) 224 - 239
FE80::/10 In IPv6, link local addresses belong to the FE80::/10 address block. Link local is the IPv6 equivalent of IPv4's private addressing.
1) Which of the following is the prefix for a link-local IPv6 address? A) 2FFE::/16 B) FEEF:/12 C) FF00::/8 D) FE80::/10
Netstat: Netstat is a Windows command line tool that will show you all current TCP/IP connections. IPCONFIG will show you you're current TCP/IP configuration, not connections.
1) You need to view a Windows PC's open TCP connections, which command would you use? A) Tracert B) Ping C) Ipconfig D) Netstat
Transport The OSI model from 1-7: Physical, Data Link, Network, Transport, Session, Presentation, Application
10) In the OSI model layer 4 is known as: A) Transport B) Phsyical C) Application D) Session
Ifconfig ifconfig can be used to display or modify all network interfances on Linux. Ipconfig is used for Windows systems.
10) What command would you use to display a MAC address if the administrator is using a Linux machine? A) Ifconfig B) Ipconfig /all C) Ipconfig D) Ipconfig -a
802.11a 802.11a uses the 5 GHz frequency range, and is a good alternative when the 2.4 GHz range is unusable.
10) Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise? A) MIMO B) 802.11a C) 802.1q D) 802.3af
Port 69 TFTP (Trivial-File Transfer Protocol) uses default port 69. Do not confuse this with FTP, which uses 20 and 21.
10) Which of these default ports, when disabled, will disallow TFTP traffic? A) 20 B) 21 C) 80 D) 69
Fiber-optic is least affected by EMI because it uses light to transmit data, meaning it is actually not affected by EMI at all.
10) Which type of cabling is least affected by EMI? A) Fiber-optic B) Coaxial C) UTP D) STP
An Evil Twin is a wireless access point that is designed to mimic another Access Point's (AP) configuration in order to trick users into connecting to the incorrect network.
11) A malicious AP that appears as a legitimate wireless access point, is known as what? A) Evil Twin B) War driving C) Phishing point D) MITM
Honeypot Honeypot is a part of the infrastructure heavily monitored to attract hackers and learn about the exploits used on the network.
11) A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as: A) Honeynet B) Rogue access point C) Honeypot D) Flood guard
When two channels overlap, this degrades the signal and causes interference. The Federal Communications Commission (FCC) is in charge of regulating all communication frequencies.
11) A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is called: A) Cross-talk B) Channel overlapping C) Collision D) Channel bonding
Switch A switch operates at level 2 of the OSI model, and forwards network traffic based of MAC Addresses.
11) Which of the following operates at OSI layer 2 to forward traffic based on the MAC address? A) Router B) Switch C) VPN Concentrator D) Hub
True These are applications hosted over the internet so the user does not have to download them. An example is Google Apps, where you can access something similar to Microsoft Word or Excel, without having to download anything.
12) A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as Software as a Service (SaaS). A) True B) False
A DMZ (Demilitarized Zone) is a physical or logical area of a network, that is facing an untrusted network, generally the internet. It is normally used for servers that need to be accessable from outside a network.
12) A subnet placed outside of a firewall, that is very lightly protected is known as what? A) VPN B) Subnet zero C) VLAN D) DMZ
Db loss Db (Decibel) levels will decrease, causing errors and loss of data. For CAT cables, the standard maximum is 100 meters, anything beyond that will be unreliable.
12) If a CAT5 cable is longer than the standard maximum length, which problem is most likely to be an issue? A) Split cable B) Increase of EMI C) Db loss D) Packet collisions will increase
Tracert Tracert (traceroute) is a diagnostic tool that will display the route and measure transmit times between network devices.
12) Which of the following could be used to estimate Round-Trip Time (RTT) across a router? A) Tracert B) Dig C) Uptime D) Arp
Tracert and traceroute6 (a Linux trace route using Ipv6) are both good answers, but are not the best. Pathping is essentially tracert/traceroute but with the ping command sent each time between hops. Pathping has an advantage when troubleshooting latency on a network because it is longer and provides more information regarding network latency. Traceroute is best for simply identifying hops between two devices.
12) Your supervisor has asked you to try and identify the network device causing increased latency between a client's PC and a server located in a different physical location but on the same enterprise network. Which tool is best suited for identifying the problematic device? A) Tracert B) Traceroute6 C) Nbtstat D) Pathping
Worm Worm is a self replicating malicious code. Trojan requires a trigger to execute, while spam is typically just a nuisance and spyware records your information.
13) A standalone malicious computer program that replicates itself over a computer network is known as: A) Spyware B) Worm C) Trojan D) Spam
PoE Power over Ethernet (PoE) is a technology that passes electrical power along with data on an Ethernet cable, thus providing power to the distant network device.
13) Lin, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? A) VTP trunking B) Port forwarding C) PoE D) VLAN tagging
A hypervisor hosts multiple guest operating systems as virtual machines. A Keyboard Video Monitor (KVM) switches a set of peripherals between devices. A cloud PC is a term we just made up. A virtual switch is a software based switch that can direct traffic, but does not host other virtual systems.
13) Which option is used to manage virtual operating systems? A) Virtual switch B) Hypervisor C) Cloud PC D) KVM
CHAP CHAP (Challenge Handshake Authentication Protocol) uses a 3-way handshake to authenticate the opposing end of a connection, and will periodically repeat the authentication process during the connection.
13) Which protocol periodically uses a 3-way handshake to authenticate a connection? A) PAP B) CHAP C) Kerberos D) PPP
OTDR (Optical Time-domain Reflectometer) is a device that test and characterizes a fiber optic cable. This device can do many things, including finding a break or fault in a Fiber optic line.
13) Which tool can help a technician identify a break in a fiber optic line? A) OTDR B) Toner & Probe C) Punch down tool D) OpticsID
Chain of custody The Chain of custody is a paper trail that shows who has possession of the object being tracked.
14) In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as: A) Proxy list B) Order of volatility C) Access log D) Chain of custody
Port Mirroring Enabling port mirroring on a network device, usually a switch, will duplicate all network traffic out a single network port so a packet sniffer may then record the traffic.
14) Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this? A) Port Mirroring B) VPN Client and Concentrator C) Smart jacks installed for each network jack D) Proxy server with content filter
A Protocol Analyzer, also known as a Packet Sniffer, will record a packet and save it to your computer so you can analyze network traffic at a later time.
14) What software tool will save a packet for later review? A) TCP/IP Scanner B) Protocol Analyzer C) Port Scanner D) TLS
Arp -a Netstat will show open connections by IP and port. Nslookup will resolve domains to IP addresses (DNS). Ipconfig /all will show you the default gateway and your MAC addresses but not the MAC of another network device. arp -a will show the Address Resolution Protocol (ARP) table, which will include the ARP for your default gateway.
14) You have been asked to identify the MAC address for the default gateway for a device's subnet. Which Windows command will help you identify this? A) Arp -a B) Netstat -n C) Nslookup D) Ipconfig /all
Agent The agent is the software on the devices in need of monitoring on a network, that uses Simple Network Management Protocol (SNMP) to send a notification to the administrator.
15) A software module on a managed device that sends Simple Network Management Protocol (SNMP) notifications to the managing station is called: A) Agent B) UC gateway C) Proxy D) ICS server
Transport The TCP protocol operates on layer 4, the Transport layer of the OSI model.
15) In which of the following layers of the OSI model does the TCP protocol operate? A) Session B) Network C) Transport D) Data link
Layer 1 Each bit is represented by a physical signal, either electric or optic. Because it is a physical signal, it resides on layer 1 (Physical layer) of the OSI model.
15) The transmission of bits is considered to be on which layer in the OSI model? A) Data-Link B) Application C) Layer 1 D) Layer 2
Port-based network access control The Port-based Network Access Control (PNAC) provides an authentication mechanism for any system attempting to connect to a LAN or WAN.
15) What would an administrator used the IEEE 802.1X standard for implementing across a network? A) Token ring networks B) Port-based network access control C) VLAN tagging D) Wireless networks
APIPA (Automatic Private IP Addressing) is a Microsoft Windows feature used when a DHCP server cannot be contacted, the computer will automatically assign itself an address in the 169.254.0.0/16 range. This is known as Link-Local in IPv6.
16) A user on a company's network is experiencing network issues. Their IP is 169.254.144.221, what does this IP indicate? A) NIC may be faulty B) APIPA was used C) WINS Server is down D) TCP/IP Stack is corrupt
Static A server needs to be accessed at all times, with outages kept to a minimum. Using anything but static IP addresses will cause issues when clients attempt to access the server. If the Ip changed, the network and clients will have to learn about the change.
16) What type of IP address should be a assigned to a server? A) Static B) Dynamic C) Lease D) Scope
Transport The Transport layer, or layer 4, of the OSI model is located between the Network and Session layers.
16) Which of the following OSI model layers is between the Network and Session layers? A) Transport B) Data link C) Physical D) Presentation
Star topology Star topology is the most common. This is often a switch, with multiple computers connected through that switch.
16) Which of the following network topologies is most commonly used in contemporary Ethernet LANs? A) Bus topology B) Star topology C) Ring topology D) Mesh topology
NAT Network Address Translation (NAT) hides the internal IP, but also is used to conserve IPv4 addresses, by using one IP address for the entire private network.
16) Which of the following solutions hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device? A) QoS B) DHCP C) NAT D) DNS
IP to MAC Address Resolution Protocol (ARP) will translate the IP address into a Media Access Control (MAC) address.
17) Address Resolution Protocol (ARP) is a telecommunication protocol that provides what kind of resolution? A) IPv6 to IPv4 B) MAC to IP C) Domain name to IP D) IP to MAC
TACACS+ TACACS+ is an open standard protocol developed by Cisco that is used to authenticate users across a network.
17) Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement? A) TACACS+ B) MS-CHAP C) PKI D) Kerberos
The switch "-n" will tell Windows to ping a host a certain amount of times. For example, ping google.com -n 10, will ping google.com 10 times.
17) Which switch for the ping command, will ping a host a specific number of times? A) -t B) -l C) -n D) -a
Serial 0/0/0 The interface in this situation is a WAN interface. The only option here that is a WAN interface is Serial 0/0/0. Fast Ethernet is a similar option, but is typically used for LAN communications.
18) Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified? A) Console 0 B) Serial 0/0/0 C) AUX 0 D) FastEthernet 0/0
Routers operate at the Network level, or layer 3 of the OSI Model. This layer includes protocols such as IP, OSPF, RIP, and EIGRP.
18) What layer does a router operate at in the OSI Model? A) Data link B) Physical C) Network D) Session
Port Blocking certain ports can restrict specific types of network traffic, for example blocking port 80 would restrict the HTTP protocol. It is important to know however that this only blocks the default HTTP port and another could be used to bypass this measure.
18) What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)? A) IP B) URL C) Port D) MAC
CSMA/CA CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is a technology in networking when each node senses if anyone else is communicating. If the node senses that some one else is using the network, then it will wait and try again in a moment.
18) Which of the following is a technology used specifically for wireless communications? A) CSMA/CD B) CSU/DSU C) Modem D) CSMA/CA
Lease When using the Dynamic Host Configuration Protocol (DHCP) a client network device is given a lease on an IP address for a certain amount of time. The lease time is set by the DHCP server.
18) Which term refers to the amount of time a client is able to use an IP address given from a DHCP server? A) Reservation B) Lease C) Scope D) Availability
Syslog Syslog is a standardized computer message logging technology, which can be used on many operating systems such as Windows and Linux.
19) Philip, an administrator, is responsible for one Linux and two Windows servers. He would like to review all server logs centrally. Which of the following services could Philip use in this scenario? A) Baselines B) Change Management C) Event logs D) Syslog
Network layer of the OSI model IPsec is used for Internet Protocol communications. This means it has to reside on the Network layer.
19) The end-to-end security scheme Internet Protocol Security (IPsec) resides at which layer of the OSI model? A) Network layer of the OSI model B) Transport layer of the OSI model C) Session layer of the OSI model D) Presentation layer of the OSI model
STP STP (Shielded Twisted Pair) is a type of Ethernet that has an EMI resistant jacket. Because there are a large amount servers, STP is necessary. Fiber is incorrect because the question specifies we need a cost effective solutions. Typically, fiber will be used on trunk and backbone connections.
19) Which cable type would be a cost effective choice for a data center with large amounts of servers? A) STP B) RJ-11 C) UTP D) Fiber
Answer D is correct because 127.0.0.1 is the IPv4 loopback address. Answer A is a mac address, while B and C are IPv6 addresses, in IPv6 the loopback is ::1
19) Which of the following is a loopback address? A) 00-21-86-5C-B4-6C B) ::127:0:0:1 C) ::0 D) 127.0.0.1
NIC teaming Network Interface Controller (NIC) teaming is a form of link aggregation that allows multiple connections for redundancy.
2) The process of combining multiple physical network adapters into a single logical interface is known as: A) Route aggregation B) Virtualization C) NIC teaming D) Device pairing
Mac Filtering: Mac filtering is a type of port-security on a switch. It allows a switch to only permit a certain amount of mac addresses, or only an exact set of mac addresses on a specific port. This is usefull if a network jack is in a public area.
2) Which choice is a feature on a switch using port-security? A) Load balancing B) QoS C) Vlan Trunking/Tagging D) Mac Filtering
A Packer Shaper: is a device that optimizes network traffic, often by giving priority of some types over others. This is similar to Quality of Service (QoS) and traffic policing. A Load Balancer does not prioritize traffic but instead distributes it among multiple common servers. For example, a Load Balancer would be used to distribute traffic between multiple web servers serving the same web site. A Packet Shaper would manipulate all traffic entering or leaving a network.
2) Which device will manipulate network traffic to ensure reliability and performance of some types of network traffic over other types? A) Packet shaper B) Load Balancer C) Router D) Traffic Classifier
Packet sniffer A packet sniffer will record network traffic onto a storage device for later review. This will allow you to save and analyze the employees network traffic.
2) You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic? A) Packet Scoping B) OTDR C) Toner Probe D) Packet sniffer
Netstat Netstat shows incoming and outgoing connections, routing tables, and other network statistics.
20) A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called: A) Tracert B) Traceroute C) Netstat D) Nslookup
ARP poisoning The addressing used in the OSI model layer 2 (Data link layer) is MAC addressing. The ARP (Address Resolution Protocol) resolves layer 3 addressing (IP addresses) to layer 2 addresses (MAC addresses). ARP Poisoning involves spoofing ARP data to redirect traffic to an incorrect address, typically to steal data.
20) Which malicious attack or exploit involves spoofing OSI layer 2 addressing? A) ARP poisoning B) DNS poisoning C) DDOS attack D) Bluejacking
255.255.255.224: 255.255.255.224 is the correct subnet, because it gives 30 usable hosts per subnet, and will give you the most possible subnets.
3) Jack, a network technician, needs to subnet a class C network into as many subnets as possible, with at least 22 usable hosts per subnet. What subnet mask should he use? A) 255.255.255.224 B) 255.255.255.128 C) 255.255.255.240 D) 255.255.255.252
Out-of-band management Out-of-band management is the use of a trusted, dedicated management channel for accessing a network device. This data is transmitted separately from in-band data such as network traffic.
3) Managing a network device on a dedicated channel that is not used for regular network traffic is known as: A) Out-of-band management B) In-Band management C) Man-in-the-middle D) Backdoor access
Dynamic ARP Inspection (DAI) inspects the packets and validates them before forwarding them. This is used to prevent many Address Resolution Protocol (ARP) attacks.
3) Which of the following security solutions allows for discarding ARP packets with invalid IP-to-MAC address bindings? A) DCS B) SIEM C) DAI D) RARP
10Base2 Thinnet has a maxiumum transmition of 10 Mbit/s, baseband signaling, and 200 meter max length cable segment. That is why it is known as 10BASE2.
3) Which option could be used when describing Thinnet or Thinnwire? A) 10Base2 B) Twisted-pair cabling C) 20 Mbit/s D) Maximum cable segment length of 100 meters
System logs System logs will show every event on an operating system. This is very useful to find if some one accessed the system, among many other things.
3) You suspect a hacker has accessed the network. Which of the following may help you confirm your suspicion? A) Traffic analysis B) Network Sniffer C) System logs D) SNMP
TTL (Time To Live): is the number of devices a packet can traverse before being discarded. When a device reads and re-transmits a packet it subtracts one from the current TTL. If the TTL reaches zero, the packet is discarded. TTL is specifically designed to end infinite loops, while hop count is simply the number of devices between the transmission and destination.
4) Which choice prevents indefinite loops in an IP Network? A) Terminators B) Hop count C) TTL D) VTP
Ethernet switch Ethernet switch is in layer 2 (data link) of the OSI model, while repeater/hub are in layer 1 (physical), and router is layer 3 (network).
4) Which of the following devices resides at the data link layer of the Open Systems Interconnections (OSI) model? A) Router B) Passive Hub C) Ethernet switch D) Repeater
Port 3389 Windows remote desktop uses RDP (Remote Desktop Protocol) which uses port 3389 as it's default port.
5) An employee connects to her desktop from her home computer, using the built in Windows Remote Desktop feature. What port is she most likely using? A) 443 B) 23 C) 3389 D) 89
Ifconfig The ifconfig command is used in Unix-like operating systems to display and configure TCP/IP network interface parameteres.
5) Which of the following commands could Philip, a network administrator, use to determine the IP address of a Linux server? A) Ifconfig B) Ipconfig C) Nbtstat D) Netstat
True MLPPP is used for link aggregation. For example, it would allow two physical dial up lines to one company computer.
6) Multi-link Point-to-Point Protocol (MLPPP) provides a method for combining two or more physical communication links into one logical interface to improve speed and redundancy. A) True B) False
Cell size increases Increasing antenna gain will increase the amount of energy projected in a certain direction (gain). This will increase the distance of travel, and therefor the overall cell size of the AP.
6) What is the effect of increasing antenna gain on an access point? A) Cell size increases B) Throughput decreases C) Connection speeds decrease D) Frequency increases
DHCP (Dynamic Host Configuration Protocol): dynamically assigns IP addresses to network devices.
6) What type of server dynamically assigns Internet Protocol Addresses? A) DNS B) DHCP C) WINS D) SNMP
A smart jack is a Network Interface Device (NID) placed between two networks to provide diagnostic data. Typically used by Internet Service Providers (ISP) to help troubleshoot issues on a customer's network.
6) Which choice is a NID placed at the demarcation point between an ISP and customer's networks that can be used as a troubleshooting tool when diagnosing a network issue? A) DMZ B) Protocol Analyzer C) Smart jack D) Line validator
ICMP The Internet Control Message Protocol (ICMP) is used to control IP networks. It is used for error reporting, network congestion, and availability.
6) Which of the following protocols is used by the ping command? A) ARP B) STP C) ICMP D) FTP
OSI Layer 2 (Data-Link Layer): consists of many layer 2 protocols, including MAC Addressing, which is used by switches and bridges. This makes both of them layer 2 devices.
7) Switches and Bridges reside on what OSI layer? A) Session B) Layer 3 C) Layer 2 D) Application
Fiber Optic Because your traversing different levels, wireless is out. Coax isn't practice to begin with, so that leave Ethernet and Fiber. The question specifies this is a large building, with a large network, so fiber is the best choice.
7) What media would be best for a backbone connection, which will connect multiple floors of a large buildings network with thousands of users? A) Ethernet B) Fiber Optic C) Coax D) Wireless
On WiFi networks the term roaming is used to describe the ability for multiple Wireless Access Points (WAP) on a single network to serve as one seemingly continuous access point. These points will generally share a single SSID and authentication mechanisms, allowing users to move freely without disconnecting or having to reauthenticate.
7) You are a Network Architect and Administrator at a large company. The business has asked for a solution that will allow them to freely move around the headquarter campus without losing wireless connectivity and without having to reconnect or re authenticate. Which technology could serve as a solution? A) Switching B) Roaming C) Routing D) Hot-swapping
24 collision domains, 24 broadcast domains A router separates both collision and broadcast domains. This means each port will represent it's own domains. Because there are 24 ports, there are 24 broadcast and 24 collision domains.
8) How many collision and broadcast domains are present on a 24-port router? A) 24 collision domains, 24 broadcast domains B) 24 collision domains, 1 broadcast domain C) 1 collision domain, 24 broadcast domains D) 1 collision domain, 1 broadcast domain
The route table of the new customer's router Because the router is new, it is likely that the new customer's router has not yet updated it's route table and that would be the best place to look.
8) Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check? A) The route table of the next-hop router B) The arp table of the ISP's gateway router. C) The route table of the new customer's router D) The arp table of the network user
Power level controls The administrator would adjust the power level controls, so the signal does not extend into the parking lot.
8) What would the administrator adjust in the WAP configuration settings so a user could not access the wireless signal from the parking lot? A) Fair access policy B) Power level controls C) Quality of Service (QoS) D) Wi-Fi Protected Setup (WPS)
A .exe file means that file is an executable file. The others are text/photo files which are less likely to be dangerous.
8) Which type of files pose the greatest risk related to the distribution of malware? A) .png B) .exe C) .txt D) .pdf
Switching loop Spanning Tree Protocol (STP) is used on network switches to disable duplicate routes until needed. Without STP, these duplicate routes will result in loops in network traffic.
9) Rachael, a network administrator, has disabled STP on the local network. Which of the following is MOST likely the cause of a recent spike in duplicate traffic? A) VLAN mismatch B) Incorrect subnet mask C) Mismatch MTU D) Switching loop
A file hash or checksum is a semi-unique value generated after running an algorithm against a file. This same algorithm can be used on the file later on to verify it's contents have not changed. If the checksum or hash value is different, it is possible the hosting server has been hacked or that a man-in-the-middle attack has occurred on the network. Some websites offer the checksum prior to downloading so that users van verify the file's integrity after downloading.
9) Your employer has implemented a policy to verify the hash of a file after downloading whenever possible. What is the purpose of verifying a file's hash after downloading? A) Validating data confidentiality B) Verifying file contents are encrypted C) Ensures data deduplication D) Verifying file integrity