CompTIA Network+ N00-005 Questions
Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time? A) CSMA/CA B) CSMA/CD C) Wireless encryption D) Wireless bonding
A) CSMA/CA
Which of the following connector types would Sandy, a network technician, use to connect a serial cable? A) DB-9 B) LC C) RJ-11 D) BNC
A) DB-9
Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided by DHCP? A) Leases B) Static IP addressing C) DNS suffixes D) Reservations
A) Leases
Which of the following WAN technologies uses a telephone cable? A) POTS B) Cable Modem C) FDDI D) SONET
A) POTS
Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices? A) Router B) Switch C) Hub D) WAP
A) Router
Which of the following sizes is the fixed cell length in ATM? A) 8 bytes B) 53 bytes C) 128 kilobytes D) 64 kilobytes
B) 53 bytes
Which of the following is the port number used by HTTP? A) 3389 B) 80 C) 443 D) 21
B) 80
Sandy, a technician, is fixing a wireless network that was receiving interference from a user's cordless phone. Which of the following should Sandy configure? A) SSID B) Channel C) DHCP Scope D) Encryption
B) Channel
Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of the network? A) Port Mirroring B) Convergence C) Spanning Tree D) Link State
B) Convergence
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? A) PSTN B) MPLS C) VLAN D) VPN
B) MPLS
In which of the following layers of the OSI model does the TCP protocol operate? A) Session B) Transport C) Network D) Data Link
B) Transport
Which of the following regulates the amount of network traffic a single node receives in a server cluster? A) Content Filter B) Proxy server C) Load balancer D) Quality of Service
C) Load balancer
Which of the following connectors push and twist-on? A) SC B) RJ-45 C) ST D) LC
C) ST
A zone transfer occurs over which of the following ports? A) TCP 25 B) UDP 123 C) TCP 53 D) UDP 67
C) TCP 53
Which of the following is an EGP routing protocol? A) OSPF B) RIP C) IGP D) BGP
D) BGP
A bridge handles frames at which of the following layers of the OSI model? A) Session B) Network C) Transport D) Data Link
D) Data Link
An administrator is configuring IP 10.178.1.5 on a legacy devices that will only accept a classful address. Which of the following is the address that can be used in this scenario? A) 10.178.1.5/8 B) 10.178.1.5/16 C) 10.178.1.5/1 D) 10.178.1.5/30
A) 10.178.1.5/8
Which of the following uses copper wiring? A) 1000BaseT B) 10GBaseER C) 100BaseFX D) 10GBaseLW
A) 1000BaseT
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies? A) 802.11n B) 802.11a C) 802.11g D) 802.11b
A) 802.11n
Which of the following is the loopback address for IPv6? A) ::1 B) 127:0:0:1 C) ::255 D) 127.0.0.1
A) ::1
Which of the following statements are true regarding VLANs? (choose TWO) A) A VLAN has a single broadcast domain. B) For traffic to pass between two VLANs, that traffic must be routed. C) Because of a switch's MAC address table, traffic does not need to be routed to pass between two VLANs. D) A VLAN has a single collision domain.
A) A VLAN has a single broadcast domain. B) For traffic to pass between two VLANs, that traffic must be routed.
They selection of the correct punch down tool to use depends on which of the following? A) Block type B) Connector type C) Switch location D) Demarcation point location
A) Block type
A packet sniffer is MOST likely used to do which of the following? A) Capture and analyze network traffic B) Prevent network based attacks C) Record the switch ARP table D) Route IP packets to remote destinations
A) Capture and analyze network traffic
Which of the following capabilities of a firewall allows Kurt, an administrator, to block traffic based on keywords determined by the company? A) Content filter B) Stateless traffic monitor C) Stateful traffic monitor D) Signature identification
A) Content filter
When examining a suspected faulty copper network cable, Karen, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following? A) Cross-talk B) DB loss C) Collisions D) Dispersion
A) Cross-talk
Which of the following metrics identifies the number of connections that is between two devices? A) Hop count B) MTU C) Latency D) Bandwidth
A) Hop count
Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use? A) Multimode fiber B) CAT6 C) CAT5e D) Coaxial
A) Multimode fiber
T568B wiring scheme is typically found on which of the following components? A) Patch Panel B) Demarc Extension C) 66 Block D) Vertical Cross-connect
A) Patch Panel
A crossover cable is MOST commonly associated with which of the following layers of the OSI model? A) Physical B) Network C) Application D) Session
A) Physical
A crossover cable is MOST commonly associated with which of the following layers of the OSI model? A) Physical B) Network C) Session D) Application
A) Physical
Which of the following layers of the OSI model maps to the Network Interface layers of the TCP stack? (Select TWO) A) Physical B) Session C) Transport D) Network E) Data Link
A) Physical E) Data Link
A technician who separated two departments using VLAN's now discovers that the VLAN's cannot communicate with each other. Which of the following does the technician need to enable communication between the VLAN's? A) Router B) Port spanning C) VLAN concentrator D) Firewall
A) Router
Which of the following OSI layers is included in the TCP/IP model's Application layer? A) Session B) Transport C) Data Link D) Network
A) Session
Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network? A) Star B) Ring C) Peer-to-peer D) Bus
A) Star
Identify two differences between an Ethernet bridge and an Ethernet switch. (Choose TWO) A) Switches use ASICs to make forwarding decisions, while bridges make their forwarding decisions in software. B) Bridges typically operate faster than switches. C) Switches typically have higher port densities than bridges. D) Bridges can base their forwarding decisions on logical network layer addresses.
A) Switches use ASICs to make forwarding decisions, while bridges make their forwarding decisions in software. C) Switches typically have higher port densities than bridges.
Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt's wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? A) WEP should be replaced with WPA encryption. B) SSID should be changed daily and enabled. C) Omni-directional antennas should be used to limit signal strength. D) MAC filtering should be enabled and configured. E) A different WAP manufacturer should be used to prevent commonly used.
A) WEP should be replaced with WPA encryption. & D) MAC filtering should be enabled and configured.
Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO) A) WPA B) GBIC installation C) MTU black hole D) Reduction of signal gain E) VLANs F) PoE
A) WPA & D) Reduction of signal gain
When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference? A) 6 and 10 B) 1 and 6 C) 5 and 6 D) 2 and 6
B) 1 and 6
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO) A) 143 B) 162 C) 22 D) 8080 E) 23 F) 161
B) 162 F) 161
Which of the following is an invalid subnet mask? A) 255.255.0.0 B) 255.256.255.0 C) 255.0.0.0 D) 255.255.255.255
B) 255.256.255.0
Which of the following technologies has different upload and download speeds? A) OC12 B) ADSL C) OC3 D) SDSL
B) ADSL
Which of the following network devices MOST likely functions as a network repeater or a bridge? A) IDS B) Access Point C) VPN Concentrator D) Firewall
B) Access Point
Which of the following is MOST commonly powered using PoE? A) Routers B) Access Points C) Laptops D) Switches
B) Access Points
Which TCP/IP model layer does the OSI model layer named "session" respond to? A) Transport B) Application C) Internet D) Presentation
B) Application
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination? A) RIPv2 B) BGP C) OSPF D) RIP
B) BGP
Which of the following wireless standards operates on the same frequency as 802.11a? A) Compatible with 802.11i wireless networks B) Compatible with 802.11n wireless networks C) Compatible with 802.11g wireless networks D) Compatible with 802.11b wireless networks
B) Compatible with 802.11n wireless networks
Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch? A) 568B B) Crossover C) Loopback D) 568A
B) Crossover
Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches? A) CAT3 cable B) Crossover cable C) Serial cable D) Rollover cable
B) Crossover cable
At which of the following layers does the ICMP protocol operate? A) Layer 1 B) Layer 3 C) Layer 4 D) Layer 5
B) Layer 3
Which of the following network appliances would facilitate an even amount of traffic hitting each web server? A) VPN Concentrator B) Load balancer C) Content Filter D) Proxy server
B) Load Balancer
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location? A) 66 Block B) MDF C) Smart Jack D) VPN
B) MDF
Which of the following layers of the OSI model is above the Session layer? A) Transport B) Presentation C) Physical D) Data Link
B) Presentation
Which of the following identifies the WLAN Joe, a user, is connected to? A) Channel B) SSID C) Frequency D) WEP
B) SSID
Which of the following would be used to connect two IDF's in the same building with the LAN, while minimizing crosstalk? A) UTP B) STP C) RG-6 D) CAT3
B) STP
Joe, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement? A) Set a separate VLAN on each WAP with the same frequency. B) Set the SSID on each WAP and set contiguous WAPs to different channels. C) Set the SSID on each WAP and set contiguous WAPs to the same channel. D) Set a separate VLAN on each WAP with the with the same encryption type.
B) Set the SSID on each WAP and set contiguous WAPs to different channels.
Which of the following can Joe, a network technician, change to help limit war driving? A) Frequency B) Signal Strength C) SSID D) Channel
B) Signal Strength
Kurt, a user, is able to connect to a distant wireless network then loses connection. This is an ongoing problem for Kurt and the only wireless network around. Which of the following is MOST likely causing this problem? A) Incorrect SSID B) Signal strength C) Encryption type D) Incorrect channel
B) Signal strength
A small office has asked to have six PC's networked together by Joe, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Joe need? (Select TWO) A) RG-59 patch cabling B) Switch C) CAT5e patch cabling D) Firewall E) Network bridge
B) Switch C) CAT5e patch cabling
Which of the following is true about an IP address if the first bit is a zero? A) The address is a Class B address. B) The address is a Class A address. C) The address is a Class C address. D) The address is a Class D address.
B) The address is a Class A address.
Joe, a customer, is looking to implement wireless security. Which of the following provides the WEAKEST encryption? A) SSH B) WEP C) EAP D) TLS
B) WEP
Joe, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has been steadily increasing. Which of the following should be configured to resolve this problem? A) MTU B) WPA C) SSID D) VLAN
B) WPA
A wireless LAN discovery tool that sends a null probe request to seek out wireless LANs, is a component of which of the following? A) An evil twin B) War driving C) War chalking D) WEP cracking
B) War driving
After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type? A) Straight-thru cable with open pairs B) Crossover cable C) Crossover cable with open pairs D) Rollover cable
B)Crossover cable
Which of the following ports carries IMAP traffic, by default, on modern email systems? A) 25 B) 80 C) 143 D) 23
C) 143
Which of the following ports would Kurt, a technician, need to open on a firewall to allow SSH on the default port? A) 21 B) 23 C) 22 D) 20
C) 22
Which of the following ports is the default telnet port? A) 20 B) 22 C) 23 D) 21
C) 23
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A) 802.11b B) 802.11g C) 802.11a D) 802.11n
C) 802.11a
Which of the following wireless standards has the highest maximum data rate? A) 802.11b B) 802.11a C) 802.11n D) 802.11g
C) 802.11n
Which of the following is an example of a DHCP failover mechanism? A) Inactive lease B) Reservations C) APIPA D) Active lease
C) APIPA
A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network (Select TWO). A) Change the broadcast channel to a less commonly used channel. B) Limit the DHCP scope to only have three address total. C) Change the encryption method to WPA. D) Enable the SSID broadcast. E) Enable and configure MAC filtering.
C) Change the encryption method to WPA. & E) Enable and configure MAC filtering.
Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this? A) PAT B) Implicit deny C) Content Filter D) NAT
C) Content Filter
Which of the following connector types will MOST likely be located on a serial cable? A) BNC B) ST C) DB-9 D) LC
C) DB-9
Joe, a company executive, has noticed that a wireless signal from the company's WAP can be seen in the company's parking lot. Joe is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat? A) Implement WEP encryption B) Change wireless channels C) Decrease signal strength D) Rotate the SSID daily
C) Decrease signal strength
Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers? A) Encryption protocols B) User authentication C) Device placement D) MAC address filtering
C) Device placement
Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose? A) CAT3 B) Coaxial C) Fiber D) STP
C) Fiber
Which of the following cable mediums is NOT susceptible to EMI? A) UTP B) Wireless C) Fiber D) Coaxial
C) Fiber
Which of the following uses eight groups of characters for addressing? A) IPv4 B) MAC C) IPv6 D) DHCP
C) IPv6
The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model? A) Layer 2 B) Layer 5 C) Layer 4 D) Layer 3
C) Layer 4
Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this? A) PPPoE B) WPA Enterprise C) MAC Filtering D) SSL VPN
C) MAC Filtering
Which of the following issues is a common problem in wireless infrastructures? A) Incorrect port number B) Too many collisions C) Mismatched SSIDs D) Invalid telnet sessions
C) Mismatched SSIDs
Kurt, an administrator, configures a device that functions at the network layer, and also has 24 collision domains. Which of the following terms BEST describes this device? A) VPN concentrator B) Wireless access point C) Multilayer switch D) Hub
C) Multilayer Switch
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server? A) ARP B) RTP C) NTP D) TFTP
C) NTP
Which of the following OSI model layers is used for logical addressing? A) Transport B) Physical C) Network D) Data Link
C) Network
Which of the following is the third layer of the OSI model? A) Data Link B) Transport C) Network D) Application
C) Network
What type of coaxial cable was often used for 10BASE2 Ethernet networks? A) RG-6 B) RG-45 C) RG-58 D) RG-59
C) RG-58
Which of the following routing protocols runs over UDP and determines path based upon distance vectors> A) IS-IS B) BGP C) RIP D) DSI
C) RIP
Which of the following has a DB-9 connector? A) LC B) SC C) RS-232 D) RJ-45
C) RS-232
Which of the following can Joe, a technician, modify on an 802.11n router that is not available as an option on 802.11g device? A) Channel B) SSID C) Spectrum D) Encryptions
C) Spectrum
For which of the following reasons could a single server's NIC transmit packets from multiple MAC address sources? A) The server is hosting a proxy server and the MAC addresses are from the connected clients B) The server is hosting a web server and the MAC addresses are from connected browsers C) The server contains several virtual machines and the MAC addresses are from the virtual machines D) The server NIC is starting to fail and should be replaced
C) The server contains several virtual machines and the MAC addresses are from the virtual machines
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately NOT work? A) This is a public address which can only be seen by internal users. B) This is a private address which can only be seen by external users. C) This is a private address which cannot be seen by external users. D) The address does not have the appropriate subnet mask assigned.
C) This is a private address which cannot be seen by external users.
Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal. Which of the following could be done together to solve this problem? (Select TWO) A) Increase the encryption method. B) Change the wireless signal. C) Turn down the signal gain. D) Disable the SSID E) Replace the WAP's antennas with directional antennas.
C) Turn down the signal gain. & E) Replace the WAP's antennas with directional antennas.
A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used? A) Peer to peer B) Subnetting C) VLAN D) VPN
C) VLAN
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems compared to the limited number of wireless devices used. Joe believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO) A) Changing the wireless speed standards B) Changing wireless channels C) WPA encryption D) SID disable E) MAC Filtering
C) WPA encryption & E) MAC Filtering
Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? A) 25 B) 22 C) 21 D) 23
C)21
Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap? A) 1, 2, 3 B) 2, 6, 10 C) 1, 7, 10 D) 1, 6, 11
D) 1, 6, 11
1000BaseT has a MAXIMUM run distance of: A) 500 meters (1640 feet) B) 25 meters (82 feet) C) 1000 meters (3280 feet) D) 100 meters (328 feet)
D) 100 meters (328 feet)
Which of the following is typically used in a LAN environment? A) 10GBaseLW B) 10GBaseEW C) 10GBaseSW D) 10GBaseSR
D) 10GBaseSR
Which of the following has a MAXIMUM distance of 300 meters (984 feet)? A) 100BaseFX B) 1000BaseT C) 100BaseTX D) 10GBaseSW
D) 10GBaseSW
Which of the following cable speeds would provide the GREATEST theoretical bandwidth? A) 100BaseT B) 1000BaseT C) 10BaseT D) 10GBaseT
D) 10GBaseT
Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter? A) 10GBaseX B) 10GBaseLR C) 10GBaseSR D) 10GBaseT
D) 10GBaseT
By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO) A) 21 B) 123 C) 80 D) 25 E) 110
D) 25 E) 110
Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed? A) 802.11a B) 802.11g C) 802.11b D) 802.11n
D) 802.11n
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting? A) A demarc B) A DB-9 C) A smart jack D) A 110 block
D) A 110 block
Which of the following connector types is used for coax cable? A) SC B) ST C) LC D) BNC
D) BNC
Which of the following describes what the number two represents in 100Base2 cabling? A) UTP B) Fiber C) Twisted pair D) Coaxial cable
D) Coaxial cable
Which of the following is the name of the routing update process involved when a change occurs in the routing environment? A) Dynamic B) Supernetting C) Subletting D) Convergence
D) Convergence
An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used? A) SNAP B) NAC C) MPLS D) DNAT
D) DNAT
Which of the following provides Kurt, a network technician, resource record information about network nodes such as canonical names? A) Proxy server B) IPS C) DHCP D) DNS
D) DNS
Which of the following OSI layers performs error detection using a Frame Check Sequence? A) Session B) Physical C) Transport D) Data Link
D) Data Link
Which of the following describes the purpose of DHCP? A) Resolving FQDNs to IP addresses. B) Applying prioritization to certain types of network traffic. C) Filtering web content based on keywords D) Dynamic assignment of IP addresses
D) Dynamic assignment of IP addresses
Which of the following connectors would Karen, a technician, use only for RG-6 cables? A) RJ-45 B) MTRJ C) RS-232 D) F-connector
D) F-connector
Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic? A) Switch B) Modem C) Repeater D) Hub
D) Hub
Which of the following protocols requests membership to a multicast group? A) ICMP B) SNMP C) SMTP D) IGMP
D) IGMP
Joe, a customer, has reported that the wireless signal from a WAP can only be found in one specific corner of a conference room. Which of the following is the MOST likely cause? A) Incorrect encryption method B) Incorrect SSID identifier C) Incorrect channel D) Incorrect antenna type
D) Incorrect antenna type
Which of the following devices will allow Sandy, a user, to see a cached copy of websites? A) Load balancer B) Content switch C) DNS server D) Proxy server
D) Proxy server
Which of the following uses a ring topology? A) DSL B) Ethernet C) DOCSIS D) SONET
D) SONET
Which of the following media types will block EMI? A) Serial B) UTP C) Non-plenum D) STP
D) STP
Which of the followingn cable types would have the LEAST amount of EMI? A) CAT5 B) Plenum CAT6 C) CAT3 D) STP CAT6
D) STP CAT6
Which of the following is a purpose of a VLAN? A) Increases port speed B) Decreases bandwidth on a network C) Allows another connection to the router D) Segments broadcast traffic
D) Segments broadcast traffic
Sandy, a network consultant, is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every corner of the house. Which of the following additional information will Sandy need to determine the equipment for the installation? (Select TWO) A) How many rooms are in the house? B) How many users will be using the wireless network? C) The cost of the house. D) The length of the house. E) The building material of the house.
D) The length of the house. & E) The building material of the house.
Joe, a technician, is asked to install a new wireless router, and make sure access to the new wireless network is secured. Which of the following should be considered for security? A) The router is compatible with 802.11g. B) The router is broadcasting on the correct frequency. C) The router has the correct antenna type. D) The router has the SSID disabled.
D) The router has the SSID disabled.
A router has 12 ports. How many broadcast domains does the router have? A) None B) One C) Two D) Twelve
D) Twelve
A switch has 12 ports. How many Collision Domains does the switch have? A) None B) One C) Two D) Twelve
D) Twelve
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use? A) Port filtering B) WEP C) Longer SSID broadcast intervals D) WPA
D) WPA
Joe, a technician, is configuring a wireless access point. Which of the following channels should he use if the LEASE interference potential is desired? A) 1, 6, 11 B) 3,7, 10 C) 7,8, 9 D) 2,5, 10
A) 1, 6, 11
CAT6 Ethernet cabling has a rated maximum transmission capability of: A) 10,000Mbps B) 100Mbps C) 10Mbps D) 20,000Mbps
A) 10,000Mbps
Which of the following would be an IP address received from APIPA? A) 169.254.0.100 B) 10.0.0.100 C) 192.168.0.100 D) 172.168.0.100
A) 169.254.0.100
Which of the following is the broadcast address for a network defined as 192.168.0.0/24? A) 192.168.0.255 B) 192.168.0.253 C) 192.168.0.1 D) 192.168.0.0
A) 192.168.0.255
An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating as to cause this issue? A) 2.4GHz B) 900MHz C) 5GHz D) 1.1GHz
A) 2.4GHz
Kurt, an administrator, receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue? A) 2.4GHz B) 900MHz C) 5GHz D) 1.1GHz
A) 2.4GHz
Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO) A) 443 B) 53 C) 80 D) 23 E) 25
A) 443 C) 80
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A) 53 B) 20 C) 3389 D) 80
A) 53
A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation? A) WPA encryption B) WEP encryption C) Disable SSID D) Channel rotation
A) WPA encryption
Which of the following is a multifunction device in a SOHO network? A) Wireless router B) Load balancer C) Bandwidth shaper D) Proxy server
A) Wireless router
In which of the following wireless standards is MIMO used? A) 802.11a B) 802.11n C) 802.11g D) 802.11b
B) 802.11n
Sandy, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used? A) 802.11g B) 802.11n C) 802.11a D) 802.11b
B) 802.11n
Which of the following wireless network standards allows for the HIGHEST speeds? A) 802.11a B) 802.11n C) 802.11g D) 802.11b
B) 802.11n
Which of the following wireless technologies can support the MOST allowable MIMO streams A) 802.11b B) 802.11n C) 802.11a D) 802.11g
B) 802.11n
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present? A) Reverse ARP B) 802.1q trunking C) PoE D) Full duplex on the fiber link
B) 802.1q trunking
A firewall that operates at Layer 7 of the OSI model is known as a(n): A) Redundant firewall B) Application level C) Packet filter D) Circuit gateway
B) Application level
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice? A) RIP B) BGP C) OSPF D) IS-IS
B) BGP
Which of the following connector types is MOST commonly found with coaxial cabling? A) RJ-45 B) BNC C) RJ-11 D) DB-9
B) BNC
Joe, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen? A) Duplicate IP addresses B) Broadcast storm C) VLAN malfunction D) Quality of Service loss
B) Broadcast storm
Which of the following is the network topology in which computers connect to form a straight line? A) Mesh B) Bus C) Ring D) Star
B) Bus
Which of the following categories of UTP cabling are most commonly used for 1000BASE-T networks? (Choose TWO) A) CAT5 B) CAT5e C) CAT6 D) CAT6e
B) CAT5e C) CAT6
Which of the following services do TCP connections provide to application layer protocols? (Select TWO) A) Transport services without error recovery B) Delivery through error recovery C) Large data size manageability using segmentation D) Secure Kerberos password encryption on data E) Proxy server authentication
B) Delivery through error recovery C) Large data size manageability using segmentation
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue? A) Open pairs B) EMI C) ESD D) A short
B) EMI
A standard installation for wireless will use which of the following antenna types? A) Patch B) Omni-Directional C) Yagi D) Sector
B) Omni-Directional
Which of the following allows for multiple backend web servers to be accessed through a single public IP address? A) Quality of service prioritization B) Port Address Translation C) Traffic Shaping D) Caching Engines
B) Port Address Translation
Karen, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows: End A: orange-white, orange, green-white, blue, blue-white, brown-white, brown End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown Which of the following should Karen do to complete the installation? A) Use the provided cable B) Purchase a straight-through cable C) Re-end the provided cable, keeping the wiring the same D) Purchase a crossover cable
B) Purchase a straight-through cable
Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference? A) RTP B) STP C) UTP D) FTP
B) STP
A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue? A) The client does not support 802.11n B) The client distance from the AP C) Incorrect encryption on the AP D) Incorrect frequency on the client is being used
B) The client distance from the AP
Which of the following is a reason to use dynamic DNS? A) Static routes cannot be used on the host network. B) The host IP address is assigned by DHCP. C) The host IP address is not listed in the firewall. D) A third-party certificate is being used.
B) The host IP address is assigned by DHCP.
An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference? A) 3, 6, and 9 B) 36, 40, and 44 C) 1, 6, and 11 D) 11, 16, and 20
C) 1, 6, and 11
Which of the following is a Class A private IP address? A) 192.168.0.100 B) 4.2.2.2 C) 10.1.1.45 D) 169.254.9.15
C) 10.1.1.45
Which of the following network appliances can BEST be described as allowing multiple servers to share requests for a website through the same public IP address? A) VPN concentrator B) Content filter C) Load balancer D) Proxy server
C) Load balancer
In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the: A) Demarcation point B) Proxy C) MDF D) Smart Jack
C) MDF
Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of the routing information. Which of the following protocols would be BEST for him to use? A) STP B) VLSM C) OSPF D) RIP
C) OSPF
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers? A) DSL B) Smart Jack C) POTS D) VDSL
C) POTS
Kurt, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO) A) Bridges B) Patch Panels C) Routers D) Hubs E) WAPs F) VLANs
C) Routers F) VLANs
Karen, a customer, wants to install a wireless network into a shared office space. there are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless networks and still provide the BEST performance and security? (Select TWO) A) Antenna type B) NAT C) SSID D) Wireless standard E) Channel
C) SSID & E) Channel
Which of the following technologies would Sandy, a technician, use to connect networks at large distances without the use of physical medium? A) ISDN B) OC3 C) Satellite D) OC12
C) Satellite
Joe, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAP's to make this change? A) PPPOE B) Encryption technology C) Transmission power D) SSID masking
C) Transmission power
Sandy, a network technician, would like to keep the IP address of the Human Resource department's server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employee workstations. Which of the following would BEST allow this and have the ability for the server to keep the same IP address? A) Use a small DHCP scope for the Human Resource department. B) Connect the server to a router in the network closet on the same floor. C) Use a DHCP reservation for the server IP address. D) Implement a set of static IPs for the entire Human Resource department.
C) Use a DHCP reservation for the server IP address.
In the 2.4GHz range, which of the following channel combinations are non-overlapping? A) 2, 7, 10 B) 2, 8, 13 C) 3, 6, 9 D) 1, 6, 11
D) 1, 6, 11
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased? A) CAT5 B) CAT3 C) Coaxial D) CAT5e
D) CAT5e
Which of the following can be an STP cable? A) RG-6 B) RG-59 C) Fiber D) CAT5e
D) CAT5e
The location that the local network connection ends and the ISP responsibility begins is know as the: A) IDF connection. B) Access Point. C) Default Gateway. D) Demarcation Point
D) Demarcation Point
A router primarily makes its forwarding decisions based on what address? A) Destination MAC address B) Source IP address C) Source MAC address D) Destination IP address
D) Destination IP address
Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cabling being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable? A) Install a 500 foot (152 meter) CAT5 cable B) Install a 500 foot (152 meter) CAT5e cable C) Install three CAT6 cables with a repeater D) Install two CAT6 cables with a repeater
D) Install two CAT6 cables with a repeater
Which of the following is a disadvantage of using the EIGRP protocol? A) It does not scale well. B) It converges slower than OSPF. C) It is a distance vector protocol. D) It is a proprietary protocol.
D) It is a proprietary protocol.
At which of the following layers does the TFTP protocol operate? A) Layer 4 B) Layer 5 C) Layer 1 D) Layer 7
D) Layer 7
Which of the following regulates the amount of network traffic a single node receives in a server cluster? A) Quality of service B) Proxy server C) Content filter D) Load balancer
D) Load balancer
A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is an example of which of the following? A) NMAP B) DMZ C) IDS D) NAT
D) NAT
Which of the following allows a technician to mask a private network of IP addresses behind one public IP address? A) DHCP B) DNS C) Subnetting D) NAT
D) NAT
Joe, a network technician, is tasked with installing a router and firewall to get an office working with internet access. Which of the following features MUST be configured to allow sharing of a single public IP address? A) POP3 B) QoS C) SMTP D) PAT
D) PAT
Which of the following interfaces is used to connect analog devices to the Internet? A) VDSL B) SDSL C) ATM D) POTS
D) POTS
Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables? A) Switch B) Smart jack C) Router D) Patch panel
D) Patch panel
On which of the following layers does a hub function? A) Network B) Transport C) Data Link D) Physical
D) Physical
VoIP is being implemented throughout a company and Joe, the network technician, needs to ensure that data and voice traffic do not interfere with each other. Which of the following features should be configured on a layer 3 switch to prioritize traffic for VoIP? A) VTP B) Port Security C) VLAN D) QoS
D) QoS
Which of the following protocols does a router use to communicate packets to other routers? A) VLAN B) VTP C) STP D) RIP
D) RIP
Which of the following defines the range of IP addresses a DHCP server can assign? A) Lease B) Reservation C) Subnet D) Scope
D) Scope
Which of the following TCP/IP and OSI model layers re-transmits a TCP packet if it is not received successfully at its destination? A) The network OSI model layer and the Internet TCP/IP model layer B) The network OSI model layer and the transport TCP/IP model layer C) The transport OSI model layer and the Internet TCP/IP model layer D) The transport OSI model layer and the transport TCP/IP model layer
D) The transport OSI model layer and the transport TCP/IP model layer