Network Test
Default gateway
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
STDM (statistical time division multiplexing)
Which kind of multiplexing assigns slots to nodes according to priority and need?
Switches Routers KVM switch
Which of the following devices are you likely to find in the MDF? Choose all that apply.
A password manager
Which of these is considered a secure place to store a list of documented network passwords?
IR
Which one of the following wireless transmission types requires a clear LOS to function?
Tone locator
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
TCP
Which protocol's header would a layer 4 device read and process?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Primary DNS server
Which DNS server offers the most current resolution to a DNS query?
Passive twinaxial cable
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?
RDP
Which of the following is an application layer protocol?
hostname
Which of these commands has no parameters in Windows?
Fiber type mismatch
What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
FE80::/64
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
802.11ax
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
CSMA/CA
Which Carrier Sense technology is used on wireless networks to reduce collisions?
Voice gateway
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
Integrity
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Z-Wave
Which of the following wireless technologies does not use the 2.4 GHz band?
Cat 5e, cat 6a, cat 7
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
The OUI
Which part of a MAC address is unique to each manufacturer?
CCMP
Which protocol replaced TKIP for WPA2?
arp -a
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?
PowerShell Command Prompt Zenmap
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Peer-to-peer
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Star
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
EF
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
Look at whether the device is located on the ISP's side of the demarc.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
RSSI
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
Identify the problem.
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Network layer
At which OSI layer does IP operate?
ipconfig /release
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
Rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Client-server
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
HTTPS
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
Fail-open
In the event of a fire, the most appropriate failure policy is a _______ policy.
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
White/green
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
255
What decimal number corresponds to the binary number 11111111?
Checksum
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
1,500 bytes
What is the Internet standard MTU?
The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
Evil twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
SQL
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Rogue AP
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?
SFTP
Which remote file access protocol is an extension of SSH?
Bandwidth
Which transmission characteristic is never fully achieved?
SSL and TLS
Which two encryption protocols might be used to provide secure transmissions for email services?
ICMP and ARP
Which two protocols manage neighbor discovery processes on IPv4 networks?
MX record
Which type of DNS record identifies an email server?
Cat 6a
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?
List all components on the network.
What is the first step of inventory management?
Wiring diagram
What type of diagram shows a graphical representation of a network's wired infrastructure?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
MT-RJ
Which fiber connector contains two strands of fiber in each ferrule?
Encryption
Which function of WPA/WPA2 security ensures data cannot be read in transit?
NEXT
Which kind of crosstalk occurs between wire pairs near the source of the signal?
Ngnix
Which of the following applications could be used to run a website from a server?
Offers access to multiple OSs in VMs
What is one advantage offered by VDI over RDS and VNC?