Network+ Scenairos
How many DS0s are used in a T1? A. 24 B. 30 C. 23 D. 31
A. 24
Which of the following can an application layer firewall filter that a network layer firewall cannot? A. HTTP URLs B. Telnet traffic C. ICMP D. HTTP traffic
A. HTTP URLs
Which of the following network security devices prevents users from propagating viruses? A. IPS B. Firewall C. IDS D. Content engine
A. IPS
IPSec is defined at what layer of the OSI model? Network Physical Layer 4 Layer 7
A. IPSec works at the Network layer of the OSI model (Layer 3) and secures all applications that operate above it (Layer 4 and above). Additionally, because it was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the Internet.
Which of the following are forms of gigabit Ethernet that require the use of fiber optic cables? (Select THREE). A. 1000Base-T B. 1000Base-SX C. 1000Base-LX D. 10Base-T E. 1000Base-TX F. 1000Base-CX
B. 1000Base-SX C. 1000Base-LX F. 1000Base-CX
Which of the following cable types is typically used to connect a hub to a hub that does not support MDI-X? A. Straight B. Loopback C. Crossover D. Rollover
C. Crossover
Which of the following protocols provides the actual encryption used over VPN? A. PPP B. HTTPS C. PPTP D. SSH
C. PPTP
Which of the following protocols provides a secure method to remotely administer a server? A. HTTP B. SFTP C. SSH D. Telnet
C. SSH
Which of the following is a demarcation device for T1 circuits with the ability to run diagnostics when remotely activated? A. 66 block B. Demarcation extension C. Smart jack D. 110 block
C. Smart jack
Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment? A. SONET B. E3 C. T3 D. OC-12
C. T3
Which of the following command line tools would BEST be used to verify DNS functionality? A. netstat B. traceroute C. dig D. arp
C. dig
Which of the following is the default port for SMTP? A. 443 B. 21 C. 110 D. 25
D. 25
Which of the following tools enables the technician to trace cables in multiple pair wiring? A. Cable tester B. Multimeter C. Butt set D. Toner probe
D. Toner probe
You have implemented and tested a solution and identified any other effects the solution may have, what is your next step? Create an action plan Close the case and head home for the day Reboot the Windows server Document the solution
Document the solution
What device is an example of an Ethernet technology implemented as a star topology?
Hub
568B wiring starting with Pin 1
Orange/White, Orange, Green/White, Blue, Blue/White, Green, Brown/White, Brown o-O-g-B-b-G-br-BR
You need to power a device, such as an access point or IP phone. What protocol can provide power to these devices over an Ethernet cable?
Power over Ethernet (PoE)
Which UNIX command is used for terminal emulation in the same way Telnet is used?
The UNIX command rlogin functions similarly to Telnet.
Why would we use WPA instead of basic WEP?
The values of WPA keys can change dynamically while the system is used.
What are two purposes for segmentation with a bridge? To add more broadcast domains To create more collision domains To add more bandwidth for users To allow more broadcasts for users
To create more collision domains To add more bandwidth for users Bridges and switches break up collision domains, which allow more bandwidth for users.
What does 802.1q define
Virtual LANs
What software application can help automatically ensure that your Windows-based computers have the most current security patches?
Windows Update
If you need to connect two PCs directly together using their network adapters, what type of cable do you need?
crossover cable
How many non‐overlapping channels are available with 802.11a? 3 12 23 40
23
How wide are the channels used in 802.11n in order to gain the large bandwidth that the specification provides? 22MHz 20Mhz 40Mhz 100Mhz
40Mhz
Which of the following is the maximum transmission distance of 10GBase-LR? A. 6 miles (9.7 kilometers) B. 25 miles (40 kilometers) C. 512 miles (824 kilometers) D. 1,024 miles (1648 kilometers)
A. 6 miles (9.7 kilometers)
221.17.101.223/28 is an example of which kind of notation? A. CIDR B. DNS C. Port Number D. ARP
A. CIDR
Which of the following authentication protocols uses certificates to negotiate access to the network? A. EAP-TLS B. PAP C. CHAP D. Kerberos
A. EAP-TLS
You are using a TDR. Which three of the following actions can you do with this device? Estimate cable lengths Find splice and connector locations and their associated loss amounts Display unused services Define cable‐impedance characteristics
A. Estimate cable lengths B. Find splice and connector locations and their associated loss amounts D. Define cable‐impedance characteristics Due to sensitivity to any variation and impedance to cabling, answers A, B and D are all reasons you'd use a TDR.
A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view? A. OSPF B. IGRP C. RIP D. BGP
A. OSPF
PPTP is a combination of which of the following protocols? (Select TWO). A. PPP B. POP3 C. PPPoE D. TCP E. TCP/IP
A. PPP E. TCP/IP
Which of the following data is included in a wireless access points beacon frame? A. SSID and MAC address B. IP and MAC address C. SSID and WEP key D. Channel and WEP key
A. SSID and MAC address
Which of the following items changes the encryption key on a users session after a set period of time? A. TKIP B. AES C. RADIUS D. WEP
A. TKIP
Using a routing table, which of the following routes will be selected MOST frequently? A. The lowest administrative distance B. The highest administrative distance C. The BGP route D. The one with the greatest number of hops
A. The lowest administrative distance
What are the three switch functions at Layer 2?
Address learning forward/filter decisions loop avoidance
What are the distinct functions of Layer 2 switching that increase available bandwidth on the network? (Choose three.) Address learning Routing Forwarding and filtering Creating network loops Loop avoidance IP addressing
Address learning Forwarding and filtering Loop avoidance
What type of scan can be done by an antivirus program? Emergency In-demand On-access All of the above
All of the above
Which application would a voltage event record be used for? Voltage recording Distortion measurement Flicker measurement Capturing voltage transients All of the above
All of the above
Which of the following Ethernet unshielded twisted‐pair (UTP) cables types is most commonly used? 10Base‐T 100Base‐TX 1000Base‐TX All of the above
All of the above
Which of the following is a tunneling protocol? Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) Secure Sockets Layer (SSL) All of the above
All of the above
Which of the following Ethernet technologies has the shortest transmission distance? A. 10Base-T B. 10GBase-T C. 100Base-T D. 10GBase-SR
B. 10GBase-
Which of the following is the maximum segment distance of a 100Base-FX network? A. 100 meters (328 feet) B. 2,000 meters (6,561 feet) C. 1,024 meters (3,359 feet) D. 1,023 meters (3,356 feet)
B. 2,000 meters (6,561 feet)
When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices? A. Cross-connect wire B. 25 pair cable C. CAT3 D. CAT5
B. 25 pair cable
Which of the following is the maximum distance a 10GBase-EW connection can transmit with one repeater? A. 10,000 meters (32,808 feet) B. 80,000 meters (262,467 feet) C. 20,000 meters (65,616 feet) D. 40,000 meters (131,233 feet)
B. 80,000 meters (262,467 feet)
Which of the following TCP connect scanners is always set for normal data flow once a connection is established? A. TCP B. ACK C. SYN D. RSH
B. ACK
Which of the following would be an appropriate use of an EGP? A. Unequal cost load balancing over a switched network. B. Advertising a /24 to an upstream provider. C. Periodic updates to neighbors on the LAN. D. Routing between VLANs on an Ethernet network.
B. Advertising a /24 to an upstream provider
A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points? A. Channels 1-3-5 B. Channels 6-6-6 C. Channels 7-11-1 D. Channels 5-5-5
B. Channels 6-6-6
A corporate network has grown and manual monitoring of the network devices are no longer feasible. Which of the following would provide central logging for all devices with message priority levels? A. Install a new server with remote terminals open to monitor equipment. B. Install a syslog server and configure the network devices to send log messages to it. C. Install a SNMP polling server to monitor and collect logs on equipment. D. Install a protocol analyzer to monitor traffic logs.
B. Install a syslog server and configure the network devices to send log messages to it.
Ensuring that data is transmitted securely over an IP network is the main purpose of: A. FTP. B. TLS. C. Telnet. D. SIP.
B. TLS.
A user has plugged a computer into a switch port and now is unable to access any server resources on the network. Which of the following are the MOST likely reasons for the access problem? (Select TWO). A. The spanning tree protocol has locked down the port. B. The computer is connected to a port in the wrong VLAN. C. The appropriate credentials have not been supplied for network access. D. A port mirroring session was started and is interfering with the connection. E. The computer is connected to an incorrect PoE port.
B. The computer is connected to the wrong VLAN port C. The appropriate credentials have not been supplied for network access.
A computer is not able to connect to the network. The link light on the NIC is not illuminated. Which of the following should the technician do FIRST? A. Reinstall NIC drivers with the most current drivers. B. Verify network cable connectivity. C. Replace the NIC card with a known good NIC card. D. Check to make sure that the port on the switch is working properly.
B. Verify network cable connectivity.
The below output is from which of the following utilities? Interface: 172.30.0.104 --- 0x2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.254 00-30-48-82-65-0e dynamic A. ping B. arp C. nbtstat D. netstat
B. arp
This device uses hardware addresses to filter a network
Bridge or Switch
Which of the following is the maximum hop count for RIPv2? A. 18 B. 10 C. 16 D. 17
C. 16
.A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points? A. TKIP B. 3DES C. AES D. CHAP
C. AES
Which of the following WAN layer two protocols would be BEST suited for a full mesh topology? A. PPP B. ATM C. MPLS D. Frame-relay
C. MPLS
Which of the following would be used to connect a vertical cross connect when using data connections? A. 110 blocks B. Demarc extension C. Patch panel D. 66 blocks
C. Patch panel
A VoIP telephone with a built-in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future? A. Port mirroring B. VLANS C. Spanning tree D. Trunking
C. Spanning tree
Which of the following commands is used to provide the output below in a Windows environment? 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out. A. nbtstat B. netstat C. tracert D. ping
C. tracert
What cable issues should you know and understand for network troubleshooting?
Collisions Crosstalk Shorts Attenuation Interference Open impedance mismatch
A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0 /24 192.168.1.0 /24 192.168.2.0 /24 192.168.3.0 /24 Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed? A. 192.168.0.0 /21 B. 192.168.0.0 /23 C. 192.168.0.0 /16 D. 192.168.0.0 /22
D. 192.168.0.0 /22
An RJ-11 connector is capable of having up to how many pins? A. 8 B. 2 C. 4 D. 6
D. 6
Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203? Network Address Subnet Mask Next Hop Address 0.0.0.0 0.0.0.0 77.0.5.5 192.168.0.0 255.255.0.0 66.40.90.121 192.168.1.0 255.255.255.0 72.40.91.1 192.168.1.0 255.255.255.127 40.40.0.254 A. 40.40.0.254 B. 66.40.90.121 C. 77.0.5.5 D. 72.40.91.1
D. 72.40.91.1
Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN? A. Wiring schematics B. Logical network diagram C. Physical network diagram D. Baseline and configuration documentation
D. Baseline and configuration documentation
Which of the following equipment would allow for routing based on logical addresses? A. Layer 2 hub B. Layer 2 switch C. Layer 1 NIC D. Layer 3 switch
D. Layer 3 switch
Which of the following cables would a technician make in order to identify a physical interface problem? A. Serial B. Rollover C. Console D. Loopback
D. Loopback
Which of the following would be used to relocate a T1 closer to the switch for connectivity? A. Patch panel B. 25 pair cable C. Demarc extension D. Smart jack
D. Smart jack
A new laptop has been purchased with an 802.11n wireless card. The laptop will not connect to their existing 802.11a network. Which of the following is MOST likely the reason the laptop will not connect? A. The laptop is too far from the existing network B. Interference C. Wrong SSID is being used D. Standard mismatch
D. Standard mismatch
Ethernet is defined at these layers
Data Link and Physical
QoS methods focus on one of five problems that can affect data
Delay Data Dropped packets Error Packets Out-of-order delivery Jitter
The SYN floods and Smurf are examples of what types of attack?
Denial of service (DoS)
Is BGP considered link state or distance vector?
Distance vector
You are troubleshooting a LAN switch and have identified the symptoms. What is the next step you should take? Escalate the issue Create an action plan Implement the solution Determine the scope of the problem
Escalate the issue
You have one serial port on your router but need to connect many remote sites. What WAN protocol could you consider as an option?
Frame Relay. Although Frame Relay is not available in many markets today, it is a possible solution for the problem presented.
Know the nine troubleshooting steps, in order
Gather information - identify symptoms and problems. Identify the affected areas of the network. Determine if anything has changed. Establish the most probable cause. Escalation if necessary. Create an action plan and solution, identifying potential effects. Implement and test the solution. Identify the results and effects of the solution. Document the solution and the entire process.
Which encryption protocol works with both IPv4 and IPv6?
IPSec
Spreading network traffic across multiple connections is called___________________.
Load balancing
Which WAN technologies are considered circuit‐switching networks?
Modems (PSTN/POTS) and ISDN
Optical Carrier Levels OC-1 OC-3 OC-12 OC-48 OC-192
OC-1 - 51.84Mbps OC-3 - 155.52Mbps OC-12 - 622.08Mbps OC-48 - 2.488Gbps OC-192 - 9.953Gbps
The two different types of virus scans are ___________________.
On-demand and on-access Click to flip
What are requirements imposed on the way you manage your network called?
Regulations
What are the types of xDSL?
SHAV V2, VH SDSL HDS ADSK VDSL VDSL2 or VHDSL
Which encryption protocol or standard allows you to create a virtual subnet on an intranet?
SSL VPN
Which type of routing would you configure on a router if you needed to use as little router overhead and CPU processing as possible?
Static routing
At which layer is routing implemented, enabling connections and path selection between two end systems?
The Network layer provides routing through an internetwork and logical addressing.
Basic IP routing process
The frame changes at each hop but that the packet is never changed or manipulated in any way until it reaches the destination device.
What is the best explanation for a DMZ? To separate a security zone for an IPS and IDS server To create a security zone for VPN terminations To create a security zone that allows public traffic but is isolated from the private inside network To create a security zone that allows private traffic but is isolated from the public network
To create a security zone that allows public traffic but is isolated from the private inside network
Which application-layer protocols are secure
SSH HTTPS SFTP SNMPv3
If data from one of your subnets should be restricted from entering another subnet, the subnets should be configured as different ___________________.
Security zones
A workstation presents an error message to a user. The message states that a duplicate IP address has been detected on the network. After establishing what has changed in the network, what should be the next step using the standard troubleshooting model? Test the result. Select the most probable cause. Create an action plan. Identify the results and effects of the solution.
Select the most probable cause.
Eight Levels of QoS
0 Best effort 1 Background 2 Standard (spare) 3 Excellent load (business‐critical applications) 4 Controlled load (streaming media) 5 Voice and video (interactive voice and video, less than 100ms latency and jitter) 6 Layer 3 Network Control Reserved Traffic (less than 10ms latency and jitter) 7 Layer 2 Network Control Reserved Traffic (lowest latency and jitter)
The default administrative distance of a static route is?
1
586B uses which pins to make a connection?
1 to 3 and 2 to 6
What is the Class C range of values for the first octet in decimal and in binary?
192-223, 110xxxxx.
In a class C IP address, how long is the network address? 8 bits 16 bits 24 bits 32 bits
24 bits
Which of the following are the IEEE version of STP? (Choose 2) 802.1x VLANs 802.1d 802.11 802.1w
802.1d 802.1w 802.1d and 802.1w are both IEEE STP versions, with 802.1w being the latest and greatest version
Which network-access security method is commonly used in wireless networks?
802.1x 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over 802 which is known as "EAP over LAN" or EAPOL. 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
What is the maximum distance of 10GBase‐SR? 100 meters (328 feet) 302 meters (990 feet) 305 meters (1000 feet) 1593 km (6 miles)
A 10GBase‐SR cable can have a maximum distance of 990 feet (302 meters).
Will a computer that shares no resources most likely be connected to the backbone or to a segment?
A segment
802.11n uses MIMO. How does this optimize throughput to gain the high speed advantage that 802.11n provides? By specifying an acknowledgment of each and every frame, 802.11n provides better overhead. Several frames are sent by several antennae over several paths and are then recombined by another set of antennae. One frame at a time is sent, but faster than in 802.11g because multiple antennas are used (multiple‐in, multiple‐out). MIMO packs smaller packets into a single unit, which improves throughput.
Several frames are sent by several antennae over several paths and are then recombined by another set of antennae.
What is the difference between a stateful and stateless firewall
A stateless firewall examines each packet individually and does not track existing states.
You need to create a cable that will connect your host to a wall jack connection. Which of the following will you use? IDS/IPS Snips Cable strippers Multimeter
Snips
Users are reporting that they can access Internet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem? A. The intranet server is down. B. The intranet DNS entry is non-authoritative. C. The DNS address handed out by DHCP is incorrect. D. The default gateway is incorrect.
A. The intranet server is down.
A network administrator needs to filter unwanted packets when implementing the companies' security policies. What should be implemented to help exercise control over future network traffic? Access control list (ACL) Proxy server Intrusion Prevention System VPN concentrator
Access control list (ACL)
In computer security, what does AAA stand for?
Authentication, authorization, and accounting
You have upgraded the firmware on your switches and access points. What documentation do you need to update? Baselines and configuration documentation Physical network diagram Logical network diagram Wiring schematics
Baselines and configuration documentation
Monkey B, Michelangelo and Stoned are examples of which type of virus? IP spoofing Multipartite Macro Boot sector
Boot sector
What kind of attack could a hacker use to target a network that tries to log in to some type of shared network resource? Packet sniffers Brute-force attack Worm Backdoor
Brute-force attack
Which of the following are types of flow control? (Choose all that apply.) Buffering Cut‐through Windowing Congestion avoidance VLANs
Buffering Windowing Congestion avoidance The common types of flow control are buffering, windowing, and congestion avoidance.
Which of the following IEEE standards describes the power output of a standard switch port? A. 802.3ab B. 802.3ae C. 802.3af D. 802.3aa
C. 802.3af
Which of the following devices can be remotely looped for troubleshooting purposes? A. A 66 block B. A 110 block C. A smart jack D. A patch panel
C. A smart jack
Which of the following documentation would a network administrator refer to discover a rogue WAP? A. Wiring schematics B. Policies C. Baseline D. Regulations
C. Baseline
Which of the following access methods is used for wireless medium access? A. CSMA/CD B. PPPoE C. CSMA /CA D. PPTP
C. CSMA /CA
There are two networks sharing the same office space. One network already has an 802.11g access point. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other? A. Encryption type B. Pre-shared key C. Channel D. WEP key
C. Channel
Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz?
Category 6
A router receives a packet with a destination address 72.44.69.254. However, no entry in the routing table exists for the network. Which of the following actions will the router take? A. The packet will be queued while the router queries for an acceptable path to the destination. B. The packet will be dropped as non-routable. C. The packet will be forwarded out until another router forwards the packet. D. The packet will be forwarded to the next hop address of the default route.
D. The packet will be forwarded to the next hop address of the default route.
Which of the following is found in a layer two switch? A. SSID settings B. Routing protocols C. DNS zones D. VLAN settings
D. VLAN settings
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords? A. WPA TLS B. 64-bit WEP C. 128-bit WEP D. WPA PEAP
D. WPA PEAP
Which spread‐spectrum technology does the 802.11b standard define for operation? IR DSSS FHSS DSSS and FHSS IR, FHSS, and DSSS
DSSS
Which WAN technologies are considered packet‐switching networks?
Frame‐Relay and X.25
Which application layer protocols are not secure
HTTP FTP rsh (remote shell) rcp (remote copy protocol) SNMP1 SNMP2
IP resides at which layer of the OSI model? Application Transport Data Link Network Physical
IP is a Network-layer protocol. You are thinking ot TCP which is Transport
In which two states is the MAC address table populated with addresses? Blocked Listening Learning Forwarding
Learning Forwarding
What does 802.1d define
MAC Bridges standard which includes Bridging, Spanning Tree and others.
Which WAN protocol can carry traffic from both circuit-switching and packet-switching clients?
MPLS
Logical addressing is used at this layer
Network
APs come set up with what type of security enabled by default?
None
Which is not a routing protocol? RIP RIPv2 RIPv3 EIGRP
RIPv3 RIP, RIPv2, and EIGRP are all examples of routing protocols.
What does 802.1w define
Rapid Spanning Tree Protocol (RSTP)
T-Series Speeds T1 T1C T2 T3 T4
T1 - 1.544Mbps (E1 - 2.048Mbps) T1C - 3.152Mbps T2 - 6.312Mbps T3 - 44.736Mbps (E3 - 34.368Mbps) T4 - 274.176Mbps
Which of the following can check the speed and condition of the signal on a cable as well as measure the time it takes to send a signal down the wire and back? Multimeter TDR Tone generator event recorder
TDR
What does Extended Service Set ID mean (ESS)? That you have more than one access point, and they are in the same SSID connected by a distribution system That you have more than one access point, and they are in separate SSIDs connected by a distribution system That you have multiple access points, but they are placed physically in different buildings That you have multiple access points, but one is a repeater access point
That you have more than one access point, and they are in the same SSID connected by a distribution system
Users are reporting that they can access the internet but not the internal company website. Which of the following is the most likely problem? The DNS entry for the server is non‐authoritative The intranet server is down The DNS address handed out by DHCP is incorrect The default gateway is incorrect
The DNS entry for the server is non‐authoritative
The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer? Bits Packets Frames Data Segments
The Data Link layer is responsible for encapsulating IP packets into frames and for providing logical network addresses.
Segmentation of a data stream happens at which layer of the OSI model? Physical Data Link Network Transport
The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments
The states of STP
The blocking state prevenst the use of looped paths. The listening state prepares to forward data frames without populating the MAC address table. The learning state populates the MAC address table but doesn't forward data frames. The forwarding state sends and receives all data frames on the bridged port. The disabled state is virtually nonoperational.
Which routing protocol has a maximum hop count of 15? RIPv1 IGRP EIGRP OSPF
The distance‐vector protocols RIPv1 and RIPv2 both have a maximum hop count of 15 (remember, 16 is unreachable). IGRP and EIGRP have a hop count of 255, and OSPF doesn't have a maximum hop count.
Which is not an advantage of network segmentation? Reduced congestion Improved security Containing network problems Preventing broadcast storms
The first 3 options all aid in boosting network performance, so the only option left is broadcast storms. Increased traffic will increase LAN congestion
What is the valid range of values that may appear in an IPv4 octet? Give your answer in decimal as well as binary.
The range of values that an IPv4 octet can take on is 0 through 255 in decimal, which stems from the values 00000000 through 11111111 in binary.
What types of threats can adversely affect your network?
Threats include: denial of service attacks viruses worms rogue access points phishing various other attack methods employed by hackers
Which of the following allows a server to distinguish among different simultaneous requests from the same host? They have different port numbers. A NAT server changes the IP address for subsequent requests. A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin. The MAC address for each one is unique.
Through the use of port numbers. TCP and UDP can establish multiple sessions between the same two hosts without creating any confusion. The sessions can be between the same or different applications, such as multiple web‐browsing sessions or a web‐browsing session and an FTP session
Two examples of high-bandwidth applications
Voice over IP (VoIP) and real-time video streaming
What types of services can firewalls provide
scanning services signature identification security zones. and content filtering
How many bits is a MAC address? 16 32 48 64
48 bit (6-byte)
Which of the following authentication protocols uses plain text to transmit passwords over the internet? A. RADIUS B. PAP C. CHAP D. Kerberos
B. PAP
A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location? A. EMI B. MDF C. IDF D. ESD
C. IDF
Which of the following is the FIRST criterion used to select a next hop from the routing table? A. Lowest administrative distance B. Greatest number of hops C. Most precise matching prefix D. The BGP route
C. Most precise matching prefix
What is a proxy server and what types of proxying are common
A computer that makes and fulfills requests on behalf of another computer. Many firewalls can act as proxies. Common proxy services include IP proxy FTP proxy web proxy mail (SMTP) proxy.
Where can a DMZ be placed
A demilitarized zone (DMZ) can be located outside a firewall, connected directly to the Internet. However, it can also be placed after the firewall. You need to remember that it can be placed in either location.
A frame carries a packet to only two places
A frame uses MAC (hardware) addresses to send a packet on a LAN. The frame will take the packet to either a host on the LAN or a router's interface if the packet is destined for a remote network
You want to monitor your UPS systems and make sure they are functioning correctly. What device should you use?
A voltage event recorder
A user reports that they cannot access any network resources. Which of the following tools would a technician use to troubleshoot the problem? A. Cable tester B. TDR C. Certifier D. Butt set
A. Cable tester
In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web? A. Layer 5 B. Layer 7 C. Layer 3 D. Layer 2
A. Layer 5
Which of the following documentations would a network technician find ports that a company has blocked? A. Policies, procedures and configurations B. Baseline reports C. Network wiring schematics D. RFC
A. Policies, procedures and configurations
A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used? A. RIPv2 B. IGRP C. IS-IS D. BGP
A. RIPv2
A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The network administrator for the branch has three separate VLANs for voice, workstations, and servers. There are approximately 50 end user workstations, 50 IP phones that require addressing, and a dozen servers. How should the network administrator use the block allocated to the branch? A. Subnet the block into /26s and assign one to each VLAN B. Do not subnet the block? use the /24 for all VLANs. C. The administrator must request more networks and use the networks given so far for the servers and workstation VLANs. D. Subnet the block into /25s and assign one to each voice and workstation VLANs.
A. Subnet the block into /26s and assign one to each VLAN
Which of the following is part of the TCP/IP protocol suite? A. UDP B. IPX C. NetBEUI D. SPX
A. UDP
Which of the following describes a broadcast address? All network bits are on (1s). All host bits are on (1s). All network bits are off (0s). All host bits are off (0s).
All host bits are on (1s).
Which is a tool of network scanners? Packet sniffers IDS/IPS software Port scanners All of the above
All of the above
IPv6 uses multiple types of addresses. Which of the following would describe an anycast address used by an IPv6 host? Communications are routed to the most distant host that shares the same address. Packets are delivered to all interfaces identified by the address. This is also called one‐to‐many addressing. This address identifies multiple interfaces, and the anycast packet is only delivered to one address. This address can also be called one‐to‐one‐of‐many.
Anycast is a new type of communication that replaces broadcasts in IPv4. Anycast addresses identify multiple interfaces, which is the same as multicast; however, the big difference is that the anycast packet is delivered to only one address: the first one it finds defined in the terms of routing distance. This address can also be called one‐to‐one‐of‐many.
Which layer of the OSI model do software firewalls operate in? (Choose all that apply.) Application Presentation Physical Network
Application Network
A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE). A. ISDN B. MPLS C. ADSL D. SONET E. Frame-relay F. ATM G. DOCSIS
B. MPLS E. Frame-relay F. ATM
Which of the following routing protocols is a link state and uses a backbone called area 0? A. IS-IS B. OSPF C. BGP D. EIGRP
B. OSPF
A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem? A. Wrong subnet mask B. Duplex mismatch C. Port speed mismatch D. Switch loop
B. Duplex mismatch
When connecting two devices for data on a vertical cross connect, which of the following cables would be used to connect those devices? A. CAT5e B. Fiber C. Coaxial D. CAT6
B. Fiber
Which of the following is an advantage of 100Base-FX over 100Base-TX? A. Faster transmission speeds B. Longer cable runs C. Uses a more durable cable D. Ease of installation
B. Longer cable runs
Which of the following protocols are used in VoIP? (Select TWO). A. RDP B. RTP C. SSH D. SMTP E. SIP
B. RTP E. SIP
Which of the following WAN technologies would a technician find dense wavelength division multiplexing (DWDM)? A. T1 B. SONET C. ADSL D. ISDN
B. SONET
Everyday around lunch time there is network latency on the Windows proxyserver 10.1.1.7. Which of the following network utilities can a technician run in order to determine the severity of the latency? A. arp-t 10.1.1.7 B. ping-t 10.1.1.7 C. nbtstat -t 10.1.1.7 D. tracert -t 10.1.1.7
B. ping-t 10.1.1.7
The difference between 10Base-T and 100Base-T is: A. 100Base-T frames hold more data. B. shorter timing between Ethernet frames. C. 100Base-T requires STP cabling. D. smaller headers on Ethernet frames.
B. shorter timing between Ethernet frames
Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called: A. port mirroring. B. trunking. C. VLAN. D. spanning tree.
B. trunking.
After adding a new cable segment to the network, the technician should: A. document the changes in the business continuity plan. B. update the wiring schematics. C. create a new baseline document. D. update the disaster recovery plan.
B. update the wiring schematics.
VLANs break up ________ domains in a Layer 2 switched network.
Broadcast
Which of the following WAN technologies uses thirty 64Kbps channels? A. ATM B. T-1 C. E-1 D. MPLS
C. E-1
Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group? A. Trunking B. Port authentication C. Enabling VLANs D. Enabling VTP
C. Enabling VLANs
A host is unable to communicate across a network. From the information below, which of the following is the cause of the issue? Host Name...........................: Test20 Primary Dns Suffix...............: abc.com Node Type............................: Unknown IP Routing Enabled...............: No WINS Proxy Enabled............: No DNS Suffix Search List.........: abc.com Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description...........................: Broadcom NetXtreme Ethernet Physical Address..: 00-00-00-15-A1-D0 Dhcp Enabled......................: No IP Address...........................: 10.0.37.144 Subnet Mask........................: 255.255.254.0 Default Gateway................. : 10.0.38.1 DNS Servers...................... : 10.0.36.5
C. Gateway IP is incorrect.
An active/passive server cluster in which only one server is active and handling requests, is an example of which of the following network performance optimization? A. Traffic shaping B. QoS C. High availability D. Load balancing
C. High availability
While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNext-Hop IPInterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2 Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4? A. The packet will be dropped as there is no matching route in the IP routing table to reach the destination network B. An ICMP network unreachable message will be sent to 192.168.1.4 C. The packet will be forwarded to 172.16.31.2 D. The packet will be forwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range
C. The packet will be forwarded to 172.16.31.2
A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections? A. Butt set B. Cable tester C. Toner probe D. Voltage meter
C. Toner probe
A network technician is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch? A. TCP 110 B. UDP 67 C. UDP 69 D. TCP 69
C. UDP 69
Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- 0x2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic A. arp-s B. netstat -a C. arp-a D. netstat -s
C. arp-a
Which of the following features of a switch will allow two switches to pass network information? PoE VLANs Trunking STP
Trunking
What does trunking provide?
Trunking allows you to make a single port part of multiple VLANs at the same time
Which protocols can be used for tunneling and encryption of data
Tunneling and encryption protocols include IPSec L2TP SSL PPTP VPN
A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem? A. Port scanner B. History log C. DNS log D. Application log
D. Application log
Which of the following network component interfaces with a Telco T1 line at the demarcation point? A. ISDN adapter B. Modem C. NIC D. CSU / DSU
D. CSU / DSU
A technician is setting up a wireless network using WEP and DHCP. The technician has set the channel and SSID on the client workstation. Which of the following is the remaining step to complete the configuration? A. Enter the username and password. B. Change the SSID. C. Enter an IP address for the client. D. Enter the encryption key.
D. Enter the encryption key.
Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features? A. Spanning tree B. Trunking C. PoE D. VLAN
D. VLAN
What role does the "A" record in a Domain Name Service (DNS) server have in your network? Translates human name to IP address Translates IP address to human name Enables printing, copying, and faxing from one device Controls network packets to optimize performance
DNS translates human names to IP addresses for routing your packet through the Internet.
What two pieces of information does a router require to make a routing decision? Destination network (address) Destination MAC address Application layer protocol Neighbor router
Destination network (address) Neighbor router A frame uses MAC addresses to send a packet on the LAN. The frame will take the packet to either a host on the LAN or a router's interface if the packet is destined for a remote network.
Which different user-authentication protocols are used on networks
EAP CHAP MS-CHAP PKI Kerberos Radius TACACS+ 802.1x - (EAP over LAN or EAPOL)
Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.) RIPv1 IGRP EIGRP OSPF BGP RIPv2
EIGRP OSPF RIPv2 RIPv1 and IGRP are true distance‐vector routing protocols and can't do much, really, except build and maintain routing tables and use a lot of bandwidth! RIPv2, EIGRP, and OSPF build and maintain routing tables, but they also provide classless routing, which allows for VLSM, summarization, and discontiguous networking.
You receive a call from a user who is having issues connecting to a new VPN. Which is the first step you should take? Find out what has changed Reboot the workstation Document the solution Identify the symptoms and potential causes
Identify the symptoms and potential causes
How a firewall determines which traffic can pass through it
Firewalls use access control lists (ACLs), which are sets of rules, to determine which traffic is allowed to pass through.
What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?
Mesh
What is the version or name of RIP that is used with IPv6?
RIPng (RIP next generation)
Which routing protocols have an administrative distance of 120? (Choose two.) RIPv1 RIPv2 EIGRP OSPF
RIPv1 & RIPv2 RIPv1 and RIPv2 have an AD of 120. EIGRP has an AD of 90. OSPF has an AD of 110 IGRP has a lower AD of 100
Which services allow you to remotely access computers across a network
Remote-access services and protocols include RAS RDP PPP PPPoE VNC ICA
What is the purpose of a port scanner? Scan UDP for closed ports Sweep TCP for closed ports Search the network host for open ports
Search the network host for open ports
Which type of firewall keeps track of existing connections passing through it?
Stateful
What are some of the problems that, if determined, should be escalated?
Switching loops routing loops routing problems Proxy ARP broadcast storms
What is the U.S. Department of Defense standard for individual computers?
TCS - Trusted computer system
You have just implemented a solution and you want to celebrate your success. But what should you do next before you start your celebration? Gather more information about the issue Document the issue and the solution that was implemented Test the solution and identify other effects it may have Escalate the issue
Test the solution and identify other effects it may have
Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?
The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses).
You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (Choose two.) The router is not configured for the new host. The STP configuration on the switch is not updated for the new host. The host has an invalid MAC address. The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port
The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port Tthe best answers are that the VLAN membership for the port is configured incorrectly and that STP shut down the port.
Which statements are true regarding ICMP packets? (Choose two.) They acknowledge receipt of a TCP segment. They guarantee datagram delivery. They can provide hosts with information about network problems. They are encapsulated within IP datagrams. They are encapsulated within UDP datagrams.
They can provide hosts with information about network problems. They are encapsulated within IP datagrams. Internet Control Message Protocol (ICMP) is used to send error messages through the network, but ICMP does not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).
Which network-performance optimization technique uses a contract to determine which data can get on to the network?
Traffic Shapping
When is STP said to be converged? (Choose two.) When all ports are in the forwarding state When all ports are in the blocking state When all ports are in the Listening state When all ports are in the Learning state
When all ports are in the forwarding state When all ports are in the blocking state
There are several ways to manage traffic on your network to speed up access and in some cases guarantee available bandwidth to applications. These include?
traffic shaping load balancing high availability and using caching servers or QoS
Which of the following can run full-duplex and achieve 200Mbps with CAT5e cable? 100Base-TX 100Base-T 1000Base-F 1000Base-T
100Base-T uses CAT5e and can run 200Mbps when using full-duplex. 100Base-TX is only CAT-5, not CAT5e
The default administrative distance of RIP is
120
The default administrative distance of RIPv2 is
120
What is the maximum data rate of IEEE 802.11a? What is the maximum data rate of IEEE 802.11b? What is the maximum data rate of IEEE 802.11g? What is the maximum data rate of IEEE 802.11n? What is the frequency range of IEEE 802.11a? What is the frequency range of IEEE 802.11b? What is the frequency range of IEEE 802.11g? What is the frequency range of IEEE 802.11n?
54Mbps 11Mbps 54Mbps 300Mbps 5GHz 2.4GHz 2.4GHz 2.4GHz/5GHz
The default administrative distance of EIGRP is
90
What happens when a router receives a packet for a network that isn't listed in the routing table? It forwards the packet to the next available router. It holds the packet until the address is updated in the routing table. The router will use RIP to inform the host that it can't send the packet. None of the above
A router will not send a broadcast looking for the remote network—the router will discard the packet.
Which is true regarding EIGRP successor routes? Successor routes are saved in the neighbor table. Successor routes are stored in the DUAL table. Successor routes are used only if the primary route fails. A successor route is used by EIGRP to forward traffic to a destination.
A successor route is used by EIGRP to forward traffic to a destination.
Which of the following are WAN protocols or technologies? (Choose all that apply.) ATM ISDN MPLS RIP
A. ATM B. ISDN C. MPLS Routing Information Protocol (RIP) is not a WAN protocol, but a routing protocol used in local area connections.
If you are running half-duplex Internet, which of the following is true. (Choose all that apply)? Your digital signal cannot transmit and receive data at the same time. Hosts use the CSMA/CD protocol to prevent collisions. The physical connection consists of one wire pair. All of the above
All of the above With half-duplex, you are using one wire pair with a digital signal either transmitting or receiving (but not both at once). Carrier Sense Multiple Access with Collision Detection (CSMA/CD) helps packets that are transmitted simultaneously from different hosts share bandwidth evenly.
Which of the following describes MIMO correctly? A protocol that requires acknowledgment of each and every frame A data‐transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae A modulation technique that allows more than one data rate A technique that packs smaller packets into a single unit, which improves throughput
B. Part of the 802.11n wireless standard, MIMO sends multiple frames by several antennae over several paths; they are then recombined by another set of antennae to optimize throughput and multipath resistance. This is called spatial multiplexing.
A workstation gives an error message to a user. The message states that a duplicate IP address has been detected on the network. After developing a hypothesis, what should the next step be according to the standard troubleshooting model? Test and observe an action plan. Determine if anything has changed. Implement an action plan. Document the solution and the entire process.
C. Creating an action plan and a solution, and identifying the potential effects, would be the next step according to the standard troubleshooting model.
Which UTP uses four twisted wire pairs (eight wires), is rated for 100MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?
Category 5e
What is the version or name of EIGRP that is used with IPv6?
EIGPRv6
What is the administrative distance of OSPF? 90 100 110 120
EIGRP is the lowest, at 90 IGRP has a lower AD of 100 OSPF has an AD of 110 RIPv1 and RIPv2 both have an AD of 120
If a frame is received on a switch port and the source MAC address is not in the forward/filter table, what will the switch do?
Flood the frame out all ports except the port it was received on
A cross-over cable is used to connect all of the following except: Switch to switch Host to host Hub to switch Host to switch
Host to switch All devices that are pinned the same for transmit and receive require a cross-over cable to communicate directly.
Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment? (Choose two.) Switch NIC Hub Repeater RJ‐45 transceiver
Hub Repeater Not that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this functionality for you.
What is the result of segmenting a network with a bridge (switch)? (Choose two.) It increases the number of collision domains. It decreases the number of collision domains. It increases the number of broadcast domains. It decreases the number of broadcast domains. It makes smaller collision domains. It makes larger collision domains.
It increases the number of collision domains It makes smaller collision domains
What are two advantages of fiber-optic cabling?
It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles).
Which of the following describe the DHCP Discover message? (Choose two.) It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. It uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a Layer 2 destination address.
It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. It uses UDP as the Transport layer protocol
What does 802.1b define
LAN/MAN Management
You connect a new host to your companies wireless network. The host is set to receives a DHCP address and the WEP key is entered correctly, however, the host cannot connect to the network. What can the problem be? DNS is not configured on the host MAC filtering is enabled on the AP The network has run out of wireless connections The host is enabled to run 802.11b and 802.11g
MAC filtering is enabled on the AP
What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.) DUAL table Neighbor table Topology table Successor route
Neighbor table Topology table EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and also maintained with the use of hello packets.
What is the version or name of OSPF that is used with IPv6?
OSPF3
Which network topology or connection type can be implemented with only two endpoints?
Point-to-point
What does 802.1x define
Port Based Network Access Control
Which IPv6 routing protocol uses UDP port 521? RIPng EIGRPv6 OSPFv3 IS-IS
RIPng
You need to transfer files between two hosts. Which two protocol can you use? SNMP SCP RIP NTP FTP
SCP FTP Secure Copy Protocol (SCP), and File Transfer Protocol (FTP), can be used to transfer files between two systems.
Which of the following services use TCP? (Choose three.) DHCP SMTP SNMP FTP HTTP TFTP
SMTP FTP HTTP
The OSI has seven layers, which layer does SMTP work at?
SMTP resides at the Application layer of the OSI/DoD model
Which IEEE standard specifies the protocol for CSMA/CD? 802.2 802.3 802.5 802.11
The 802.3 standard, commonly associated with Ethernet, specifies the media‐access method used by Ethernet, which is known as Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
A server has received a frame from your remote host. What will be the destination hardware address of the frame?
The MAC address of the router sending the frame to the server
When data is encapsulated, which is the correct order? Data, frame, packet, segment, bits Segment, data, packet, frame, bits Data, segment, packet, frame, bits Data, segment, frame, packet, bits
The encapsulation order is data, segment, packet, frame, bits
Which of the following protocols will advertise routed IPv6 networks? RIP RIPng OSPFv2 EIGRPv3
The routing protocols that have been upgraded to advertise IPv6 routes are RIPng, OSPFv3, and EIGRPv6. IS-IS can advertise IPv6 routes as well, but no upgrade was needed for IS-IS.
What is one reason that WPA encryption is preferred over WEP? A WPA key is longer and requires more special characters than the WEP key. The access point and the client are manually configured with different WPA key values. WPA key values remain the same until the client configuration is changed. The values of WPA keys can change dynamically while the system is used.
The values of WPA keys can change dynamically while the system is used.
Which of the following are benefits of VLANs? (Choose three.) They increase the size of collision domains. They allow logical grouping of users by function. They can enhance network security. They increase the size of broadcast domains while decreasing the number of collision domains. They simplify switch administration. They increase the number of broadcast domains while decreasing the size of the broadcast domains.
They allow logical grouping of users by function They can enhance network security. They increase the number of broadcast domains while decreasing the size of the broadcast domains.
You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the hub to the switch? EtherIP Crossover Straight‐through Cable Sense, Multiple Access
To connect two switches together or a hub to a switch, you need a crossover cable.
Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz? Category 3 UTP Category 5 STP Category 5 UTP Category 6 UTP
To get the high data-transfer speed, like 1Gbps, you need to use a wire standard that is highly rated, such as Category 5e or Category 6
Name some of the benefits of IPv6 over IPv4.
more available addresses, simpler header, options for authentication and other security