MTA Networking Fundamentals Certification Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which one of the following is a second-level domain? A. in-addr.arpa B. .edu C. www.gmetrix.com D. microsoft.com

.edu

You have a subnet mask of 255.255.240.0. What would the CIDR notation be? A. /16 B. /20 C. /24 D. /28

/20

The subnet mask 255.255.255.240 can be written in slash notation as _______________ A. /30 B. /26 C. /28 D. /24

/28

Which IP address in a routing table signifies a default route? A. 127.0.0.1 B. 0.0.0.0 C. 255.255.255.255 D. 1.1.1.1

0.0.0.0

Classful Addressing Class A Class B Class C Class D Class E

0.0.0.0 - 127.255.255.255 128.0.0.0 - 191.255.255.255 192.0.0.0 - 223.255.255.255 224.0.0.0 - 239.255.255.255 240.0.0.0 - 255.255.255.255

Which of the following represents a Media Access Control (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Al:25 D. 127.0.0.1

05:35:AB:6E:Al:25

Which of the following cables match the speeds presented? 1. Cat5 2. Cat2 3. Cat5e 4. Cat3 A. 1 Gbps B. 10 Mbps C. 100 Mbps

1 Gbps --> Cat5e 10 Mbps --> Cat3 100 Mbps --> Cat5

Class A:

1-127 /8

Which layers of the OSI model are considered to be hardware layers? A. 1-2 B. 4-7 C. 1-3 D. 3-7

1-3

An administrator wants to give priority to video conferencing traffic on a router. What should be configured on the router to facilitate this? A. Firewall B. Static routing C. Floating static routes D. QoS

QoS

When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem? A. EMI B. RFI C. network adapter failure D. cable failure

RFI

What of the following is not a characteristic of 802.11n? A. frame aggregation B. channel bonding C. RFI protection D. MIMO

RFI protection

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network? A. RIP B. OSPF C. BGP D. IGMP

RIP

Which of the following is not a fiber connector? A. FC B. LC C. RJ-45 D. MT-RJ

RJ-45

What is the most common adapter or connector used to connect a computer to a wired network? A. RG6 B. RG58 C. RJ45 D. RJ8

RJ45

What is the frame that is smaller than 64 bytes called? A. JUMBO B. RUNT C. TINY D. MICRO

RUNT

A layer 3 switch is similar to a __________. A. Router B. Repeater C. Hub D. Patch Panel

Router

What is an example of a Layer 3 device that connects multiple computers and networks? A. Packet B. Repeater C. Switch D. Router

Router

You need to divide a network into three subnets. Which Device should you use? A. Router B. Hub C. Segmenter D. Bridge

Router

You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use? A. Hub B. Repeater C. Switch D. Router E. Bridge

Router

_________ is used to send packets from one network to another network. A. Routing B. Transport C. BGP D. Encapsulation

Routing

In the IP Sec the __________ generates encryption and authentication keys. A. SA B. AH C. ARP D. ESP

SA

Which component of IPSec is generates the encryption and authentication keys? A. SA B. AH C. ESP D. MPPE

SA

Which type of networks cables can carry signals over the longest distances? A. Multimode fiber B. Singlemode fiber C. Coaxial D. Twisted-Pair

Singlemode fiber

Which of the following IPv6 addresses is used to identify a node in a site or intranet? A. Local-link B. Site local unicast C. Global unicast D. Anycast

Site local unicast

You are needing to set up a VPN between two companies that are collaborating on a project. Which type of VPN will you set up? A. Site-to-Host B. Site-to-Site C. Host-to-Host D. Host-to-Site

Site-to-Site

___________ securely connects two portions of a private network or two private networks. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN

Site-to-Site VPN

In which physical network topology is each computer connected to a central point? A. Star B. Mesh C. Ring D. Bus

Star

This question requires that you evaluate the underlined text to determine if it is correct. An example of a physical Ring topology would be eight hubs connected to a single switch. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. A. Bus B. No change is needed C. Star D. Mesh

Star

Which type of firewall blocks packets based on rules that are based on IP addresses or ports? A. packet filtering B. stateful packet inspection C. NAT filtering D. Application-level gateway

packet filtering

What technology takes data and breaks them into packets and sends them over a network, sometimes using different routes for each packet? A. circuit switching B. connection switching C. packet switching D. network switching

packet switching

X.25 and Frame Relay are examples of what type of WAN technology? A. circuit switching B. connection switching C. packet switching D. network switching

packet switching

Which model has each host have their own security database? A. peer-to-peer B. client/server C. distributive D. sliding

peer-to-peer

All of your users connect to Web sites using Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name? A. FTP B. UDP C. HTTP D. HTTPS

HTTP

Which of these protocols is not a Network Layer Protocol? A. IP B. ICMP C. HTTP D. ARP

HTTP

Which protocol can be used to encrypt packets on the Internet? A. HTTP B. SNMP C. HTTPS D. TFTP

HTTPS

Which metric does Routing Information Protocol (RIP) use to determine the least costly route? A. Delay B. Host ID C. Hop count D. Interface

Hop count

A _________ is a single computer or device that connects to a TCP/IP network. A. Host B. Node C. Access Point D. Laptop

Host (It can also be Node)

________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. A. Hub B. Router C. Firewall D. Switch

Hub

Ping is used to check network connectivity and it makes use of the _____________ protocol. A. IGMP B. RARP C. Proxy ARP D. ICMP

ICMP

What protocol does the ping command use to test network connectivity? A. TCP B. UDP C. ICMP D. FTP

ICMP

Which of the below is a standard for Wireless devices? A. IEEE 802.1 q B. IEEE 802.3 C. IEEE 802.11 D. IEEE 802.3ab

IEEE 802.11

What is used to uniquely identify a host on a TCP/IP network? A. IP address B. MAC address C. bit pattern D. router name

IP address

Layer 3 Switching uses Logical Addresses such as _____ to determine the determine the destination of the packet. A. DHCP servers B. IP addresses C. Domain controllers D. MAC addresses

IP addresses

_________________ is a feature in Windows that can used when want to make a server act like a router. A. RDP B. IP Sec C. DNS D. IP forwarding

IP forwarding

Which of the following utilities is used to display the current TCP/IP configuration of a Windows NT computer? A. FTP B. IPCONFIG C. CONFIG.SYS D. NBTSTAT

IPCONFIG

Which of the following utilities will produce the output as shown in the image below? A. NBTSTAT B. IPCONFIG C. PING D. NETSTAT

IPCONFIG

Which type of port is used to support VLAN traffic between two switches? A. LAN port B. Trunk port C. Virtual port D. WAN port

Trunk port

How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users. A. WAN B. VPN C. ISDN D. LAN

VPN

What allows a user to connect to a corporate network using the Internet? A. VPN B. VPC C. PPTN D. IPSec

VPN

What technology can you use temporarily to connect networks from two different companies? A. VPN B. HTTP C. DHCP D. passive router

VPN

Which data transmission method uses a private tunnel over a public network? A. PPTP B. L2TP C. IPsec D. VPN

VPN

Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN

VPN

To test a cable, you would use a _____________. A. Continuity tester B. Patch Tester C. Loopback Plug D. Tone & Probe

Continuity tester

The 802.3an Ethernet network runs at a speed of ____________ A. 10Mbps B. 100 Mbps C. 10 Gbps D. 1 Gbps

10 Gbps

Which type of cable is least susceptible to EMI? A. Coaxial B. UTP C. Fiber Optic D. STP

Fiber Optic

Match each port speed to its definition. 1. 1 Kbps 2. 1 Gbps 3. 1000 Kbps 4. 10 Mbps A. 1,000 bits per sec B. 10,000,000 bits per sec C. 1,000 megabits per sec D. 1 Mbps

1. 1 Kbps --> 1,000 bits per sec 2. 10 Mbps --> 10,000,000 bits per sec 3. 1 Gbps --> 1000 Mbps per sec 4. 1000 Kps --> 1 Mbps per sec

Match each IP address to its corresponding IPv4 address class. 1. Class A 2. Class B 3. Class C 4. Class D A. 224.2.200.35 B. 130.34.3.223 C. 10.123.12.1 D. 199.11.221.4

1. 10.123.12.1 2. 130.34.3.223 3. 199.11.221.4 4. 224.2.200.35

Match each IP address to its appropriate class. 1. Class A 2. Class B 3. Class C 4. Class D A. 224.0.0.2 B. 100.100.1.1 C. 198.126.1.55 D. 170.100.1.5 E. 241.241.241.241

1. 100.100.1.1 2. 170.100.1.5 3. 198.126.1.55 4. 224.0.0.2

You work in the IT Department of a mid-size corporation. The company's network is segmented into several subnets. The layout of the network is similar to the following image: The number of hops a packet must take from the source network to the destination network is... A. 6 B. 4 C. 5 ______ is a common routing protocol that uses hop count. A. EIGRP B. RIP C. OSPF

1. 4 2. RIP

Match each Maximum Data Transfer Rate to a WAN Technology. 1. Dial-up 2. ISDN 3. T1 4. E1 A. 128 Kbps B. 2.048 Mbps C. 1.536 Mbps D. 56 Kbps

1. 56 Kbps 2. 128 Kbps 3. 1.536 Mbps 4. 2.048 Mbps

The local university uses a network layout for their routers similar to the following image: 1. What is the physical topology of this network? A. 6 B. 4 C. 3 2. How many connections are there among the routers? A. Star B. Mesh C. Bus

1. 6 2. Mesh

Match 802.11 standard to its description. 1. Frequency: 2.4 GHz - Data rate: 11 Mbps 2. Frequency: 2.4 GHz - Data rate: 54 Mbps 3. Frequency: 2.4 GHz or 5 GHz - Data rate: 65 - 600 Mbps 4. Frequency: 5 GHz - Data rate: 54 Mbps 5. Frequency range: 5 GHz - Data rate: up to 1.3 Gbps A. 802.11n B. 802.11g C. 802.11ac D. 802.11b E. 802.11a

1. 802.11b 2. 802.11g 3. 802.11n 4. 802.11a 5. 802.11ac

Match each Media Issue with its Description. 1. The gradual loss of a signal over distance 2. Primary problem with CSMA/CD 3. Hearing two radio broadcasts on the same station A. Traffic Collisions B. Crosstalk C. Attenuation

1. Attenuation 2. Traffic Collisions 3. Crosstalk

Which record type should an administrator create to have a more user-friendly name for a host machine? A. ANAME B. ALIAS C. CNAME Which type of record resolves IP addresses to hostnames? A. PTR B. CNAME C. A

1. CNAME 2. PTR

The cable is a ________ cable. A. Crossover B. Straighover C. Rollover In which type of connection would this cable be used? A. Switch to Switch B. Switch to Router C. Switch to PC

1. Crossover 2. Switch to Switch

Match each device with its function. 1. A technology used on Layer 1 of the OSI model to transmit data 2. Uses MAC addressing to determine which port to forward a frame 3. Connects two or more networks using different protocols A. Router B. Layer 2 Switch C. Ethernet D. NIC

1. Ethernet 2. Layer 2 Switch 3. Router

Match each WAN Technology to its corresponding Connection Type. 1. Uses two 64Kbps channels 2. Use connections over shared broadband 3. Uses dedicated phone lines to connect to telco provider offices A. ISDN B. DSL C. Cable modems

1. ISDN 2. Cable modems 3. DSL

Match the network type to the corresponding definition. 1. A global system on interconnected computers. 2. A network restricted to users within an organizations. 3. Provides access to services needed by partners and customers without granting them access to the entire network. A. Internet B. Extranet C. Intranet

1. Internet 2. Intranet 3. Extranet

You work in the IT Department of a small corporation. The company's network is protected by a firewzll and it provides servers within a perimeter network for access by customers and partners. The layout of your network is similar to the following image: The portion of the diagram labeled "A" is the ____ portion of the network. A. Extranet B. Intranet C. Internet The portion of the diagram labeled "B" is the ___ portion of the network. A. Extranet B. Intranet C. Internet The portion of the diagram labeled "C" is the ___ portion of the network. A. Extranet B. Intranet C. Internet

1. Internet 2. Intranet 3. Extranet

Match each function to its layer in the OSI Model. 1. Session Layer 2. Application Layer 3. Physical Layer 4. Presentation Layer 5. Transport Layer 6. Data Link Layer 7. Network Layer A. ASCII, .jpg, mp3 B. User interface to the network C. Keeps conversations (data streams) separate D. Specifies voltage, media speeds, connector pin-outs E. Determines reliable or unreliable delivery F. Determines data route using logical addressing G. Combines bytes into frames; uses MAC addressing H. Word processor, spreadsheets, gaming software

1. Keeps conversation (data streams) separate 2. User interface to the network 3. Specifies voltage, media speeds, connector pin-outs 4. ASCII, .jpg, mp3 5. Determines reliable or unreliable delivery 6. Combines bytes into frames; uses MAC addressing 7. Determines data route using logical addressing

The IP address tested in this ping is the ________ address. A. APIPA B. Default gateway C. Loopback The equivalent IPv6 address is ___. A. ::0 B. ::87 C. ::1

1. Loopback 2. ::1

You need to set up 200 computers on a Class A private network. Which of the following network IDs meet all the criteria of a Class A private network? A. 192.168.1.0 B. 100.10.1.0 C. 10.0.0.0 D. 172.168.0.1

10.0.0.0

Match each Networking Service to its function. 1. Makes a request from a private IP address routable. 2. Allows or blocks data packets 3. Distributes IP addresses 4. Authenticates a user from an external network 5. Uses a public network for private data communication A. NAT B. Remote Access Server C. Firewall D. DHCP E. VPN

1. NAT 2. Firewall 3. DHCP 4. Remote Access Server 5. VPN

Firewalls mainly use user accounts to filter data packets. A. Yes B. No Firewalls can be hardware or soft-based. A. Yes B. No Firewalls are only set up on individual host machines. A. Yes B. No

1. No 2. Yes 3. No

A VLAN is typically configured on a router. A. Yes B. No A router is used to separate multiple networks. A. Yes B. No NAT is the mapping of a private LAN IP address to a public IP address. A. Yes B. No

1. No 2. Yes 3. Yes

AAAA records resolve hostnames to IPv4 addresses. A. Yes B. No A secondary name server gets its data from another name server using a zone transfer. A. Yes B. No Entries in a HOSTS file on a local computer take precedence over DNS A. Yes B. No

1. No 2. Yes 3. Yes

LMHOSTS files resolve hostnames to IP addresses. A. Yes B. No DNS resolves host names to IP addresses. A. Yes B. No CNAME records must be created manually. A. Yes B. No

1. No 2. Yes 3. Yes

Microwave ovens tend to cause interference in wired networks. A. Yes B. No Fluorscent lighting can cause EMI A. Yes B. No Cordless phones can cause interference for wireless networks. A. Yes B. No

1. No 2. Yes 3. Yes

Your friend just got a home router and asked you to set up his computer to use it. You open the IP settings on the computer and see the information shown in the following image: Once the address is set to use DHCP, how should the DNS address be obtained? A. Manually B. Automatically, through DHCP C. Through the Advanced button

1. Obtain an IP address automatically 2. Automatically, through DHCP

Match each Tunneling Protocol to its corresponding TCP/IP port. 1. TCP/UDP port 1723 2. UDP port 1701 3. TCP port 443 A. PPTP B. L2TP C. SSTP D. PPP

1. PPTP 2. L2TP 3. SSTP

Match each Tunneling Protocol to its corresponding method of encryption. 1. MPPE 2. IPSec 3. HTTPS A. SSTP B. PPP C. PPTP D. L2TP

1. PPTP 2. L2TP 3. SSTP

A wireless camera connects directly to a device and sends pictures to it. Which type of connection is this? A. Peer-to-Peer B. Infrasture C. Ad Hoc This type of wireless network lacks security because there is no centralized controlling security. A. Peer-to-Peer B. Infrasture C. Ad Hoc Which type of wireless network is controlled through a wireless access point? A. Peer-to-Peer B. Infrasture C. Ad Hoc What can be disabled on a wireless access point to help secure a wireless network? A. SSID B. QoS C. Filtering of MAC addresses

1. Peer-to-Peer 2. Ad Hoc 3. Infrasture 4. SSID

Match each address type to its appropriate range. 1. 75.0.0.0 - 75.255.255.255 2. 224.0.0.0 - 239.255.255.255 3. 192.168.0.0 - 192.168.255.255 A. Private network addresses B. Multicast addresses C. Public network addresses

1. Public Network 2. Multicast 3. Private Network

Your small business has been growing and so has the number of computers on your network. Your employees are starting to complain that their computers are responding slowly whenever they access network resources. The layout of your LAN is similar to the following image: The physical topology of this network is which kind of topology? A. Star B. Bus C. Mesh Which device change on the network would greatly improve network speed? A. Replace twisted-pair cables with fiber-optic cables B. Replace the hub with a switch C. Replace the hub with a router

1. Star 2. Replace the hub with a switch

The layout of your LAN is similar to the following image: You should use a _____ cable to connect each computer to the hub. A. Crossover B. Straight-through C. Rollover You should use a _____ cable to connect each hub to the switch. A. Crossover B. Straight-through C. Rollover

1. Straight-through 2. Crossover

A user in your computer cannot to the Internet. You execute the ipconfig command on the user's computer and see the results displayed in the following image: The problem is: A. DHCP should be enabled B. The default gateway is a network address C. The default gateway is a broadcast address D. The subnet mask is incorrect The solution is: A. DHCP needs to be enabled B. The default gateway needs to be changed C. The subnet mask needs to be changed

1. The default gateway is a broadcast address 2. The default gateway needs to be changed

A user in your company cannot connect to any of the servers which are on the 192.168.1.0 network. You execute the ipconfig command on the user's computer and see the results displayed in the following image: The problem is: A. There is no default-gateway B. The IP address should be on 192.168.1.x network C. The subnet mask is incorrect D. The DNS server is incorrect The solution is: A. Configure a default gateway in the 10.1.3.x network B. Configure a default gateway in the 192.168.1.x network C. Configure a default gateway in the 255.255.255.x network D. Configure a static route

1. There is no default gateway 2. Configure a default gateway in 10.1.3.x network

Match each layer in the OSI Model with the encapsulation state of data. 1. Segment 2. Packet 3. Frame 4. Bit A. Physical Layer B. Session Layer C. Presentation Layer D. Data Link E. Transport Layer F. Network Layer G. Application

1. Transport Layer 2. Network Layer 3. Data Link Layer 4. Physical Layer

The corporation where you work has asked you to telecommute from home two days per week. The access you've been provided to your company network looks similar to the following image: The access you will use to securely connect your home computer to your company intranet is a ... A. IPsec B. VPN C. GRE Which type of VPN is in use in this example? A. Site-to-Site B. Host-to-Host C. Host-to-Site

1. VPN 2. Host-to-Site

Class A Private range is: Class B Private range is: Class C Private range is:

10.x.x.x 172.16.x.x - 172.31.x.x 192.168.x.x - 192.168.255.x

What speed does FDDI use? A. 10 Mbps B. 44 Mbps C. 54 Mbps D. 100 Mbps

100 Mbps

ipconfig /release is the command that deletes an IP address bound to an interface. A. Yes B. No dhcp -renew is the command that acquires an IP address from a DHCP server A. Yes B. No dhcp -release is the command that deletes an IP address bound to an interface A. Yes B. No ipconfig /renew is the command that acquires an IP address from a DHCP server. A. Yes B. No

1. Yes 2. No 3. No 4. Yes

A switch stack multiple physical switches appear as one logical switch. A. Yes B. No Load balancing is limited to routers and is not available on switches. A. Yes B. No Switches can use active-passive load balancing. A. Yes B. No

1. Yes 2. No 3. Yes

Unsecured websites are accessed through port 80 by default. A. Yes B. No Public websites are accessed are accessed through port 25 A. Yes B. No Secured websites are accessed through port 443 by default. A. Yes B. No

1. Yes 2. No 3. Yes

A Firewall can be a hardware device. A. Yes B. No A Firewall can be a software package. A. Yes B. No A Firewall is a special room to protect servers. A. Yes B. No

1. Yes 2. Yes 3. No

A layer 2 switch is also called a bridge. A. Yes B. No A switch floods ports if it does not know where to send a packet. A. Yes B. No A layer 2 switch uses routing tables. A. Yes B. No

1. Yes 2. Yes 3. No

In Static NAT, each private IP address requires a seperate public IP address for mapping. A. Yes B. No In Dynamic NAT, a pool of public IP addresses is used. A. Yes B. No In PAT, at least two public IP addresses are required. A. Yes B. No

1. Yes 2. Yes 3. No

Layer 2 switches use MAC addresses. A. Yes B. No Layer 3 switches use IP addresses. A. Yes B. No Layer 3 switches can use MAC addresses. A. Yes B. No

1. Yes 2. Yes 3. No

TCP is connection-oriented and reliable. A. Yes B. No UDP is connectionless and unreliable. A. Yes B. No IP is connection-oriented and reliable. A. Yes B. No

1. Yes 2. Yes 3. No

You are troubleshooting a friend's computer that will not connect to a specific website on the Internet, yet it can connect to other websites. You can connect to the website with no problems using your smartphone. Using a TCP/IP tool on your friend's computer, you receive the information shown in the following image: Which command was used to generate these results: To solve the connectivity problem, you should clear the computer's memory by executing which command?

1. ipconfig /displaydns 2. ipconfig /flushdns

Use the following screenshot to answer the questions. Which command was run to generate these results? A. netstat -a B. netstate -s C. netstate -p Which command should be run to just show these results for tcp connections? A. netstat -a tcp B. netstat -proto tcp C. netstat -p tcp

1. netstat -a 2. netstat -p tcp

Match each PING command with its result. 1. Assigns a specific number of packets to transmit 2. Continuously pings a remote host until stopped 3. Specifies the size of the packet to transmit 4. Sends four packets to the local loopback address 1. ping -n 2. ping 127.0.0.1 3. ping -l 4. ping -t

1. ping -n 2. ping -t 3. ping -l 4. ping 127.0.0.1

You receive a call from a friend whose computers is unable to connect to the Louvre Museum website located in France. Using a TCP/IP tool, you attempt to contact the website's host from your friends computer and receive the information shown in the following image: Which command-line tool was used to generate these results? A. tracert B. ping C. pathping Which command-line tool should be used if both hops and statistics showing a percentage of dropped packets need to be known? A. pathping B. ping C. netstat

1. tracert 2. pathping

What speed does a T1 run at? A. 1.544 Mbps B. 2.889 Mbps C. 3.101 Gbps D. 2.54 MBps

1.544 Mbps

Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line? A. 1.5 Mbps B. 15.35 Mbps C. 1.544 Mbps D. 1.536 Mbps

1.544 Mbps

Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line? A. 1.536 Mbps B. 1.5 Mbps C. 15.35 Mbps D. 1.544 Mbps

1.544 Mbps

PRI, a form of ISDN, can provide transmission rates of up to ____. A. 1.544Mbps B. 16Kbps C. 128Kbps D. 64Kbps

1.544Mbps

If a 16-port switch has all ports set to 100 Mbps, sharing the same chassis, what is the incoming backplane speed of the switch? A. 800 Mbps B. 1.6 Gbps C. 16 Ghps D. 200 Mbps

1.6 Gbps

This question requires that you evaluate the underlined text to determine if it is correct. A cable that meets the 1000BaseT standard has a maximum length of _1,000_ meters. A. 100 meters B. 250 meters C. 500 meters D. No change is needed.

100 meters

You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports? A. 10 meters B. 100 meters C. 480 meters D. 1000 meters

100 meters

You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports? A. 100 meters B. 480 meters C. 10 meters D. 1000 meters

100 meters

Which of the following types of network uses terminators? A. 100Base-FX B. 100BaseT C. 10BaseT D. 10Base2

10Base2

Which of the following standards uses twisted pair cabling? A. 10Base5 B. 10BaseT C. 100BaseSX D. 100BaseFX

10BaseT

You are in the proceed of designing a home network for a client. You have decided to make use of 10BaseT cabling. Which of the following options are TRUE with regards to 10 BaseT cabling?! (Choose two.) A. 10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. B. 10BaseT cables are made up of twisted pair cables that are a maximum of 10 meters in length. C. 10BaseT cables allows for the system to operate at 10Mbps. D. 10BaseT cables allows for the system to operate at 100 Mbps.

10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. 10BaseT cables allows for the system to operate at 10Mbps.

What is the maximum speed supported by 802.11b? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps

11 Mbps

POP3

110

What is the loopback IP address? A. 127.0.0.1 B. 198.2.2.3 C. 255.255.255.1 D. 0.0.0.0

127.0.0.1

Which if the below are loopback addresses. Choose all that apply. A. 128.0.0.1 B. 127.0.0.1 C. 127.31.0.1 D. 192.127.0.0

127.0.0.1 127.31.0.1

How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256

128

How many bits is an IPv6 address? A. 32 B. 48 C. 64 D. 128

128

An IPv6 address is __________ in length A. 32 bit B. 64 byte C. 128 bit D. 128 bytes

128 bit

Class B:

128-191 /16

NetBIOS

137-139

IMAP

143

What is the maximum upstream throughput speed supported by VDSL? A. 52 Mbps B. 11 Mbps C. 1.5 Mbps D. 16 Mbps

16 Mbps

SNMP

161

Link Local Addressing

169.254.1.0 - 169.254.254.255.

L2TP

1701

What port does L2TP use? A. 501 B. 1723 C. 1701 D. 443

1701

Loopback Address

172.0.0.0/24

Which of the following are private IP addresses? Each correct answer represents a complete solution. (Choose all that apply.) A. 172.16.255.20 B. 10.1.23.225 C. 155.155.155.155 D. 192.168.1.125

172.16.255.20 10.1.23.225 192.168.1.125

Which of the below is a valid Private IP address in the B class? Choose all that Apply A. 172.33.20. 20 B. 172.26.20.20 C. 172. 16.20.20 D. 192.168.0.0

172.26.20.20 172. 16.20.20

L2TP uses port ________________ A. 443 B. 500 C. 89 D. 1723

1723

PPTP

1723

What port does PPTP use? A. 80 B. 8080 C. 1723 D. 433

1723

Class C:

192-223 /24

You must manually configure a computer with an IP address on the same network as a router. The router's interface is configured as 192.168.1.100 with a subnet mask of 255.255.255.0. Which two are valid IP addresses you could assign the computer? (Choose two.) A. 192.168.1.254 B. 192.168.1.100 C. 192.168.1.5 D. 192.168.100.1 E. 192.168.1.255 F. 192.168.0.10

192.168.1.254 192.168.1.5

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. The company's office has an ISDN connection. This connection is used to connect the network to the Internet. How many channels does an ISDN BRI connection use to send data? A. 2 B. 4 C. 6 D. 1

2

What stage is the World Wide Web in? A. 1.0 B. 1.1 C. 2.0 D. 3.0

2.0

The transmission rate of an Optical Carrier OC-24 is _________________ A. 51.84 Mbps B. 1.244 Gbps C. 9.953 Gbps D. 2.488Gbps

2.488Gbps

Which of the following is not a private address? A. 10.4.24.24 B. 172.16.36.45 C. 192.168.34.3 D. 200.23.34.120

200.23.34.120

You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:0000:2001:0000:0000:0000:0068 would be ______. A. 2001:4860::::68 B. 21:486::21:::68 C. 2001:4860:0:2001:0:0:0:68 D. 2001:4860:0:2001::68

2001:4860:0:2001::68

This question requires that you evaluate the underlined text to determine if it correct. ff00:: is a valid IPv6 address that could be assigned to a host computer. A. No change is needed B. 2003:dead:beef:4dad:23:46:bb:101 C. ::1 D. 2001:db8::

2003:dead:beef:4dad:23:46:bb:101

FTP

21

SSH

22

Class D:

224-239 (Multicast)

Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1

224.0.0.1

How many B channels does an ISDN PRI support? A. 2 B. 8 C. 23 D. 48

23

Telnet

23

The default port used for telnet is: A. 23 B. 25 C. 80 D. 8080

23

Class E:

240-255 (Research)

SMTP

25

What is the maximum number of hosts you can use for each subnet that belongs to a class C address? A. 128 B. 254 C. 256 D. 65,534

254

What is the default subnet mask for a Class B network? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

255.255.0.0

You need to subnet a 192.168.1.0 network using as a Class C network. What will be the subnet mask? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.255 D. 255.255.255.0

255.255.255.0

How many T1 lines are used for a full T3 connection? A. 3 B. 16 C. 2 D. 28

28

RDP

3389

What port does Remote Desktop Services use? A. 443 B. 501 C. 389 D. 3389

3389

Which port does Remote Desktop Protocol use? A. 3389 B. 389 C. 636 D. 443

3389

Windows used the RDP or Remote desktop service to connect to a remote machine. This Remote Desktop services runs on which port? A. 500 B. 3389 C. 443 D. 289

3389

How many layers does the TCP/IP model have? A. 3 B. 4 C. 6 D. 7

4

At what speed does a T3 line run? A. 1.5 Mbps B. 4.5 Mbps C. 44.7 Mbps D. 128 Mbps

44.7 Mbps

What is the bit rate for a North American T3 circuit? A. 6.312 Mbit/s B. 44.736 Mbit/s C. 274.176 Mbit/s D. 400.352 Mbit/s

44.736 Mbit/s

HTTPS

443

HTTPS and other SSID related protocols run on which port? A. 80 B. 443 C. 22 D. 23

443

SMB

445

DNS

53

What port does DNS use? A. 443 B. 389 C. 51 D. 53

53

What is the maximum speed supported by 802.11g? A. 1 Mbps B. 10 Mbps C. 11 Mbps D. 54 Mbps

54 Mbps

You work as a Network Administrator for Net World International. You are configuring a local area network (LAN) spanning across various buildings in the company's premises. You decide to use a 1000BASE-SX network. What is the maximum length of the cable segment that can be used? A. 1500 meters B. 100 meters C. 225 meters D. 1000 meters E. 550 meters

550 meters

If you are making a crossover cable and one end is 568A, what should the other end be? A. 568A B. 568B C. 568C D. BOGB

568B

How fast is a DS0 circuit? A. 32 Kbps B. 64 Kbps C. 128 Kbps D. 1024 Kbps

64 Kbps

Which of these ports does DHCP use? A. 80 B. 67 C. 23 D. 500

67

Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101

68.24.78.221

HTTP

80

Which IEEE standard is used for wireless networks? A. 802.2 B. 802.11 C. 802.3 D. 802.5

802.11

Your purchasing department has purchased new 802.11ac wireless routers. You want to make sure all of your wireless devices are compatible with this new router. Besides 802.11ac, which wireless standards will work with these wireless routers? (Choose two answers.) A. 802.11n B. 802.11b C. 802.11a D. 802.11g

802.11n 802.11a

In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 802.1X B. WPA2-PSK C. WPA-PSK D. No change is needed

802.1X

For organizations, using ___________ authentication for wireless networks is recommended. A. 802.1d B. 802.1x C. 802.11g D. 802.11x

802.1x

What standard describes CSMA/CD? A. 801.2 B. 802.3 C. 802.5 D. 802.11

802.3

Kerberos

88

What is the local loopback address in IPv6? A. ::87 B. ::0 C. ::127 D. ::1

::1

You are in the process of designing a Ring network for a client. Which of the following is an advantage of a Ring network? A. A Ring network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Ring network, there are no interruptions. C. A Ring network prevents the passing of data packets through an excessive number of nodes. D. The number of nodes in a Ring network has no impact on communication delays.

A Ring network manages the connectivity between workstations without the need of a central node.

A client has requested a network setup for his home. The network has to be cost effective, and easy to extend and implement. Further more, the client wants his workstations connected by a single cable. Which of the following network topologies should you use? A. A star network topology. B. A bus network topology. C. A mesh network topology. D. A ring network topology.

A bus network topology.

Which of the following statements are true regarding VLAN? Each correct answer represents a complete solution. (Choose all that apply.) A. MAC addresses and TCP port addresses are required to define a VLAN. B. A router is required to connect two VLANs. C. A switch is required to create a VLAN. D. It is used to protect network hosts against unauthorized access from a public network.

A router is required to connect two VLANs. A switch is required to create a VLAN.

Which best describes a VPN? A. An encryption protocol B. A secure tunnel used to pass data through the Internet C. Virtual Protocol Name D. A dynamic routing protocol

A secure tunnel used to pass data through the Internet

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. The network is configured on Cisco devices. The network is configured as shown in the image below: Following is a list of the types of cable used in networking: Which of the following options is correct regarding the types of cable used for connecting different networking devices on the network? A. A-4, B-3, C-2, D-1 B. A-3, B-1, C-1, D-4 C. A-1, B-2, C-3, D-4 D. A-2, B-1, C-4, D-3

A-3, B-1, C-1, D-4

Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality? A. SA B. AH C. ESP D. MPPE

AH

In some scenarios when you check the IP address of your PC you see an IP of range: 169. 254. 24.24. Where does this IP come from? A. APIPA B. DHCP C. WINS D. NetBIOS

APIPA

What type of address is 169.254.32.23? A. APIPA B. multicast address C. anycast address D. broadcast address

APIPA

Which protocol is used to translate IP addresses to MAC addresses? A. RARP B. ARP C. DNS D. WINS

ARP

_________________ resolves IP addresses to MAC addresses. A. UDP B. TCP C. ICMP D. ARP E. IGMP

ARP

Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router? A. Peer-to-Peer B. Bridged C. Infrasture D. Ad hoc

Ad hoc

The protocol maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Address Resolution Protocol (ARP). C. Dynamic Host Configuration Protocol (DHCP). D. User Datagram Protocol (UDP). E. Routing Information Protocol (RIP).

Address Resolution Protocol (ARP).

The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP).

Address Resolution Protocol (ARP).

What do routing tables typically use as criteria for determining which routes to include in a routing table? A. Hop Count B. Speed C. Administrative distance D. Metric

Administrative Distance

After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server? A. Register the scope B. Register the server C. Authorize the server D. Register the clients

Authorize the server

Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? A. Get scope registered B. Authorized the server C. Get clients registered D. Get DNS IP registered

Authorized the server

You are in the process of designing a FDDI network for a clients enviroment. Which of the following is TRUE with regards to a FDDI network? A. An FDDI network cannot contain rings that are longer than 100 kilometers respectively. B. An FDDI network can contain rings that exceed 100 kilometers respectively. C. Each ring in a FDDI network can support a maximum of 500 nodes. D. Each ring in a FDDI network can support a maximum of 50 nodes.

An FDDI network cannot contain rings that are longer than 100 kilometers respectively.

The ____ layer provides access to the network for applications and certain user functions. It displays incoming information and prepares outgoing information for network access. A. Transport B. Network C. Physical D. Session E. Data-link F. Application

Application

Which layer in the OSI model covers HTTP, FTP, and RDC? A. Physical B. Session C. Application D. Presentation

Application

Which three layers on the OSI model make up the Application layer on the TCP model? (Choose three answers.) A. Application B. Presentation C. Data Link D. Physical E. Network F. Session G. Transport

Application Presentation Session

In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? A. Blue, Orange, Green, Black B. Black, Orange, Green, Brown C. Blue, Orange, Green, Brown D. Brown, Orange, Green, Black

Blue, Orange, Green, Brown

What is a similarity between Layer 2 and Layer 3 switches? A. Both provide a high level of security to the network. B. Both use logical addressing to forward transmissions. C. Both forward packets onto the network. D. Both allow the implementation of VLANs.

Both allow the implementation of VLANs.

Which of the following devices work at the data link layer of the OSI reference model? Each correct answer represents a complete solution. (Choose two.) A. Bridges B. Switches C. Multiplexers D. Hubs

Bridges Switches

Which of the following functions is not performed by a router? A. Internetwork communication B. Broadcast forwarding C. Packet filtering D. Packet switching

Broadcast forwarding

This question requires that you evaluate the underlined text to determine if it is correct. A Mesh network has to have termination points at both ends of the network. A. No change is needed. B. Ring C. Star D. Bus

Bus

Which of the following network topologies uses a 10Base2 cable? A. Bus B. Mesh C. Star D. Ring

Bus

Which of the following topologies is used by a coaxial cable? A. Wireless B. Bus C. Star D. Mesh

Bus

You are a network consultant for Tech Perfect Inc. You are designing the network of the company. You are required to accomplish the following task: The cabling must support data transfer speed up to 50 Mbit/sec. The cost of cabling must be as low as possible. Which of the following cables will you use? A. CAT 2 B. CAT 5e C. CAT 4 D. CAT 6

CAT 5e

You work as a consultant for Tech Perfect Inc. You are required to design a gigabit network for the company. Which of the following types of cables will you use for the network? A. CAT 3 B. CAT 4 C. CAT 5 D. CAT 6

CAT 6

What mechanism do wireless networks use to access the network? A. CSMA/CD B. CSMA/CA C. token passing D. polling

CSMA/CA

Which of the following channel access methods is used in IEEE 802.11 networks? A. CSMA/CD B. Full duplex C. Token passing D. CSMA/CA

CSMA/CA

What device acts as a high-speed modem for a LAN? A. analog modem B. telco incoming router C. packet switcher D. CSU/DSU

CSU/DSU

Which two of the following WAN technologies are most commonly used to connect home devices to the Internet? (Choose two.) A. T1 B. DSL C. Cable modems D. ISDN E. E1

Cable modems DSL

A ________ is the guaranteed certain amount of information provided by a circuit or line. A. Committed Information Route B. Pivotal Information Route C. Next Hop Policy Route D. Frame x Frame Route

Committed Information Route

Which of the following cables offers more resistance to crosstalk than the other cables? A. Unshielded twisted pair B. Fiber-optic C. Coaxial D. Shielded twisted pair

Fiber-optic

Which of the following types of patch cable is used in a 100BaseT network? A. Cat 3 STP B. Cat 3 UTP C. RJ 58 Coaxial D. Cat 5 UTP

Cat 5 UTP

Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6

Cat 5e

Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6

Cat 5e Cat 6

Which of the following cables support transmission speed of 1000Mbps? Each correct answer represents a complete solution. (Choose all that apply.) A. Cat 5e B. Cat 6 C. Cat 3 D. Cat 5

Cat 5e Cat 6

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6

Cat5e

Your neighbor has asked you to network his home office. He wants a wired connection, not wireless. The network needs to support 1 Gigabit per second speeds. What is the least expensive options that meets this requirement? A. Cat3 B. Fiber Optic C. Cat5e D. Coaxial

Cat5e

Which twisted-pair category runs at 10 Ghps for 55 meters. A. Cat6 B. Cat7 C. Cat6a D. Cat5

Cat6

What is the minimum category of twisted-pair cable you need to support 100 Mbps? A. Category 3 B. Category 5 C. Category 5e D. Category 6

Category 5

You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based network. You are required to create a separate network for a new office constructed in the company's campus. The new network will be based on the 100BASE-TX standard. Which of the following cables will you use for the network? A. Single-mode fiber B. Multimode fiber C. Category 3 UTP D. Category 5 UTP

Category 5 UTP

What is the minimum cabling requirement for a 100BaseTx network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable

Category 5 UTP cable

You work as a network administrator for Tech Perfect Inc. The company has a 100Mbps TCP/Ipbased Windows Server 2003 network. The network is shown in the image below: The company wants to upgrade the network to a gigabit network. Which of the following steps will you take FIRST to accomplish the task? A. Replace the T1 connection with T3 connection. B. Replace the router with bridge. C. Upgrade servers running Windows Server 2003 to Windows Server 2008. D. Change the CAT 5 cable to a CAT 6 cable.

Change the CAT 5 cable to a CAT 6 cable.

You have a host with the address of 180.24.45.120. To what class would this be address be assigned? A. Class A B. Class B C. Class C D. Class D

Class B

You need to set up 750 computers on the same network. Which IP class is the best option? A. Class D B. Class B C. Class C D. Class A

Class B

For IPv4, what class is used for multicasting? A. Class A B. Class B C. Class C D. Class D

Class D

Which model users a central database for authentication? A. peer-to-peer B. workgroup C. client/server D. distributive

Client/Server

In the FDDI network, each network node is connected to a central cabling nexus called a ____. A. Concentrator B. Gateway C. Repeater D. Transceiver E. NIC F. Bridge

Concentrator

What are two characteristics of fiber optic cable? (Choose two.) A. Conducts electricity B. Requires metal conduit C. Supports splicing D. Requires a polish for end connectors

Conducts electricity Supports splicing

You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based routed network. Subnet X and Subnet Y are configured with DHCP servers to provide automatic IP addresses to the client computers in their respective segments. The DHCP server on Subnet Y crashes. You have to immediately configure the network so that the DHCP server in Subnet X can provide DHCP services to the client computers of Subnet Y. The router on the network is not BOOTP enabled. Your solution must involve a minimum of administrative effort and cost. What will you do to resolve the issue? A. Configure a DHCP Relay Agent on Subnet Y. B. Replace the existing router with a BOOTP enabled router. C. Configure a DHCP Relay Agent on Subnet X. D. Install a new DHCP server in Subnet Y.

Configure a DHCP Relay Agent on Subnet Y.

Your IT Director wants you to group all of the Administrative Assistants' computers so they can communicate as if they were on the same network. The challenge is that they are located in different areas of a building. What should you do? A. Reconfigure the entire company onto one large class B subnet B. Connect all the Administrative Assistants to one dedicated switch C. Connect all the Administrative Assistants to one dedicated router D. Configure a VLAN

Configure a VLAN

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based network. You have to configure a wireless LAN on your network. Two separate buildings in front of each other are to be connected wirelessly. Which of the following steps will you choose to accomplish the task? A. Configure one WAP in each building. Place one outdoor Omni antenna in each building. B. Configure one WAP in each building. Place one outdoor Yagi-Uda antenna in one building. Place one outdoor Omni antenna in the other building. C. Lay underground fiber optic cable backbone between the two buildings. Configure Ethernet network including network of both building. D. Configure one Wireless Access Point (WAP) in each building. Place one outdoor Yagi-Uda antenna in each building facing towards each other.

Configure one Wireless Access Point (WAP) in each building. Place one outdoor Yagi-Uda antenna in each building facing towards each other.

You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based network. The network is configured on a Ring topology as in the image below: During a routine checkup on a Monday morning, you find that Server D has failed. You are required to send the server to the manufacturer for getting it repaired. You take out the server from the network. What will be your next step, so that other terminals are not affected? A. Put 50 ohm terminators at Server C and Server E . B. Put a 50 ohm terminator at Server C . C. Put a 50 ohm terminator at Server E . D. Connect Server C and Server E by using a barrel connector.

Connect Server C and Server E by using a barrel connector.

Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? A. Content Addressable Memory B. Control Access Media C. Converged Address Memory D. Control Address Memory

Content Addressable Memory

Which oi the following is a function of a WINS server on a network? A. Assigning virtual memory to the server. B. Assigning IP addresses. C. Converting host names to domain names. D. Converting NetBIOS names to IP addresses. E. Assigning computer names.

Converting NetBIOS names to IP addresses.

To connect similar devices like, switch to switch, what type of cable is used ? A. Console B. Crossover Cable C. Straight through D. Rolled Cable

Crossover Cable

What are three common forwarding methods used by LAN switches? (Choose three.) A. Cut-Through B. ARPA Mapping C. Store-and-Forward D. Packet Switching E. Routing F. Fragment-Free

Cut-Through Store-and-Forward Fragment-Free

In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A. A B. C C. E D. D

D

The below protocol is used to automatically assign or configure an IP address to a client. A. DNS B. ARP C. RIP D. DHCP

DHCP

What feature within Windows allows the server to act as a router? A. IPsec B. DHCP C. IP forwarding D. RDC

DHCP

What protocol automatically configures IP configuration for a client? A. DNS B. DHCP C. WINS D. FTP

DHCP

Which of the following services is required in a routed network to communicate with the DHCP server on another segment? A. DHCP B. RIS C. DNS D. DHCP relay agent E. WINS

DHCP relay agent

What zone is used to publish external websites for an organization? A. intranet B. exanet C. internetwork D. DMZ

DMZ

What provides name resolution between domain names and IP addresses? A. DHCP B. DNS C. ARP D. RPC

DNS

What server is used to translate host names to IP addresses? A. DNS B. WINS C. HOSTS D. DHCP

DNS

You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network? A. APIPA B. WINS C. DNS D. LMHOSTS E. DHCP

DNS

You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network? A. DHCP B. APIPA C. WINS D. LMHOSTS E. DNS

DNS

Which of the following uses pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS

DNS Server

This question requires that you evaluate the underlined text to determine if it is correct. _WAN_ is a connection that uses a dedicated phone line from a customer to a telco provider's office. A. No change is needed B. DSL C. ISDN D. Cable

DSL

What technology uses wires from the telephone company to provide broadband Internet connection? A. cable B. DSL C. FDDI D. Frame Relay

DSL

Which layer in the OSI model do MAC addresses and switches use? A. Physical B. Data Link C. Network D. Transport

Data Link

Which layer of the OSI model includes VLANs? A. Physical B. Data Link C. Network D. Transport

Data-Link

Which of the following is not among the seven layers of the OSI model? A. Data-line B. Application C. Transport D. Presentation E. Physical F. Session

Data-line

Which layer of the OSI reference model is responsible for bridging? A. Data-link B. Physical C. Transport D. Network

Data-link

You are setting up a network within a warehouse using Category 6 UTP. However, parts of the network are down because of the heavy machinery used. What cable type should you use? A. STP B. coaxial C. fiber D. plenum-rated

Fiber

When a signal degrades as it runs through a wire, you have ________. A. Degradation B. Attenuation C. Cross Over D. Resistance

Degradation

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table? A. Delay B. Bandwidth C. Load D. Frequency

Delay Load Frequency

The default gateway address identifies the: A. Server that will provide name services for the computer. B. Device that will connect the computer to a remote network. C. Device that will connect the computer to the local network. D. Server that will authenticate the user of the computer.

Device that will connect the computer to a remote network.

List the four steps for a client to get an IP address from a DHCP server in the correct order. A. Discovery Offering Request Acknowledge B. Request Offering Discovery Acknowledge C. Discovery Request Offering Acknowledge D. Request Offering Discovery Acknowledge

Discovery Offering Request Acknowledge

What model promises the most processing power? A. centralized computing B. distributive computing C. switching computing D. dumb computing

Distributive computing

The service that resolves fully qualified domain name (FQDN) to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS).

Domain Name Service (DNS).

Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network? A. Dual stack B. Duplexing C. Clustering D. Mirroring

Dual stack

A __________ address is assigned by a DHCP server. A. Static B. Dynamic C. Private Only D. Public Only

Dynamic

In Europe, what circuit would be similar to the T1 found in the United States? A. E1 B. J1 C. T2 D. F1

E1

Which IPsec component includes the most security, including confidentiality? A. SA B. AH C. ESP D. MPPE

ESP

Which of the following is a member of the IPsec protocol suite and provides origin authenticity, integrity, and confidentiality protection of packets? A. PPTP B. AH C. L2TP D. ESP

ESP

Which protocol in IPsec providers both authentication and encryption? a. L2TP b. AH c. ESP d. PPTP

ESP

The IEEE standard 802.3j is used for ___________________ A. Thin Coaxial B. Fiber Optic C. Thick Coaxial D. Twisted Pair

Fiber Optic

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) A. Establishing network speed parameters B. Verifying the client's patch level C. Negotiating algorithms to use D. Exchanging key information

Establishing network speed parameters Verifying the client's patch level

Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Leased line B. Ethernet C. Dial-up D. Token ring

Ethernet Leased line

You work as a Network Administrator for On Dot Inc. The company has a Windows 2000-based network. The management wants to install Internet Security and Acceleration (ISA) Server 2000 on the network. This server will connect to the Internet through a T1 line. Which of the following components is required to be installed on the server to accomplish this? A. External network adapter B. Modem C. Router D. ISDN adapter

External network adapter

You work as a Web Developer for WebCrunch Inc. You create a web site that contains information about the company's products and services. The web site is to be used by the company's suppliers only. Which of the following options will you use to specify the nature of access to the web site? A. Intranet B. Internet C. Internet and Intranet D. Extranet

Extranet

Which of the following is an incorrect IPv6 notation? A. FACE.:344:0::3389 B. FACE.122::23:DAC2:3389 C. FACE.122:0:344::23:DAC2:3389 D. FACE.122:0:344:0:23:DAC2:3389

FACE.:344:0::3389

An example that typically uses this topology is ...

FDDI

What device is used to protect one network from another by using filtering packets? A. Firewall B. Point to Point Tunnel C. VPN D. Router

Firewall

What advantage do CAT 5 cables have over fiber-optic cables? A. Support for higher bandwidth B. Flexibility C. Faster transmission of data D. Immunity from EMI

Flexibility

You have executed the NBTSTAT command with the -S parameter from the command-line on your workstation. Which of the following describes the reason for executing this command? A. For the purpose of viewing the names registered locally by NetBIOS applications. B. For the purpose of viewing the current NetBIOS sessions and their status, with the IP address. C. For the purpose of purging the name cache. D. For the purpose of viewing the NetBIOS sessions table converting destination IP addresses to computer NetBIOS names.

For the purpose of viewing the current NetBIOS sessions and their status, with the IP address.

Frame Relay is associated with FECN / BECN, what does FECN stand for________________ A. Frame Elastic Check Notification B. Forward Explicit Congestion Notification C. Frame Explict Compression Notification D. Forward Explict Compression Notification

Forward Explicit Congestion Notification

If a router cannot determine the next hop for a packet, the router will: A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the memory buffer.

Forward the packet to the default route.

What replaced X.25? A. Frame Relay B. ATM C. ISDN BRI D. DSL

Frame Relay

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)? A. SLIP B. X.25 C. Frame relay D. PPP

Frame relay

The unit of measurement on a data link layer is _________________ A. Frames B. Bits C. Packets D. Segments

Frames

In Windows to configure VPN which options do you need to go to? A. CLI command -> start vpn B. Control Panel --> VPN C. From Administrative Tools --> Routing and Remote Access D. None of the above

From Administrative Tools --> Routing and Remote Access

You need to connect a network adapter to a switch. You need the connection to be able to send and receive data at the same time. What type of connection should you use? A. Half duplex B. Gigabit C. Full duplex D. Simplex

Full duplex

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network. Which of the following utilities will you use? A. TRACERT B. TELNET C. PING D. IPCONFIG

IPCONFIG

The ________________ protocol is used to encrypt data in L2TP. A. PAP B. MS-CHAP C. IPSec D. DHCP

IPSec

What protocol is used with L2TP to encrypt data? A. IPSec B. MS-CHAP C. MS-CHAPv2 D. MPPE

IPSec

What protocol is used with L2TP to provide encryption? A. IPSec B. MPPE C. HTTPS D. MSC-CHAP

IPSec

This address is usually written in notation of four octets expressed in decimal and separated by periods. A. NetBIOS B. IPv4 C. IPv6 D. MAC

IPv4

A client has configured their network to support both IPv4 and IPv6. You are explaining the differences between IPv4 and IPv6 to a class of the clients trainee technicians. Which of the following statements are TRUE with regards to these differences? (Choose two) A. IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. B. IPv4 addresses are represented in a colon-hexadecimal format, while IPv6 addresses are represented in a dotted-decimal format. C. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability. D. IPv4 addresses make use of the first 32 bits of IPv6 addresses for interoperability.

IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.

What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231? A. MAC address B. IPv4 C. IPv6 D. anycast address

IPv6

Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ A. IPSec B. ISDN C. PSTN D. Frame Relay

ISDN

Which of the following connection mediums operates at a maximum speed of 128 Kbps? A. T3 B. OC-3 C. ISDN D. T1

ISDN

The clients network consists of a single domain named ABC.com. The clients network connects to the internet via an ISDN connection. Which of the following is TRUE with regards to the ISDN connection? A. ISDN operates at a minimum speed of 128 Kbps. B. ISDN operates at a maximum speed of 128 Mbps. C. ISDN operates at a maximum speed of 128 Kbps. D. ISDN operates at a minimum speed of 128 Mbps.

ISDN operates at a maximum speed of 128 Kbps.

Which two statements are true about layer 2 switches? (Choose two.) A. A switch uses IP address tables to determine where to forward packets. B. Switches are faster than hubs in all circumstances. C. If a switch does not know where to forward a frame, it floods it out all ports. D. Store-and-forward is the fastest switching method available. E. Switches uses MAC address tables to determine where to forward frames

If a switch does not know where to forward a frame, it floods it out all ports. Switches uses MAC address tables to determine where to forward frames

If a router is installed so that it separates DHCP server from its clients, the clients will: A. Immediately lose connectivity to all segments. B. Receive an immediate renew of their lease. C. Be unable to obtain their leases from the server. D. Immediately lose connectivity to the local segment.

Immediately lose connectivity to all segments.

You have been tasked with resolving an Internet name resolution problem. After pinging the DNS server address of the clients ISP, you find that the ISP server is down. You then decide to run the ping-t command from the command line. Which of the following describes the purpose of this command? A. It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted. B. It performs reverse name resolution on the ISP's DNs server IP address. C. It sends Echo Request messages with the Don't Fragment flag in the IP header set to 1. D. It sends Echo Request messages a specified amount of times.

It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted.

What mode users a wireless access point? A. Infrastructure Mode B. Ad Hop Mode C. Bridge Mode D. Forward Tunneling Mode

Infrastructure Mode

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network as shown in the image below: You have configured a DHCP server on Subnet X. This server will provide DHCP lease to the client computers on both the subnets. You find that the clients in Subnet Y are not getting IP address leases from the DHCP server. Which of the following steps will you take to resolve the issue? A. Install the DHCP Relay Agent in Subnet X. B. Install a DNS server in Subnet X. C. Install the DHCP Relay Agent in Subnet Y. D. Install a DNS server in Subnet Y.

Install the DHCP Relay Agent in Subnet Y.

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You configure two Virtual LANs (VLANs) on your network. A router is configured to connect the two VLANs. What will happen if the router fails? A. Inter VLAN communication will be affected. B. The entire network will fail. C. The network will not be affected at all. D. Communication within each VLAN will be affected.

Inter VLAN communication will be affected.

An _________ is the internal network for an organization. A. Internet B. Extranet C. Intranet D. WWW

Internet

The ____________ is the largest WAN in the world. A. Internet B. Intranet C. WWW D. MSDN

Internet

What type of firewall do you use to block access to certain websites or instant messengers? A. Internet content filter B. NIDS C. circuit-level gateway D. NAT filtering

Internet content filter

Which of the following security zones is internal to the company, as well as closest to its internal network? A. Internet B. Extranet C. Intranet D. DMZ

Intranet

You work as a Web Designer for Blue Well Inc. You have to create a Web site for the company. The Web site will be for internal use only and will contain information about policies and procedures of the company. What will be the scope of the Web site? A. Extranet B. Internet C. Utilitarian D. Intranet

Intranet

You are explaining the purpose of a dual stack node on the network. Which of the following suitably represents this explanation? A. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model. B. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the physical layer of the OSI model. C. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the data-link layer of the OSI model. D. It allows an IPv6 asocket to communicate with an IPv4, and IPv6 peer at the session layer of the OSI model.

It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.

Users have reported that they are experiencing network connectivity problems. You decide to run the ping -I command from the command-line. Which of the following describes the purpose of using the ping -I command? A. It allows you to specify a Time To Live for outgoing packets. B. It allows you to specify the type of service. C. It allows you to specify the amount of data to include int he ping. D. It allows you to resolve addresses to host names.

It allows you to specify the amount of data to include int he ping.

You have a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. What is most likely the problem? A. It cannot communicate with a DHCP server. B. The DNS servers specified are incorrect or are down. C. NetBIOS over TCP/IP has not been enabled. D. The network card is not connected properly to the network.

It cannot communicate with a DHCP server.

What are two characteristics of the CSMA/CD access method? (Choose two.) A. It checks to see if a collision has been detected. B. It does a round robin search for requests to transmit from all nodes on the network. C. It signals its intent to transmit on the network. D. It waits until the transmission medium is idle.

It does a round robin search for requests to transmit from all nodes on the network. It signals its intent to transmit on the network.

You have recently designed a network for a client, using the fully connected mesh topology. Which of the following is TRUE with regards to this kind of topology? A. It's the connectivity between workstations without the need of a central node. B. It does not require the use of switching or broadcasting. C. It prevents the number of data packets through an excessive number of nodes. D. The number of nodes in a fully connected mesh network has no impact on communication delays.

It does not require the use of switching or broadcasting.

Which of the following statements is true regarding VLAN? A. It increases the number of interfaces available to the network. B. It is applied in case oi RIP routing. C. It configures permissions across the network. D. It enables the user to map port number.

It increases the number of interfaces available to the network.

Which of the following statements is true regarding hybrid network topology? A. It is a combination of more than two similar networks connected through routers. B. It is a combination of two or more similar types of networks connected through a bridge de vice. C. It is a combination of two or more different types of networks topologies. D. It is a network that uses both coaxial and CAT 5 cabling.

It is a combination of two or more different types of networks topologies.

Which of the following statements about a fiber-optic cable are true? Each correct answer represents a complete solution. (Choose three.) A. It has eight wires twisted into four pairs. B. It is immune to electromagnetic interference (EMI). C. It can transmit signals over great distances. D. It uses light pulses for signal transmission.

It is immune to electromagnetic interference (EMI). It can transmit signals over great distances. It uses light pulses for signal transmission.

What are two advantages of using mesh topology in a network. (Choose two.) A. The protocols used are very lightweight with little overhead B. It is self-healing and can still operate when one node breaks down C. Data travels from node to node, with each node in the network handling each packet. D. It is considered more reliable than other networks.

It is self-healing and can still operate when one node breaks down It is considered more reliable than other networks.

Which of the following statements are true about a UTP crossover cable with RJ-45 connectors? Each correct answer represents a complete solution. (Choose two.) A. It is used for establishing a connection between a telephone line and a modem. B. It is used for troubleshooting a network card. C. It is used for establishing a connection between a broadband modem and a PC/router. D. It is used for establishing a connection between two PCs without a hub.

It is used for establishing a connection between a broadband modem and a PC/router. It is used for establishing a connection between two PCs without a hub.

To configure a DHCP server in Windows which of the below is a correct step. A. On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next B. ipconfig /dhcp C. On control Panel --> DHCP Server D. None of the above

On Server Manager --> Roles --> Add Roles --> Select DHCP Server and Click Next

You are designing a network that will have two subnets, named Subnet A and Subnet B, connected to a router. To save cost, ABC.com wants you to make use of an existing router that cannot be configured to support BOOTP. Subnet A will host a DHCP server, while Subnet B will have a DHCP relay agent configured. Which of the following is TRUE with regards to DHCP Relay Agent ? (Choose Two) A. It is used to prevent broadcast traffic across the two subnets. B. It is used to pass broadcast traffic across the two subnets. C. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, whether it is configured on the VPN server or not. D. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.

It is used to pass broadcast traffic across the two subnets. It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.

You have recently designed a home office network for a client that includes a switch. Which of the following are TRUE with regards to network switches? A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached C. It operates at the Physical layer of the OSI model. D. It operates at the Data-Link layer of the OSI model.

It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached. It operates at the Data-Link layer of the OSI model.

What are the advantages of an ISDN connection over a PSTN connection? Each correct answer represents a complete solution. (Choose all that apply.) A. It offers more bandwidth. B. It provides end-to-end digital communications. C. It provides a faster connection. D. It requires an analog modem.

It offers more bandwidth. It provides end-to-end digital communications. It provides a faster connection.

You are in the process of connecting a 100BASE-SX gigabit Ehternet in a clients office block. Which of the following statements are TRUE with regards to 1000BASE-SX? A. It requires multi-mode fiber optic cable. B. It requires single-mode fiber optic cable. C. It can work over distances in excess of 70 Km. D. The maximum length of a cable segment is 10 Km.

It requires multi-mode fiber optic cable.

Which of the following statements are true about an IPv6 network? Each correct answer represents a complete solution. (Choose all that apply.) A. It uses 128-bit addresses. B. It uses longer subnet masks than those used in IPv4. C. It increases the number of available IP addresses. D. For interoperability, IPv6 addresses use the last 32 bits of IPv4 addresses. E. It provides improved authentication and security.

It uses 128-bit addresses. It increases the number of available IP addresses. For interoperability, IPv6 addresses use the last 32 bits of IPv4 addresses. It provides improved authentication and security.

You have planned to use plenum rated cable for extending your existing LAN. For which of the following reasons, plenum rated cable is used for? Each correct answer represents a complete solution. (Choose all that apply.) A. It provides better bandwidth than normal cable. B. Its outer surface is more resistant to flame than normal cable C. It produces less toxic gas than normal cable in case of fire. D. It provides more throughput than normal cable.

Its outer surface is more resistant to flame than normal cable It produces less toxic gas than normal cable in case of fire.

Port number 88 is used for which of the below protocols? A. NetBIOS B. Kerberos C. IMAP D. POP3

Kerberos

To install IPv6 on your windows computer you need to _____________ A. LAN connection Properties-> Check IPv6 B. using CLI : enable ipv6 C. From Web Browser Properties D. using CLI: ipv6 enable

LAN connection Properties-> Check IPv6

What type of communication at the physical and data link layers of the OSI model? A. Transport B. Routing C. WAN protocols D. LAN protocols

LAN protocols

Which file resolves NetBIOS names to IP addresses? A. HOSTS B. WINS C. DNS D. LMHOSTS

LMHOSTS

___________ creates an unencrypted connection between two network devices. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN

Layer 2 Tunneling Protocol

What is the main criteria used by firewalls to filter traffic? (Choose two answers.) A. Protocols B. User accounts C. Ports D. Applications

Protocols Ports

TCP is used on which layer of the OSI Model? A. Layer 3 B. Layer 4 C. Layer 2 D. Layer 1

Layer 4

Which of the following layers of the OSI model is responsible for establishing communication session between the processes running on different communication entities in a network? A. Layer 5 (Session layer) B. Layer 3 (Network layer) C. Layer 7 (Application layer) D. Layer 2 (Data-link layer)

Layer 5 (Session layer)

In which directions can communicate occur between layers of OSI model? (Choose three.) A. all layers below B. layer directly above C. peer layer in other networked computer systems D. all layers above E. layer directly below F. there is not communication

Layer directly above Peer layer in other networked computer systems Layer directly below

Which feature of Category 5e STP cable reduces external interference? A. Crosstalk B. Shielding C. Length D. Twisting

Length

What is the advantage of UDP over TCP? A. Less Overhead - Faster Performance B. Older - Larger pool of compatible hardware C. TCP is not IPv6 compatible UDP is D. UDP can operate at Layer 1

Less Overhead - Faster Performance

The query protocol used to locate resources on a network is: A. Tracert B. Telnet. C. Lightweight Directory Access Protocol (LDAP). D. User Datagram Protocol (UDP).

Lightweight Directory Access Protocol (LDAP).

You are troubleshooting a server that needs to connect directly to the Internet. After you run an ipconfig/all, you discover the problem. The server has been auto-assigned the IPv6 address FE80::260:8FF:FEC0:98d%4. The server won't connect to the Internet because this is a ______ address. A. Link-local B. Link-Private C. Logic-Link D. Malformed

Link-local

_______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. A. Gateway Address B. IP address C. MAC Address D. None of the above

MAC address

What type of record does DNS use to find a mail service? A. Host (A) DNS record B. Canonical (CNAME) DNS record C. Service (SRV) DNS record D. Mail Exchanger (MX) DNS record

Mail Exchanger (MX) DNS record

One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet.

Make resources available to the Internet.

In a ________ topology, every single computer is connected to every other computer on the network. A. Star B. Ring C. Mesh D. Diamond

Mesh

This question requires that you evaluate the underlined text to determine if it is correct. In a diamond topology, every single computer is connected to every computer on the network. A. Ring B. Mesh C. No change is needed D. Star

Mesh

Which of the following network topologies is the most fault tolerant? A. Ring B. Star C. Bus D. Mesh

Mesh

Which topology is the most redundant and the most expensive? A. star B. ring C. mesh D. bus

Mesh

What would you use to create VPN tunnels so that users can connect to your internal network while at home using Windows Server 2008 R2? A. Microsoft RAS B. Microsoft RRAS C. Microsoft RDC D. Microsoft VPN Server

Microsoft RRAS

Which of the following devices is required for remotely accessing the network through PSTN lines? A. Hub B. Bridge C. Switch D. Modem E. Gateway F. Router

Modem

You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement a(n) _____ address. A. Singlecast B. Multicast C. Broadcast D. Anycast

Multicast

Which are the two main filters firewalls use for data packets. (Choose two answers.) A. User accounts B. Applications C. Protocols D. Ports E. IP Addresses

Protocols Ports

Connecting to a private Network address from a public network requires: A. Dynamic Host Configuration Protocol (DHCP). B. Network Access Protection (NAP). C. Dynamic domain name system (DDNS). D. Network address translation (NAT).

NAT

What is used to remap private addresses to public addresses and back? A. DNS B. DHCP C. WINS D. NAT

NAT

Which of the following services masks internal IP addresses from outside the network? A. DHCP B. NAT C. WINS D. DNS

NAT

Which of the following command-line utilities is used to show the state of current TCP/IP connections? A. TRACERT B. NSLOOKUP C. PING D. NETSTAT

NETSTAT

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use? A. NETSTAT -r B. NBTSTAT -s C. NBTSTAT -r D. NETSTAT -s

NETSTAT -s

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use? A. NETSTAT -r B. NBTSTAT -s C. NBTSTAT -r D. NETSTAT -s

NETSTAT -s

What type of device is used to detect malicious network activities and reports only those issues to the administrator? A. NIDS B. NIPS C. Internet content filter D. NAT server

NIDS

What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity? A. NIDS B. NIPS C. Internet content filter D. NAT server

NIPS

In which OSI layer does routing occur? A. Physical B. Network C. Data Link D. Transport

Network

This question requires that you evaluate the underlined text to determine if it is correct. A router is a device that functions primarily on the Data Link layer of the OSI Model. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. A. Transport B. Network C. No change is needed D. Physical

Network

Which layer in the OSI model covers routing between networks? A. Physical B. Data Link C. Network D. Transport

Network

Which layer in the OSI model is used to verify that data was delivered without error? A. Physical B. Data Link C. Network D. Transport

Network

The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. A. WINS B. DHCP C. Network Address Translation D. FTP

Network Address Translation

A router's static route is set by the: A. Next upstream router. B. Routing protocol. C. Adjacent network. D. Network administrator.

Network administrator.

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals

Network printer Web server

In a star topology, failure of a central connectivity device does not bring down the entire network. A. Yes B. No

No

Quality of Service (QoS) allows you to assign protocols dynamically. A. Yes B. No

No

A directly connected route has an administrative distance of _0_. A. 1 B. 120 C. 255 D. No change is needed

No change is needed

E1 connections use 32 channels to obtain a top speed of 2.048 Mbps. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed." A. 1.544 Mbps B. No change is needed C. 34.368 Mbps D. 44.736 Mbps

No change is needed

This question requires that underlined text to determine if it is correct. __AAAA__ records resolve hostnames to 128-bit addresses. A. No change is needed B. A C. IPv4 D. IPv6

No change is needed

This question requires that you evaluate the underlined text to determine if it is correct. Dynamic routing is fault tolerant. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. Static routing B. Default route C. Least cost routing D. No change is needed

No change is needed

This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 10.0.1.1 B. 169.254.0.5 C. 192168.1.1 D. No change is needed

No change is needed

This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct A. WPA-AES B. WPA2 C. WPA-PSK D. No change is needed

No change is needed

Which of the following terms is the IPv6 equivalent of a static IP address in IPv4? A. Nontemporary B. Temporary C. Dynamic D. Nondynamic

Nontemporary

What model is used to describe how data communication occurs between hosts? A. server-centric model B. workgroup model C. peer-to-peer model D. OSI reference model

OSI reference model

What routing protocol is the most popular link-state protocol used within a large organization? A. RIP B. OSPF C. BGP D. IGMP

OSPF

Which of the below is a Link state routing protocol? Choose the best fit A. RIP B. IGRP C. EIGRP D. OSPF

OSPF

You have been tasked with installing a routing protocol that monitors the network for routers that have changed their link state. Which routing protocol will accomplish this? A. IGRP B. NAT C. OSPF D. RIP

OSPF

What does X.25 use as its DTE device? A. telco incoming router B. packet switcher C. analog modem D. PAD

PAD

What part of the network is the point where the responsibility of the administrator ends and the telecommunications provider's responsibility begins? A. last mile B. demarc C. router array D. PAD interface

PAD interface

Which version allows for multiple private addresses to share a single public address? A. PAT B. One-to-many NAT C. Dynamic NAT D. Static NAT

PAT

Which oi the following utilities will produce the output as shown in the image below? A. PING B. NETSTAT C. TRACERT D. NBTSTAT

PING

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use? A. NETSTAT B. TELNET C. PING D. TRACERT

PING

Which VPN technology is the most common and the easiest to set up? A. PPTP B. L2TP with IPSec C. SSTP D. CHAP

PPTP

Which of the below are tunneling protocol used by VPN? (Choose two) A. PPTP B. L2TP C. SFTP D. NNTP

PPTP L2TP

Frame Relay and X.25 are a type of ___________________ WAN technology? A. Packet Switching B. Circuit Switching C. Network Switching D. Console switching

Packet Switching

What type of configuration creates a DMZ between two firewalls? (Choose two) A. Gateway Network B. Perimeter Network C. DMZ D. RADIAUS Server

Perimeter Network DMZ

PVCs are associated with Frame Relay, what does PVC stand for _________________________ A. Permanent Virtual Circuit B. Permanent Virtual Class C. Preferable Volunteer Circuit D. Passive Virtual Circuit

Permanent Virtual Circuit

Which layer in the OSI model includes the cable and network adapters? A. Physical B. Session C. Application D. Presentation

Physical

What are the seven layers found in the OSI model, in order? A. Physical - Data Link - Network - Transport - Session - Presentation - Application B. Physical - Data Link - Network - Transport - Session - Application - Presentation C. Physical - Data Link - Transport - Network - Session - Application - Presentation D. Physical - Data Link - Transport - Session - Network - Presentation - Application

Physical - Data Link - Network - Transport - Session - Presentation - Application

What command do you use to test the TCP/IP stack on a computer? (Select three) A. Ping localhost B. Ping 127.0.0.1 C. Ping loopback D. ipconfig /renew

Ping localhost Ping 127.0.0.1 Ping loopback

You are in the process of expanding a clients current LAN setup. You have been instructed to make sure that the cable used is fire safe, and that it emits less toxic fumes. Which of the following options should you use? (Choose two) A. PVC cable. B. Plenum rated cable. C. Fiber-optic cable. D. Carpet Cable.

Plenum rated cable. Fiber-optic cable.

On which layer of the OSI model does encryption take place? A. Data Link B. Presentation C. Application D. Session

Presentation

What layer in the OSI model is used to encrypt data? A. Physical B. Session C. Application D. Presentation

Presentation

____________________ Layer of the OSI takes care of the compression and encryption. A. Physical B. Session C. Presentation D. Transport

Presentation

TCP/IP and IPX/SPX are known as _________ stacks. A. Protocols B. Services C. Layers D. Lenses

Protocols

One reason to incorporate VLANs in a network is to: A. Reduce the number of broadcast domains. B. Increase the number of available Media Access Control (MAC) addresses. C. Increase the number of available IP addresses. D. Reduce the number of nodes in a broadcast domain.

Reduce the number of nodes in a broadcast domain.

Which role needs to be added to Windows Server 2016 in order to enable routing through the server? A. Remote Access B. Remote Desktop Services C. Windows Deployment Services D. Network Controller

Remote Access

Which role needs to be added to Windows Server 2016 in order to enable routing through the server? A. Windows Deployment Services B. Remote Desktop Services C. Network Controller D. Remote Access

Remote Access

You use the ________ to connect to a terminal server. A. Remote Desktop Connection (RDC) B. Remote Desktop Protocol (RDP) C. Remote Session Call (RSC) D. Remote NetBios Connect (RNC)

Remote Desktop Connection (RDC)

What name does Windows Server 2008 R2 use for Terminal Services? A. MS Telnet Server B. MS Primary Services C. MS Thin Server D. Remote Desktop Services

Remote Desktop Services

You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this information? A. RRAS is running B. Remote Desktop Services is running C. The WINS service is running D. The DNS service is running

Remote Desktop Services is running

You have installed a small network at an accounting office. All the computers have gigabit Ethernet NICs. Your router works at 1000mbps. Yet when you measure internet speed, you see it is going at 100mbps maximum. What should you do to fix this? A. Replace the cable with Category 5 cable. B. Replace the cable with fiber optic. C. Replace the cable with Category 6 cable. D. Replace the router.

Replace the cable with Category 6 cable.

Which of the below is not a process in the DHCP DORA? A. Discover B. Offer C. Response D. Acknowledge

Response

Connecting several computers together in a circle without the use of a hub or switch is using a _____ topology. A. Star B. Diamond C. Ring D. Mesh

Ring

Which DNS servers hold complete tables of mappings of Internet addresses to IP addresses? A. Root B. DNSSEC C. External D. Namespace

Root

You are setting up home wireless networking for a writer. She wants to choose a DSL connection. As she frequently uploads manuscripts to her publisher, she wants the fastest upload rate possible. Which DSLs would work? A. ISDN B. HDSL C. ADSL D. SDSL

SDSL

What is used to identify a wireless network? A. network ID B. frequency identifier C. wireless password D. SSID

SSID

___________ allows a remote user to connect to a private network from anywhere on the Internet. A. Point-to-Point Protocol B. SSL VPN C. Layer 2 Tunneling Protocol D. Site-to-Site VPN

SSL VPN

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6

STP Cat5e

Unicast Multicast Broadcast

Sends data to one device Sends data to two or more devices Sends data to all available devices

Which of the following items are configured on a user workstation for wireless networking? Each correct answer represents a complete solution. (Choose two.) A. MAC Address Filtering B. Service Set Identifier (SSID) C. Encryption D. Security Set Identifier (SSID)

Service Set Identifier (SSID) Encryption

What layer in the OSI model is responsible for logging on and off? A. Physical B. Session C. Application D. Presentation

Session

Which of the below modes are related to Fiber Optic Cable? (Choose two) A. Single Mode B. Multi Mode C. Fiber Mode D. RJ Mode

Single Mode Multi Mode

Which of the following is a characteristic of single-mode fiber? A. Single-mode fiber supports longer distances than multimode fiber. B. Single-mode fiber has increased bandwidth than multimode fiber. C. Single-mode supports only a ring topology. D. Single mode allows multiplexing of electrical and light signals

Single-mode fiber supports longer distances than multimode fiber.

The physical topology of this network is a ...

Star topology

What IPv6 address incorporates IPv4? A. Starting ::ffff: B. Starting 0:0::ffff: C. Ending ::ffff D. Ending 0:0::ffff

Starting ::ffff:

Which type of route is manually configured by an administrator? A. Direct B. Static C. Dynamic D. Floating

Static

_________ is a route that must be manually defined on each router. A. Static B. Dynamic C. Persistent D. Global

Static

_________ uses a clocking circuit to control the timing of communications between two WAN devices such as routers. A. Static Route B. Dynamic Route C. PPTP Route D. Point To Point

Static Route

What do you call a smaller network that is part of a larger network? A. host B. broadcast domain C. cluster D. subnet

Subnet

Classless Addressing

Subnetting a network address Saving IP addresses

A ________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions. A. Switch B. Router C. Repeater D. Hub

Switch

A _________ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions. A. Repeat B. Hub C. Router D. Switch

Switch

What do you use to create VLANs? A. router B. switch C. firewall D. proxy server

Switch

What is the most common central device used today to connect computers to a network? A. hub B. switch C. SOHO router D. VPN router

Switch

Which of the following devices works at the data-link layer (layer 2) of the OSI model? A. Router B. Repeater C. Gateway D. Switch

Switch

Which oi the following devices is used to create VLANs In a small network? A. Switch B. Bridge C. Hub D. Repeater

Switch

Which are examples of leased lines? (Choose two answers.) A. T1 B. DSL C. Dial-ups D. Cable broadband

T1 DSL

Andrew works as a Network Administrator for NetTech Inc. He wants to install an Internet connection having a data transmission rate of at least 10 Mbps, in the company's office. Which of the following types of connections will be most suitable? A. ISDN B. T1 C. T3 D. E1

T3

A client has requested the installation of a T3 internet connection for their offices. Which of the following is TRUE with regards to T3 internet connections? A. T3 internet connections have a minimum transmission rate of 64 Mbps. B. T3 internet connections have a minimum transmission rate of 56 Kbps. C. T3 internet connections have a minimum transmission rate of 10 Mbps. D. T3 internet connections have a minimum transmission rate of 128 Mbps.

T3 internet connections have a minimum transmission rate of 10 Mbps.

_________________ is connection-oriented protocol with guaranteed service. A. UDP B. TCP C. ICMP D. ARP E. IGMP

TCP

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. You are configuring an Internet connection for your company. Your Internet service provider (ISP) has a UNIX-based server. Which of the following utilities will enable you to access the UNIX server, using a text-based connection? A. TELNET B. TRACERT C. IPCONFIG D. FTP

TELNET

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem? A. IPCONFIG B. ROUTE C. TELNET D. TRACERT

TRACERT

What are tunnels used to transmit IPv6 address information over IPv4? (Choose two answers.) A. GRE B. VPN C. ISATAP D. Teredo

Teredo ISATAP

Which of the following technologies or services can be used to isolate hosts and segments and to control broadcast traffic? A. VLAN B. Perimeter network C. VPN D. RRAS

VLAN

Which of the following OSI layers is responsible for a reliable connection between two hosts on a TCP/IP network? A. Data-Link layer (layer 2) B. Session layer (layer 5) C. Network layer (layer 3) D. Transport layer (layer 4) E. Physical layer (layer 1)

Transport layer (layer 4)

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped.

The DNS is not resolving.

You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open systems interconnect (OSI) model. You are explaining the Data-link layer. Which of the following best describes the Data-link layer of the OSI model? A. The Data-link layer deals with the transmission and reception of the unstructured raw bit steam over a physical medium. B. The Data-link layer controls the operation of the subnet. C. The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer. D. The Data-link layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.

The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer.

You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open Systems Interconnect model. You are explaining the Transport layer. Which of the following best describes the Transport layer of the OSI model? A. The Transport layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium. B. The Transport layer controls the operation of the subnet. C. The Transport layer deals with error-free trasfer of data frames from one node to another over the physical layer. D. The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications.

The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications.

You have created a physical star network using a hub for testing purposes. One of the links to the hub breaks. What will happen? A. The computer linked to the hub through the link will stop working. B. The entire network will stop working. C. The hub will stop working. D. The affected link will stop working.

The affected link will stop working.

As part of a training exercise, you have been asked to identify the layer that allows applications and a number of user functions access to the network Which of the following options represents your response? A. The document layer. B. The application layer. C. The system layer. D. The Data-link layer.

The application layer.

A client has a small office network. The customer would like to create a virtual LAN on their network. Which of the following components should the customer have to proceed? A. The customer should have a switch. B. The cusotmer should have a modem. C. The customer should have a server. D. The customer should have a router.

The customer should have a switch.

Identify whether the given statement is true or false. "In a token ring network, a patch cable is used to connect two MAUs." A. True B. False

True

Which two statements are true about Microsoft security zones? (Choose two.) A. The default security level for Local intranet and Trusted sites is the same B. The security level for Restricted sites can be changed C. Windows Firewall is the application you must to add or remove websites to security zones D. Adding a website to a security zone blocks access to that website E. Internet Explorer has four security zones

The default security level for Local intranet and Trusted sites is the same Internet Explorer has four security zones

You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. What is the problem? A. The host cannot find a DHCP server. B. The host is set to multicast. C. The host is currently broadcasting. D. The host cannot find a domain controller.

The host cannot find a DHCP server.

You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based Ethernet network. The network contains twenty hosts and a switch. One day, network cable develops a break. What will happen? A. The switch will become offline. B. The whole network will collapse. C. No effect on the connectivity. D. The host directly connected to the cable will not be able to access the network.

The host directly connected to the cable will not be able to access the network.

Identify whether the given statement is true or false. "A switch passes data based on the MAC address." A. True B. False

True

What is the primary disadvantage of a bus topology? A. It consists of one central switch, hub, or computer. B. The network has a single point of failure. C. Each node in the network acts an independent router. D. One node or device contains multiple radio cards or modules.

The network has a single point of failure.

Security is a concern on wireless networks due to: A. The radio broadcast access method. B. Spread spectrum issues. C. Frequency modulation issues. D. The potential for cross-talk.

The radio broadcast access method.

Identify whether the given statement is true or false. "In a bus topology, when a computer transmits its data, the signals travel in both directions on the bus until they reach both ends." A. True B. False

True

Identify whether the given statement is true or false. "In a segmented network, the router prevents broadcasts from being transferred from one segment to another." A. True B. False

True

C:\>ping 66.111.64.227 Pinging 66.111.64.227 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Pingi statistics for 66.111.64.227: Packet: Sent = 4, Received = 0, Lost - 4 (100% Lost). Approximate round trip time: in milli seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms What has happened? A. The IP address of the destination computer is not resolved. B. There is no connectivity between the source and the destination computer. C. The network bandwidth is heavily utilized. D. The hub is not working.

There is no connectivity between the source and the destination computer.

Which of the following statements are true regarding plenum-rated cables? Each correct answer represents a complete solution. Choose all that apply. A. These cables are often coated with Teflon. B. These cables are less expansive than normal cables. C. These cables produce less toxic gas than normal cables in case of fire. D. These cables are used in an enclosed environment.

These cables are often coated with Teflon. These cables produce less toxic gas than normal cables in case of fire. These cables are used in an enclosed environment.

What are three advantages of VLANs? (Choose three.) A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate traffic. D. They are efficient because a single switch can implement only a single VLAN. E. They act as though they are on the same LAN regardless of physical location.

They compartmentalize a network and isolate traffic. They require a router to connect to VLANs on another switch. They act as though they are on the same LAN regardless of physical location.

Which of the following are functions of the application layer of the OSI model? Each correct answer represents a complete solution. (Choose three.) A. To provide protocols for service advertisement B. To provide a user interface for database services C. To provide file, print, and message services D. To provide protocols for service use

To provide protocols for service advertisement To provide file, print, and message services To provide protocols for service use

Which of the following are functions of the application layer of the OSI model? Each correct answer represents a complete solution. (Choose three.) A. To provide a user interface for database services B. To provide protocols for service use C. To provide protocols for service advertisement D. To provide file, print, and message services

To provide protocols for service use To provide protocols for service advertisement To provide file, print, and message services

Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. (Choose two.) A. Wireless LAN (IEEE 802.11b) B. Token ring (IEEE 802.5) C. Ethernet (IEEE 802.3) D. Fiber Distributed Data Interface (FDDI)

Token ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI)

Which layer in the OSI model is included in the TCP/IP model? A. Physical B. Data Link C. Transport D. Application

Transport

Which of the following layers of the OSI model defines the functions of TCP and UDP? A. Data Link B. Physical C. Application D. Transport E. Session

Transport

Which protocol do you use as the transport protocol for a video application? A. TCP B. UDP C. FTP D. RDC

UDP

_________________ is connectionless, message-based protocol with best-effort service. A. UDP B. TCP C. ICMP D. ARP E. IGMP

UDP

What is the most common cable used today? A. UTP B. STP C. Coaxial D. Fiber

UTP

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. The network contains all Cisco connectivity devices. The network is configured as shown in the image below: What is the type of cable A? A. UTP rollover cable B. UTP straight-through cable C. UTP crossover cable D. Serial cable

UTP rollover cable

The three main types of IPv6 addresses are _________________ A. Unicast B. Anycast C. Multicast D. Broadcast

Unicast Anycast Multicast

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008-based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6? Each correct answer represents a complete solution. (Choose all that apply.) A. Unicast B. Broadcast C. Multicast D. Anycast

Unicast Multicast Anycast

Which type of switch is also known as a plug and play switch? A. Virtual B. Multilayer C. Managed D. Unmanaged

Unmanaged

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet. Which of the following actions will the router take to route the incoming packet? Each correct answer represents a part of the solution. (Choose two.) A. Add the path covered by the packet to the routing table. B. Use the routing table to determine the best path to the destination network address. C. Read the destination IP address. D. Use the routing table to determine the best path to the source network address. E. Read the source IP address.

Use the routing table to determine the best path to the destination network address. Read the destination IP address.

A client has requested the configuration of a new internet connection. The client would like her connection to support high-definiation television, as well as voice over IP and general Internet access, over a single connection. Which of the following options should you use? A. ADSL B. IDSL C. HDSL D. VDSL

VDSL

What do you use to isolate a group of computers within your organization? A. WLAN B. WAN C. VLAN D. Internet

VLAN

Which of the following technologies or services can be used to isolate hosts and segments and to control broadcast traffic? A. Perimeter network B. VPN C. RRAS D. VLAN

VLAN

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to the network. What should you do next? A. Verify that the DHCP service is available. B. Reset the user's password on the server. C. Flush the cache on the DNS server. D. Check your router's current routing tables.

Verify that the DHCP service is available.

In Hyper-V, what is used to separate a virtual network with no Internet connection with one that has an Internet connection? A. NIC B. Virtual switch C. Virtual routers D. Virtual hub

Virtual switch

Which are types of switch ports? (Choose three answers.) A. Managed B. Voice access C. Access D. Trunk E. Unmanaged

Voice Access Access Trunk

Which encryption standard is considered to be the weakest for wireless networks? A. WPA B. AES C. WEP D. WPA2

WEP

Which of the below is a 64 bit Wireless Encryption Protocol? A. AES B. TKIP C. WPA 2 D. WEP

WEP

What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses? A. DNS B. WINS C. DHCP D. LDAP

WINS

_________________ Service in Windows resolves NetBIOS names to IP addresses. A. WINS B. DHCP C. DNS D. ARP

WINS

A client would like to connect his two home computers, You need to solve the problem without the use of unnecessary hardware. Which of the following actions should you take? A. You should make use of a hub and a UTP crossover cable with RJ-45 connectors. B. You should make use of a hub and a UTP crossover cable with RJ-11 connectors. C. You should make use of a UTP crossover cable with RJ-45 connectors. D. You should make use of a UTP crossover cable with RJ-11 connectors.

You should make use of a UTP crossover cable with RJ-45 connectors

This question requires that you evaluate the underlined text to determine if it is correct. WEP provides the strongest encryption for a wireless network. A. RADIUS B. WPA C. No change is needed D. WPA2

WPA2

Which is the most secure encryption used in wireless networks? A. WEP B. WPA C. WPA2 D. 802.1x

WPA2

Which two types of servers are typically placed in a perimeter network? A. Web server B. File server C. Print server D. Email server

Web server Email server

Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS? A. well-known ports B. registered ports C. dynamic ports D. private ports

Well-known ports

You are in the process of designing a Star network for a client. Which of the following is an advantage of a Star network? A. A star network manages the connectivity between workstations without the need of a central node. B. When you connect or remove devices on the Star network, there are no interruptions. C. A Star network allows the passing of data packets through an excessive number of nodes. D. Failure of the central hub has no impact on a Star network.

When you connect or remove devices on the Star network, there are no interruptions.

A service that resolves NetBIOS names to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Windows Internet Name Service (WINS). D. Address Resolution Protocol (ARP).

Windows Internet Name Service (WINS).

What is the central device used in wireless LANs? A. Wireless Access Point B. CSA/CDM Connector C. Wireless Switch D. MDU

Wireless Access Point

You need to connect three wireless networks together: an 802.11a, an 802.11g, and an 802.11n. Which wireless tool should you use to accomplish this task? A. Wireless router B. Wireless network adapter C. Wireless bridge D. Wireless Access Point

Wireless bridge

Which of the below two tools can be used to capture and analyze traffic? A. Wireshark B. Kiwi syslog C. dumpster diving D. tcpdump

Wireshark tcpdump

A client is planning to replace their existing network cabling. They have requested that the replacement cabling meet the following requirements: It must be unaffected by electromagnetic interference. It must be able to transmit data over vast distances. wich of he following actions should you take? A. You should make use of Coaxial cable. B. You should make use of fiber-optic cable. C. You should make use of Shielded Twisted-Pair cable. D. You should make use of Unshielded Twisted-Pair cable.

You should make use of fiber-optic cable.

In a star topology, a bad cable affects only two interfaces. A. Yes B. No

Yes

In a star topology, a central connection point allows for flexibility and scalability. A. Yes B. No

Yes

Quality of Service (QoS) allows you to control bandwidth. A. Yes B. No

Yes

Quality of Service (QoS) allows you to define the priority traffic on the network. A. Yes B. No

Yes

You have been tasked with making sure that a clients network includes a server that converts NetBIOS names to IP addresses. Which of the following actions should you take? A. You should consider adding a DHCP server to the clients network B. You should consider adding a DNS server to the clients network C. You should consider adding a Web server to the clients network D. You should consider adding a WINS server to the clients network

You should consider adding a WINS server to the clients network

A clients network is made up of two network segments, named Subnet A and Subnet B. DHCP clients are located on Subnet A. A DHCP server on Subnet B. You need to make sure that DHCP clients are able to connect to the server. Which of the following actions should you take? A. You should make sure that the RRAS service is configured. B. You should make sure that WEb service is configured. C. You should make sure that the DNS service is configured. D. You should make sure that the DHCP relay agent service is configured.

You should make sure that the DHCP relay agent service is configured.

You have been instructed to design a TCP/Ip-based network. you need to configure the use of a suitable name resolution strategy that makes provision for Windows and Unix computer on the network. Which of the following actions should you take? A. You should make use of DNS as the name resolution strategy. B. You should make use of NetBIOS as the name resolution strategy. C. You should make use of DHCP as the name resolution strategy. D. You should make use of Peer Name Resolution Protocol as the name resolution strategy.

You should make use of DNS as the name resolution strategy.

What type of network can you set up that is another company's internal network? A. intranet B. extranet C. internet D. DMZ

extranet

The wireless adapter has an IP address configured: A. manually B. through DHCP C. through APIPA

through AIPA

What type of address is 202.23.2.255? A. multicast address B. broadcast address C. unicast address D. anycast address

broadcast address

What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking? A. proxy server B. application firewall C. NAT filtering D. circuit-level gateway

circuit-level gateway

If you want to connect a computer directly to another computer without using a switch, you use a __________. A. straight-through cable B. crossover cable C. laplink cable D. rollover cable

crossover cable

What do you call it when electrical signals jump to another set of wires? A. EMI B. RFI C. crosstalk D. jump it is

crosstalk

One purpose of a perimeter network is to: A. make resource available to the intranet. B. link campus area networks (CANs). C. link local area networks (LANs). D. make resources available to the Internet.

make resources available to the Internet.

What defines the nearest router for a host? A. subnet mask B. default gateway C. DNS server D. WINS server

default gateway

What ports are defined above 49,152? A. well-known ports B. registered ports C. dynamic ports D. sliding ports

dynamic ports

What command do you use to connect to a FTP server to download a file? A. nslookup B. ssh C. telnet D. ftp

ftp

Which of the following does a switch use for increased performance? A. simplex B. half duplex C. full duplex D. sliding duplex

full duplex

When a packet traverses a network, each router is a _____. A. jump point B. CSU/DSU C. jump switch D. hop

hop

A node within a local area network (LAN) must have a network interface and a: A. resource to share. B. host address. C. network account. D. table of all network nodes

host address.

After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. A. ifconfig B. traceroute C. ping D. ipconfig

ipconfig

What command displays the IP address, subnet mask, and default gateway of the system you are currently on? A. ipconfig B. ping C. tracert D. nslookup

ipconfig

The ______________ command in Windows CLI will remove the IP address learnt from DHCP. A. ipconfig /renew B. ipconfig / release C. netstat / release D. ping -a

ipconfig / release

What command do you use to display the MAC address on a system? A. ipconfig /all B. pathping -m C. route /showmac D. nbstat -r

ipconfig /all

Which command-line tool is used to display IP address information and, where applicable, DHCP server information? A. ping -d B. ipconfig C. ipconfig /all D. ping

ipconfig /all

You are required to find the MAC address of you own computer. Which of the below command is used? A. ipconfig /all B. ipconfig -an C. netstat -an D. ipconfig

ipconfig /all

You need to find the MAC address of the network adapter for the computer you are currently working on. What command line command will give you the information you need? A. ipconfig B. grep C. ipconfig /all D. arp

ipconfig /all

What command do you use to register the computer's name and IP address with the nearest DNS server? A. ipconfig /renew B. ipconfig /renew all C. ipconfig /flushdns D. ipconfig /registerdns

ipconfig /registerdns

What command do you use to release the IP configuration handed out by a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release

ipconfig /release

What command do you use to retrieve or update your DHCP assigned configuration? A. ipconfig /flushdns B. ipconfig /all C. ipconfig /release D. ipconfig /renew

ipconfig /release

What command do you use to reacquire IP configuration from a DHCP server? A. ipconfig /renew B. ipconfig /releasedns C. ipconfig /savestatic D. ipconfig /release

ipconfig /renew

What command do you use to clear the DNS cache on a local system? A. ipconfig /registerdns B. ipconfig /cleardns C. ipocnfig /flushdns D. ipconfig /releasedns

ipocnfig /flushdns

When trying to protect your network, you should create your secure network based on _______. A. multiple content filters B. a master firewall that all traffic flows through C. a NAT firewall and a proxy server D. layers

layers

What type of address is used to send a single set of packets to multiple hosts? A. multicast address B. broadcast address C. unicast address D. anycast address

multicast address

What command clears the NetBIOS name cache table? A. nbtstat -r B. nbtstat -R C. nbtstat -RR D. nbtstat -s

nbtstat -R

Which of the below command will help remove IP address from CLI? A. ipconfig B. removeIP C. netdom D. netsh

netdom

What command do you use to display and modify the network configuration of a local computer? A. netsh B. netstat C. telnet D. nbtstat

netsh

What command do you use to display active TCP or UDP connections? A. nbtstat B. netstat C. ipconfig D. nslookup

netstat

What command is used to display NetBIOS over TCP/IP statistics? A. nbtstat B. netstat C. ipconfig D. nslookup

netstat

The ___________ command is used to check the connection status to and from your computer. A. netstat -an B. ping -t C. arp -a D. tcpdump

netstat -an

What command displays Ethernet statistics? A. netstat -e B. netstat -x C. netstat -q D. netstat -t

netstat -e

What type of server does Active Directory run on? A. file server B. print server C. database server D. network controller

network controller

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use? A. ping -a B. ping -4 C. ping -l D. ping -t

ping -l

What option do you use to ping constantly until you stop it? A. ping -t <host> B. ping -q <host> C. ping -r <host> D. ping -s <host>

ping -t <host>

What command do you use to test a system's IPv4 protocol stack? A. ping 127.0.0.1 B. ping self C. ping 255.255.255.255 D. ping default gateway

ping 127.0.0.1

What type of cable should be used as part of a fire code for a building? A. STP B. PVC C. heat protected D. plenum-rated

plenum-rated

What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future? A. NAT server B. stateful packet inspector C. proxy server D. NIDS

proxy server

You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use? A. punch-down tool B. zip tool C. wire wedge D. soldering iron

punch-down tool

Tracert is used to: A. report the shortest route between different networks. B. manage routing tables dynamically. C. manage session-oriented connections between nodes. D. report the route taken by packets across an IP network.

report the route taken by packets across an IP network.

What topology does FDDI use? A. bus B. star C. ring D. mesh

ring

What command is used to add static routes to a Windows computer? A. nslookup B. telnet C. route D. nbtstat

route

What command do you use to display the routing table on a local system? A. route display B. route table C. route local D. route print

route print

What is the primary disadvantage of X.25? A. digital circuit B. small data payloads C. circuit switching D. slow speeds

slow speeds

What technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network? A. stateless packet inspection B. stateful packet inspection C. NAT filtering D. application-level gateway

stateful packet inspection

What command can you use to connect to a mail server so that you can test SMTP? A. ftp B. nslookup C. telnet D. nbtstat

telnet

What command do you use to connect to a remote computer so that you can execute commands? A. ftp B. nslookup C. telnet D. nbtstat

telnet

Which DMZ configuration uses one firewall with three interfaces? A. back-to-back configuration B. three-leg perimeter configuration C. basic configuration D. perimeter configuration

three-leg perimeter configuration

The Ethernet adapter has an IP address configured: A. manually B. through DHCP C. through APIPA

through AIPA

What command tests network connectivity while showing you each hop along the way and the degree of packet loss? A. ping B. pathping C. nbtstat D. tracert

tracert

What command tests network connectivity while showing you each hop along the way? A. ping B. nslookup C. nbtstat D. tracert

tracert

What type of communication is sent to a single designated host? A. unicast B. broadcast C. multicast D. anycast

unicast

When you have multiple circuits connected to a site, the entire circuit is known as a ___________. A. virtual circuit B. emulated circuit C. joined circuit D. multitasked circuit

virtual circuit


Set pelajaran terkait

developmental dysplasia of the hip (DDH)

View Set

Basic research vs. Applied research

View Set

Grade 6 Social Studies India, Religion, Caste System

View Set

Prueba de práctica Official study guide

View Set

PC Pro 12.4.12 Practice Questions

View Set

Reconstruction & Civil War (US HISTORY)

View Set

Macroeconomics Final - LSU 2023 - Yang

View Set