CompTIA Network+ (N10-006) Sample Questions

Ace your homework & exams now with Quizwiz!

APIPA

169.254.0.100 is an IP address which would MOST likely come from which of the following? A. CIDR B. DHCP C. APIPA D. DNS

255.0.0.0

192.168.0.7/8 notation denotes which of the following IPv4 subnet masks? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

Class C

203.50.5.0 is an example of which of the following network classes? A. Class A B. Class B C. Class C D. Class D

PPPoE

A DSL modem connects to the provider's network using which of the following authentication techniques? A. PoE B. MS-CHAP C. PPPoE D. EAP

Data Link

A MAC address is a part of which of the following OSI model layers? A. Network B. Data Link C. Physical D. Transport

On the quarantine network

A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop? A. On the DMZ network B. On the sandbox network C. On the honeypot D. On the quarantine network

Incorrect VLAN assignment

A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem? A. Damaged cable B. Duplex mismatch C. Incorrect VLAN assignment D. Speed mismatch

Switch WAP

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO). A. IDS B. Repeater C. Switch D. WAP E. UTM device

The laptops are only capable of functioning on 2.4GHz spectrum

A SOHO company just installed new 802.11a wireless APs. All company laptops have gigabit LAN ports along with wireless-g cards. Which of the following is the issue with this setup? A. The laptops will have a max wireless speed of 300Mbps B. The wired network is likely not backwards compatible with the gigabit LAN ports on the laptops C. The wireless system will only function at a slow 11Mbps D. The laptops are only capable of functioning on 2.4GHz spectrum

Enable WPA2 encryption

A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches? A. Turn down the signal strength B. Replace the WAP and enable WEP C. Change both the SSID and WEP key D. Enable WPA2 encryption

Move the access point

A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity? A. Disable SSID broadcast B. Increase the signal strength C. Move the access point D. Change the broadcast channel

Router Wi-Fi Access point

A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO). A. Router B. Wi-Fi Access point C. Cable modem D. Ten WiMAX adapters E. Ten CAT6 patch cables

NAS

A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup? A. iSCSI SAN B. FCoE SAN C. NAS D. USB flash drive

Channel service unit

A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback? A. Channel remote module B. Fiber optic modem C. Channel service unit D. Digital subscriber line modem

An ACL.

A VLAN with a gateway offers no security without the addition of: A. An ACL. B. 802.1w. C. A RADIUS server. D. 802.1d.

RJ-45

A VoIP line will MOST likely have which of the following connectors? A. RJ-11 B. DB-25 C. BNC D. RJ-45

Latency

A VoIP system running over a wireless network link is continually being reported as choppy. Which of the following is the cause of this issue? A. Frequency B. Latency C. Interference D. Encryption type

system logs.

A Windows server has a problem after booting up. Kim, a technician, should immediately check the: A. history logs. B. cron logs. C. application logs. D. system logs.

Duplex mismatch

A administrator's network has OSPF for the internal routing protocol and has two interfaces that continue to flap. The administrator reviews the following output: Fast ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100Base Tx/Fx Received 1052993 broadcasts 1258 input errors 983881 packet output, 768588 bytes 1747 output errors, 0 collisions, 423 resets Which of the following problems would cause the interface flap? A. Wrong IP address B. Loopback not set C. Bad wire D. Incorrect encapsulation E. Duplex mismatch

Short

A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following problems to occur? A. EMI B. Short C. Reversed TXRX D. dB loss

Channel selection

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client's wireless network to help ensure that interference from other wireless networks is at a minimum? A. WPA encryption key selection B. Channel selection C. Antenna types D. Disable SSID

Honeypot

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network? A. DMZ B. Content Filter C. Botnet D. Honeypot

Man-in-the-middle

A client is receiving certificate errors in other languages when trying to access the company's main intranet site. Which of the following is MOST likely the cause? A. DoS B. Reflective DNS C. Man-in-the-middle D. ARP poisoning

Configuration backup

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to replace it. Which of the following would be the MOST helpful in regaining connectivity? A. VLAN configuration B. Network diagram C. Configuration backup D. Router image

Network diagrams

A client reports that half of the office is unable to access a shared resource. Which of the following should be used to troubleshoot the issue? A. Data backups B. Network diagrams C. Baseline information D. Vendor documentation

SSL VPN

A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access? A. Site-to-site VPN B. Network-based firewall C. SSL VPN D. Host-based firewall

2

A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one of its interfaces. How many broadcast domains are present in this company's network A. 1 B. 2 C. 5 D. 16 E. 28

Private SaaS

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following? A. Public SaaS B. Private SaaS C. Hybrid IaaS D. Community IaaS

Two-factor authentication

A company has a remote access VPN and wants to ensure that if a username and password are compromised, the corporate network will remain secure. Which of the following will allow the company to achieve its security goal? A. Posture assessment B. Kerberos C. TACACS+ D. Two-factor authentication

Fault tolerance

A company has a server with redundant power supplies. Which of the following is this an example of? A. Traffic shaping B. Caching engines C. Fault tolerance D. Load balancing

PAT

A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity? A. VLSM B. NAT C. CIDR D. PAT

Provide end user awareness and training for employees

A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach? A. Create VLANs to segment the network traffic B. Place a network sniffer on segments with new employees C. Provide end user awareness and training for employees D. Ensure best practices were implemented when creating new user accounts

Content filter

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this? A. Content filter B. Packet filter C. IPS D. IDS

Check for switching loops between core and distribution switches.

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue? A. Check for switching loops between core and distribution switches. B. Check whether an incorrect VLAN has been assigned to the new distribution switch. C. Check for inconsistent or missing routes between the core and distribution switches. D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.

/27

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask? A. /26 B. /27 C. /28 D. /29

High availability

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible? A. Traffic shaping B. QoS C. Caching engines D. High availability

The router interface is configured with the incorrect IP address. The default gateway is configured incorrectly.

A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP: Interface A: IP address: 10.10.150.16 Subnet mask: 255.255.255.240 Default gateway: 10.10.150.32 Speed: 1000 Mbps Duplex: Auto State: No Shutdown None of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO). A. There is a duplex mismatch between the router and ISP. B. The router interface is turned off. C. The interface is set to the incorrect speed. D. The router is configured with the incorrect subnet mask. E. The router interface is configured with the incorrect IP address. F. The default gateway is configured incorrectly.

Install host-based anti-malware software

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy? A. Install host-based anti-malware software B. Implement MAC filtering on all wireless access points C. Add an implicit deny to the core router ACL D. Block port 80 outbound on the company firewall E. Require users to utilize two-factor authentication

Change management

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work? A. Change management B. Asset management C. Access log D. Baselines

Patch management

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? A. Host-based intrusion detection systems B. Acceptable use policies C. Incident response team D. Patch management

Install recommended updates

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? A. Utilize a FTP service B. Install recommended updates C. Send all log files through SMTP D. Configure the firewall to block port 22

Remove the WEP encryption from Access Point 2.

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change? Access Point 1Access Point 2 802.11g802.11b Encryption: WPA2Encryption: WEP Channel: 1Channel: 7 SSID. CompanyWiFiSSID. Visitor A. Change the SSID on Access Point 2 to OPEN. B. Disable SSID broadcasting on Access Point 1. C. Change the encryption on Access Point 2 to WPA2. D. Remove the WEP encryption from Access Point 2.

Incompatible NICs

A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect? A. Incorrect channel B. Weak encryption C. Incompatible NICs D. Incorrect SSID

Performance optimization

A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages. This is an example of which of the following network segmentation techniques? A. Compliance implementation B. Separate public/private newtorking C. Honeypot implementation D. Performance optimization

Signal strength

A company has just installed wireless in their office. In one corner of the office building users are not able to establish a connection. Which of the following can be changed on the AP to help resolve this issue? A. SSID B. Channels C. Signal strength D. Encryption

Web content filtering

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences? A. ARP inspection B. Intrusion detection system C. Web content filtering D. Port filtering

MX

A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email? A. CNAME B. MX C. PTR D. A

Smart jack

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc? A. Premise router B. ISP router C. Smart jack D. CSU/DSU

802.11ac with 2 spatial streams and an 80MHz bandwidth

A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? A. 802.11ac with 2 spatial streams and an 80MHz bandwidth B. 802.11ac with 3 spatial streams and a 20MHz bandwidth C. 802.11ac with 3 spatial streams and a 40MHz bandwidth D. 802.11ac with 4 spatial streams and a 160MHz bandwidth

Network analyzer

A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages? A. Network analyzer B. Packet analyzer C. Protocol analyzer D. Network sniffer

MIMO

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds? A. MU-MIMO B. LWAPP C. PoE D. MIMO

MDF

A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to? A. Core switch B. MDF C. Ethernet router D. IDF

Password and key fob

A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of twofactor authentication? A. ID badge and keys B. Password and key fob C. fingerprint scanner and retina scan D. Username and password

A RADIUS server and an access point

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results? A. A TACACS+ device and a RADIUS server B. A TACACS and a proxy server C. A RADIUS server and an access point D. A RADIUS server and a network controller

Clean Gas

A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire. Which of the following is the best choice for the fire suppression system? A. Portable extinguishers B. Wet Pipe C. Clean Gas D. Dry Pipe

MAC filtering

A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured? A. SSID disable B. ACL rules C. WPA encryption D. MAC filtering

MAC filtering

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk? A. Firewall B. Web filtering C. MAC filtering D. Host-based antivirus

NaaS

A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing? A. Virtual desktops B. Virtual servers C. NaaS D. SaaS

Business continuity

A company plan established to resume normal system operations following a disruption in business would be described as which of the following? A. First responders B. User awareness training C. Disaster recovery D. Business continuity

EMI

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue? A. dB loss B. Distance C. Incorrect connector type D. EMI E. Crosstalk

Establish a plan of action to solve the problem.

A company suffers an outage due to a bad module in a core switch. Which of the following is the proper order of troubleshooting? A. Gather information, start at the top of the OSI model, and work down. B. Establish a plan of action to solve the problem. C. Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat. D. Gather information, start at the bottom of the OSI model, and work up.

Wireless router

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network? A. Wireless bridge B. VPN concentrator C. Default WAP D. Wireless router

Throttle the connection speed of the patching server to match older PCs

A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. Which of the following should be done to prevent this issue in the future? A. Enable automatic rebooting of the pCs after patching is completed B. Require the patching server to update the oldest PCs off hours C. Disable automatic driver updates to PCs on the patching server D. Throttle the connection speed of the patching server to match older PCs

Butt set

A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability? A. Honeypot B. Butt set C. Spyware D. Blue jacking

BGP

A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down? A. Load balancer B. VRRP C. OSPF D. BGP

DMZ

A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used? A. VPN B. ACL C. DMZ D. VLAN

802.1x

A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this? A. 802.1x B. 802.1p C. Single sign-on D. Kerberos

80 8080

A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO). A. 20 B. 80 C. 143 D. 443 E. 8080

WPA2 enterprise

A company wants to simplify network authentication for their users. Which of the following would be used to implement wireless security with single sign-on? A. WPA2 enterprise B. WEP C. Stateful firewall D. PAT

80

A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this? A. 20 B. 80 C. 143 D. 443

3389

A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this? A. 143 B. 443 C. 3389 D. 8080

WPA

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this? A. Stateful inspection B. WEP C. WPA D. Open with EAP

Options

A computer configured by DHCP has a listed DNS server and gateway. Which of the following allows these settings to be configured? A. Reservations B. Leases C. Scopes D. Options

Loopback plug

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer's NIC? A. Cable certifier B. Throughput tester C. Loopback plug D. Multimeter

Proxy server

A content filter is MOST likely installed on which of the following servers? A. Proxy server B. TACACS+ server C. DNS server D. DHCP server

Downgrade firmware and restore backup configuration

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. Which of the following is the BEST action to alleviate the situation? A. Allow the contractor to reset switches to factory defaults B. Check the cabling on all switches for improper crossover use C. Document the changes that were made D. Downgrade firmware and restore backup configuration

SOW

A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes? A. MLA B. MOU C. SOW D. SLA

WPA encryption

A customer has not been using security on a wireless network and has recently received many attacks through this vector. Which of the following would be the MOST secure way to harden this wireless network? A. Disable the SSID B. WPA encryption C. VLAN implementation D. WEP encryption

Ensure that port 20 is open

A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened. Which of the following should be one FIRST to resolve the problem? A. Ensure that port 20 is open B. Ensure that port 161 is open C. Flush the DNS cache on the local workstation D. Validate the security certificate from the host

Fiber optic

A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch? A. Fiber optic B. Wireless C. CAT5e D. CAT3

802.1q is not configured on the switch port

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem? A. 802.1q is not configured on the switch port B. APIPA has been misconfigured on the VLAN C. Bad SFP in the PC's 10/100 NIC D. OS updates have not been installed

Implement a biometric reader at the datacenter entrance and require passage through a mantrap

A facility would like to verify each individual's identity prior to allowing access to the datacenter. Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of the following would BEST meet these goals? A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap B. Implement a security guard at the facility entrance and a keypad on the datacenter entrance C. Implement a CCTV camera and a proximity reader on the datacenter entrance D. Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance

11, 10, 12, 13

A firewall ACL is configured as follows: 10. Deny Any Trust to Any DMZ eq to TCP port 22 11. Allow 10.200.0.0/16 to Any DMZ eq to Any 12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443 13. Deny Any Trust to Any DMZ eq to Any A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives? A. 11, 10, 12, 13 B. 12, 10, 11, 13 C. 13, 10, 12, 11 D. 13, 12, 11, 10

Behavior based IPS

A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following? A. Signature based IDS B. Behavior based IPS C. Host based IPS D. Network based IDS

application level

A firewall that operates at Layer 7 of the OSI model is known as a(n): A. circuit gateway B. packet filter C. application level D. redundant firewall

Hostnames to IP addresses

A forward lookup zone converts which of the following? A. IP addresses to hostnames B. Hostnames to IP addresses C. MAC addresses to IP addresses D. IP Addresses to MAC addresses

192.168.0.1

A home office has a dozen devices that need a class based DHCP device to assign addresses. The subnet only has one octet for the host portion of each device. Which of the following IP addresses would be assigned to the default gateway? A. 10.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1

PAN

A home user is pairing a bluetooth gaming controller with the game console. Which of the following is implemented between the console and the controller? A. LAN B. PAN C. WAN D. MAN

Establish a plan of action

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step? A. Identify the problem B. Question the user C. Establish a plan of action D. Establish a theory of probable cause

CCMP

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method? A. WEP B. CCMP C. TKIP D. CHAP

APIPA

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types? A. APIPA B. MAC C. Static D. Public

IDF

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring? A. MDF B. VPN C. RDP D. IDF

Jamming

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing? A. Removing the AP from the classroom B. ACL C. Jamming D. Firewall E. IPS

Packet Sniffing

A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed? A. Man-in-the-middle B. Evil Twin C. Packet Sniffing D. IV attack

ARP poisoning

A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using? A. DNS poisoning B. ARP poisoning C. Reflection D. SYN attack

ipconfig

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings? A. net share B. hostname C. ipconfig D. tracert

Layers 2 and 3

A multi-layer switch operates at which of the following OSI layers? A. Layers 1 and 5 B. Layers 2 and 3 C. Layers 4 and 5 D. Layers 5 and 6

QoS

A national cable company providing TV, telephone, and Internet service to home users over its IP network, has been tracking a large increase of network bandwidth due to P2P file sharing. Which of the following should the company deploy to ensure excellent TV and telephone service? A. QoS B. Load balancing C. High availability D. Fiber optics

The network administrator should install and configure a syslog server.

A network administrator currently collects log files from several different servers. Which of the following would allow the network administrator to collect log files on a centralized host? A. The network administrator should install and configure a traffic analysis server. B. The network administrator should install and configure a DMZ server. C. The network administrator should install and configure a syslog server. D. The network administrator should install and configure a network sniffer.

Port security

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example? A. Packet filtering B. Hardware firewalls C. Port security D. Stateful inspection

Change the IP of 192.168.2.130 to 192.168.2.126

A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer's IP addresses: 192.168.2.70 192.168.2.100 192.168.2.125 192.168.2.130 When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do? A. Change the IP of 192.168.2.130 to 192.168.1.128. B. Change the IP of 192.168.2.130 to 192.168.2.126. C. Change the default gateway of 192.168.2.130 accordingly. D. Reconfigure the switch for the right VLAN.

Remove default 802.1q tag and set to server VLAN

A network administrator has configured a new 100Mbs WAN circuit, but speed testing shows poor performance when downloading large files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the downloads speeds over time. The administrator checks the router interface and sees the following: Router01#show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000A.00BB.CC11 Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding Which of the following is MOST likely to resolve the issue? A. Shutdown and then re-enable this interface B. Reset the statistics counter for this interface C. Remove default 802.1q tag and set to server VLAN D. Apply egress port rate-shaping

3389

A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened? A. 445 B. 3389 C. 5004 D. 5060

Two-factor authentication

A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented? A. Two-factor authentication B. Biometric security C. Multi-factor authentication D. Single factor authentication

TX/RX cables reversed

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity? A. Broadcast storm B. TX/RX cables reversed C. Mismatched MTU D. Incorrect routing table

Option

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot? A. Scope B. Reservation C. Option D. Lease

MAC filtering

A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions? A. MAC filtering B. Port filtering C. IP filtering D. ACL filtering

Penetration testing

A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be performed to verify the security controls in place? A. Penetration testing B. AAA authentication testing C. Disaster recovery testing D. Single point of failure testing

Behavior based IPS

A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed? A. Honeynet B. Signature based IPS C. Behavior based IPS D. Host based IPS

Add additional network cards to the server

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue? A. Add a honeypot to reduce traffic to the server B. Update the Ethernet drivers to use 802.3 C. Add additional network cards to the server D. Disable CSMA/CD on the network

PoE

A network administrator is planning to install wireless access points across the enterprise. Which of the following should be considered when installing at remote locations? A. PoE B. BSSID C. MAC filtering D. NAT

PoE

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches? A. PoE B. STP C. NAT D. VTP

nslookup

A network administrator is reviewing logs and notices that a device with a public IP address is trying to access the web server RDP port. Which of the following tools can be used to resolve the domain of the public IP address? A. arp B. nslookup C. ipconfig D. netstat

Signal strength

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review? A. Signal strength B. SSID name C. WPA2 encryption D. WEP encryption

Closing off port 25 on the firewall

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? A. Closing off port 25 on the firewall B. Closing off port 53 on the firewall C. Turning off the SMTP service on the email server D. Turning off the IMAP service on the email server

Closing off port 25 on the firewall

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? A. Closing off port 25 on the firewall B. Closing off port 53 on the firewall C. Turning off the SMTP service on the email server D. Turning off the IMAP service on the email server

Use the same SSIDs on different channels and AP isolation

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building? A. Use the same SSIDs on different channels and AP isolation B. Use different SSIDs on different channels and VLANs C. Use different SSIDs on the same channels with VLANs D. Use the same SSIDs on same channels with AP isolation

dB loss

A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to? A. Bad connectors B. Cross-talk C. EMI / Interference D. dB loss

Network

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output: SRC MAC SRC IP DST MAC DST IP 00:1D:1F:AB:10:7D 192.168.1.10:2000 15:BE:9F:AB:10:1D 192.168.1.14:1200 05:DD:1F:AB:10:27 192.168.1.10:1000 22:C7:2F:AB:10:A2 192.168.1.15:1300 Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring? A. Network B. Application C. Data link D. Transport

21

A network administrator needs to allow employees to securely upload files to a remote server. Which of the following should be allowed on the firewall? A. 20 B. 21 C. 22 D. 161

Port mirroring

A network administrator needs to configure a port on the switch that will enable all packets on a particular switch to be monitored. Which of the following would BEST complete this objective? A. Traffic shaping B. MAC filtering C. Port mirroring D. VLAN trunking

11, 1, 6, 11, 1, 6, 11

A network administrator needs to deploy seven equally spaced WAPs along an underground tunnel. Which of the following is the BEST channel design to avoid interference? A. 1, 3, 5, 7, 9, 11, 1 B. 1, 6, 11, 1, 1, 6, 11 C. 1, 11, 1, 11, 1, 11, 1 D. 11, 1, 6, 11, 1, 6, 11

36, 44, 52, 60

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels? A. 36, 40, 44, 48 B. 36, 44, 52, 60 C. 36, 44, 48, 52 D. 36, 48, 60, 64

Bus

A network administrator noticed that when one computer goes down, all the other computers in the office will not work. Which of the following topologies is in use? A. Star B. Ring C. Hybrid D. Bus E. Mesh

Network sniffer

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network? A. Wire tap B. Network sniffer C. Load balancing appliance D. NIPS

Test the theory by analyzing logs

A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT? A. Escalate to the management team B. Change the IP address back to its previous state C. Test the theory by analyzing logs D. Create a plan of action to present to management

Distributed DoS

A network administrator notices that the border router is having high network capacity loads during non-working hours which is causing web services outages. Which of the following is the MOST likely cause? A. Evil twin B. Session hijacking C. Distributed DoS D. ARP cache poisoning

Log analysis

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator's account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack? A. Network maps B. Change management C. Log analysis D. Protocol analyzer

Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

A network administrator received the following email from a user: From: [email protected] To: [email protected] Subject: Free smart phone Dear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/ survey.php Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain? A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list. B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Social engineering

A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks? A. Social engineering B. Spoofing C. Zero-day attack D. VLAN hopping

Update the DNS server with the proxy server information.

A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites. Which of the following will resolve the issue? A. Update the DNS server with the proxy server information. B. Implement a split horizon DNS server. C. Reboot the web proxy and then reboot the DNS server. D. Put the proxy server on the other side of the demarc.

Check if there are link lights on the ports

A network administrator set up a network computer lab and discovered connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. Which of the following should the administrator perform FIRST? A. Check if there are link lights on the ports B. Checkthe ports on the switch for full duplex C. Check to see if port security is enabled D. Check to see if the uplink interface is configured correctly.

Packet sniffer

A network administrator suspects an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic? A. Syslog server B. Toner probe C. OTDR D. Packet sniffer

NIC bonding

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards? A. NIC bonding B. Proxy server C. Firewall ACLs D. VLANs

802.11a 802.11ac

A network administrator wants to deploy a wireless network in a location that has too much RF interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless transmissions? (Select TWO) A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n

Switch

A network administrator wants to logically separate web function servers on the network. Which of the following network devices will need to be configured? A. IPS B. Switch C. Hub D. HIDS

SNMP

A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used? A. SCTP B. Packet sniffer C. DCCP D. SNMP

Packet sniffing

A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used? A. Social engineering B. Packet sniffing C. Rogue access point D. Man-in-the-middle

The number of allowable MAC addresses.

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed? A. The network address translation IP range. B. The signal strength of the router. C. The DCHP lease time. D. The number of allowable MAC addresses.

Site survey

A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference which of the following? A. Network diagram B. Site survey C. Network topology D. PoE requirements

Layer 1

A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 7

Missing default gateway

A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility: Network Destination Netmask Gateway Interface 192.168.1.0 255.255.255.0 192.168.1.254 eth0 192.168.1.10 255.255.255.255 192.168.1.10 eth0 127.0.0.1 255.0.0.0 On-link lo 127.0.0.0 255.0.0.0 On-link lo 255.255.255.255 ^ 102.168.1.10 eth0 255.255.255.255 Which of the following is the reason for the computer issue, given the above output? A. Wrong default gateway netmask B. Incorrect default gateway address C. Default gateway on the wrong interface D. Missing default gateway

Ring

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement? A. Star B. Bus C. Ring D. Mesh

Decrease lease times

A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue? A. Increase the number of reservations B. Increase exclude list C. Decrease lease times D. Decrease the scope

NIDS

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements? A. HIDS B. NIDS C. NIPS D. HIPS

Vulnerability scanner

A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the missing update or patch. Which of the following solutions would work BEST to present this data? A. Security policy B. Penetration scan C. Virus scan D. Vulnerability scanner

Incorrectly configured ACL

A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the Internet. Which of the following is the MOST likely reason? A. Incorrectly configured ACL B. Implicit allow statement C. SMTP requests are being denied D. All protocols are being allowed in

ipconfig /release then ipconfig /renew

A network technician determines that two dynamically assigned workstations have duplicate IP addresses. Which of the following commands should the technician use to correct this problem? A. ipconfig /all B. ipconfig /dhcp C. ipconfig /release then ipconfig /renew D. ipconfig /renew

Establish a theory of probable cause

A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue? A. Test a theory to determine the cause B. Escalate to a senior technician C. Identify the symptoms D. Establish a theory of probable cause E. Establish a plan of action

ST

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the following is the MOST common connector that will be used on the switch to connect the media converter? A. FDDI B. Fiber coupler C. MT-RJ D. ST

The gateway is misconfigured on the new router.

A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue? A. The gateway is misconfigured on the new router. B. The subnet mask is incorrect on the new router. C. The gateway is misconfigured on the edge router. D. The SSID is incorrect on the new router.

SNMPv3

A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner? A. S/MIME B. SYSLOG C. PGP D. SNMPv3 E. RSH

802.11ac

A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design? A. 802.11g B. 802.11ac C. 802.11b D. 802.11a

UDP port 53 needs to be allowed

A network technician has configured a new firewall to allow TCP port 80 traffic and deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies by attempting to access a popular website. Which of the following will MOST likely correct the error? A. HTTP uses UDP B. DNS port 23 needs to be allowed C. HTTP needs port 443 allowed D. UDP port 53 needs to be allowed

Wavelength mismatch

A network technician has configured a point-to-point interface on a router, however, once the fiber optic cables have been run, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light is passing in both directions without excessive loss. Which of the following is the MOST likely cause? A. Distance limitation B. Wavelength mismatch C. cross-talk D. EMI E. Macro bend

The admin private network allowing only admin access

A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments? A. The internal network since it is private B. The admin private network allowing only admin access C. The DMZ only allowing access from the segment with the servers D. The internet connection to allow admin access from anywhere

show mac address-table

A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to? A. nbtstat-a B. show mac address-table C. show interface status D. show ip access-list E. nslookup hostname

Establish a plan to locate the rogue DHCP server.

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology? A. Document the findings and action taken. B. Establish a plan to locate the rogue DHCP server. C. Remove the rogue DHCP server from the network. D. Identify the root cause of the problem.

Backup the current configuration for each switch

A network technician has downloaded the latest vendor switch O/S. which includes new features and enhancements. Which of the following should the technician perform FIRST when updating the switches? A. Backup the current configuration for each switch B. Install during non-business hours to test the system C. Test the O/S on one of the production switches D. Power cycle the company's border router

Port 69 is blocked on a router between the network segments

A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error? A. Only FTP can be used to copy configurations from switches B. Anonymous users were not used to log into the TFTP server C. An incorrect password was used and the account is now locked D. Port 69 is blocked on a router between the network segments

Vulnerability patch

A network technician has just received an email regarding a security issue detected on the company's standard web browser. Which of the following will MOST likely fix the issue? A. Firmware update B. OS update C. Vulnerability patch D. Driver update

Wavelength mismatch

A network technician has just run a new point-to point fiber link between two local routers, however, after the fiber has been plugged in on both ends, the interface will not come up. The technician has double- checked the interface configuration on both routers, both SFPs have been hard looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient optical power. Which of the following is the cause of the issue? A. Wavelength mismatch B. Duplex mismatch C. Distance limitations D. Wrong IP address

Placement

A network technician has received a help desk ticket indicating that after the new wireless access point was installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other departments are connecting just fine and the settings on the new access point were copied from the baseline. Which of the following is a reason why the media department is not connecting? A. Wrong SSID B. Rogue access point C. Placement D. Channel mismatch

tracert

A network technician has received comments from several users that cannot reach a particular website. Which of the following commands would provide the BEST information about the path taken across the network to this website? A. ping B. netstat C. telnet D. tracert

Implement port security on all switches in the network.

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch? A. Implement 802.11i on all switches in the network. B. Implement port security on all computers in the company. C. Implement port security on all switches in the network. D. Implement rules on the firewall to block unknown devices.

Add a rule to the end allowing port 80 and 53.

A network technician has set up a firewall and entered only three rules allowing traffic on ports 21,110, and 25 to secure the network. Users are reporting they cannot access web pages using the URLs. Which of the following can the technician do to correct the situation? A. Add a rule to the end allowing port 80 and 53. B. Add a rule to the end allowing port 143 and 22. C. Add a rule to the end allowing port 137 and 66. D. Add a rule to the end allowing port 445 and 173.

Provide an MD5 hash for each file

A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch? A. Use TFTP for tested and secure downloads B. Require biometric authentication for patch updates C. Provide an MD5 hash for each file D. Implement a RADIUS authentication

Place each department in a separate VLAN

A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. Which of the following solutions should the technician design into the new network? A. Place each department in a separate VLAN B. Add a router and create a segment for all the monitoring host stations C. Increase the number of switches on the network to reduce broadcasts D. Increase the collision domain to compensate for the added broadcasts

History logs

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information? A. Event viewer B. History logs C. Network sniffer D. System logs

Build redundant links between core devices

A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan? A. Build redundant links between core devices B. Physically secure all network equipment C. Maintain up-to-date configuration backups D. Perform reoccurring vulnerability scans

Confirm the new host is compatible with 10BaseT Ethernet

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect? A. Confirm the new host is using 10GBaseSR due to the manufacturing environment B. Confirm the new host is compatible with 10BaseT Ethernet C. Confirm the existing 10Base2 equipment is using the proper frame type D. Confirm that CSMA/CD is disabled on the Ethernet network

Naming conventions

A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram? A. Building layout B. Patch panel labeling C. Packet sniffing D. Naming conventions

The firewall should be placed between the Internet connection and the local network.

A network technician is configuring a new firewall for placement into an existing network infrastructure. The existing network is connected to the Internet by a broadband connection. Which of the following represents the BEST location for the new firewall? A. The firewall should be placed between the Internet connection and the local network. B. The firewall should be placed inside the local network. C. The firewall should be placed between the broadband connection and the Internet. D. The firewall should be placed in the Internet cloud.

Channel

A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting? A. Channel B. SSID C. Firewall rule D. Encryption

Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements? A. Use two combined Internet/router/wireless devices, one in each house. B. Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house. C. Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house. D. Use a single combined Internet/router/wireless device at the guest house.

Configure a test lab for updates

A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future? A. Configure an automated patching server B. Virtualize the servers and take daily snapshots C. Configure a honeypot for application testing D. Configure a test lab for updates

DDoS

A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find? A. AP isolation B. DDoS C. Evil twin D. Rogue AP

WPA2

A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for the HIGHEST level of security? A. WPA2 B. WPA C. WEP64 D. WEP128

Configure the firewall to allow echo reply in and echo request out of the network

A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out. The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? A. Enable split horizon to allow internal tracert commands to pass through the firewall B. Enable IGMP messages out and block IGMP messages into the network C. Configure the firewall to allow echo reply in and echo request out of the network D. Install a backdoor to access the router to allow tracert messages to pass through

Rogue AP

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats? A. Bluesnarfing B. DDoS C. Brute force D. Rogue AP

Firewall

A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured? A. Content filter B. Firewall C. DNS D. DHCP

Toner probe

A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario? A. Protocol analyzer B. Punch down tool C. Multimeter D. Toner probe

Move the server to the DMZ of the firewall

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk? A. Add an outbound ACL to the firewall B. Change the FTP server to a more secure SFTP C. Use the implicit deny of the firewall D. Move the server to the DMZ of the firewall

Data link Physical

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO) A. Presentation B. Transport C. Session D. Data link E. Application F. Physical

The interface status will show line protocol down.

A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action? A. The normal amount of errors and the connection problem has been resolved. B. The interface status will indicate that the port is administratively down. C. The traffic will flow, but with excessive errors. D. The interface status will show line protocol down.

QoS

A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following? A. LLDP B. VLAN tagging C. QoS D. SIP trunking

netsh

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below? Querying active state... TCP Global Parameters -——————————————— Receive-Side Scaling State : enabled Chimney Offload State : disabled Receive Window Auto-Tuning Level : normal Add-On Congestion Control Provider : ctcp ECN Capability : disabled RFC 1323 Timestamps : disabled A. net B. netstat C. nbtstat D. netsh

Punch down tool

A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario? A. Crimper B. OTDR C. Throughput tester D. Punch down tool

Determine if anything has changed.

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT? A. Establish a theory of probable cause. B. Document actions and findings. C. Determine next steps to solve the problem. D. Determine if anything has changed.

Only allow administrators to access routers using port 22

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network? A. Use SNMPv1 for all configurations involving the router B. Ensure the password is 10 characters, containing letter and numbers C. Copy all configurations to routers using TFTP for secuirty D. Only allow administrators to access routers using port 22

20 21

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO). A. 20 B. 21 C. 22 D. 23 E. 67 F. 68 G. 69

Port Forwarding

A network technician must allow use of HTTP from the internet to an internal resource running HTTP. This is an example of which of the following? A. Dynamic DNS B. Virtual Private networking (VPN) C. Dynamic NAT D. Port Forwarding

Yagi

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution? A. Yagi B. Omni-directional C. Parabolic D. Patch

1000Base-SR 10GBase-SR

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO). A. 1000Base-LR B. 1000Base-SR C. 1000Base-T D. 10GBase-LR E. 10GBase-SR F. 10GBase-T

Channel bonding

A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution? A. Disable SSID B. Channel bonding C. MIMO D. Increase the signal

Fiber Optic cable

A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb. Which of the following media would be optimal for this application? A. CAT5e cable B. Coax cable C. Fiber Optic cable D. CAT6 cable

1, 6, 11

A network technician needs to install an additional access point to the company's wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point's coverage areas to overlap? A. 1, 6, 11 B. 2, 5, 10 C. 3, 13, 23 D. 4, 8, 16

A packet sniffer

A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it? A. An SNMP GET B. A top listener tool C. An intrusion detection system D. A packet sniffer

Block ICMP at the firewall

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps? A. Block echo replies inbound to the DMZ B. Disable UDP on the servers C. Block ICMP at the firewall D. Disable TCP/IP on the server

Place them in the demilitarized zone

A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which of the following security techniques should be used? A. Place them behind honeypots B. Place them in a separate subnet C. Place them between two internal firewalls D. Place them in the demilitarized zone

History logs

A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues? A. Router logs B. History logs C. Startup/bootup config logs D. Event Viewer logs

Interface link status

A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54" Which of the following is being monitored to trigger the alarm? A. Speed and duplex mismatch B. Wireless channel utilization C. Network device CPU D. Network device memory E. Interface link status

The technician did not use the correct cable when trunking the new switch.

A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments? A. The newly installed switch is defective and must be returned. B. The newly installed switch is using a different MAC address than the previous switch. C. The technician forgot to change the VTP mode on the new switch to server. D. The technician did not use the correct cable when trunking the new switch.

Gather information

A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and it happens several times throughout the day. Which of the following troubleshooting methods should the technician perform FIRST? A. Test the theory B. Establish a plan of action C. Gather information D. Question the obvious

route print

A network technician suspects that there is an issue with the routing table on a Windows- based server. Which of the following commands will enable the technician to validate this hypothesis? A. route print B. route C. ipconfig D. tracert

Virtual PBX

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used? A. Virtual switch B. Virtual server C. Virtual desktop D. Virtual PBX

PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select TWO) A. PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80 B. PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80 C. PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY D. PERMIT SRCIP: ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT:80 E. PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80

Protocol analyzer

A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail? A. Network flow information B. SNMP traps C. Debug level syslog D. Protocol analyzer

Guest network

A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office. Which of the following should be created? A. Guest network B. VLAN network C. Security network D. DMZ network

DHCP scope

A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP address automatically. Which of the following is the cause of the problem? A. DNS B. Wrong TCP port C. Split horizon D. DHCP scope

Chain of custody

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed? A. Document the scene B. Forensics report C. Evidence collection D. Chain of custody

Mesh

A network topology in which all nodes have point to point connections to all other nodes is known as which of the following? A. Mesh B. Ring C. Bus D. Star

Star

A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? A. Star B. Ring C. Mesh D. Bus

RADIUS TACACS

A network uses a centralized server to manage credentials for all network devices. Which of the following server types are MOST likely being used in this configuration? (Select two.) A. DNS B. DHCP C. FTP D. RADIUS E. Kerberos F. TACACS G. Wireless controller

Incorrect channel

A new SOHO wireless network is set up using two access points with separate SSIDs on the same frequency. However, the users are experiencing intermittent connectivity on both SSIDs. Which of the following is the problem? A. Wrong DNS B. SSID mismatch C. Encryption type D. Incorrect channel

A rogue access point was installed by a company employee.

A new employee was given the following information to connect to the corporate wireless network for the first time: SSID:CorporateWiFi Encryption:WPA2 Password:SuperSecret! The user enters the correct SSID and notices that encryption type or password are not required when configuring the laptop in the office, and the laptop successfully connects to the Internet. When the user brings the laptop to the conference room, a pop-up asks for the CorporateWiFi password. Which of the following is the MOST likely cause of this behavior? A. The laptop wireless network card is incompatible with the conference room WAP. B. The office walls prevent the employee from making a full connection. C. A rogue access point was installed by a company employee. D. MAC filtering is only enabled in the conference room.

Incorrect speed/duplex setting on the alarm device.

A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause? A. A missing route on the alarm device. B. Incorrect VLAN assignment on the router. C. A missing route on the network routers. D. Incorrect speed/duplex setting on the alarm device.

A backdoor has been installed to access the network

A new network administrator is hired to replace a consultant that has been keeping the network running for several months. After a month, the network administrator is having network issues. The problems are easily resolved and appear to be changes in the server settings. The log files on the servers do not contain any error or messages related to the issues. Which of the following is a possible cause of the issues? A. TACASRadius misconfiguration is causing logs to be erased B. ICMP ping of death is resetting DHCP and DNS on the server C. A backdoor has been installed to access the network D. The last ACL on the router is set to Deny All

Traffic analyzer

A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST? A. Traffic analyzer B. Network sniffer C. SNMPv3 D. System logs

Signal strength

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following? A. Signal strength B. SSID mismatch C. Channel mismatch D. Encryption mismatch

Stateful packet inspection

A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block this traffic? A. Intrusion detection system B. Application aware firewall C. Stateful packet inspection D. Stateless packet inspection

Cable certifier

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the wiring back to the patch panel? A. Butt set B. Cable certifier C. Toner probe D. Snips

Test access to the concentrator to confirm the status

A number of remote users have reported being unable to securely log on to the company's network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT? A. Plan to reboot the concentrator as the potential solution B. Escalate the problem to management C. Continue to speak to users, questioning if changes have been made D. Test access to the concentrator to confirm the status

Social engineering

A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress? A. Phishing B. Social engineering C. Man-in-the-middle D. Smurfing

Statement of work

A project manager is tasked with the planning of a new network installation for a client. The client wants to ensure that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. Which of the following should the project manager provide the client? A. Acceptable Use Policy B. Service Level agreement C. Statement of work D. Security Policy

load balancing

A public website using round robin DNS is an example of: A. load balancing B. QoS C. Caching engines D. Traffic shaping

Ensure rack security

A secondary datacenter in a remote location is used by a company. The cable management and power management are handled by the datacenter staff. The building security is also handled by the datacenter staff with little oversight. Which of the following should the network administrator do to adhere to best practices? A. Secure the patch panels. B. Ensure power monitoring is enabled. C. Ensure rack security. D. Secure the UPS units.

Behavior based IPS

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed? A. Behavior based IPS B. Signature based IDS C. Antivirus software D. Access Control Lists

Proxy server

A server that filters traffic between a WAN and a LAN is which of the following? A. Proxy server B. RAS server C. Default gateway D. Email server

SLA.

A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the: A. MLA. B. SLA. C. SOW. D. MOU.

OTDR

A single mode fiber is no longer providing network connectivity to a remote site. Which of the following would be used to identify the location of the break? A. MT-RJ B. OTDR C. Media converter D. Cable certifier

A router

A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements? A. A firewall B. A router C. A hub D. A Layer 2 switch

WEP

A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose? A. WEP B. WPS C. WPA D. WPA2

PoE

A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment? A. PoE B. Layer 3 switching C. STP D. VLAN

Directional

A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements? A. Dipole B. Parabolic C. Directional D. Omni-directional

Broadband over Power Line

A small office needs to connect one new system to their network in a distant office, but does not have the resources to install a new Ethernet wall jack, and does not want to use wireless. Which of the following is a simple, cost effective option for providing connectivity? A. SONET B. Multimode fiber C. 802.11n D. Broadband over Power Line

Interference

A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following? A. Interference B. Configuration C. Incorrect MTU size D. Incorrect IP

SNMP

A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols requires MIBs? A. IPSec B. SSL C. ISAKMP D. SNMP

Implement an environment to test the enhancements.

A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed? A. Implement an environment to test the enhancements. B. Implement ACLs that only allow management access to the enhancements. C. Deploy an IPS on the production network. D. Move the software team's workstations to the DMZ.

Install the software in a test environment

A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST? A. Remove all user accounts on the server B. Isolate the server logically on the network C. Block all HTTP traffic to the server D. Install the software in a test environment

Driver update

A technician add memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is MOST likely the cause? A. VTP B. Driver update C. ESD D. Halon particles

Application aware firewall

A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZone Dest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall? A. HTTPS B. Stateless packet inspection C. Intrusion detection system D. Application aware firewall

netsh winsock

A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage? A. netsh lan B. netsh interface C. netsh wlan D. netsh winsock

Load balancing

A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following? A. QoS B. Caching engines C. Traffic shaping D. Load balancing

Single sign-on

A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following? A. Two-factor authentication B. Network access control C. Multifactor authentication D. Single sign-on

Layer 1

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring? A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7

Straight through instead of cross over cable

A technician grabs a network cable and connects two switches together. However, the ports fail to come up as indicated by the link lights. Which of the following is MOST likely the issue? A. Wrong subnet mask on the interfaces B. Mismatched MTU size C. Straight through instead of cross over cable D. SSID mismatch between the switches

Packet bottlenecks

A technician has attempted to optimize the network but some segments are still reporting poor performance. Which of the following issues should the technician look at? A. Switch incorrectly set to full duplex B. Conflicting IP addresses C. Packet bottlenecks D. IP address scope depletion

Crosstalk

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem? A. Crosstalk B. Bad connectors C. Wrong DNS D. Duplicate IP address

Ceiling airflow condition

A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which of the following environmental conditions should be considered when deciding whether or not to use plenum-rated cables? A. Workstation models B. Window placement C. Floor composition D. Ceiling airflow condition

IP address

A technician has been tasked to set-up a managed switch. Which of the following will the technician need to accomplish this task? A. IP address B. Switch serial number C. VLAN tag D. Loopback plug

Punch down tool

A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup? (1) 1000 foot CAT6 spool (1) crimper (1) 16 port gigabit switch (20) RJ-45 connectors (12) RJ-45 wall jacks (1) ____________ A. Compression tool B. Punch down tool C. Network map D. Multimeter

Heat map

A technician has completed a survey of a wireless network and documented signal strengths. This document is known as which of the following? A. Logical Network map B. Heat map C. Network baseline D. Bandwidth survey

RADIUS

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used? A. Kerberos B. TACACS+ C. RADIUS D. 802.1x

Latency

A technician has determined that calls placed over a wireless connection are breaking up and the speaker's voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues? A. Latency B. Bad GBIC C. Bad SFP D. SSID mismatch

Verify system functionality

A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken? A. Document the findings, actions, and outcomes B. Duplicate the problem if possible C. Verify system functionality D. Make an archival backup

Shared secret key is mismatched

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem? A. Username is misspelled is the device configuration file B. IDS is blocking RADIUS C. Shared secret key is mismatched D. Group policy has not propagated to the device

Layer 3 switch Router

A technician has installed a group of layer 2 switches with multiple VLANs. The VLANs cannot talk to each other. Which of the following network devices could correct this problem? (Select TWO). A. Hub B. DNS server C. DHCP server D. Layer 3 switch E. Router

Crimper

A technician has noticed that the RJ-45 connector on the end of a user's patch cable was stripped too far back from the connector allowing for cross talk. Which of the following tools would a technician use to attach a new connector to eliminate this issue? A. Crimper B. Cable certifier C. Loopback plug D. Punch down tool

MSDS

A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted? A. HCL B. MSDS C. SLA D. HVAC

POTS

A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch panel. The technician has cabled this port to be used with which of the following? A. 10baseT B. POTS C. 568B D. 568A

Document findings and outcomes

A technician has resolved a ticket to fix a user's printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST? A. Document findings and outcomes B. Establish a theory of probably cause C. Upgrade the printer drivers D. Close out the service ticket

Secure the area

A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT? A. Secure the area B. Initiate Data collection C. Create the forensics report D. Verify the chain of custody

Dynamic

A technician has set up a wired network IP scheme with the following specifications: DHCP: 192.168.1.100-150 Gateway: 192.168.1.1 DNS: 192.168.1.1 Which of the following is represented by this addressing scheme? A. Static B. QoS C. Dynamic D. Dynamic with static reservation

Wait five minutes until the PC resends a DHCP request

A technician has spent most of the day replacing a server running DHCP. Some of the users have begun to call the help desk stating that Internet connection stopped working even after rebooting. Upon investigation, the users' PCs with issues all have IP addresses that start with 169.254.x.x. The technician completes the replacement and powers on the new DHCP server. Which of the following is the BEST way to provide the PCs with issues a new IP address? A. Statically assign a legitimate IP address, and then set the PCs' NICs to DHCP B. Inform each user to replace 169.254 with 192.168 C. Wait five minutes until the PC resends a DHCP request D. Run netstat on each PC and then reboot into safe mode

Punch down

A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use? A. Loopback plug B. Multimeter C. Punch down D. Crimper

Butt Set

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone? A. Toner Probe B. Punch Down Tool C. Protocol Analyzer D. Butt Set

Channel width is set to 40MHz

A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason? A. Channels below 9 overlap each other B. Channel width is set to 40MHz C. Channels are in the 5GHz range by mistake D. Channel 1 should have been set to 11 to avoid an overlap

Toner probe

A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall? A. Cable certifier B. Multimeter C. Cable tester D. Toner probe

DB loss

A technician installs a new CAT6 cable from one end of the office building to another, a total distance of 600 feet (182.88 meters). When a laptop is connected to the cable, it cannot connect to the Internet. Which of the following is MOST likely the cause of this problem? A. Bad connectors B. Crosstalk C. DB loss D. TXRX reversed

Spectrum Analyzer tool

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance? A. Port scanner tool B. Interface monitoring tool C. Packet capture tool D. Spectrum Analyzer tool

MIB

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to allow it to interpret the new device and control it using SNMP? A. TRAP B. GET C. MIB D. WALK

Allow the main network to handle DHCP

A technician installs a wireless router on an existing network by connecting it directly to the firewall. By default, the main network is a Class A network, while the wireless network is a Class C network. After the wireless router is installed, users connected to the wireless network report they are unable to connect to the Internet. Which of the following needs to be configured to BEST resolve this issue? A. Configure the main network to Class C B. Allow for duplicate IP addresses C. Allow the main network to handle DHCP D. Create a spanning tree to prevent switching loops

Port filtering

A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request? A. MAC filtering B. IP filtering C. Port filtering D. Content filtering

Single mode fiber

A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider? A. CAT5e Cable B. CAT5 Cable C. Plenum D. Single mode fiber

Enable port 53 on the firewall

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue? A. Update the HOST file with the URLs for all websites B. Use NSLOOKUP to resolve URLs C. Ensure ICMP messages can pass through the firewall D. Enable port 53 on the firewall

SSID broadcasting is disabled on the WAP

A technician is attempting to set up a new laptop for a user. The user's old laptop connects to the corporate wireless network "CompanyWiFi" automatically. However, when the technician looks for the "CompanyWiFi" network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user's desk. Which of the following would MOST likely be the reason that the new laptop cannot see the "CompanyWiFi" network? A. Loss of signal strength B. Incorrect WEP key was input C. RFID interference from other electronic devices D. SSID broadcasting is disabled on the WAP

Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100

A technician is being tasked to centralize the management of the switches and segment the switches by broadcast domains. The company is currently all on VLAN1 using a single private IP address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. Which of the following options would work BEST to accomplish these requirements? A. Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with native VLAN 100 B. Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with native VLAN 100 C. Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100 D. Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100

Dirty connectors

A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cord installed. Which of the following is MOST likely the cause of the issue? A. Distance limitations B. Wavelength mismatch C. Bend radius limitation D. Dirty connectors

SNMPv3

A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option? A. SLIP B. SNMPv3 C. TKIP D. SNMPv2

Block all WAN to LAN traffic

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet. Which of the following rules on the firewall should the technician configure for the lab computers? A. Block all LAN to LAN traffic B. Block all LAN to WAN traffic C. Block all WAN to LAN traffic D. Block all WLAN to WAN traffic

PoE

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? A. PoE B. Port bonding C. VLAN D. Trunking

Wrong gateway

A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause? A. Duplicate IP addresses B. Bad GBIC C. Wrong gateway D. Switching loop

iSCSI

A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames? A. HTTPS B. Fibre channel C. iSCSI D. MS-CHAP

UPS

A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue? A. Grounding bar B. Rack monitoring C. UPS D. Air flow management E. Surge protector

nslookup

A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly? A. nslookup B. netstat C. traceroute D. nbtstat

ping -a

A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use? A. ipconfig /a B. ping -t C. ping -a D. netstat

Environment limitations

A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST? A. Compatibility requirements B. Environment limitations C. Cable length D. Equipment limitations

802.11g with WPA-Enterprise

A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use? A. 802.11a with WPA2-Enterprise B. 802.11n with WPA-PSK C. 802.11n with WPA2-PSK D. 802.11g with WPA-Enterprise

Goodput

A technician is in a large room that contains a large amount of industrial equipment. The technician would like to record the usable bandwidth between devices in a wireless network and the access point. Which of the following should the technician document? A. Goodput B. EMI C. Latency D. Jitter E. Overhead

2

A technician is installing 802.11a wireless access points in an open warehouse 300 feet (91.44 meters) long and 200 feet (60.96 meters) wide. Which of the following would be the LEAST number of devices needed to provide coverage to the entire building? A. 1 B. 2 C. 3 D. 4

QoS

A technician is installing a PoE switch for VoIP phones. Which of the following is the technician MOST likely going to configure on the switch? A. NAT B. QoS C. PAT D. DHCP

Fiber to Ethernet

A technician is installing a media converter that connects a newly installed multimode connection to an existing CAT5e infrastructure. Which of the following media converter types should the technician use? A. Ethernet to coaxial B. Fiber to Ethernet C. Fiber to coaxial D. Multimode to single mode fiber

Add the system to the DMZ

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform? A. Disable the network based firewall B. Implicit deny all traffic on network C. Configure a VLAN on Layer 2 switch D. Add the system to the DMZ

QoS

A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch? A. VLAN B. PoE C. VTP D. QoS

802.11b

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Cable certifier Crimper

A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO). A. Toner probe B. Cable certifier C. Butt set D. Crimper E. Network analyzer

TXRX reversed

A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT? A. Open shorts B. Excessive DB loss C. TXRX reversed D. Split cables

Software firewall

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure? A. Hardware firewall B. Proxy server C. Software firewall D. GRE tunneling

NAT

A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up? A. Port security B. MAC filtering C. ACL D. NAT

Spanning tree

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation? A. Port mirroring B. Spanning tree C. ARP inspection D. VLAN

Encryption SSID broadcast

A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO). A. Channel B. Encryption C. Diversity D. SSID broadcast E. Frequency

Crossover

A technician is sorting patch cables into four bins labeled coaxial, crossover, straight- through, and fiber. The technician has a cable with RJ-45 ends. The wires at one end of the cable start with an orange-white wire, while the wires at the other end of the cable start with a green wire. Into which of the following bins should this cable be placed? A. Crossover B. Fiber C. Straight-through D. Coaxial

Source. 192.168.1.100; Source Port: Any; Destination: 192.168.3.3; Destination Port:80; Action: Permit

A technician is tasked with adding an ACL to the host-based firewall of a PC. The ACL should allow the Development Server to only connect to the PC's HTTP server on the default port. Given the IP addresses below, which of the following ACLs would accomplish this goal? Development Server: 192.168.1.100 PC. 192.168.3.3 A. Source. 192.168.1.100; Source Port: Any; Destination: 192.168.3.3; Destination Port:80; Action: Permit B. Source. 192.168.1.100; Source Port:80; Destination: 192.168.3.3; Destination Port:80; Action: Permit C. Source. 192.168.3.3; Source Port:80; Destination: 192.168.1.100; Destination Port: Any; Action: Permit D. Source. 192.168.3.3; Source Port:80; Destination: 192.168.1.100; Destination Port:80; Action: Permit E. Source. 192.168.1.100; Source Port: Any; Destination: 192.168.3.3; Destination Port: Any; Action: Permit

The wrong wavelength was demuxed from the multiplexer.

A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up. Which of the following is the MOST likely cause? A. The wrong wavelength was demuxed from the multiplexer. B. The SFP in the multiplexer is malfunctioning. C. There is a dirty connector on the fiber optic cable. D. The fiber optic cable is bent in the management tray.

DB-9

A technician is tasked with replacing some older RS-232 serial printers. Which of the following ports would the technician most likely find on these printers? A. BNC B. DB-9 C. LC D. RJ-11

Verify the network cards can support 1Gbps

A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST? A. Upgrade the existing computers B. Purchase a new 802.11ac access point and install. C. Install CAT6 wiring for the SOHO network D. Verify the network cards can support 1Gbps

Punch down tool

A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use? A. Loopback plug B. Crimper tool C. Punch down tool D. Cable tester

Cross-talk

A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector. Which of the following is the issue? A. Cross-talk B. 568A/568B mismatch C. Tx/Rx reverse D. Split pairs

The WAP is using AES encryption The WAP is using the 5GHz channel

A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition. myClient$ wificard -getinfo agrCtlRSSI: -72 agrExtRSSI: 0 state: running op mode: station lastTxRate: 178 MaxRate: 300 802.11 auth: open link auth: wpa2-psk BSSID: 0F:33:AE:F1:02:0A SSID: CafeWireless Channel: 149,1 Given this output, which of the following has the technician learned about the wireless network? (Select TWO). A. The WAP is using RC4 encryption B. The WAP is using 802.11a C. The WAP is using AES encryption D. The WAP is using the 2.4GHz channel E. The WAP is using the 5GHz channel F. The WAP is using 802.11g

Re-establish theory of probable cause

A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT? A. Question users to determine if anything has changed B. Re-establish theory of probable cause C. Escalate problem to upper management D. Document replacement of power supply

Internet-to-adapter translation tables

A technician is troubleshooting a host name being directed to the wrong system. The `arp -a' command line utility is used to identify and display which of the following? A. All TCP/IP connections and listening ports B. Internet-to-adapter translation tables C. Information to help diagnose DNS issues D. Active sockets and connections

The public IP address of the network has changed.

A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred? A. The public IP address of the network has changed. B. The camera has received a new firmware update. C. The camera's secure shell has been disabled. D. The router has changed the IP of the mobile device.

ping 127.0.0.1

A technician is troubleshooting a network connectivity issue on a laptop. The technician wants to verify the NIC is functioning on the laptop. Which of the following commands should the technician use? A. ping 127.0.0.1 B. ping 169.254.0.1 C. tracert 192.168.0.1 D. nslookup 10.4.0.1

Port mirroring

A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch? A. ISAKMP B. Port forwarding C. Port security D. Port mirroring

WAP placement

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST? A. WAP placement B. Encryption type C. Bandwidth saturation D. WAP SSID

Ask users if anything changed in their environment recently

A technician is troubleshooting a printing issue where some users in an office are unable to print. Which of the following should be the FIRST step in troubleshooting this issue? A. Reboot each of the workstations B. Ask users if anything changed in their environment recently C. Advise users to move to a different office D. Power cycle the printer

Crosstalk

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check? A. Attenuation B. Latency C. Crosstalk D. External interference

Test the theory

A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the technician do NEXT? A. Implement the solution B. Question users C. Test the theory D. Escalate the problem

Bad wiring

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue? A. EMI B. RFI C. Cross-talk D. Bad wiring

The 802.11n WAPs are using a 5 GHz frequency channel.

A technician is troubleshooting a wireless network that was setup previously. The network is a hybrid of 802.11g and 802.11n WAPs. Users are not able to view or connect to the 802.11n WAPs. Which of the following is MOST likely the cause? A. The 802.11g WAPs are not setup for backwards compatibility. B. The 802.11n WAPs are using a 2.4 GHz frequency channel. C. The 802.11n WAPs are using a 5 GHz frequency channel. D. The 802.11g WAPs all have disabled SSID broadcast.

Cable certifier

A technician is upgrading the wiring in an older office building. The building currently contains some CAT3, CAT5, and CAT6 cables. The technician cannot visually distinguish between the cables because they are all the same color. Which of the following tools would help the technician determine which wires are the CAT3 and CAT5 cables needing to be replaced with CAT6 ones? A. Cable certifier B. Toner probe C. Cable tester D. Crimper

Implement a split horizon DNS

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address? A. Configure NAT on the firewall B. Implement a split horizon DNS C. Place the server in the DMZ D. Adjust the proper internal ACL

TEMPEST

A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted? A. DWDM B. MIMO C. TEMPEST D. DOCSIS

Two-factor authentication

A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of? A. Single sign-on B. Network access control C. PKI authentication D. Two-factor authentication

Key rotation

A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following? A. Strong RC4 encryption B. Shared secret keys C. AES encryption D. Key rotation

RAS

A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home. Which of the following servers should the technician implement? A. DNSSEC B. PPP C. RAS D. VLAN E. NAT

A host-based firewall which allows all outbound communication

A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based? A. A cloud-based antivirus system with a heuristic and signature based engine B. A network based firewall which blocks all inbound communication C. A host-based firewall which allows all outbound communication D. A HIDS to inspect both inbound and outbound network communication

Add a layer 3 switch and create a VLAN.

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements? A. Add a router and enable OSPF. B. Add a layer 3 switch and create a VLAN. C. Add a bridge between two switches. D. Add a firewall and implement proper ACL.

NAT

A technician needs to make a web server with a private IP address reachable from the Internet. Which of the following should the technician implement on the company firewall? A. DOCSIS B. NAT C. CIDR D. VPN

MAC address filtering

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration? A. Port filtering B. WEP C. MAC address filtering D. PoE

SSL

A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website? A. SSL B. DNSSEC C. WPA2 D. MTU

Reservations

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured? A. Leases B. Helper addresses C. Scopes D. Reservations

Cable certifier

A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used? A. B. Toner probe C. Cable tester D. Protocol analyzer

MIBS

A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices. Which of the following will allow SNMP monitoring of the devices? A. SSH B. MIMO C. SYSLOG D. MIBS

Cable tester

A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used? A. Protocol analyzer B. Crimper C. Cable tester D. Punch down tool

System logs

A technician needs to verify the time of a power outage. Which of the following may be used to determine this information? A. Network baseline B. Tracert C. System logs D. Protocol analyzer

MAC address filtering

A technician notices that guests have plugged their laptops into a network wall jack located in the conference room. Which of the following could the technician implement in order to ensure that ONLY employees are able to access network resources? A. Port mirroring B. VTP configuration C. MAC address filtering D. Traffic filtering

Switching loop

A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic? A. STP blocking B. Duplicate IP addresses C. MTU mismatch D. Switching loop

Man-in-the-middle

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following? A. Phishing B. Social engineering C. Man-in-the-middle D. Shoulder surfing

Electromagnetic interference

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem? A. Distance limitation B. Electromagnetic interference C. Cross talk D. Speed and duplex mismatch

The route table of the new customer's router.

A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check? A. The arp table of the new customer's router. B. The route table of the next-hop router. C. The route table of the new customer's router. D. The arp table of a network user.

High availability

A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method? A. Load balancing B. High availability C. Caching engines D. Quality of Service

Gather information

A technician suspects that the email system is slow due to excessive incoming SPAM. Which of the following should the technician do according to the troubleshooting methodology? A. Verify full system functionality B. Block incoming email C. Establish a plan of action D. Gather information E. Consider multiple approaches

Loopback

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using? A. RS-232 B. Rollover cable C. Loopback D. Point to point cable

VTP server

A technician wants to configure multiple switches to support all of the corporate VLANs. Which of the following will allow configuration of the switches and have the information propagate automatically to the other switches? A. FTP server B. VTP server C. Virtual PBX D. NTP server

CAT6

A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection? A. Telephone B. Parallel C. Serial D. CAT6

Quarantine

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement? A. High availability B. MAN network C. Quarantine D. Honeynet

SNMPv3

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices? A. WPA2 B. IPv6 C. SNMPv3 D. RIPv2

SNMPv3

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used? A. SNMPv3 B. FTP C. TFTP D. Telnet

Archives/backups

A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be replaced quickly in the event of a device failure? A. Vendor documentation B. Archives/backups C. Proper asset tagging and labeling D. Network Baseline

Connector mismatch

A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable? A. Wavelength mismatch B. Distance limitations C. Connector mismatch D. Attenuation/Db loss

Wireless bridge

A technician would like to connect two separate LAN networks at a small business for a short period of time, to share files. The connection needs to be temporary, and is physically impossible using standard network cabling. Which of the following is the BEST way to connect the networks in this situation? A. Wireless repeater B. Wireless bridge C. Bluetooth D. RADIUS server

Baseline

A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison? A. Regression test B. Speed test C. Baseline D. Statement of work

/30

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet? A. /24 B. /32 C. /28 D. /29 E. /30

127.0.0.1

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? A. 10.0.0.1 B. 127.0.0.1 C. 172.16.1.1 D. 192.168.1.1

Determine if anything has changed

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST? A. Determine if anything has changed B. Once a theory is confirmed determine the next step is to resolve the problem C. Implement the solution or escalate as necessary D. Question the obvious

TRUNK

A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup? A. DHCP B. Split horizon C. CIDR D. TRUNK

Evil twin

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP? A. Man-in-the-middle B. DDoS C. Evil twin D. War driving

Interference

A user at a small business states that they cannot connect to the Internet via the company's wireless network every time their cordless phone rings. Which of the following is MOST likely occurring? A. Interference B. Incorrect encryption type C. Latency D. SSID mismatch

Single sign-on

A user authenticated to more than one website using their same credentials is an example of: A. Multifactor authentication B. User access control C. Two-factor authentication D. Single sign-on

Is the user able to access any network resources?

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? A. Does the printer have toner? B. Are there any errors on the printer display? C. Is the user able to access any network resources? D. Is the printer powered up?

The user is connected to the wrong SSID.

A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user? A. The user is connected using the wrong channel. B. The user is connected to the wrong SSID. C. The user is experiencing an EMI issue. D. The user is connected to the wrong RADIUS server.

CHAP

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process? A. PKI B. Kerberos C. Single sign-on D. CHAP

installed the printer in ad-hoc mode

A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office. The used has MOST likely: A. Installed the printer in infrastructure mode B. Installed the printer in the wrong subnet C. misconfigured the gateway on the wireless printer D. installed the printer in ad-hoc mode

Toner probe

A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable? A. Butt set B. Punch down tool C. Toner probe D. Protocol analyzer

802.1q

A user has three different subnets in an office. Which of the following can be configured to allow two of the subnets to communicate directly with each other at the switch level? A. 802.1af B. 802.1q C. 802.1x D. 802.2

Move the wireless router to a better location where line of sight is obtained.

A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength? A. Call the wireless provider and ask for a T3 circuit. B. Move the wireless router to a better location where line of sight is obtained. C. Reinstall the operating system to the PC to ensure the newest patches are installed. D. Install a hub to ensure there is a clear path for the cables to run.

Lineman's handset

A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis? A. Multimeter B. Cable tester C. Lineman's handset D. Toner probe

Bad or missing routes

A user is on a network with two upstream connections to the Internet and is experiencing intermittent issues while connecting to websites. Some websites are available but others are not. Which of the following is the MOST likely cause of the condition? A. Incorrect VLAN assignment B. Bad or missing routes C. Switching loop D. Wrong subnet mask

Adjust the signal strength of the access points with minimal coverage overlap.

A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues? A. Adjust the signal strength of the access points with minimal coverage overlap. B. Increase the pool in each of the access points to avoid running out of IPs. C. Configure each access point to use a different method of encryption than the others. D. Reconfigure each of the access points so that they broadcast different SSIDs.

Implicit deny

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP? A. Stateful inspection B. NAT/PAT C. Port security D. Implicit deny

Link from router A to PC 1 are on different subnets

A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following: 1) Client PC 1 has an IP address if 192.168.10.25/25 2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A 3) Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25 4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause? A. Link from router A to PC 1 are on different subnets B. Link from router A to server A is down C. Link from PC 1 to router A has duplex issues D. Link from server A top PC 2 is down

Identify the problem.

A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue? A. Identify the problem. B. Establish a plan of action to resolve the problem. C. Establish a theory of probable cause. D. Implement preventative measures.

802.11b at 1Mbps

A user needs maximum distance in a wireless connection. Which of the following should be configured to meet this goal? A. 802.11a at 54Mbps B. 802.11b at 1Mbps C. 802.11g at 11Mbps D. 802.11n at 130Mbps

Software firewall is blocking ports

A user receives a new computer and now is unable to connect to a database using ODBC. Other users on the network are able to connect successfully. A technician is able to successfully ping the database server but still is unable to connect. Which of the following is the issue? A. Missing IP routes on router B. Wrong default gateway address C. Software firewall is blocking ports D. Failing network interface card

Social engineering

A user receives a phone call at home from someone claiming to be from their company's IT help desk. The help desk person wants to verify their username and password to ensure that the user's account has not been compromised. Which of the following attacks has just occurred? A. Evil twin B. Phishing C. Man-in-the-middle D. Social engineering

Toner probe

A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block? A. Protocol analyzer B. Multimeter C. Punch down tool D. Toner probe

Verify functionality

A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT? A. Test the theory B. Question the user C. Document the outcome D. Verify functionality

Question the user to determine if anything has changed.

A user reports lack of network connectivity on their desktop. Which of the following is the FIRST step of the network troubleshooting methodology that the technician should perform? A. Establish a plan of action to resolve the problem. B. Establish a theory of probable cause by questioning the obvious. C. Test the theory to determine the cause. D. Question the user to determine if anything has changed.

Hard drive

A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg % Processor Time =10% Avg Pages/Second = 0 Avg Disk Queue Length = 3 Based on the results, which of the following is causing a bottleneck? A. Hard drive B. Memory C. Processor D. NIC

The patch cable

A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following? A. The IDS server logs B. The DNS resolution time C. The firewall's blocked logs D. The patch cable

TELNET

A user reports that one of their critical programs no longer functions after a recent router upgrade in the office. A network technician is called in to troubleshoot the issue and documentation shows that the software needs full open connections over ports 558, 981, and 382 in order to function. Which of the following tools could the technician BEST use to troubleshoot this issue? A. NET USE B. IPCONFIG C. TRACEROUTE D. TELNET

Deny 192.168.5.0/28192.168.5.16/28

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause? User's IP: 192.168.5.14 Server IP: 192.168.5.17 Firewall rules: Permit 192.168.5.16/28192.168.5.0/28 Permit 192.168.5.0/24192.168.4.0/24 Permit 192.168.4.0/24192.168.5.0/24 Deny 192.168.5.0/28192.168.5.16/28 Deny 192.168.14.0/24192.168.5.16/28 Deny 192.168.0.0/24192.168.5.0/24 A. Deny 192.168.0.0/24192.168.5.0/24 B. Deny 192.168.5.0/28192.168.5.16/28 C. Deny 192.168.14.0/24192.168.5.16/28 D. Implicit Deny rule

Interference

A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user's office. Which of the following would MOST likely cause them to lose their connection? A. Encryption type B. Disabled wireless adapter C. SSID mismatch D. Interference

Document findings, actions, and outcomes

A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night's power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT? A. Escalate by following change procedures B. Establish a plan of action to resolve the problem C. Document findings, actions, and outcomes D. Question the user

Crimper

A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector? A. Wire tester B. Punch down C. Crimper D. Multimeter

Firewall

A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter? A. VPN B. Throughput tester C. Firewall D. OC3

Digital signatures

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented? A. MAC filtering B. Digital signatures C. MS-CHAP D. CHAP

802.11b

A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network? A. 802.11a B. 802.11ac C. 802.11b D. 802.11g

Crossover

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this? A. Crossover B. Rollover C. Loopback D. Straight cable

Identification

A username provides which of the following? A. Biometrics B. Identification C. Authorization D. Authentication

HTTPS

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols? A. HTTPS B. POP3 C. SSH D. SMTP

MAC filtering

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points? A. Port forwarding B. MAC filtering C. TLS/TTLS D. IP ACL

Default gateway

A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255 A. DNS address B. Subnet mask C. Default gateway D. Broadcast address E. IP address

Network maps

A workstation on the third floor of the company building is having connectivity issues. The NIC and patch cable have been tested and found to be working properly. Which of the following would MOST likely have the information the administrator would need to locate and test the remaining cabling and connections? A. Network maps B. Network baseline C. Asset management D. Change management

Roll back the drivers to the previous version.

After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible? A. Reformat and install the compatible drivers. B. Reset Ann's equipment configuration from a backup. C. Downgrade the PC to a working patch level. D. Restore Ann's PC to the last known good configuration. E. Roll back the drivers to the previous version.

UDP 67 UDP 68

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO). A. UDP 53 B. UDP 67 C. UDP 68 D. TCP 53 E. TCP 67 F. TCP 68

Missing route

After a power failure, several users are unable to connect to network devices at the remote office. Which of the following is the MOST likely cause of the issue? A. Bad cable B. Missing route C. Duplicate IP address D. Switching loop

SIEM

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used? A. Event log B. Syslog C. SIEM D. SNMP

Loop prevention

After an employee connected a switch port of a home router to the wall jack in the office, other employees in the office started losing connectivity. Which of the following can be implemented on the company switch to prevent loss of connectivity in the future? A. Loop prevention B. ARP inspections C. DHCP snooping D. MAC address filtering

Run the following command on the administrator's workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0e

After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is 192.168.0.10/23? A. Use the reset button on the back of the firewall to restore it to its factory default, and then log onto B. Run the following command on the administrator's workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0e C. Use an SNMP tool to query the firewall properties and determine the correct management IP address D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1

Wrong gateway

After deploying a network switch, the network administrator is unable to remotely administer the device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue? Management LAN: 192.168.10.0/24 Management interfacE. 192.168.10.2 255.255.255.0 Default gateway: 192.168.11.1 STP is enabled A. VLAN assignment B. Wrong subnet mask C. Switching loop D. Wrong gateway

Cable short

After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected. Which of the following is the MOST likely cause? A. Attenuation B. Bad UPS C. Cable short D. Misconfigured DNS

Cable certifier

After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly? A. Punch down tool B. Cable certifier C. Loopback plug D. Toner probe

Local hosts file

After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked? A. Server host file B. Subnet mask C. Local hosts file D. Duplex settings

Establish a plan of action.

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process? A. Implement the solution to the problem. B. Establish a plan of action. C. Identify the problem. D. Implement preventative measures.

Maintenance window

All scheduled work on production network equipment should be done during which of the following periods? A. Maintenance window B. Development life cycle C. Down time D. Business hours

Broadcast storm

All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue? A. STP convergence B. Power failure C. Excessive bandwidth usage D. Broadcast storm

An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

An 801.11g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40 Which is true about the above configuration? A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client.

5.0 GHz

An 802.11a wireless network is functioning at which of the following frequencies? A. 1.0 GHz B. 1.5 GHz C. 2.4 GHz D. 5.0 GHz

11 Mbps.

An 802.11b wireless network has a maximum data rate of: A. 11 Mbps. B. 20 Mbps. C. 28 Mbps. D. 54 Mbps.

RG6

An F-connector is used on which of the following types of cabling? A. CAT3 B. Single mode fiber C. CAT5 D. RG6

Network

An IP address is encapsulated at which of the following layers of the OSI model? A. Transport B. Data link C. Network D. Application

Multimeter

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory? A. Toner probe B. Loopback plug C. Protocol analyzer D. Multimeter

Content filter

An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality? A. Layer 3 managed switch B. VPN concentrator C. Load balancer D. Content filter

Make the change, noting the requester, and document all network changes

An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate. The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following is the BEST course of action for the network administrator to take? A. Wait until the maintenance window, and make the requested change B. First document the potential impacts and procedures related to the change C. Send out a notification to the company about the change D. Make the change, noting the requester, and document all network changes

QoS

An administrator can use packet tags to configure which of the following? A. VLAN B. NAT C. PoE D. QoS

IPSec L2TP

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO). A. SSL B. IPSec C. Kerberos D. RDP E. L2TP F. PPTP

Change management

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions? A. Asset management B. Baselines C. Network maps D. Change management

The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC's, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet these requirements? A. The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network B. The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only C. The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range D. The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC

The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches? A. The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings. B. The administrator should configure each vSAN participant to have its own VLAN. C. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL). D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

Phone communications

An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario? A. Phone communications B. Web site downloads C. Streaming video clients D. Client bittorrent abilities

Bus

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design? A. Ring B. Star C. Bus D. Mesh

netstat

An administrator has been experiencing slower than normal performance on a server. The administrator suspects that a developer is currently uploading large files to it from an internal network PC. Which of the following will display established connections to the server on the FTP port? A. ifconfig B. nslookup C. netstat D. arp

Create each VLAN on the host's virtual switch

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal? A. Set the VLAN preferences on the host's NIC B. Create each VLAN on the host's virtual switch C. Change the virtual machine NIC settings from private to bridged D. Create each VLAN on the host's gateway router

WEP's IV is too small.

An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason? A. WEP's IV is too small. B. WEP uses RC4 which is easily accessible and not secure. C. WEP uses plain text. D. WEP is not well supported.

VPN Concentrator

An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed? A. Proxy Server B. Load Balancer C. VPN Concentrator D. Web-Application Firewall

Public Iaas

An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using? A. Community PaaS B. Public Iaas C. Hybrid Saas D. Private Iaas

SNMP

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using? A. Telnet B. RADIUS C. SSH D. SNMP

Change the channel on the access point to channel 11.

An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on the executive's desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive's office? A. Turn off SSID broadcasting for the executive's access point. B. Replace the 802.11n access point in the office with an 802.11a access point. C. Change the channel on the access point to channel 11. D. Turn off as many lights in the executive's office as possible to reduce interference.

802.11n

An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be installed? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Enable the SSID broadcast.

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users' connection issues? A. Limit the devices to 802.11n only. B. Enable the SSID broadcast. C. Enable MAC filtering. D. Use a WEP 128-bit key.

Butt set

An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario? A. T1 loopback B. Butt set C. Multimeter D. Protocol analyzer

SNMPv3

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network? A. SNMPv3 B. VTP C. CDP D. IPSec

A stateless network-based firewall

An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install? A. A host- based firewall B. A network-based firewall C. A host-based stateful firewall D. A stateless network-based firewall.

TCP 53 UDP 53

An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO). A. TCP 23 B. TCP 53 C. TCP 123 D. UDP 23 E. UDP 53 F. UDP 123

Port Address Translation

An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this? A. Port Address Translation B. Demilitarized Zone C. Stateful Packet Inspection D. Network Address Translation

CAN

An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office. Which of the following did the administrator set up? A. CAN B. MAN C. WAN D. LAN

RS-232

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable? A. RS-232 B. 802.3 C. ATM D. Token ring

The workstation has the wrong DNS configured.

An administrator notices that a computer on the network is unable to reach any of the servers by hostname. The computer has connectivity to the network and is able to ping all the devices by IP address. Which of the following can cause the error? A. The workstation has a duplicate IP address. B. The workstation has been assigned to the wrong VLAN. C. The workstation has the wrong gateway configured. D. The workstation has the wrong DNS configured.

ipconfig

An administrator only has telnet access to a remote workstation. Which of the following utilities will identify if the workstation uses DHCP? A. tracert B. ping C. dig D. ipconfig E. netstat

Asset management

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions? A. Network map B. Asset management C. Change management D. Baselines

A port filtering ACL

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this? A. An IP filtering ACL B. A MAC filtering ACL C. A port filtering ACL D. A class matching ACL

nslookup

An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used? A. ifconfig B. nslookup C. netstat D. ipconfig

Allow port 443 Deny port 80

An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall. Using the default port numbers, which of the following should the administrator configure? (Select TWO). A. Allow port 443 B. Deny port 53 C. Deny port 20 D. Deny port 80 E. Allow port 23

Caching server

An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed? A. Load balancing B. VPN concentrator C. Caching server D. Fault tolerance

Channel bonding

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using? A. MIMO B. AP isolation C. Channel bonding D. Burst mode

Demilitarized Zone

An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this? A. Network Address Translation B. Stateful Inspection C. Port Address Translation D. Demilitarized Zone

Nessus

An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use? A. Ping B. Nessus C. IMAP D. Telnet

Nessus

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this? A. Baseline analyzer B. Ping C. Protocol analyzer D. Nessus

Redistribution

An advertised route learned from one protocol over a different protocol is called: A. Co-location B. Reallocation C. Redundancy D. Redistribution

Butt set

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used? A. Protocol analyzer B. Butt set C. OTDR D. Toner probe

Biometric

An area to which access is controlled by retina scan is protected by which of the following security measure types? A. Two-factor authentication B. Biometric C. Cipher locks D. Optical reader E. Proximity reader

packet sniffing

An attack used to find unencrypted information in network traffic is called: A. WEP cracking B. packet sniffing C. ping sweep D. social engineering

Social engineering

An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following? A. Social engineering B. Bluesnarfing C. Man-in-the-middle D. Evil Twin

VLAN hopping

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks? A. Smurf attack B. VLAN hopping C. Bluesnarfing D. Spear phishing

An 802.11n smartphone

An office has an 802.11a access point. A technician has been asked to identify devices that are compatible with this AP. Which of the following devices is MOST likely compatible? A. An 802.1q SOHO router B. An 802.11b tablet computer C. An 802.11g laptop D. An 802.11n smartphone

Allow TCP port 22 outbound Allow TCP port 80 outbound

An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (Select TWO). A. Allow UDP port 21 outbound B. Allow UDP port 22 outbound C. Allow UDP port 80 outbound D. Allow TCP port 21 outbound E. Allow TCP port 22 outbound F. Allow TCP port 80 outbound

Legal hold

An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence? A. Chain of custody B. Legal hold C. Divide and conquer D. Persistent agents

Fire suppression

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing? A. Fire suppression B. Mantraps at the entry C. HVAC D. UPS and battery backups

End-user awareness training

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with the fewest security issues? A. Consent to monitoring B. Business continuity measures C. Vulnerability scanning D. End-user awareness training

Port address translation

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity? A. Forwarding proxy B. Port address translation C. DMZ port security D. Application inspection

Allow TCP port 25 Allow TCP port 110

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO). A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110

Allow TCP port 3389 inbound

An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured? A. Allow TCP port 3389 outbound B. Allow UDP port 3389 inbound C. Allow UDP port 3389 outbound D. Allow TCP port 3389 inbound

BGP routing issues

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following? A. The OSPF not-so-stubby area is misconfigured B. Reduced wireless network coverage C. Spanning tree ports in flooding mode D. BGP routing issues

Load balancer

An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality? A. Router B. Forward proxy C. Load balancer D. Firewall

Ensure patches are deployed

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item? A. Ensure patches are deployed B. Install an IDS on the network C. Configure the firewall to block traffic on port 443 D. Implement a VPN for employees

MSDS

Ann, a network administrator, is in the process of cleaning network switches for resale. Ann splashes the cleaning agent in her eye and needs to know the procedure of cleansing her eye. To which of the following should Ann refer? A. EULA B. MSDS C. SLA D. MOU

Private

Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address. Which of the following is an addressing scheme that will work in this situation? A. Teredo tunneling B. Private C. APIPA D. Classless

Stop and escalate to the proper authorities

Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform? A. Erase the files created by the virus B. Stop and escalate to the proper authorities C. Check the remaining directories for more .mp4 files D. Copy the information to a network drive to preserve the evidence

Change the IP address of the computer to 10.0.0.12

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann's problem? Computer_ASwitch_A IP: 10.0.0.60Int VLAN10 SM: 255.255.255.0IP address 10.0.0.1/28 GW: 10.0.0.1Speed 100 Duplex Full A. Change the duplex on the switch interface to half B. Change the speed on the switch interface to 10Mbps C. Change the subnet mask of the computer to 255.255.255.240 D. Change the IP address of the computer to 10.0.0.12

Install an event management tool

Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem? A. Increase the maximum log size B. Log into the DNS server every hour to check if the logs are full C. Install an event management tool D. Delete the logs when full

Users with a slow connection are too far away from the wireless router.

Ann, a technician, installs a wireless router in a network closet in a large office. She then configures all workstations in various offices on that floor to use the wireless connection. Maximum connection speed at each workstation is 54 Mbps. Some users complain that their network connection is very slow. Which of the following is MOST likely the problem? A. Workstations were configured with the wrong connection speed on the wireless adapter. B. Users with a slow connection are too far away from the wireless router. C. Users that cannot connect are configured on the wrong channel. D. Wireless network SSID is incorrect.

Evil twin

Ann, a user, connects to her company's secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats? A. Rogue access point B. ARP poisoning C. Replay attack D. Evil twin

Bounce

Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal. Which of the following is the MOST likely cause of the issue? A. Signal-to-noise ratio B. AP configuration C. Incorrect SSID D. Bounce

The Administrator has implemented a feature that only allows white-listed MAC addresses

Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address. Which of the following is the MOST likely reason why the router is not receiving a DHCP address? A. The administrator has enabled DHCP snooping on the network B. The administrator is blocking DHCP requests that originate from access points C. The administrator is blocking the wireless router's MAC address using MAC filtering D. The Administrator has implemented a feature that only allows white-listed MAC addresses

Layer 2 Layer 3

As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5

DHCP

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances? A. RADIUS B. DNS C. DHCP D. IDS

Application

At which layer of the OSI and TCP/IP model would HTTP and FTP be found? A. Application B. Network C. Session D. Data Link

Data Link

At which layer of the OSI model do MAC addresses operate? A. Data Link B. Network C. Application D. Physical

Network Interface

At which layer of the TCP/IP model would cabling exist? A. Network Interface B. Internet C. Application D. Transport

Network

At which of the following layers of the OSI model do packets exist? A. Network B. Session C. Data Link D. Transport

Layer 2

At which of the following layers of the OSI model is the Logical Link Control found? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5

Demarc

At which of the following locations does the responsibility of a Telco provider cease? A. IDF B. CSU C. Demarc D. MDF

DNS

Based on the packet capture below, which of the following services is the client requesting? 08:30:54.982378192.168.50.42.8329 > 192.168.50.20.53: S 32859235:32859235(0) win 8096 08:30:55.001378192.168.50.20.53 > 192.168.50.42.8329: S 31845637: 31845637(0) ack 32859236 win 8096 08:30:55.027578192.168.50.42.8329 > 192.168.50.51.53: ack 1 win 8096 A. ARP B. SMTP C. DHCP D. DNS

AUP

Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following? A. SOP B. BEP C. AUP D. SLA

4

CAT6 has how many twisted copper pairs? A. 2 B. 4 C. 6 D. 8 E. 16

Connection speed

Channel bonding will improve which of the following wireless characteristics? A. Signal strength B. Encryption strength C. Coverage area D. Connection speed

SYSLOG server

Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location? A. TACACS+ server B. Single sign-on C. SYSLOG server D. Wi-Fi analyzer

Building material Sight lines

Coverage analysis for a new implementation of 802.11n WLAN involves which of the following? (Select TWO) A. Humidity B. Temperature C. Heatmap D. Building material E. Sight lines

White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown.

Crimp out a T568B.

68

DHCP uses which of the following ports by default? A. 21 B. 23 C. 68 D. 443

Crimper - Used to correct open short on a cable Port analyzer - used to determine which port a CAT6 cable is connected to Punchdown tool - Used to terminate a cable at a 110 block Cable tester - Used to verify known good patch cables Loopback plug - Used to verify functionality after a NIC is installed

Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

802.11a - 54Mbps 802.11b - 11Mbps 802.11g - 54Mbps 802.11n - >100Mbps

Drag and drop the following maximum speeds to their corresponding wireless standards. Tokens can be used more than once.

Power failure

During a blizzard, a technician decides to work from home but is unable to connect to the company's network. Which of the following is MOST likely taking place at the office? A. Switching loop B. Wrong DNS C. Power failure D. Duplicate IP address

Man traps Biometrics Cipher locks

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE). A. RSA B. Passwords C. Man traps D. Biometrics E. Cipher locks F. VLANs G. 3DES

Failed router

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage? A. Wrong gateway B. Failed router C. Bad switch module D. Incorrect VLAN

Automatic registration of host records

Dynamic DNS provides which of the following services? A. Automatic registration of host records B. Translates public host names to private host names C. Provides round robin load balancing for web servers D. Provides aliases for additional search suffixes

Confidentiality

Encryption provides which of the following to data being transferred across the network? A. Confidentiality B. Resistance to Jitter C. High Availability D. Data Integrity

Bluejacking

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following? A. Multiplexing B. Zero-day attack C. Smurfing D. Bluejacking

Layer 2

Frame relay occurs at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 6

Wi-Fi

Frequency, channel bonding, and MIMO configuration are all characteristics of which of the following networking technologies? A. Wi-Fi B. SONET C. T1/E1 Internet D. Satellite Internet

a single collision domain.

Hubs are differentiated from switches in that between the two, only hubs have: A. a single collision domain. B. a single broadcast domain. C. multiple collision domains. D. multiple broadcast domains.

dynamic IP address.

If a technician does not assign an IP address to a device, the DHCP server will assign the device A. static IP address. B. reservation. C. dynamic IP address. D. MAC address.

MAC filtering

If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network? A. Device placement B. Wireless standard C. Encryption type D. MAC filtering

Cable crosstalk EMI

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO). A. VLAN configuration error B. Cables too short C. Cable crosstalk D. Incorrect channel E. EMI F. Wrong subnet mask

Point-to-multipoint

In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types? A. Peer-to-peer B. Point-to-multipoint C. Hybrid D. Point-to-point

Wall plate labeling Patch panel labeling

In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO). A. Rack monitoring B. Device placement C. Wall plate labeling D. Room numbering E. Patch panel labeling

Spanning-tree protocol

In order for switching loops to be automatically disabled, which of the following needs to be implemented? A. Routing tables B. Collision domains C. Port mirroring D. Spanning-tree protocol

25

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587? A. 20 B. 21 C. 23 D. 25

Memorandum of understanding Acceptable use policy

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO) A. Memorandum of understanding B. Data classification document C. Service level agreement D. Interconnection security agreement E. Consent to monitor F. Acceptable use policy

Network device CPU issues

It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following? A. Network device power issues B. Network device CPU issues C. Storage area network issues D. Delayed responses from RADIUS

Network sniffer

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user's network port. Which of the following devices would be used to monitor the network activity? A. Port analyzer B. Multimeter C. Network sniffer D. Cable certifier

Wireless channel

Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks? A. PPPoE authentication B. MAC filtering C. WPA encryption D. Wireless channel

WPA encryption MAC filtering

Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). A. WPA encryption B. Changing wireless channels C. MAC filtering D. Changing wireless speed standards E. SSID disable

Missing helper addresses

Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue? A. Incorrect VLAN tagging B. Missing helper addresses C. Wrong default gateway D. Improper routing protocols

WAP placement

Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? A. WAP placement B. PoE devices C. MAC filtering D. Encryption type

FastEthernet 0/0

Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified? A. FastEthernet 0/0 B. AUX 0 C. Console 0 D. Serial 0/0/0

SNMP v2

Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data? A. SNMP v2 B. VPN C. SYSLOG D. SMTP

Butt set

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? A. Loopback plugs B. Butt set C. Cable certifier D. Toner probe

The server is missing default-gateway information.

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem? A. The subnet mask is incorrect. B. A routing loop has occurred. C. Jeff used a crossover cable to connect the switch to the gateway. D. The server is missing default-gateway information.

Flash the latest firmware for his router

Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The manufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network. Which of the following should Joe perform in order to resolve this issue? A. Load the latest hardware drivers for his USB drive B. Install the latest OS on his computers C. Download the latest playback software for his music files D. Flash the latest firmware for his router

Conduct a wireless survey of the back warehouse.

Joe, a network technician, is asked to install a couple new WAP's inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP's to use? A. Conduct a wireless survey of the back warehouse. B. Ask the vendor that provided the WAP's for the main warehouse for recommendations. C. Ask the systems administrator which WAP's are preferred. D. Only order WAP's that support 5GHz channels.

AES TKIP

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO). A. SSH B. 3DES C. AES D. SSL E. TLS F. TKIP

Default gateway Subnet mask DNS servers

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE). A. Default gateway B. Subnet mask C. Reservations D. TFTP server E. Lease expiration time of 1 day F. DNS servers G. Bootp

Determine which wireless channels and bands to use to mitigate as much interference as possible.

Joe, a network technician, is tasked with setting up a new wireless network in an office for office laptops and desktops only. The surrounding offices already have many wireless networks. Joe discovered that over 30 wireless networks were showing up as he completed a wireless survey of the office. Every single one of the networks that Joe was able to see while conducting the wireless survey were 802.11b/g networks. Which of the following should Joe consider before purchasing/installing the new wireless access points? A. Move the WAP so that it is close to the interior walls. B. Determine which wireless channels and bands to use to mitigate as much interference as possible. C. Turn the SSID broadcasts off to decrease interference. D. Determine if the business should relocate to a building with a lot less surrounding wireless networks.

C:windowssystem32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS resource records for all adapters has been initiated. Any errors will be reported in the event viewer in 15 minutes.

Joe, a system administrator, is troubleshooting an issue with remotely accessing a new server on the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the new server. The server that he cannot remote to is located on the same LAN as another server that he can successfully remote to. Which of the following output from the command line would BEST resolve the problem? A. C:windowssystem32>ipconfig /flushdnsWindows IP configurationSuccessfully flushed DNS resolver cache B. C:windowssystem32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS resource records for all adapters has been initiated. Any errors will be reported in the event viewer in 15 minutes. C. C:windowssystem32>nslookupDefault server: unknownAddress: 1.1.1.1 D. C:windowssystem32>nbtstat -RSuccessful purge and reload of the NBT remote cache table

The technician used a straight-through cable.

Joe, a technician, is attempting to connect two hubs to add a new segment to his local network. He uses one of his CAT5 patch cables to connect them; however, he is unable to reach the new network segment from his workstation. He can only connect to it from a workstation within that segment. Which of the following is MOST likely the problem? A. One of the hubs is defective. B. The new hub is powered down. C. The patch cable needs to be a CAT6 patch cable. D. The technician used a straight-through cable.

The cable is a straight through.

Joe, a technician, terminates ends on a new copper cable for use between two legacy switches. When Joe connects the two switches together using the cable, they fail to establish a connection. Which of the following is MOST likely the issue? A. The cable has exceeded bend radius limitations. B. The cable is a straight through. C. The cableis a cross over. D. The cable has RJ-11 connectors instead of RJ-45.

The wireless router at the customer's site is configured with MAC filtering.

Joe, a vendor, walks into a customer's site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site's wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem? A. The customer's wireless router uses WPA encryption. B. The wireless router at the customer's site is configured with MAC filtering. C. The customer's WAP uses WEP encryption. D. The customer's IT department blocks all visitors from connecting to their network.

Misconfigured Split Horizon

Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of the switches he receives "Destination Unreachable". Which of the following issues could this be? A. Denial of service attack B. Misconfigured DNS settings C. Misconfigured Split Horizon D. RADIUS authentication errors

Network diagrams

Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor support technician to properly set up and configure the SAN on the network. In order to begin SAN I/O optimization, which of the following would Joe need to provide the vendor support technician? A. Network diagrams B. Baseline documents C. Asset management document D. Access to the datacenter

Configuration management

Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following? A. Project management B. Quality of service C. Configuration management D. Bandwidth shaping

Reduce the transmission power

Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue? A. Change the security method B. Reduce the transmission power C. Change the SSID D. Change the frequency

Change management

Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues? A. Network map B. Cable management C. Change management D. Asset management

Disable 802.11b and 802.11g

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients? A. Name the SSID on the 802.11n network only B. Limit the DHCP address pool C. Disable 802.11b and 802.11g D. Only use WPA encryption

Enable mixed mode

Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? A. Enable mixed mode B. Disable SSID C. Disable encryption D. Enable `n' only mode

Port speed Duplex

Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO). A. MAC addressing B. IP addressing C. Port speed D. IPv6 addressing E. Duplex

Toner probe

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable? A. Protocol analyzer B. Cable tester C. Toner probe D. Punch down tool

Incorrect WEP key

Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause? A. TXRX is reversed B. Faulty crossover cable C. Incorrect WEP key D. A short in the cable pairs

Incorrect DNS

Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID

Wireless Access Points

Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution? A. Private IP Addressing B. Wireless Access Points C. Wide Area Networking D. Virtual Local Area Networks

Allow TCP port 443

Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website? A. Allow UDP port 53 B. Allow TCP port 80 C. Allow UDP port 340 D. Allow TCP port 443

Application

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model? A. Transport B. Application C. Internet D. Network Interface

Trunking

Linking two or more switches together so that they can share VLAN information is known as which of the following? A. Port replicating B. Filtering C. Trunking D. Spoofing

Frequency interference

Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue? A. Frequency interference B. Low signal strength C. Standard mismatch D. Incorrect channel

80 443

Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO). A. 23 B. 25 C. 53 D. 80 E. 443

Punch down tool

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use? A. OTDR B. Multimeter C. Punch down tool D. Temperature monitor

Cryptokey

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration? A. Port speed B. Cryptokey C. Data VLAN D. NAT/PAT

21

Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? A. 21 B. 22 C. 23 D. 25

Butt set

Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used? A. Butt set B. Toner probe C. Wire mapper D. Cable certifier

nslookup

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation? A. nslookup B. route C. nbtstat D. arp

Enable wireless multimedia (WMM) for QoS

Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue? A. Enable wireless multimedia (WMM) for QoS B. Use the 40MHz channels in the 2.4GHz band C. Enable access point antenna isolation D. Limit the clients to 802.11g compatible laptops

Multipath support

MIMO technology in the 802.11n standard provides for which of the following benefits? A. Channel expansion B. Gigabit wireless bandwidth C. Multipath support D. Channel bonding

DDoS

Malicious users have used multiple workstations to target a single server with the intent of preventing legitimate users from accessing the server. This server suffered which of the following types of attack? A. DDoS B. Trojan C. Cross-site scripting D. Man in the middle E. Replay attack

Use a VPN after connecting to the coffee shop wireless

Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop? A. Enable the host-based firewall on each of the laptops B. Use a VPN after connecting to the coffee shop wireless C. Edit the SSID connection information and change 'open' to 'shared' D. Connect to the open SSID then switch on WPA2 encryption

Protocol analyzer

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue? A. Spam filter B. Protocol analyzer C. Web application firewall D. Load balancer

Increase the number of virtual terminals available.

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue? A. Increase installed memory and install a larger flash module. B. Increase the number of VLANs configured on the switch. C. Decrease the number of VLANs configured on the switch. D. Increase the number of virtual terminals available.

Security through isolation

Network segmentation provides which of the following benefits? A. Security through isolation B. Link aggregation C. Packet flooding through all ports D. High availability through redundancy

Fiber

No link lights on a switch's SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of-9. Which of the following types of cable is MOST likely being tested? A. Fiber B. CAT3 C. CAT5e D. CAT6a

Modulation

OFDM, QAM and QPSK are all examples of which of the following wireless technologies? A. Frequency B. Modulation C. RF interference D. Spectrum

Network

On which of the following layers of the OSI model does IP operate? A. Session B. Transport C. Network D. Data link

Compromised system

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario? A. Compromised system B. Smurf attack C. SQL injection attack D. Man-in-the-middle

User permission reviews

Privilege creep among long-term employees can be mitigated by which of the following procedures? A. User permission reviews B. Mandatory vacations C. Separation of duties D. Job function rotation

Layer 2 Layer 3

QoS operates at which of the following OSI model layers? (Select TWO) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5

Layer 2 Layer 3

QoS operates at which of the following OSI model layers? (Select TWO) A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 5 E. Layer 7

Autonomous system number

Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following? A. Network handle B. Autonomous system number C. Route aggregation D. Top level domain

Interference

Several mobile users from various areas are reporting intermittent connectivity issues. Which of the following is the MOST likely cause? A. Encryption strength B. SSID mismatch C. Interference D. Incompatible NIC

Power failure

Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue? A. Wrong default gateway B. Wrong DNS C. Switching loop D. Power failure

Only TX or RX strand is working.

Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to the corresponding switch's SFP at the MDF. Which of the following is the MOST likely cause? A. A crossover cable is being used. B. DB loss is too high on all strands. C. Only TX or RX strand is working. D. TX and RX are reversed.

access control

Something you have, something you are, and something you know are the three tenets of: A. social engineering B. change management C. remote access D. access control

Presentation

Standards such as JPEG and ASCII operate at which of the following OSI model layers? A. Presentation B. Data link C. Session D. Application

The channels are overlapping with other wireless networks and should be changed.

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem? A. The channels are overlapping with other wireless networks and should be changed. B. The SSIDs are incompatible and should be renamed. C. The users have incompatible wireless network cards and should upgrade. D. The default idle period for logoff is too short and should be changed to a longer limit.

Stateful firewall

The Chief Information Officer (CIO) of an organization is concerned that the current locallyhosted, software threat solution is not agile enough. The CIO points to specific examples of zeroday threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals? A. Stateful firewall B. Premise-based IDS C. Host-based IDS D. Cloud-based anti-malware

Policies

The Chief Information Officer (CIO) wants to improve the security of the company's data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information? A. Policies B. VPN C. HTTPS D. Standards

Layer 2

The MAC address of a network device is used to communicate at which of the following OSI layers? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 5

Recent backups

The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain? A. Vendor documentation B. Recent backups C. Physical IP address D. Physical network diagram

4

The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? A. 1 B. 3 C. 4 D. 5

Posture assessment

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features? A. Quarantine network B. Persistent agents C. Posture assessment D. Non-persistent agents

IPv6

The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following? A. APIPA B. MAC C. IPv4 D. IPv6

Submit a change request

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager's inquiry, which of the following did the administrator forget to do FIRST? A. Submit a change request B. Schedule a maintenance window C. Provide notification of change to users D. Document the changes

WPA2 Enterprise

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. Which of the following encryption types should be implemented? A. WPA2 Enterprise B. WEP C. MAC filtering D. WPA personal

Change duplex to full

The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 983881 packets output, 768588 bytes 0 output errors, 0 collisions, 0 resets A. Set the loopback address B. Change the IP address C. Change the slash notation D. Change duplex to full

Multi-factor authentication

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used? A. Multi-factor authentication B. Two-factor authentication C. Biometrics D. Single sign-on

Load balancer

The company's main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following? A. VPN concentrator B. Content filter C. Proxy server D. Load balancer

Layer 1 Layer 2

The components of a NIC function at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5

Coaxial

The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI? A. CAT6 B. UTP C. Coaxial D. Crossover

Change management

The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators? A. Asset management B. System baselines C. System logging D. Change management

CAT6e

The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be provided, which of the following media will need to utilized? A. CAT6e B. CAT5e C. 802.11n D. 802.11ac

802.11a

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of following standards should be used? A. 802.11a B. 802.11b C. 802.11g D. 802.1x

LACP

The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use? A. BPDU B. LACP C. Spanning tree D. Load balancing

Use only 20 MHz channel bandwidth

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue? A. Configure Wi-Fi Multimedia support B. Use only 20 MHz channel bandwidth C. Enable band steering to use 802.11n D. Configure Quality of Service

Layer 3 switch

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service? A. Layer 3 switch B. Proxy server C. Layer 2 switch D. Smart hub

QoS.

The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called: A. CARP. B. QoS. C. Traffic shaping. D. Fault tolerance.

Configure 802.1q trunks on the switches

The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem? A. Clear the ARP table B. Add host entries on the user's computer C. Configure 802.1x trunks on the switches D. Configure 802.1q trunks on the switches

Buttset

The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue? A. Cable tester B. Buttset C. Toner probe D. Cable certifier

CSU/DSU

The phone company has provided a channelized T1 line. Which of the following should this line be connected to? A. Switch B. CSU/DSU C. IDF D. MDF

IP filtering

The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following? A. MAC filtering B. Traffic shaping C. Session filtering D. IP filtering

161

The protocol SNMP uses which of the following ports by default? A. 53 B. 61 C. 67 D. 161

hypervisor.

The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the: A. hypervisor. B. LPAR. C. broker. D. VDI.

hypervisor

The software that allows a machine to run multiple operating systems at once is called the: A. server manager B. hypervisor C. boot loader D. partition manager

Allow remote administration of the switch

The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this? A. Allow VLAN routing B. Enable packet filtering on the switch C. Allow remote administration of the switch D. Enable MAC filtering on the switch

A logical, rather than a physical switch device

The term virtual switch refers to which of the following? A. A switch that has not yet been implemented in the local network B. Migrating an entire environment to virtualization C. A computer component that controls environmental elements, such as lights and thermometers D. A logical, rather than a physical switch device

Channel bonding

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this? A. Switch the channel B. Change frequencies C. Channel bonding D. Increase the signal

Application logs

There has been an increase in Help Desk tickets related to web portal user accounts being locked out. Which of the following resources would be used to analyze the issue? A. Router logs B. Protocol analyzer C. Firewall logs D. Application logs

User awareness training

There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future? A. Helpdesk training B. Appropriate use policy C. User awareness training D. Personal Identifiable Information

It is a rapid version of spanning tree that uses BPDU to detect problems

There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d. Which of the following is the MOST probable reason the vendor made this suggestion? A. It is a rapid version of spanning tree that uses BPDU to detect problems B. It is a regular version of port mirroring that uses hellow packets to detect loops C. It is a simple version of spanning tree that uses BPDU to detect problems D. It is a rapid version of port mirroring that uses BPDU to detect problems

Protocol analyzer

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic? A. Protocol analyzer B. Cable tester C. Cable certifier D. Environmental monitor

WAP SSIDs are matching

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? A. WPA should be enabled B. PKI should be turned off C. WAP SSIDs are matching D. WAPs are transmitting on same channel

Switching loop

Two switches are connected using both a CAT6 cable and a CAT5e cable. Which of the following problems is occurring? A. Missing route B. Autosensing ports C. Improper cable types D. Switching loop E. Media mismatch

Via HTTP using the default username and password

Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches? A. Via SSH using the RADIUS shared secret B. Via HTTP using the default username and password C. Via console using the administrator's password D. Via SNMP using the default RO community

Duplicate IP address

Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the following could be the cause of this failure? A. Duplicate IP address B. Incorrect subnet mask C. Incorrect gateway D. Wrong DNS

Router - Multiple broadcast and collision domains Layer 2 Switch - Single broadcast, multiple collision domains Wireless AP - Single broadcast and collision domains Hub - Single broadcast and collision domains

Under each network device, drag and drop the associated broadcast and/or collison description. Objects may be used multiple times, as needed.

The server's NIC drivers

Upon arrival at work, an administrator is informed that network users cannot access the file server. The administrator logs onto the server and sees the updates were automatically installed and the network connection shows limited and no availability. Which of the following needs to be rolled back? A. The browser on the server B. The server's NIC drivers C. The server's IP address D. The antivirus updates

Individual accountability

Use of group accounts should be minimized to ensure which of the following? A. Password security B. Regular auditing C. Baseline management D. Individual accountability

Unplug appliances (e.g. microwaves) to see if they are causing interference.

Users are contacting the internal helpdesk, stating that they are having difficulty staying connected to the wireless network. When the technician investigates, it is discovered that the users are having a problem using the wireless network in the company break rooms. Which of the following should the technician do FIRST? A. Install a new access point in each break room to provide adequate coverage. B. Remount the access points to a place on the ceiling closer to the break rooms. C. Unplug appliances (e.g. microwaves) to see if they are causing interference. D. Change the encryption on the access points from WPA2 to WEP.

Utilization

Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root cause of the problem? A. Baseline B. Bottleneck C. Utilization D. Link status

Environmental monitor

Users are reporting that all of a sudden some of the files stored on the remote file server share are becoming corrupted and cannot be opened. A technician is dispatched to the server room to troubleshoot. The technician verifies that no changes to the network infrastructure occurred recently. Which of the following tools is MOST likely to reveal why files are becoming corrupted? A. Environmental monitor B. OTDR C. Cable tester D. Punch down tool

RADIUS

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue? A. WPA2 security key B. SSL certificates C. CSMA/CA D. RADIUS

Move one or more access points, minimizing signal overlap.

Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this? A. Reconfigure the access points from 802.11b to 802.11g. B. Establish procedures which limit user connections during peak hours. C. Configure the access points so that they all use different SSIDs. D. Move one or more access points, minimizing signal overlap.

Block all ICMP request

Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following should the technician implement to avoid potential occurrences from happening in the future? A. Block all ICMP request B. Update all antivirus software C. Remove all suspected users from the network D. Upgrade firmware on all network cards

Subnet mask

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem? A. Default gateway B. Duplicate IP address C. Wrong DNS D. Subnet mask

35

Users report that they are unable to access the production server with IP address 192.168.30.17. These users need to be provided access without changing any subnet to VLAN information. The VLANs configured on the network are listed below: DepartmentVLAN #Subnet used Marketing20192.168.20.0/28 Customer Service25192.168.20.64/28 Finance30192.168.30.0/28 WHSE35192.168.30.16/28 Sales40192.168.3.16/28 The users experiencing this issue need to be added to which of the following VLANs? A. 25 B. 30 C. 35 D. 40

Document findings, actions, and outcomes.

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality? A. Establish a plan of action to resolve the problem and identify potential effects. B. Implement the solution. C. Establish a theory of probable cause. D. Document findings, actions, and outcomes.

Physical layer

When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting? A. Transport layer B. Physical layer C. Network layer D. Session layer

Root bridge

When a loop occurs, which of the following STP components determines which port to disable? A. Convergence B. Root bridge C. BPDU guard D. MAC address

Switching loop

When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis? A. Denial of service attack B. MTU black hole C. Switching loop D. Defective patch cable

Signal strength

When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area? A. Signal strength B. SSID enable C. Encryption D. Password hardening

Mail server

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly? A. Load balancer B. FTP server C. Firewall DMZ D. Mail server

arp

When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A. ping B. arp C. route D. dig

All routers learn the route to all connected networks

When convergence on a routed network occurs, which of the following is true? A. All routers are using hop count as the metric B. All routers have the same routing table C. All routers learn the route to all connected networks D. All routers use route summarization

QoS

When dealing with high bandwidth applications such as VoIP and VTC, which of the following network performance optimization tools should be implemented to ensure BEST performance? A. Fault tolerance B. Load balancing C. Caching engines D. QoS

QoS

When implementing video streaming from the Internet to an always on device, it is best to employ which of the following services to minimize latency issues? A. QoS B. EIGRP C. PPTP D. OSPF

Short

When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection. This creates which of the following conditions? A. Short B. Twisted pair C. Electrostatic discharge D. Crosstalk E. Open

Decrease signal strength.

When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving? A. Implement multiple wireless encryption techniques. B. Implement PoE on each WAP. C. Decrease signal strength. D. Increase signal strength.

DoS

When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likely experiencing which of the following attacks? A. Bluejacking B. ARP cache poisoning C. Phishing D. DoS

Loopback plug

When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU. Which of the following was MOST likely used by the technician? A. Cable analyzer B. Toner probe C. OTDR D. Loopback plug

Layer 2 Data link

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO). A. Layer 2 B. Layer 3 C. Layer 5 D. Transport layer E. Data link F. Physical layer

LACP

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement? A. Port mirroring B. 802.1w C. LACP D. VTP

Load balancing

When using high bandwidth applications over multiple WAN connections, which of the following should be used? A. Static IP addressing B. Half-duplex C. PoE devices D. Load balancing

802.1q

Which IEEE protocol is used with VLAN technology? A. 802.11a B. 802.11b C. 802.1m D. 802.1q

n

Which of the following 802.11 standards can operate at both 2.4Ghz and 5.0Ghz? A. a B. b C. g D. n

Unidirectional

Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a narrow path? A. Omni-direction B. Unidirectional C. Patch D. Yagi

Channel bonding

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spatial reuse D. 20MHz channel spacing

Switches packets within the same subnet based on MAC addresses

Which of the following BEST describes how a layer 2 switch functions? A. Switches packets within the same subnet based on MAC addresses B. Switches packets between different subnets based on IP addresses C. Switches packets between different subnets based on MAC addresses D. Switches packets within the same subnet based on IP addresses

Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet.

Which of the following BEST describes the difference between layer 2 switching and layer 2 routing? A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet. B. Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet. C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace. D. Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.

Chain of custody

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence A. Legal hold B. Chain of custody C. Secure copy protocol D. Financial responsibility

PTR

Which of the following DNS records allows for reverse lookup of a domain? A. PTR B. AAAA C. A D. MX

AAAA

Which of the following DNS records is used in conjunction with 192:168::1:10? A. AAAA B. MX C. TXT D. PTR

CNAME

Which of the following DNS records would allow for a website to have more than one FQDN? A. TXT B. PTR C. MX D. CNAME

172.15.1.1/16 193.168.2.1/24

Which of the following IP address/CIDR combinations represent public address space? (Select TWO). A. 10.1.1.1/8 B. 172.15.1.1/16 C. 172.16.1.1/16 D. 172.31.1.1/16 E. 193.168.2.1/24 F. 224.0.0.1/32

10.100.200.0

Which of the following IP addresses would be classified as private? A. 10.100.200.0 B. 169.253.10.20 C. 172.168.5.0 D. 200.100.25.0

Time

Which of the following MUST be kept synchronized in order for Kerberos to work? A. Certificate B. Ticket C. Time D. Token

Application layer firewall

Which of the following MUST be used when securing a VoIP network consisting of private IP addresses? A. IPS B. Application layer firewall C. IDS D. An unmanaged switch

Session Presentation

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO). A. Data Link B. Transport C. Network D. Session E. Presentation

Data link

Which of the following OSI model layers is used to frame packets that are sent over a medium? A. Session B. Data link C. Physical D. Transport

Transport

Which of the following OSI model layers is used to order packets which may have arrived out of order? A. Transport B. Presentation C. Network D. Session

Datagram

Which of the following PDUs is used by a connectionless protocol? A. Frames B. Segments C. Streams D. Datagram

Blocking

Which of the following STP states indicates an inactivated port due to a loop? A. Disabled B. Learning C. Blocking D. Forwarding

Application Layer

Which of the following TCP/IP model layers combines four OSI model layers? A. Application Layer B. Internet Layer C. Transport Layer D. Network Interface Layer

Network Interface

Which of the following TCP/IP model layers does the OSI model Data Link layer map to? A. Application B. Transport C. Internet D. Network Interface

IPSec

Which of the following VPN technologies uses IKE and ISAKMP for key exchange? A. SSL B. IPSec C. L2TP D. PPTP

OC-3

Which of the following WAN technologies has a MAXIMUM speed of 155.52Mbps? A. OC-3 B. T3 C. OC-12 D. E1

T1

Which of the following WAN technologies has synchronous up/down speeds? A. T1 B. ADSL C. Satellite D. Cable broadband

Satellite

Which of the following WAN technologies is associated with high latency? A. T1 B. Satellite C. Cable D. OCx

OC3

Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps? A. DS3 B. E3 C. OC3 D. T3

Dialup DSL

Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO). A. Dialup B. DSL C. SONET D. Cable E. WiMAX F. LTE

WPA2

Which of the following WAP security features offers the STRONGEST encryption? A. WPA B. WPA2 C. WEP D. Hidden SSID

Mandatory access control

Which of the following access controls enforces permissions based on data labeling at specific levels? A. Mandatory access control B. Separation of duties access control C. Discretionary access control D. Role based access control

172.23.226.34

Which of the following addresses is a class B private address? A. 132.216.14.184 B. 152.119.25.213 C. 162.17.43.22 D. 172.23.226.34

MIMO technology

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards? A. Dual frequency B. Enhanced encryption C. MIMO technology D. Backwards compatibility

Multicast

Which of the following allows a central point to simultaneously address other points without addressing all of them? A. Multicast B. Subnetting C. Unicast D. Broadcast

Fingerprinting

Which of the following allows a technician to gather information about the operating system? A. Domain services B. Fingerprinting C. Countermeasures D. Reconnaissance

Smart Jack

Which of the following allows a telecommunication company to test circuits to customers remotely? A. VLAN B. Toner Probe C. RDP D. Smart Jack E. VPN

VLAN

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks? A. RIP B. STP C. VLAN D. MTU

Omni

Which of the following antenna types has a flat circular radiation pattern? A. Diversity B. Yagi C. Omni D. Patch

De-encapsulation

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? A. Tagging B. Encapsulation C. Tunneling D. De-encapsulation

RADIUS TACACS+

Which of the following are authentication methods that can use AAA authentication? (Select TWO). A. Kerberos B. PKI C. TKIP/AES D. MS-CHAP E. RADIUS F. TACACS+

Radius TACACS+

Which of the following are considered AAA authentication methods? (Select TWO). A. Kerberos B. Radius C. MS-CHAP D. TACACS+ E. 802.1X

FTP RCP

Which of the following are considered unsecure access methods? (Select TWO). A. FTP B. IPSec C. RCP D. SCP E. SFTP

Star Bus

Which of the following are network topologies? (Select TWO). A. Ethernet B. Duplex C. Star D. Circular E. Bus

MTRJ ST

Which of the following are standard fiber cable connector types? (Select TWO). A. RJ-11 B. F-connector C. MTRJ D. DB-9 E. ST

172.16.0.255 172.16.1.1

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO). A. 172.16.0.255 B. 172.16.0.0 C. 172.16.1.1 D. 172.16.8.0 E. 172.16.256.255

Virtual machines

Which of the following assists a network administrator in reverse engineering malware and viruses? A. Virtual switches B. Virtual machines C. VLANs D. IDS

Worms

Which of the following attacks is spread by attaching themselves to files? A. Worms B. Botnet C. DDoS D. FTP bounce

Evil twin

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic? A. Evil twin B. Rogue access point C. WEP attack D. War driving

Kerberos

Which of the following authentication methods is MOST secure? A. NTLM B. CHAP C. MS-CHAP D. Kerberos

Kerberos

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources? A. Kerberos B. RADIUS C. Multi-factor authentication D. TACACS+

POTS

Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections? A. OC12 B. POTS C. WiMax D. OC3

CAT5

Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps? A. CAT3 B. CAT5 C. CAT5e D. CAT6

CAT3

Which of the following cable types is MOST commonly used with POTS? A. CAT3 B. Multimode C. CAT6 D. Coaxial

Fiber

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern? A. STP B. RG-6 C. Fiber D. RG-59

Straight-though

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive? A. Coaxial B. Crossover C. Multimode fiber D. Straight-though

CAT6a

Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires? A. Coaxial B. CAT3 C. CAT5 D. CAT6a

CAT6

Which of the following cables has the MOST twists per inch? A. CAT3 B. CAT5 C. CAT5e D. CAT6

CAT6

Which of the following cables is MOST likely to be terminated into a patch panel? A. Serial B. RG-6 C. RG-59 D. CAT6

CAT6a

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance? A. T1 crossover B. Singlemode fiber C. CAT6a D. Coaxial

RG-6

Which of the following cables will MOST likely be used to connect to a satellite dish? A. RG-6 B. CAT5e C. Fiber D. CAT6

Fiber

Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running? A. CAT5 B. CAT6 C. Coaxial D. Fiber

Load balancer

Which of the following can a technician use when a company implements redundant WAN links? A. Content filter B. Load balancer C. Proxy server D. VPN concentrator

Content filter

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images? A. Content filter B. VPN concentrator C. Load balancer D. Proxy server

OTDR

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification? A. Multimeter B. OTDR C. Link state D. Protocol analyzer

SNMP

Which of the following can be configured on a managed network switch to send real time alerts to a technician? A. SSID B. SMTP C. SNMP D. Syslog

traceroute

Which of the following can be issued from the command line to find the layer 3 hops to a remote destination? A. traceroute B. nslookup C. ping D. netstat

VPN concentrator

Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload? A. Proxy server B. Content filter C. Load balancer D. VPN concentrator

System log

Which of the following can determine the last time an address lease was renewed on a network device? A. System log B. Packet sniffer C. Time domain reflectometer D. Stateful packet filter

TACACS+

Which of the following can use a third party back-end LDAP user database for authentication? A. ISAKMP B. TACACS+ C. PKI D. CHAP

Channel bonding

Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps? A. MIMO technology B. Channel bonding C. Encryption type D. Frequency

Hybrid

Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review? A. Hybrid B. Public C. Community D. Private

ifconfig

Which of the following commands can be used on a server to display IP information for a given interface? A. nbtstat B. dig C. ifconfig D. msconfig

traceroute

Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination? A. route B. netstat C. traceroute D. ping 127.0.0.1

Connectionless

Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP? A. Connectionless B. Stateful C. Full Duplex D. Quality of Service

Multicast

Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices? A. Anycast B. Unicast C. CoS D. QoS E. Multicast

DWDM

Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths? A. DWDM B. SONET C. ADSL D. LACP

Redundancy Offsite backups

Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO). A. Redundancy B. Implementing acceptable use policy C. Offsite backups D. Uninterruptable power supplies E. Vulnerability scanning

Baseline

Which of the following configuration management documents is used to describe how a computer performs after initial installation onto a network? A. Baseline B. Network map C. Asset management D. Installation guide

WPA2

Which of the following configurations of a wireless network would be considered MOST secure? A. WEP using MAC Filtering B. WEP and hiding the SSID C. WPA2 D. WPA TKIP and hiding the SSID

BNC

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility? A. 66 block B. BNC C. F-connector D. RJ-11

RS-232

Which of the following connector types is MOST commonly used for serial connections? A. MTRJ B. RJ-11 C. RS-232 D. RJ-45

DB-9

Which of the following connector types is only used with copper media? A. ST B. SC C. MTRJ D. DB-9

DB-9

Which of the following connector types would Sandy, a network technician, use to connect a serial cable? A. RJ-11 B. BNC C. LC D. DB-9

110 block

Which of the following connector types would require a punch down tool to attach a network cable to it? A. F-connector B. ST C. 110 block D. RJ-45

BNC

Which of the following connectors is used for coaxial copper cable? A. BNC B. DB-9 C. RJ-11 D. ST

F

Which of the following connectors is used on a coaxial cable? A. F B. LC C. RJ-11 D. ST

TCP header

Which of the following contains the SYN and ACK flags? A. UDP header B. IP header C. TCP header D. ICMP header

Physical, Data Link, Network, Transport, Session, Presentation, Application.

Which of the following correctly lists the layers of the OSI model starting at Layer 1? A. Data Link, Physical, Network, Transport, Presentation, Session, Application. B. Physical, Data Link, Network, Transport, Presentation, Session, Application. C. Physical, Data Link, Transport, Network, Session, Presentation, Application. D. Physical, Data Link, Network, Transport, Session, Presentation, Application.

traceroute

Which of the following could be used to estimate RTT across a router? A. dig B. traceroute C. arp D. uptime

Behavior based IPS

Which of the following could be used to stop unknown threats? A. DMZ B. Signature based IPS C. Behavior based IPS D. Honeypots

2427

Which of the following default ports is associated with protocols that are connectionless? A. 80 B. 443 C. 2427 D. 3389

69

Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123

3389

Which of the following default ports would need to be open on a firewall to allow remote desktop access? A. 143 B. 443 C. 3389 D. 8080

Kerberos

Which of the following default services uses TCP/UDP port 88? A. LDAP B. IGMP C. HTTP D. Kerberos

Private

Which of the following defines an IP address that is NOT routed on the Internet? A. Multicast B. Public C. Private D. Classful

568B

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable? A. 568B B. RJ-11 C. RJ-45 D. RS-232

Packet sniffing

Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities? A. XSS B. SQL injection C. Directory traversal D. Packet sniffing

Translates an IP address to a name

Which of the following describes a DNS server? A. Translates an IP address to a name B. Caches commonly viewed web pages C. Assigns IP addresses to network devices D. Provides port security for a network

Load balancing

Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability? A. Load balancing B. MPLS trunking C. VLAN tagging D. Multiplexing

Static

Which of the following describes a manually entered route? A. Static B. Dynamic C. Multicast D. Unicast

Attack on a target using spoofed ICMP packets to flood it

Which of the following describes a smurf attack? A. Attack on a target using spoofed ICMP packets to flood it B. Intercepting traffic intended for a target and redirecting it to another C. Spoofed VLAN tags used to bypass authentication D. Forging tags to bypass QoS policies in order to steal bandwidth

Loopback

Which of the following describes an IPv6 address of ::1? A. Broadcast B. Loopback C. Classless D. Multicast

MDF

Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider? A. 110 block B. MDF C. DSU D. CSU

IP filtering

Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic? A. Port filtering B. IP filtering C. MAC filtering D. Application filtering

Latency

Which of the following describes the amount of time it takes for a packet to transmit from one switch to another? A. Hop count B. Latency C. MTU limit D. Distance vector

Proxy server

Which of the following devices acts as a gateway between clients and servers? A. WINS server B. Proxy server C. Content filter D. DNS server

Load balancer

Which of the following devices allows for multiple web servers to host the same web page and for traffic to be distributed between them according to some metric? A. Proxy server B. VPN concentrator C. Load balancer D. Content filter

Proxy server

Which of the following devices can be used to offload outbound web server SSL encryption overhead? A. NIPS B. Proxy server C. Content filter D. VPN concentrator

Router Layer 3 switch

Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO). A. Cable modem B. Layer 2 switch C. Router D. NIDS E. Layer 3 switch

802.11 AP

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols? A. Firewall B. Router C. 802.11 AP D. Switch

Load balancer

Which of the following devices is used to distribute network traffic equally over multiple links? A. Content filter B. DNS server C. Load balancer D. Proxy server

An IPS

Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks? A. An IPS B. A protocol analyzer C. A traffic shaper D. An IDS

ping

Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets? A. ifconfig B. ping C. route D. nbtstat

Routing

Which of the following differentiates a layer 3 switch from a layer 2 switch? A. Routing B. Bridging C. Switching D. Repeating

CSMA/CA

Which of the following do 802.11 networks use to handle packet collisions from multiple nodes? A. CSMA/CA B. CSU/DSU C. Ethernet Tokens D. CSMA/CD

Leases Suffixes

Which of the following do DHCP servers provide to requesting devices on the network? (Select TWO). A. Encryption B. Leases C. SSID D. Channels E. Suffixes F. VLAN assignments

Rollback procedure

Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window? A. Configuration procedures B. Stakeholder notification C. Impact analysis D. Rollback procedure

No DHCP server connectivity

Which of the following does the IP address 169.254.222.10 indicate? A. No DHCP server connectivity B. The DNS server is unavailable C. Firewall issue D. Duplicate IP addresses are found

RIP

Which of the following dynamic routing protocols selects routing paths based upon hop count? A. BGP B. RIP C. OSPF D. IGRP

Packet Router

Which of the following exist at layer three of the OSI model? (Select TWO). A. NIC B. Switch C. Frame D. Packet E. Router F. Cable

Deny any source network 1.1.1.0/24 to destination any on port 23

Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24? A. Deny any source host on source port 23 to destination any B. Deny any source network 1.1.1.0/24 to destination any on port 23 C. Deny source host 1.1.12 on source port 23 to destination any D. Deny any source network 1.1.1.0/24 with source port 23 to destination any

802.11a

Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Switch

Which of the following has the LEAST amount of collisions in a domain? A. Bridge B. Hub C. Repeater D. Switch

Split horizon

Which of the following helps prevent routing loops? A. Routing table B. Default gateway C. Route summarization D. Split horizon

IPSEC

Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver? A. IPSEC B. SHA C. DES D. CRC

Non-persistent agent

Which of the following is BEST used to perform a one-time temporary posture assessment in a NAC environment? A. Intrusion prevention system B. Host-based firewall C. Non-persistent agent D. Antivirus

100BaseFX

Which of the following is MOST commonly used with a fiber-optic network backbone? A. 100BaseFX B. 100BaseT C. 100BaseTX D. 1000BaseCX

Analog modem

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? A. Multilayer switch B. Access point C. Analog modem D. DOCSIS modem

Softphone

Which of the following is a UC application? A. Softphone B. Intranet C. Proxy D. Facsimile

BNC

Which of the following is a common connector used on a coaxial cable? A. RJ-45 B. DB-25 C. BNC D. LC

WEP cracking

Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack? A. WEP cracking B. WPA cracking C. War driving D. Rogue access point

ICMP UDP

Which of the following is a connectionless protocol? (Select TWO) A. ICMP B. SSL C. TCP D. SSH E. HTTP F. UDP

Chain of custody

Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been? A. Warrant B. Legal document C. Chain of custody D. Forensic report E. Documentation of the scene

IS-IS

Which of the following is a link state routing protocol? A. RIPv2 B. BGP C. IS-IS D. RIP

Honeypot

Which of the following is a logical host on the network where unauthorized users believe they are on the production network? A. Virtual server B. VLAN C. Honeypot D. Virtual Terminal

Frame relay

Which of the following is a packet switching WAN technology? A. Frame relay B. T1 C. Asynchronous transfer mode D. ISDN

EIGRP

Which of the following is a proprietary routing protocol? A. RIP B. EIGRP C. OSPF D. BGP

194.178.12.54

Which of the following is a public class C IP address? A. 4.2.2.2 B. 194.178.12.54 C. 175.35.46.60 D. 192.168.1.34

Segments broadcast traffic

Which of the following is a purpose of a VLAN? A. Decreases bandwidth on a network B. Segments broadcast traffic C. Increases port speed D. Allows another connection to the router

IP

Which of the following is a routed protocol that functions at layer 3 of the OSI model? A. IP B. Frame relay C. PPP D. ADSL

SFTP

Which of the following is a secure way to connect to a device? A. RSH B. TFTP C. SNMPv2 D. SFTP

Isolated corporate resources

Which of the following is a security benefit gained from setting up a guest wireless network? A. Optimized device bandwidth B. Isolated corporate resources C. Smaller ACL changes D. Reduced password resets

MT-RJ

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector? A. BNC B. FSMA C. MT-RJ D. ST

Bootp server address

Which of the following is a value that can be received from a DHCP server? A. Bootp server address B. SMTP server address C. WWW server address D. VPN server address

2001:cdba::3257:9652

Which of the following is an IPv6 address? A. 00:14:38:05:7B:E5 B. 10.10.1.1 C. 192.168.1.1 D. 2001:cdba::3257:9652

It can reroute connectivity in the event of failure.

Which of the following is an advantage of dynamic routing? A. It can reroute connectivity in the event of failure. B. It is the simplest form of routing. C. The routes do not change. D. The setup and configuration are done manually.

192.168.1.254

Which of the following is an example of an IPv4 address? A. 192:168:1:55 B. 192.168.1.254 C. 00:AB:FA:B1:07:34 D. ::1

PKI

Which of the following is an example of asymmetric encryption? A. PKI B. SHA1 C. AES D. 3DES

Password and hardware token OTP

Which of the following is an example of two factor authentication? A. Password, device certificate and PIN B. SSL web server certificate and password C. User password and administrator password D. Password and hardware token OTP

56:AD:BX:89:55:54

Which of the following is an invalid MAC address? A. AA:CE:58:FD:90:08 B. 44:98:3E:F8:33:23 C. 56:AD:BX:89:55:54 D. 94:9E:FE:EE:8C:DF

PTR

Which of the following is associated with DNS reverse lookup zones? A. CNAME B. TXT C. PTR D. MX

Smurf attack

Which of the following is based ENTIRELY on using ICMP packets? A. Social engineering B. NMAP C. Buffer overflow attack D. Smurf attack

War chalking

Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots? A. Social engineering B. War chalking C. WPA cracking D. Packet sniffing

Whaling

Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails? A. Whaling B. Impersonation C. Privilege escalation D. Spear phishing

IS-IS

Which of the following is considered a classless routing protocol? A. IGRP B. IS-IS C. RIPv1 D. STP

Hop count

Which of the following is considered a routing metric? A. Hop count B. QoS C. Subnet size D. IP address

Broadcast MAC address.

Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF? A. Unicast MAC address. B. Invalid MAC address. C. Multicast MAC address. D. Broadcast MAC address.

Arbitrary IP address

Which of the following is indicative of an FTP bounce? A. Arbitrary IP address B. Reverse DNS lookups C. Same Port Number D. File Transfer Success

CAT6

Which of the following is rated for speeds over 800Mbps? A. Coaxial B. DB-9 C. CAT6 D. CAT5e

Static routing

Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router? A. ACLs B. Static routing C. Trunking D. SNMP strings

User training

Which of the following is the BEST way to mitigate security threats on a network? A. Social engineering B. User training C. Incident response D. Man-in-the-middle

54Mbps

Which of the following is the MAXIMUM data transmission rate of 802.11a? A. 8Mbps B. 11Mbps C. 54Mbps D. 107Mbps

10GBaseT

Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter? A. 10GBaseLR B. 10GBaseSR C. 10GBaseX D. 10GBaseT

::

Which of the following is the correct representation of an IPv6 address? A. :: B. 0:0:0:0:0:0:0:0:1 C. 1:2:3:4:AB:CD:EF D. 2001::4860:800f::

MS-CHAP

Which of the following is the default authentication method for a Windows client using PPP over a dialup connection? A. TACACS+ B. WINS C. Kerberos D. MS-CHAP

255.255.0.0

Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

The TCP header implements flags, while the UDP header does not.

Which of the following is the main difference between TCP and UDP? A. TCP data flows in two directions, while UDP data flows from server to client. B. The TCP header implements flags, while the UDP header does not. C. The TCP header implements checksum, while the UDP header does not. D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.

/21

Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet? A. /19 B. /21 C. /22 D. /24

Ring

Which of the following is the network topology in which computers connect in a closed circle? A. Bus B. Mesh C. Ring D. Star

FE80::/10

Which of the following is the prefix for a link-local IPv6 address? A. FE80::/10 B. FF00::/8 C. 2FFE::/16 D. FEEF:/12

To assign IP addresses to devices on the network

Which of the following is the reason why a company's network may contain a DHCP server? A. To assign IP addresses to devices on the network B. To convert IP addresses to fully qualified domain names C. To provide POP3 and IMAP email functionality D. To allow secure remote access

Frame

Which of the following is the unit used to transfer information at Layer 2 of the OSI model? A. Packet B. Socket C. Session D. Frame

AES-CCMP

Which of the following is the wireless encryption standard associated with WPA2? A. AES-CCMP B. EAP C. WEP D. 802.1x

The address is a Class B address.

Which of the following is true about an IP address if the first bit is a one and the second bit is a zero? A. The address is a Class A address. B. The address is a Class B address. C. The address is a Class C address. D. The address is a Class D address.

Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.

Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.

SSL VPN provides a secure tunnel.

Which of the following is true about tunneling and encryption? A. SIP encrypts all data going through the tunnel. B. PPTP creates a secure tunnel. C. SSL VPN provides a secure tunnel. D. RAS is a secure way to create a tunnel.

Remote clients connect to a centralized server

Which of the following is true of a client/server topology? A. Virtual servers are used to stream data to other remote servers B. Servers are used to connect to centralized clients C. Remote clients connect to a centralized server D. Remote clients connect to each other via a virtual server

10GBASELW

Which of the following is used for SONET connections and requires a wavelength of 1310nm? A. 10GBASECX4 B. 10GBASELX4 C. 10GBASELW D. 10GBASESR

DWDM

Which of the following is used to allow multiple sources on a single optical cable? A. HSPA+ B. MIMO C. DWDM D. SONET

DHCP

Which of the following is used to assign an IP address to a device? A. DHCP B. NTP C. DNS D. RADIUS

RADIUS 802.1x

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO). A. OSPF B. VTP trunking C. Virtual PBX D. RADIUS E. 802.1x

VPN

Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN

Traffic shaping

Which of the following is used to define how much bandwidth can be used by various protocols on the network? A. Traffic shaping B. High availability C. Load balancing D. Fault tolerance

802.1q

Which of the following is used to describe trunking VLANs on a network? A. 802.11a B. 802.11i C. 802.1q D. 802.1x

LDAP

Which of the following is used to determine whether or not a user's account is authorized to access a server remotely? A. VPN B. RDP C. LDAP D. Encryption

EUI-64

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address? A. Subnet B. IANA prefix C. EUI-64 D. Site-local

Load balancer

Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits? A. DNS server B. Content filter C. Proxy server D. Load balancer

Acceptable use policy

Which of the following is used to explain guidelines for users while using network resources? A. Network cut sheet B. Baselines C. Acceptable use policy D. Regulations

Traffic shaping

Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance? A. QoS B. Fault tolerance C. Load balancing D. Traffic shaping

CARP

Which of the following is used to provide hot standby capabilities using paired routers? A. CARP B. L2TP C. PPTP D. ISAKMP

Network

Which of the following layers of the OSI model is between the Data Link and Transport layers? A. Application B. Session C. Network D. Physical

4

Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer? A. 2 B. 3 C. 4 D. 5

Physical Data Link

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO). A. Application B. Physical C. Presentation D. Transport E. Data Link F. Network

CAT6

Which of the following media types can carry a standard Ethernet signal for network connectivity? A. USB B. Parallel C. Serial D. CAT6

PSTN

Which of the following mediums is circuit switched? A. PSTN B. ATM C. Frame relay D. MPLS

Load balancing

Which of the following methods for network performance optimization is used to distribute traffic among similar devices? A. Fault tolerance B. QoS C. Proxy server D. Load balancing

MAC filtering

Which of the following methods limits access to a network based on characteristics of the network card? A. IP filtering B. MAC filtering C. Port filtering D. Encryption

Port Mirroring

Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer? A. STP B. Port Mirroring C. VLANs D. PoE

Port mirroring

Which of the following needs to be configured on a switch to use a packet sniffer? A. Port trunking B. Port mirroring C. Tagged VLAN D. Untagged VLAN

IPS

Which of the following network devices is meant to actively protect against network treats and can disable connections to stop malicious traffic if necessary? A. DMZ B. IPS C. SSL VPN D. Layer 3 switch

Firewall

Which of the following network devices use ACLs to prevent unauthorized access into company systems? A. IDS B. Firewall C. Content filter D. Load balancer

UC gateway

Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN? A. Access switch B. UC gateway C. UC server D. Edge router

PAN

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones? A. PAN B. LAN C. WLAN D. MAN

RJ-11

Which of the following network media connectors can use a MAXIMUM of two copper wire pairs? A. F-connector B. RJ-11 C. MTRJ D. RJ-45

Syslog server

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics? A. Protocol analyzer B. Syslog server C. Packet sniffer D. IPS logs

Caching engines

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements? A. Load balancing B. Traffic policing C. Caching engines D. Traffic shaping

SNMP

Which of the following network protocols would be used to transmit traps across a network to a log server? A. SMTP B. PPPoE C. POP3 D. SNMP

Ring

Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network? A. Star B. Mesh C. Bus D. Ring

Mesh

Which of the following network topologies describes a network where each node is connected to multiple devices? A. Mesh B. Bus C. Star D. Ring

Star

Which of the following network topologies has a central, single point of failure? A. Ring B. Star C. Hybrid D. Mesh

Peer-to-peer

Which of the following network topologies is MOST commonly used by online file sharing websites? A. Point to multipoint B. Peer-to-peer C. Ring D. Hybrid

Point to Point

Which of the following network topologies is MOST likely used in remote access VPN? A. Point to Point B. Bus C. Ring D. Mesh

Peer-to-peer

Which of the following network topologies is ONLY possible between two users? A. Star B. Client-server C. Hybrid D. Peer-to-peer

Mesh

Which of the following network topologies would be the BEST choice in providing network redundancy for an organization? A. Star B. Hybrid C. Mesh D. Point to Point

Cell size increases

Which of the following occurs when antenna gain is increased on an access point? A. Connection speeds decrease B. Throughput decreases C. Cell size increases D. Attenuation increases

MAC address Switch

Which of the following operate at the Data Link layer of the OSI model? (Select TWO). A. MAC address B. Router C. Hub D. Switch E. IP address

Switch

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address? A. Switch B. Proxy Server C. Router D. VPN Concentrator

Proximity readers

Which of the following physical security controls prevents an attacker from gaining access to a network closet? A. CCTVs B. Proximity readers C. Motion sensors D. IP cameras

21

Which of the following port numbers needs to be open on a firewall to allow FTP traffic? A. 21 B. 22 C. 23 D. 25

22 23

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO). A. 21 B. 22 C. 23 D. 53 E. 67

67 68

Which of the following ports does DHCP use? (Select TWO). A. 22 B. 23 C. 67 D. 68 E. 69

143

Which of the following ports does IMAP use by default? A. 110 B. 123 C. 143 D. 443

23

Which of the following ports is the default telnet port? A. 20 B. 21 C. 22 D. 23

23

Which of the following ports is used by Telnet? A. 21 B. 23 C. 80 D. 143

22

Which of the following ports is used to provide secure sessions over the web by default? A. 22 B. 25 C. 80 D. 5004

53

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server? A. 20 B. 53 C. 80 D. 3389

5060

Which of the following ports should be allowed to provide access to certain VoIP applications? A. 110 B. 139 C. 1720 D. 5060

22

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? A. 20 B. 21 C. 22 D. 23

123

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port? A. 123 B. 143 C. 153 D. 163

161 162

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080

MTU black hole

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel? A. Routing loop B. MTU black hole C. Framing errors D. SYN flood

Telnet SSH

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO). A. Telnet B. FTP C. SNMP D. SSH E. RDP

SSH RDP

Which of the following protocols are used to connect devices in a secure manner? (Select TWO). A. TELNET B. SSH C. RDP D. HTTP E. DNS F. FTP

NTP

Which of the following protocols are used to provide accurate time to network devices? A. SMTP B. FTP C. TLS D. NTP

POP3 IMAP4

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO). A. TFTP B. SNMP C. POP3 D. IMAP4 E. SFTP

TLS

Which of the following protocols can be implemented to provide encryption during transmission between email gateways? A. TLS B. PPTP C. SSH D. HTTPS

SNMPv3

Which of the following protocols could the below packet capture be from? Port: 161 msgVersion: <masked> msgUsername: <masked> msgAuthenticationParameters: <masked> msgPrivacyParameters: <masked> msgData: data: get-request request-iD. <masked> error-status: noError (0) error-index: 0 variable-bindings: 0 items A. SNMPv3 B. SSH C. HTTP D. SNMPv1

OSPF

Which of the following protocols exchange the latest information that has changed in the routing table? A. TFTP B. BGP C. OSPF D. IGMP

EIGRP

Which of the following protocols is considered a hybrid routing protocol? A. OSPF B. RIPv2 C. IS-IS D. BGP E. EIGRP

IMAP4

Which of the following protocols is the BEST choice for retrieving email on multiple devices? A. IMAP4 B. SMTP C. FTP D. SNMPv3

RDP

Which of the following protocols is used by Windows to securely access a remote computer? A. RAS B. Telnet C. PPP D. RDP

SNMP

Which of the following protocols is used for remote management of devices? A. SNMP B. TFTP C. Syslog D. SMTP

NAT

Which of the following protocols is used to allow multiple hosts to share a common IP address? A. HTTPS B. ARP C. CARP D. NAT

Spanning Tree Protocol

Which of the following protocols is used to detect and eliminate switching loops within a network? A. Spanning Tree Protocol B. EIGRP C. OSPF D. Dynamic routing

GRE

Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections? A. MPLS B. ESP C. GRE D. PPP

TLS

Which of the following protocols is used to provide secure authentication and encryption over non- secure networks? A. RADIUS B. TLS C. PPTP D. HTTP

SSH

Which of the following protocols is used to securely connect to a multi-layer switch? A. HTTP B. SMTP C. SSH D. Telnet

SMTP

Which of the following protocols is used to send mail to another server on the Internet? A. RTP B. SNMP C. POP D. SMTP

FTP

Which of the following protocols is used to transfer files over the Internet? A. SNMP B. NTP C. FTP D. SIP

SMTP

Which of the following protocols is used to transmit outgoing email? A. RDP B. NTP C. POP3 D. SMTP

VTP

Which of the following protocols must be implemented in order for two switches to share VLAN information? A. VTP B. MPLS C. STP D. PPTP

UDP

Which of the following protocols occurs at Layer 4 of the OSI model? A. ISDN B. IPX C. GRE D. UDP

IPSec

Which of the following protocols provides a secure connection between two networks? A. L2TP B. IPSec C. PPP D. PPTP

MPLS

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic? A. BGP B. OSPF C. IS-IS D. MPLS

RDP

Which of the following protocols uses port 3389? A. IMAP B. DHCP C. SSH D. RDP

Spanning tree 802.1d

Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO) A. OSPF B. RIPv2 C. 802.1q D. Spanning tree E. 802.1d F. QoS

NTP

Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server? A. RTP B. NTP C. TFTP D. ARP

IPSec

Which of the following protocols would be MOST likely found to be running on a device in a SOHO environment? A. BGP B. SONET C. IPSec D. OSPF

SMTP

Which of the following protocols would be used to send email to an email server? A. NTP B. FTP C. SNMP D. SMTP

SSH

Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session? A. SCP B. SNMPv3 C. SSL D. SSH

TACACS+

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption? A. Multifactor authentication B. ISAKMP C. TACACS+ D. Network access control

Anti-spam

Which of the following provides the MOST protection against zero day attacks via email attachments? A. Anti-spam B. Anti-virus C. Host-based firewalls D. Patch management

IPSec

Which of the following provides the STRONGEST security for a tunneled connection over the Internet? A. RDP B. SMTP C. RAS D. IPSec

SSL VPN

Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software? A. RDP B. SSL VPN C. ISAKMP D. TLS 2.0

CAN

Which of the following refers to a network that spans several buildings that are within walking distance of each other? A. CAN B. WAN C. PAN D. MAN

SSH

Which of the following remote access protocols is commonly used for command line access to a device? A. RAS B. VPN C. RDP D. SSH

Quality of Service

Which of the following requires congestion to occur before enabling traffic prioritization? A. Quality of Service B. IGMP snooping C. Flow control D. WAN optimization

A minor release upgrade of a production router.

Which of the following requires the network administrator to schedule a maintenance window? A. When a company-wide email notification must be sent. B. A minor release upgrade of a production router. C. When the network administrator's laptop must be rebooted. D. A major release upgrade of a core switch in a test lab.

Cable

Which of the following residential Internet medias would employ the DOCSIS standard? A. Fiber B. DSL C. Cable D. 3G/LTE E. Cellular

EIGRP

Which of the following routing protocols can be utilized as both an IGP and EGP? A. EIGRP B. RIP C. IGRP D. RIPv2

RIP

Which of the following routing protocols relies on hop count as its ONLY metric? A. BGP B. EIGRP C. OSPF D. RIP

Signature based IDS

Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network? A. Host based IPS B. Network based firewall C. Signature based IDS D. Behavior based IPS

TLS 1.2

Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication? A. TLS 1.2 B. SNMPv3 C. WPA2 D. SMTP

Phishing

Which of the following security threats relies primarily on user deception and misinformation? A. Rogue access points B. DoS attacks C. Man-in-the-middle attacks D. Phishing

Router

Which of the following separates broadcast domains? A. Port mirroring B. Router C. Convergence D. Switch

FTP and basic Internet traffic

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router? A. FTP and basic Internet traffic B. HTTPS and IMAP traffic C. DNS and TELNET traffic D. VPN and RDP traffic

QoS

Which of the following should be implemented in a networked environment carrying teleconferencing packets? A. L2TP B. SSH C. QoS D. SNMP

Reservation

Which of the following should be used to ensure a specific device always receives the same IP address? A. IP helper B. Reservation C. Address lease D. DHCP scope E. DHCP relay

Implicit deny

Which of the following should the last line of an ACL normally contain? A. Explicit allow B. Statically routed C. Random access D. Implicit deny

IPS

Which of the following solutions will detect and disable a rogue access point? A. Port scan B. Packet sniffer C. IPS D. IDS

802.1x

Which of the following specifications would Sara, an administrator, implement as a network access control? A. 802.1q B. 802.3 C. 802.11n D. 802.1x

110 block

Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector? A. BNC connection B. 110 block C. Plenum D. LC connector

802.11n

Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

255.255.255.0

Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.254

255.255.255.0

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.248

-a

Which of the following switches is used with ARP to display the cache entry for a specific IP address? A. -a B. -d C. -g D. -s

Spanning Tree

Which of the following technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port Mirroring D. Spanning Tree

MIMO

Which of the following technologies allows more than two transceivers with an access point? A. MIMO B. FIFO C. 802.1x D. WPA

QoS

Which of the following technologies could be implemented to improve call clarity when using VoIP technology? A. Static IP addressing B. Caching engines C. QoS D. Port forwarding

802.11a

Which of the following technologies has more non-overlapping channels to utilize in a wireless LAN? A. 802.11a B. 802.11b C. 802.11i D. Bluetooth

High availability

Which of the following technologies is designed to keep systems uptime running in the event of a disaster? A. High availability B. Load balancing C. Quality of service D. Caching engines

NAT

Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP? A. NAT B. RIP C. PAT D. ACL

CDMA

Which of the following technologies is used on cellular networks? A. Ethernet B. CDMA C. CSMA/CA D. POTS

CSMA/CA

Which of the following technologies prevents network collisions to maximize safe delivery of network data? A. CSMA/CA B. DWDM C. RADIUS D. SONET

Toner

Which of the following tools allows an administrator to identify a cable? A. Multimeter B. Cable stripper C. Toner D. Punch down tool

Protocol analyzer

Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine a connection problem within a subnet? A. Wire mapper B. Protocol analyzer C. Cable tester D. SYSLOG server

NMAP

Which of the following tools will scan a network for hosts and provide information on the installed operating system? A. DOCSIS B. NMAP C. IMAP D. BERT

Cable tester

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated? A. Cable tester B. Punch down tool C. Crimper D. Multimeter

Cable tester

Which of the following tools would a technician use to determine if a CAT6 patch cable has an open or short? A. OTDR B. Cable tester C. Toner probe D. Protocol analyzer

Broadcast

Which of the following transmission methods do DHCP enabled devices use to request an IP address? A. Broadcast B. Directed broadcast C. Unicast D. Multicast

MAC

Which of the following transmission methods is used for network utilizing the 802.3 standard? A. MAC B. Synchronous C. DSSS D. Broadband E. Baseband

Straight-through cable

Which of the following types of cables would be used to connect a hub to a patch panel? A. Straight-through cable B. Crossover cable C. T1 Crossover cable D. Rollover cable

2/4 post racks

Which of the following types of equipment should be used for telecommunications equipment and have an open design? A. 2/4 post racks B. Rail Racks C. Vertical frame D. Ladder racks

Guest network

Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers? A. Quarantine network B. Core network C. Guest network D. Wireless network

10GBaseSR

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network? A. 10GBaseER B. 10GBaseSR C. 10GBaseTX D. 10GBaseT

IPv6

Which of the following uses a 128-bit addressing scheme? A. MAC B. DHCP C. IPv4 D. IPv6

PKI

Which of the following uses certificates as a form of security? A. Kerberos B. LDAP C. PKI D. CHAP

IPv6

Which of the following uses eight groups of characters for addressing? A. MAC B. IPv4 C. IPv6 D. DHCP

DNS

Which of the following uses port 53 by default? A. RDP B. QoS C. DHCP D. DNS

ICMP

Which of the following uses types and codes rather than ports? A. EIGRP B. ICMP C. UDP D. IPv6

tracert

Which of the following utilities would a technician use to determine the location of lost packets on a routed network? A. ping B. nslookup C. route D. tracert

Channel bonding

Which of the following will allow multiple frequencies to be combined? A. WiMAX B. MPLS C. MIMO D. Channel bonding

CSMA/CD

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments? A. CSMA/CD B. OSPF C. DOCSIS D. BGP

STP

Which of the following will prevent switching loops by selectively shutting down switch ports? A. RIP B. IGP C. STP D. VLAN

Channel

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed? A. Encryption type B. SSID C. IP address D. Channel

Bluetooth

Which of the following wireless standards has a MAXIMUM speed of only 1Mbps? A. IrDA B. 802.11b C. Bluetooth D. 802.11g

802.11b

Which of the following wireless standards has a maximum rate of less than 50 Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

802.11a

Which of the following wireless standards is capable of ONLY operating on 5.8GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

N

Which of the following wireless standards is the only one capable of operating in either of the 802.11 wireless spectrums? A. A B. B C. G D. N

Patch Panel

Which of the following wiring components is used as a central point of termination for all network jacks through a building area? A. Demarc B. CSU C. Patch Panel D. Smart Jack

MDF

Which of the following wiring distribution is used to connect wiring from equipment inside a company to carrier cabling outside a building? A. 66 block B. IDF C. MDF D. Patch panel

Enable an SNMP agent

Which of the following would Kim, a technician, do to monitor remote traffic through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2

MDF/IDFs

Which of the following would Sandy, a technician, find in a network map? A. QoS standards B. MDF/IDFs C. System logs D. Firewall rules

Nessus

Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company's network? A. IDS B. Nessus C. NMAP D. Firewall

PKI

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates? A. PKI B. Kerberos C. TACACS+ D. RADIUS

Reservation

Which of the following would allow for a specific device to receive the same IP address from a DHCP server? A. Scope B. Reservation C. Suffix D. Lease

192.168.50.125

Which of the following would be considered a Class C private address? A. 10.0.0.125 B. 192.168.50.125 C. 192.169.0.132 D. 255.255.255.0

Copper wire connecting the main PSTN point of entry to a wall data outlet

Which of the following would be considered a Demarc extension? A. A patch cable connecting a cable modem with a wireless router B. Patch panel wiring C. Punch down block wiring D. Copper wire connecting the main PSTN point of entry to a wall data outlet

Hot sites or cold sites

Which of the following would be the BEST addition to a business continuity plan that would protect business from a catastrophic event such as a fire, tornado, or earthquake? A. UPS and battery backups B. Fire suppression systems C. Building generator D. Hot sites or cold sites E. NAS and tape backups

The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting? A. The VoIP phone would request a new phone number from the unified communications server. B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls. D. The VoIP phone would request a different configuration from the unified communications server.

Stateful inspection

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections? A. Access control lists B. Port address translation C. Blocking unauthorized ports D. Stateful inspection

Codec SIP

Which of the following would be used in an IP-based video conferencing deployment? (Select TWO). A. RS-232 B. 56k modem C. Bluetooth D. Codec E. SIP

CARP

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable? A. QoS B. CARP C. VLAN D. DHCP server

DMZ

Which of the following would be used to place extranet servers in a separate subnet for security purposes? A. VPN B. NAT C. DMZ D. IDS

802.11g

Which wireless standard works at a MAXIMUM data rate of up to 54Mbps? A. 802.11b B. 802.11g C. 802.11n D. 802.1q

Antenna

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues? A. UTP patch cables B. Antenna C. Power adapter D. Security standard

Network baseline

While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. Which of the following should the technician use to verify if this is a concern? A. Log management B. Network diagram C. Network baseline D. Real time monitor

DHCP server

While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem? A. Default gateway address B. Misconfigured DNS C. DHCP server D. NIC failure

Bend radius exceeded

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? A. Maximum cable length exceeded B. Dirty connectors C. RF interference caused by impedance mismatch D. Bend radius exceeded

DNS server

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. Which of the following servers is MOST likely down? A. WINS server B. Domain controller C. DHCP server D. DNS server

Block traffic from the wireless access point

Your company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A. Content filtering on the wireless access point B. Allow traffic from the wireless access point C. Block traffic from the wireless access point D. Packet filtering on the wireless access point

PoE and QoS

Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support? A. PoE and QoS B. LACP and OSPF C. 802.1x and 802.11n D. NAT and VTP

IP address and SNMP configuration

Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters? A. PoE settings and VTP configuration B. SNMP configuration only C. IP address and SNMP configuration D. QoS and PoE settings

IP address on the native VLAN interface

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured? A. IP address on the native VLAN interface B. Port security C. Port forwarding D. IP address on the fiber interface

The cable is not a crossover.

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause? A. Both T568A and T568B standards are being used. B. STP is disabled. C. The cable is not a crossover. D. The port is not trunked.

Cable tester

Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this? A. Cable tester B. Toner probe C. OTDR D. Loopback plug

SSID

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name? A. Channel B. WEP C. SSID D. WPA

Punch down

Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use? A. Toner probe B. Punch down C. Wire tester D. Crimper

Syslog

Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem? A. Network map B. Environmental monitor C. Placement map D. Syslog

Loopback plug

Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A. Loopback plug B. Protocol analyzer C. Smart jack D. Coupler

sim question

add this to the sim document

lab sim

add to the sim document

Simulation placeholder

see simulations document question 1

Simulation placeholder

see simulations document question 2

Simulation placeholder

see simulations document question 3

Simulation placeholder

see simulations document question 4

Simulation placeholder

see simulations document question 5

Simulation placeholder

see simulations document question 6

Simulation placeholder

see simulations document question 7

Simulation placeholder

see simulations document question 8


Related study sets

Chapter 5 strategic management smartbook

View Set

BIOL1108 Sapling Learning Unit 2, Unit 8 and 9

View Set