Network +

Ace your homework & exams now with Quizwiz!

Which of the following DNS records is used in conjunction with 192:168::1:10? A. AAAA B.MX C.TXT D. PTR

A. AAAA

A technician has resolved a ticket to fix a user's printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST? A. Document findings and outcomes B. Establish a theory of probably cause C. Upgrade the printer drivers D. Close out the service ticket

A. Document findings and outcomes

Which of the following routing protocols utilizes the DUAL algorithm for determining best path? A. EIGRP B. RIPv2 C. OSPF D. RIP

A. EIGRP

Which of the following OSI model layers is used to order packets which may have arrived out of order? A. Transport B. Presentation C. Network D. Session

A. Transport

Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification? A. ping B. netstat C. route D. arp

A. ping Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO). A.172.16.0.255 B. 172.16.0.0 C. 172.16.1.1 D. 172.16.8.0 E. 172.16.256.255

A.172.16.0.255 C. 172.16.1.1

Which of the following would be considered a Class C private address? A. 10.0.0.125 B. 192.168.50.125 C. 192.169.0.132 D. 255.255.255.0

B. 192.168.50.125

Which of the following uses classless subnet masks across a network? A. Subnetting B. CIDR C. Supernetting D. Summarization

B. CIDR

A multi-layer switch operates at which of the following OSI layers? A. Layers 1 and 5 B. Layers 2 and 3 C.Layers 4 and 5 D.Layers 5 and 6

B. Layers 2 and 3

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step? A. Identify the problem B. Question the user C. Establish a plan of action D. Establish a theory of probable cause

C. Establish a plan of action

A company has one public IP address, and only one device needs to be able to connect to the Internet at a time. Which of the following is the BEST option for connectivity? A.VLSM B. CIDR C. NAT D. PAT

C. NAT

Which of the following uses a 128-bit addressing scheme? A. MAC B. DHCP C. IPv4 D. IPv6

D. IPv6

Which of the following has the LEAST amount of collisions in a domain? A. Bridge B. Hub C. Repeater D. Switch

D. Switch

Which of the following is a common physical network topology? A. Cross-over B. Loopback C. Star D. Straight

Star

Which of the following is a Class A IP address? A. 10.4.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 254.200.0.1

A. 10.4.0.1

Which of the following is the FASTEST Ethernet technology? A. 10GBaseSR B. 10BaseT C. 100BaseFX D. 1000BaseT

A. 10GBaseSR 10GBASE-SR ("short range") is a port type for multi-mode fiber and uses 850 nm lasers. Its Physical Coding Sublayer 64b/66b PCS is defined in IEEE 802.3 Clause 49 and its Physical Medium Dependent PMD in Clause 52. It delivers serialized data at a line rate of 10.3125 Gbit/s.

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port? A. 123 B. 143 C. 153 D. 163

A. 123

Which of the following TCP ports are used by FTP? (Select TWO). A. 20 B. 21 C. 22 D. 23 E. 25 F. 80

A. 20 B. 21

Which of the following port numbers needs to be open on a firewall to allow FTP traffic? A. 21 B. 22 C. 23 D. 25

A. 21

An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened? A. 25 B. 53 C. 110 D. 443

A. 25

192.168.0.7/8 notation denotes which of the following IPv4 subnet masks? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

A. 255.0.0.0

At which layer of the OSI and TCP/IP model would HTTP and FTP be found? A. Application B. Network C. Session D. Data Link

A. Application

Dynamic DNS provides which of the following services? A. Automatic registration of host records B. Translates public host names to private host names C. Provides round robin load balancing for web servers D. Provides aliases for additional search suffixes

A. Automatic registration of host records

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network? A. Closing off port 25 on the firewall B. Closing off port 53 on the firewall C. Turning off the SMTP service on the email server D. Turning off the IMAP service on the email server

A. Closing off port 25 on the firewall

Which of the following BEST describes the definition of DHCP? A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts.

A. DHCP is utilized to dynamically lease IP addresses to hosts.

Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released? A. DHCP lease B. DNS suffix C. Subnet mask D.DHCP reservation

A. DHCP lease By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid.

Which of the following network protocols is used to resolve FQDNs to IP addresses? A. DNS B. FTP C. DHCP D. APIPA

A. DNS An Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4

At which layer of the OSI model do MAC addresses operate? A. Data Link B. Network C. Application D. Physical

A. Data Link

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST? A. Determine if anything has changed B. Once a theory is confirmed determine the next step is to resolve the problem C. Implement the solution or escalate as necessary D. Question the obvious

A. Determine if anything has changed

Two workstations are unable to communicate on the network despite having known good cables. When one device is unplugged from the network the other device functions properly. Which of the following could be the cause of this failure? A. Duplicate IP address B. Incorrect subnet mask C. Incorrect gateway D. Wrong DNS

A. Duplicate IP address

Which of the following routing protocols can be utilized as both an IGP and EGP? A. EIGRP B. RIP C. IGRP D. RIPv2

A. EIGRP

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT? A. Escalate the problem B. Identify potential effects C. Test the theory to determine cause D. Establish a plan of action to resolve the problem

A. Escalate the problem

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router? A. FTP and basic Internet traffic B. HTTPS and IMAP traffic C. DNS and TELNET traffic D.VPN and RDP traffic

A. FTP and basic Internet traffic

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols? A. HTTPS B. POP3 C. SSH D. SMTP

A. HTTPS

Which of the following is considered a routing metric? A. Hop count B. QoS C. Subnet size D. IP address

A. Hop count

Which of the following protocols is the BEST choice for retrieving email on multiple devices? A. IMAP4 B. SMTP C. FTP D. SNMPv3

A. IMAP4

While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate? A. It is the default route. B. This is the address for the DHCP server. C. The PC has not been assigned an IP address. D. The firewall is down.

A. It is the default route.

Which of the following protocols works at the LOWEST layer of the OSI model? A. L2TP B. PPTP C. ISAKMP D. IPSec

A. L2TP Explanation: Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet.

A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following? A. Latency B. Attenuation C. Crosstalk D. Frequency hopping

A. Latency during the high ping time users are using most of the bandwidth that causes latency so signal strength get affected by this.

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring? A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7

A. Layer 1

The components of a NIC function at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5

A. Layer 1 B. Layer 2

Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents? A. Logical network diagrams B. Physical network diagrams C. Wiring schematics D.Group security role assignments

A. Logical network diagrams

Which of the following operate at the Data Link layer of the OSI model? (Select TWO). A. MAC address B. Router C. Hub D. Switch E. IP address

A. MAC address D. Switch

Which of the following protocols is used to send time synchronization updates on a given network? A. NTP B. POP3 C. DNS D. IMAP

A. NTP

At which of the following layers of the OSI model do packets exist? A. Network B. Session C. Data Link D. Transport

A. Network

At which layer of the TCP/IP model would cabling exist? A. Network Interface B. Internet C. Application D. Transport

A. Network Interface

At which of the following layers do frames exist? (Select TWO). A. OSI model Data link layer B. TCP/IP model Network Interface layer C. OSI model Physical layer D. OSI model Network layer E. TCP/IP model Internet layer

A. OSI model Data link layer B. TCP/IP model Network Interface layer

If a NIC does not have a link light, there is a failure at which of the following OSI layers? A. Physical B. Session C. Data link D. Presentation

A. Physical

Standards such as JPEG and ASCII operate at which of the following OSI model layers? A. Presentation B. Data link C. Session D. Application

A. Presentation

Which of the following protocols uses port 3389 by default? A. RDP B. TFTP C. IMAP D. DNS

A. RDP

An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection? A. RDP B. RTP C. RIP D. RAS

A. RDP Explanation: Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.

Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options

A. Reservations Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured.

Which of the following differentiates a layer 3 switch from a layer 2 switch? A. Routing B. Bridging C.Switching D.Repeating

A. Routing

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used? A. SNMPv3 B. FTP C. TFTP D.Telnet

A. SNMPv3

Which of the following can function in an unsecure mode? A. SNMPv3 B. SSH C. SSL D. SCP

A. SNMPv3

Which of the following protocols could the below packet capture be from? Port: 161 msgVersion: <masked> msgUsername: <masked> msgAuthenticationParameters: <masked> msgPrivacyParameters: <masked> msgData: data: get-request request-iD. <masked> error-status: noError (0) error-index: 0 variable-bindings: 0 items A. SNMPv3 B. SSH C. HTTP D. SNMPv1

A. SNMPv3

In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented? A. Scope options B. Leases C. Reservations D. DNS suffixes

A. Scope options

Which of the following protocols is used to detect and eliminate switching loops within a network? A. Spanning Tree Protocol B. EIGRP C. OSPF D. Dynamic routing

A. Spanning Tree Protocol

Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports? A. Switch B. Hub C. Router D. Repeater

A. Switch

Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO). A. Switch B. Cable C. Repeater D. Router E. Bridge F. Hub

A. Switch D. Router

Which of the following protocols does DNS utilize on port 53? A. TCP B. FTP C. RTP D. ICMP

A. TCP

Which of the following uses port 23 by default? A. TELNET B. IMAP C. FTP D. SNMP

A. TELNET

Which of the following TCP/IP model layers combines four OSI model layers? A.Application Layer B. Internet Layer C. Transport Layer D. Network Interface Layer

A.Application Layer

Which of the following is an advantage of dynamic routing? A.It can reroute connectivity in the event of failure. B.It is the simplest form of routing. C. The routes do not change. D. The setup and configuration are done manually.

A.It can reroute connectivity in the event of failure.

At which of the following layers of the OSI model is the Logical Link Control found? A.Layer 2 B.Layer 3 C. Layer 4 D. Layer 5

A.Layer 2

At which of the following layers do IP addresses exist? A.TCP/IP model Internet layer B.OSI model Data Link layer C. TCP/IP model Transport layer D. OSI model Physical layer

A.TCP/IP model Internet layer

A technician wants to separate networks on a switch. Which of the following should be configured to allow this? A.VLAN B. Trunking C. Spanning tree D. Traffic filtering

A.VLAN A VLAN is a group of end stations in a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment

Which of the following features can BEST be used to facilitate authorized remote access to a network? A.VPN concentrator B. Proxy server C. Content filter D. Load balancer

A.VPN concentrator

Which of the following would be used to run an instance of a Layer 2 device within an application? A.Virtual switch B.Virtual router C.Virtual PBX D. NaaS

A.Virtual switch

Hubs are differentiated from switches in that between the two, only hubs have: A.a single collision domain. B. a single broadcast domain. C. multiple collision domains. D. multiple broadcast domains.

A.a single collision domain.

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model? A. Transport B. Application C. Internet D. Network Interface

Application

Which of the following is the minimum subnet mask to allow 172.16.1.5 and 172.16.4.3 to be on the same subnet? A. /19 B. /21 C. /22 D. /24

B. /21

A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?

B. /27

Which of the following IP address/CIDR combinations represent public address space? (Select TWO). A. 10.1.1.1/8 B. 172.15.1.1/16 C. 172.16.1.1/16 D. 172.31.1.1/16 E. 193.168.2.1/24 F. 224.0.0.1/32

B. 172.15.1.1/16 E. 193.168.2.1/24

Which of the following is a public class C IP address? A. 4.2.2.2 B. 194.178.12.54 C. 175.35.46.60 D. 192.168.1.34

B. 194.178.12.54

Which of the following ports is used by Telnet? A. 21 B. 23 C. 80 D. 143

B. 23

Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet? A. 250 B. 254 C. 255 D. 256

B. 254 The Subnet Mask however, determines the "class" of a Network. 255.255.255.0 is a "Class C" network.A class c network can host up to 254 pc's

A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements? A. A firewall B. A router C. A hub D.A Layer 2 switch

B. A router

Which of the following protocols resolves IP addresses to MAC addresses? A. DNS B. ARP C. RARP D. NTP

B. ARP /Reference: Explanation: ARP is used to convert an IP address to a physical address such as an Ethernet address. ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). IPv4 over IEEE 802.3 and IEEE 802.11 is the most common case.

Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected.

B. An incorrect subnet mask has been entered in the WAP configuration. Due to wrong subnet entered user is unable to communicate with anyone so to communicate he needs to be in right subnet.

The APIPA address 169.254.10.123 falls into which of the following class of addresses? A. A B. B C. C D. D

B. B

A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer's IP addresses: 192.168.2.70 192.168.2.100 192.168.2.125 192.168.2.130 When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do A. Change the IP of 192.168.2.130 to 192.168.1.128. B. Change the IP of 192.168.2.130 to 192.168.2.126. C. Change the default gateway of 192.168.2.130 accordingly. D. Reconfigure the switch for the right VLAN

B. Change the IP of 192.168.2.130 to 192.168.2.126.

A MAC address is a part of which of the following OSI model layers? A. Network B. Data Link C. Physical D. Transport

B. Data Link

On which of the following OSI model layers would a MAC address be used? A. Network B. Data Link C. Transport D. Physical

B. Data Link The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

Which of the following OSI model layers is used to frame packets that are sent over a medium? A. Session B. Data link C. Physical D. Transport

B. Data link

The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this? A. Allow VLAN routing B. Enable packet filtering on the switch C. Allow remote administration of the switch D. Enable MAC filtering on the switch

B. Enable packet filtering on the switch

Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time? A. Burst-frame B. Full-duplex C. Half-duplex D.VoIP

B. Full-duplex

Which of the following uses types and codes rather than ports? A. EIGRP B. ICMP C. UDP D. IPv6

B. ICMP

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows: IP address: 192.168.0.124 Subnet Mask: 255.255.255.128 Default Gateway: 192.168.0.254 Which is MOST likely preventing the user from accessing the Internet? A. Duplicate IP address B. Incorrect gateway C. Incorrect VLAN D.Bad switch port

B. Incorrect gateway We usually give default gateway as an end device which is directly connected with ISP so in this case user has lost his connectivity with due to wrong default gateway configured.

Which of the following describes the amount of time it takes for a packet to transmit from one switch to another? A. Hop count B. Latency C. MTU limit D. Distance vector

B. Latency

Frame relay occurs at which of the following layers of the OSI model? A.Layer 1 B. Layer 2 C. Layer 4 D. Layer 6

B. Layer 2

The MAC address of a network device is used to communicate at which of the following OSI layers? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 5

B. Layer 2

A router operates at which of the following layers of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5

B. Layer 3

A customer has requested that a new piece of network equipment be installed so that the customer can have multiple subnets for each department, but allow network traffic from each department to reach one another without the use of a router. Which of the following network devices would satisfy this customer's requirements? A. Packet filter B. Layer 3 switch C. Stateful firewall D. Wireless bridge

B. Layer 3 switch

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? A.VLAN B. MPLS C.VPN D. PSTN

B. MPLS

A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist? A. Data link B. Network C. Session D. Physical

B. Network

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO). A. Application B. Physical C. Presentation D. Transport E. Data Link F. Network

B. Physical E. Data Link

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective? A. Content filtering B. Port filtering C. MAC filtering D.IP filtering

B. Port filtering TCP/IP port filtering is the practice of selectively enabling or disabling Transmission Control Protocol (TCP) ports and User Datagram Protocol (UDP) ports on computers or network devices. When used in conjunction with other security practices, such as deploying firewall software at your Internet access point, applying port filters to intranet and Internet servers insulates those servers from many TCP/IP-based security attacks, including internal attacks by malicious users.

When a loop occurs, which of the following STP components determines which port to disable? A. Convergence B. Root bridge C. BPDU guard D. MAC address

B. Root bridge

Which of the following DHCP properties defines the size of the pool of available IP addresses? A. Options B. Scope C. Leases D. Reservations

B. Scope Explanation: A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service.

A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task? A. Media convertor B. Switch C. Firewall D. Bridge

B. Switch They connect multiple PCs, printers, servers and other hardware. Switches allow you to send information, such as email, and access shared resources, including printers, in a smooth, efficient, and transparent manner.

An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO). A. TCP 23 B. TCP 53 C. TCP 123 D. UDP 23 E. UDP 53 F. UDP 123

B. TCP 53 E. UDP 53

Which of the following is the definition of a DNS server? A. Hosts proprietary business applications B. Translates FQDN's to IP addresses C. Provides network IDS/IPS security D. Assigns IP addresses to network devices

B. Translates FQDN's to IP addresses

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO). A. UDP 53 B. UDP 67 C. UDP 68 D. TCP 53 E. TCP 67 F. TCP 68

B. UDP 67 C. UDP 68

A computer's DNS has bad cach records.which tools can be used to clear the DNS record. A. netstat B. ipconfig C. nslookup D. tracert

B. ipconfig

Which of the following commands displays the routing table on a server or workstation? A. nbtstat B. route C. traceroute D. nmap

B. route The route command allows you to make manual entries into the network routing tables. The route command distinguishes between routes to hosts ...

The BEST way to determine the next hop of a packet is to check the: A. link state. B. routing table. C. routing metrics. D. convergence.

B. routing table.

Which of the following is used to register and resolve IP addresses with their plain language equivalents? A. Proxy server B.DNS server C.Brouter equipment D. DHCP server

B.DNS server

A user arrives at a new house and the Internet provider states the connection will run through the cable. If the user wants to install multiple PCs, which of the following will the user need in order to establish a connection? (Select TWO). A.VPN B.Router C. T1 card D. WEP E. Modem

B.Router E.Modem

Which of the following protocols is MOST commonly used for the transfer of router configuration files? A. SSL B.TFTP C.DNS D. IMAP

B.TFTP Trivial File Transfer Protocol (TFTP) is a file transfer protocol notable for its simplicity. It is generally used for automated transfer of configuration or boot files between machines in a local environment. Compared to FTP, TFTP is extremely limited, providing no authentication, and is rarely used interactively by a user.

Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443

C. 143

Which of the following ports does IMAP use by default? A. 110 B. 123 C. 143 D. 443

C. 143

Which of the following port numbers is used for SNMP? A. 61 B. 151 C. 161 D. 1611

C. 161

Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO). A. 200.200.100.0/28 B. 200.200.100.32/27 C. 200.200.100.63/27 D. 200.200.100.79/27 E. 200.200.100.95/27 F. 200.200.100.254/30

C. 200.200.100.63/27 E. 200.200.100.95/27 broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address is typically received by all network-attached hosts, rather than by a specific host. ReferencE. http://www.wikihow.com/Calculate-Network-and-Broadcast-Address

Which of the following subnet masks indicate a subnet with exactly 254 assignable IP addresses? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.254

C. 255.255.255.0

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server? A. 80 B. 445 C. 3000 D. 3389

C. 3000

Users report that they are unable to access the production server with IP address 192.168.30.17. These users need to be provided access without changing any subnet to VLAN information. The VLANs configured on the network are listed below: Department VLAN # Subnet used Marketing 20 192.168.20.0/28 Customer Service 25 192.168.20.64/28 Finance 30 192.168.30.0/28 WHSE 35 192.168.30.16/28 Sales 40 192.168.3.16/28 The users experiencing this issue need to be added to which of the following VLANs? A. 25 B. 30 C. 35 D. 40

C. 35

DHCP uses which of the following ports by default? A. 21 B. 23 C. 68 D. 443

C. 68

Which of the following DNS records must be queried to resolve the IPv6 address of a website? A. CNAME B. PTR C. AAAA D. A

C. AAAA

203.50.5.0 is an example of which of the following network classes? A. Class A B. Class B C. Class C D. Class D

C. Class C

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO). A. Combined DNS and DHCP hosting B. Encryption C. Content filtering D. Fault tolerance E. Website caching

C. Content filtering E. Website caching

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances? A. RADIUS B. DNS C. DHCP D. IDS

C. DHCP

In which of the following layers of the OSI model would MAC addressing be found? A.Network B.Application C. Data Link D. Transport

C. Data Link The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address? A. Subnet B. IANA prefix C. EUI-64 D. Site-loca

C. EUI-64

Which of the following protocols is used to transfer files over the Internet? A. SNMP B. NTP C. FTP D. SIP

C. FTP

Which of the following is a link state routing protocol? A. RIPv2 B. BGP C. IS-IS D. RIP

C. IS-IS

Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues? A. Faulty cable B. Remote management disabled C. Improper VLAN assignment D. Mismatched duplex

C. Improper VLAN assignment Finance Server is placed in same VLAN which is assigned to finance users if they are able to access internet that's means connectivity to switch is good, so we have to check the VLAN assigned to users.

Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE? A. Layer 3 B. Layer 5 C. Layer 6 D. Layer 7

C. Layer 6

The TCP/IP application layer contains which of the following OSI layers? A. Layers 1, 5, 6, 7 B. Layers 4, 7 C. Layers 5, 6, 7 D. Layer 7

C. Layers 5, 6, 7

Which of the following DNS records is used to identify a domain's SMTP server? A. CNAME B. PTR C. MX D. A

C. MX A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

An IP address is encapsulated at which of the following layers of the OSI model? A. Transport B. Data link C. Network D. Application

C. Network

On which of the following layers of the OSI model does IP operate? A. Session B. Transport C. Network D.Data link

C. Network

Which of the following protocols exchange the latest information that has changed in the routing table? A. TFTP B. BGP C. OSPF D. IGMP

C. OSPF

A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? A.VLAN B. PoE C. PAT D.VPN

C. PAT Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO). A. TFTP B. SNMP C. POP3 D. IMAP4 E. SFTP

C. POP3 D. IMAP4

Which of the following is associated with DNS reverse lookup zones? A. CNAME B. TXT C. PTR D. MX

C. PTR

Which of the following records allows for reverse DNS lookups? A. AAAA B. A C. PTR D. CNAME

C. PTR

Which two layers of the OSI model make up the TCP/IP model Network Interface layer? A. Application and Transport B. Transport and Session C. Physical and Data Link D. Session and Presentation

C. Physical and Data Link

At which of the following layers of the OSI model does ASCII work? A. Session B. Transport C. Presentation D. Application

C. Presentation The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file.

Which of the following defines an IP address that is NOT routed on the Internet? A. Multicast B. Public C. Private D. Classful

C. Private

Assigning the same IP address to a network device is which of the following? A. SSID B. Scope C. Reservation D. Lease

C. Reservation

Which of the following can be configured on a managed network switch to send real time alerts to a technician? A. SSID B. SMTP C. SNMP D. Syslog

C. SNMP

Which of the following is MOST commonly implemented for remote access to UNIX systems? A. SSL B. RSH C. SSH D. RDP

C. SSH

Spanning-Tree Protocol is used with which of the following network devices? A. Router B. NIC C. Switch D. DHCP server

C. Switch Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network.

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO). A. IDS B. Repeater C. Switch D. WAP E. UTM device

C. Switch D. WAP

Which of the following contains the SYN and ACK flags? A. UDP header B. IP header C. TCP header D. ICMP header

C. TCP header

Which of the following is always true when a router selects a destination? A. The default gateway is selected over any other static or dynamic route. B. The shortest route is always selected. C. The most specific route is selected over the default gateway. D. A dynamic route is selected over a directly attached network.

C. The most specific route is selected over the default gateway.

A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue? A. The DHCP lease pool was not large enough B. DHCP lease times were set too low C. The router is not the only DHCP server D. DHCP was not enabled on the replacement router

C. The router is not the only DHCP server

Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party? A. Ping B. Protocol analyzer C. Tracert D. Dig

C. Tracert Tracet command will tell the administrator which route is not present or which is present so he will come to know whether he has appropriate route or not.

A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? A. SSID name B. WAP encryption strength C. WAP radio power D. Channel overlay

C. WAP radio power Explanation: WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power.

Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer? A. 2 B.3 C.4 D. 5

C.4

Which of the following TCP/IP model layers does the OSI model Presentation layer map to? A. Transport B.Internet C.Application D. Network Interface

C.Application The Application layer provides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed.

Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut? A. Mesh B. Ring C.Bus D.Star

C.Bus

Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols? A. DNS B.DOS C.DHCP D. DSL

C.DHCP

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks? A. RIP B. STP C.VLAN D. MTU

C.VLAN

A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic? A. Duplex settings B. SNMP string C.VLAN assignments D. Spanning tree

C.VLAN assignments A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment.

Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A. 10GBaseLR B. 100BaseFX C. 100BaseTX D. 1000BaseX

D. 1000BaseX 1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error-correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media.

The protocol SNMP uses which of the following ports by default? A. 53 B. 61 C. 67 D. 161

D. 161

Which of the following addresses is a class B private address? A. 132.216.14.184 B.152.119.25.213 C.162.17.43.22 D. 172.23.226.34

D. 172.23.226.34

Which of the following is an example of a Class C address? A. 10.19.0.79 B. 127.34.8.197 C. 176.96.1.222 D. 192.168.1.105

D. 192.168.1.105

The term virtual switch refers to which of the following? A. A switch that has not yet been implemented in the local network B. Migrating an entire environment to virtualization C. A computer component that controls environmental elements, such as lights and thermometers D. A logical, rather than a physical switch device

D. 802.1q

Which IEEE protocol is used with VLAN technology? A. 802.11a B. 802.11b C. 802.1m D. 802.1q

D. 802.1q

Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF? A. Unicast MAC address. B. Invalid MAC address. C. Multicast MAC address. D. Broadcast MAC address.

D. Broadcast MAC address.

A user is unable to access any network resources. The IP configuration of the workstation is as follows: IP Address: 192.168.10.32 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.10.46 Which of the following would allow the user to connect to network resources? A. Change the default gateway to 192.168.10.1 B. Change the default gateway to 192.168.10.254 C. Change the IP address to 192.168.10.31 D. Change the IP address to 192.168.10.33

D. Change the IP address to 192.168.10.33 The given ip address is network id which we don't assign to the host so the next ip is applicable to this.

The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem? A. Clear the ARP table B. Add host entries on the user's computer C. Configure 802.1x trunks on the switches D. Configure 802.1q trunks on the switches

D. Configure 802.1q trunks on the switches

Based on the packet capture below, which of the following services is the client requesting? 08:30:54.982378 192.168.50.42.8329 > 192.168.50.20.53: S 32859235:32859235(0) win 8096 08:30:55.001378 192.168.50.20.53 > 192.168.50.42.8329: S 31845637: 31845637(0) ack 32859236 win 8096 08:30:55.027578 192.168.50.42.8329 > 192.168.50.51.53: ack 1 win 8096 A. ARP B. SMTP C. DHCP D. DNS

D. DNS

Companies trying to cut down on constant documentation of IP addresses could use which of the following? A. Longer lease times B. More reservations C. Larger scopes D. Dynamic IP addressing

D. Dynamic IP addressing Explanation: In Dynamic IP addressing all the hosts with private ip address will be patted to the same ip so the administrator will not have to keep track of each and every host with private ip mapped to a static public ip address

Which of the following is the unit used to transfer information at Layer 2 of the OSI model? A. Packet B. Socket C. Session D. Frame

D. Frame

Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO). A. Hub B. Switch C. MAC address D. IP address E. Router

D. IP address E. Router

The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following? A. APIPA B. MAC C. IPv4 D. IPv6

D. IPv6

The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model? A.Layer 2 B. Layer 5 C. Layer 6 D. Layer 7

D. Layer 7

Which of the following OSI layers allows users to access network services such as file sharing? A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7

D. Layer 7

Which of the following protocols are used to provide accurate time to network devices? A. SMTP B. FTP C. TLS D. NTP

D. NTP

Which of the following TCP/IP model layers does the OSI model Data Link layer map to? A. Application B. Transport C. Internet D. Network Interface

D. Network Interface

Which of the following exist at layer three of the OSI model? (Select TWO). A. NIC B. Switch C. Frame D. Packet E. Router F. Cable

D. Packet E. Router

The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO). A. Network B. Session C. Transport D. Physical E. Data link

D. Physical E. Data link The network layer is responsible for packet forwarding including routing through intermediate routers, whereas the data link layer is responsible for media access control, flow control and error checking.

Which of the following correctly lists the layers of the OSI model starting at Layer 1? A. Data Link, Physical, Network, Transport, Presentation, Session, Application. B. Physical, Data Link, Network, Transport, Presentation, Session, Application. C. Physical, Data Link, Transport, Network, Session, Presentation, Application. D. Physical, Data Link, Network, Transport, Session, Presentation, Application.

D. Physical, Data Link, Network, Transport, Session, Presentation, Application.

Which of the following protocols is used by Windows to securely access a remote computer? A. RAS B. Telnet C. PPP D. RDP

D. RDP

Which of the following uses distance vector algorithms to determine the BEST network route to a destination address? A. IS-IS B. OSPF C. BGP D. RIP

D. RIP

Which of the following network protocols is used to transport email between servers? A. IMAP4 B. POP3 C. SNMP D. SMTP

D. SMTP While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using? A. Telnet B. RADIUS C. SSH D. SNMP

D. SNMP

Which of the following network protocols would be used to transmit traps across a network to a log server? A. SMTP B. PPPoE C. POP3 D. SNMP

D. SNMP

Which of the following provides secure access to a network device? A. SNMPv2 B. FTP C. RSH D. SSH

D. SSH

Which of the following remote access protocols is commonly used for command line access to a device? A. RAS B.VPN C. RDP D. SSH

D. SSH

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem? A.Default gateway B.Duplicate IP address C. Wrong DNS D. Subnet mask

D. Subnet mask

A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments? A. The newly installed switch is defective and must be returned. B. The newly installed switch is using a different MAC address than the previous switch. C. The technician forgot to change the VTP mode on the new switch to server. D. The technician did not use the correct cable when trunking the new switch.

D. The technician did not use the correct cable when trunking the new switch.

Which of the following protocols occurs at Layer 4 of the OSI model? A. ISDN B. IPX C. GRE D. UDP

D. UDP

The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO). A. Transport layer B. Network layer C.Session layer D.Physical layer E. Presentation layer F. Data link layer

D.Physical layer F. Data link layer

Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?

D.The administrator should create exclusions for the servers IP addresses.

Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue? A. Faulty GBIC B. Faulty SFP C. Cable is a crossover D.VLAN mismatch

D.VLAN mismatch As user has link light on NIC that means he has connectivity with switch so he need to check his vlan assignment.

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used? A.Virtual switch B.Virtual server C.Virtual desktop D.Virtual PBX

D.Virtual PBX

Which of the following is a path vector routing protocol? A. RIP B. EIGRP C. ISIS D. OSPF E. BGP

E. BGP

Which of the following are considered unsecure access methods? (Select TWO). A. FTP B. IPSec C. RCP D. SCP E. SFTP

FTP RCP

Using source port numbers as a way to keep track of connections is a characteristic of which of the following protocols? A. TCP B. UDP C. NAT D. PAT

PAT

Which of the following dynamic routing protocols selects routing paths based upon hop count? A. BGP B. RIP C. OSPF D. IGRP

RIP

An advertised route learned from one protocol over a different protocol is called: A. Co-location B. Reallocation C. Redundancy D. Redistribution

Redistribution

Which of the following network protocols is used to transport email across the Internet? A. NTP B. SSH C. SMTP D. SNMP

SMTP

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO). A. Data Link B. Transport C. Network D. Session E. Presentation

Session E. Presentation

A network where all traffic feeds through a centralized gateway uses which of the following topologies? A. Peer-to-peer B. Ring C. Bus D. Star

Star

A small company has a single multi-layer switch. The company currently has all network devices on the same subnet but would like to switch the servers to another subnet for security reasons. The company cannot budget any more money to purchase additional hardware. Which of the following features should be used to achieve the new company requirements? A. PAT B. PoE C.VLAN D. QoS

VLAN


Related study sets

Exam 2 : bacteria, replication, transcription, translation

View Set

WGU C955 - Module 1: Basic Numeracy & Calculation Skills

View Set

Pharmacology II: Gastrointestinal NCLEX

View Set

Human Motivation Chapter 8 Goal Setting

View Set

Ch. 31 Quiz - Environmental Emergencies AEMT

View Set