Term
2) Which networking topology connects computers using a central hub?
A) Bus
B) Ring
C) Star
D) Mesh |
|
Definition
|
|
Term
3) Which of the following network protocol does NOT function at the Transport layer of the OSI seven-layer model?
A) ICMP
B) TCP
C) UDP
D) IP |
|
Definition
|
|
Term
5) Of the following choices, which are legitimate MAC addresses? (Select Two)
A) 02:45:A2:96:DF45
B) FFFF.FFFF.FFFF
C) 00-2C-37-4A-C3-29-17
D) 00-49-3B-5B-D5-84-11
E) 0211:3H5B.64D5 |
|
Definition
|
|
Term
8) Which of the following networking topologies requires less hardware and cabling than the others?
A) Bus
B) Ring
C) Star
D) Mesh |
|
Definition
|
|
Term
9) Which layer of the OSI model includes HTTP?
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
E) Network Layer
F) Data Link Layer |
|
Definition
|
|
Term
10) A NIC creates ____ in the data link layer
A) Segments
B) Packets
C) Frames
D) Layers |
|
Definition
|
|
Term
11) Of the following OSI layers, which one converts the ones and zeros to electrical signals and places these signals on the cable?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
E) Session Layer
F) Presentation Layer |
|
Definition
|
|
Term
14) In a star topology
A) All systems connect to a central hub
B) All system connect to every other system
C) All systems connect to a single cable
D) All systems connect to a central ring |
|
Definition
|
|
Term
17) You are a network administrator and you want to create a MAN while having fault tolerance between all of the routers on your network. Which topology will work best for you?
A) Star
B) Bus
C) Ring
D) Mesh |
|
Definition
|
|
Term
18) Which OSI layer do routers function on?
A) Physical
B) Data Link
C) Network
D) Transport
E) Presentation
F) Application |
|
Definition
|
|
Term
19) How many fiber optic cables are needed by 100BaseFX?
A) 1
B) 2
C) 3
D) 4 |
|
Definition
|
|
Term
21) Which of the following statements best describes the ST and SC Connectors? (Select 2)
A) Threaded type connector for fiber optic cable
B) Twist on type connector for fiber optic cable
C) Push type connector for fiber optic cable
D) A serial port type connector for fiber optic cable |
|
Definition
|
|
Term
22) Every Ethernet NIC card has a unique number assigned to it. What is that number called?
A) Node address
B) Invoice address
C) IP address
D) MAC Address |
|
Definition
|
|
Term
23) Which layer of the OSI seven-layer model handles data formatting?
A) Physical
B) Transport
C) Data link
D) Application
E) Presentation
F) Network |
|
Definition
|
|
Term
28) A Mac address is known as a(n) ___address
a) IP
b) Logical
c) Physical
d) OEM |
|
Definition
|
|
Term
You are wanting to make a short straight-through cable to connect a router to a switch in your MDF. Your company uses the 568B wire pattern. Which color pairs will be crimped down on the outer pins of the rj-45 connector? (select two)
A) white/orange, orange
B) white/brown. brown
C) white/green. green
d) white blue/blue
e) white/green, blue
f) white orange, blue
|
|
Definition
|
|
Term
How many pairs of wires are used in a 1000Base T CAT 5e cable?
A) 1
B) 2
C) 4
D) Not enough information |
|
Definition
|
|
Term
A 10Base T node must be within how many meter of its hub?
A) 100
B) 185
C) 200
D) 2000 |
|
Definition
|
|
Term
Which networking technology used in LAN's is desribed as Fast Ethernet and uses two pairs of cabling for transmitting and receiving?
A) 100Base T4
B) 100Base TX
C) 100 Base FX
D) 1000 BaseT |
|
Definition
|
|
Term
Which of the following network technologies has the shortest maximum length?
A) 10Base FL
B) 10Base T
C) 10 Base 2
D)10 Base 5 |
|
Definition
|
|
Term
Which type of cable do you need to connect a client to a 100 Base TX Network?
A)STP
B) RG-58
C) Category 3 UTP
D) Category 5 UTP |
|
Definition
|
|
Term
Which cable type has a maximum length of 300 meters?
A) 10GBase SW
B) 100Base FX
C) 100 Base T
D) 10GBase T |
|
Definition
|
|
Term
You are using Gigabit Ethernet for the backbone of you LAN. Which of the following access methods does Gigabit Ethernet use?
A) CSMA/CD
B) Bonding
C) Broadcast
D) CSMA/CA
|
|
Definition
|
|
Term
You are wanting to make a short crossover cable to connect two switches in your IDF. You have just finished crimping down one end of the cable using the 568B wire pattern. Which color pairs will be crimped down on the outer pins of the RJ-45 connector on the other end of the cable?
A) white orange/orange
B) white brown/brown
C) White green/green
D) White blue/blue
E) white green/blue |
|
Definition
|
|
Term
You are about to install a switch in the communications closet when a fellow technician notices you using a crossover cable to hook the switch to the existing switch in the closet. He says you don't need the crossover cable. Why is that?
A) The switch has an MDIX port
B) The switch is has STP enabled
C) The switch uses CSMA/CD
D) The switch needs a plenum-grade cable |
|
Definition
|
|
Term
Which network technology is best defined as Fast Ethernet?
A) 10BaseFL
B) 100BaseT
C) 1000 Base SX
D) 1000 Base T
|
|
Definition
|
|
Term
You are setting up a static IP on a workstation on your network. Which of the following are valid numbers you can use for the subnet mask ? (Select 3)
A) 0
B) 1
C) 254
D) 255
E) 256
F) 253 |
|
Definition
|
|
Term
What begins an Ethernet frame?
A) MAC Address
B) Length
C) Preamble
D) CRC |
|
Definition
|
|
Term
What type of bus does 10 Base T use?
A) Bus
B) Ring
C) Star Bus
D) Bus Ring |
|
Definition
|
|
Term
When used for Ethernet, unshielded twisted pair uses what type of connection?
A) RG-58
B) RJ-45
C)RJ-11
D) DRS-232 |
|
Definition
|
|
Term
What is the maximum number of nodes that can be connected to a 10 BaseT Hub?
A) 1024
B) 500
C) 100
D) 185 |
|
Definition
|
|
Term
Which of the following is not true of crossover cables?
A) They are a type of twisted-pair cabling
B) They reverse the sending and receiving wire pairs
C) They are used to connect hubs
D) Both ends of a crossover cable are wired according to the TIA/EIA 568B standard |
|
Definition
|
|
Term
Which of the following connectors are used by 10Base FL cable? (Select two)
A) SC
B) RJ-45
C) RJ-11
D) ST |
|
Definition
|
|
Term
Which networking devices can use the Spanning Tree Protocol (STP)
A) Hubs
B) Media Converters
C) UTP Cables
D) Switches |
|
Definition
|
|
Term
What device directs packets based on MAC addresses?
A) Router
B) Hub
C) Bridge
D) Switch |
|
Definition
|
|
Term
With 100Base T, what is the maximum distance between the hub (or switch) and the node?
A) 1000 meters
B) 400 meters
C) 100 meters
D) 150 meters |
|
Definition
|
|
Term
What type of cable and connector does 100 Base FX use?
A) Multimode fiber with ST or SC connectors
B) STP CAT 6 with RJ-4 Connectors
C) Single-mode fiber with MT-RJ connectors
D) UTP Cat 5e with RJ-45 connectors
|
|
Definition
|
|
Term
How many pairs of wires do 10BaseT and 100Base T use?
A) 4
B) 1
C) 3
D) 2
|
|
Definition
|
|
Term
What is the biggest physical difference between 1000 Base SX and 100 Base FX?
A) 1000 BaseSX uses the SC connector exclusively
B) 1000 BaseSX is single-mode, whereas 100Base FX is multimode
C) 1000BaseSX uses the ST connector exclusively
D) There is no difference |
|
Definition
|
|
Term
What is the maximum distance for 1000Base LX without repeaters?
A) 1 mile
B) 2,500 meters
C) 20,000 feet
D) 5,000 meters |
|
Definition
|
|
Term
What is the big advantage to using fiber-optic cable?
A) Fiber is common glass; therefore, it's less expensive
B) Fiber is not affected by EM intereference
B) Making custom cable lengths is easier with fiber
D) All that orange fiber looks mpressive in the network closet |
|
Definition
|
|
Term
How many wire pairs does 1000Base T use?
A) 1
B) 2
C) 3
D) 4 |
|
Definition
|
|
Term
What is the maximum cable length of 10GBase T on Cat 6?
A) 55 meters
B) 100 meters
C) 20 meters
D) 70 meters? |
|
Definition
|
|
Term
Which of the following statements is not true regarding 1000Base CX?
A) 1000Base CX uses Cat6 UTP
B) 1000 Base CX has a maximum distance of 25 meters
C) 1000BaseCX is a Gigabit Ethernet standard
D) 1000Base CX uses copper, not fiber optics |
|
Definition
|
|
Term
Which of the following versions of Fiber Ethernet will enable you to create a successful cable run of up to 5 kilometers or more (Select two)
A) 10GBase-ER
B) 100Base-FX
C) 1000Base-SX
D)1000Base-LX
E) 10GBase-T |
|
Definition
|
|
Term
Elsa needs to connect two switches together with no MDIX ports. Which of the following might she use?
A) Bridge
B) Spanning Tree
C) Crossover cable
D) Straight-through cable |
|
Definition
|
|
Term
Which 1000Base X Ethernet network supports copper cabling? (Select two)
A) 1000BaseSX
B) 1000Base CX
C) 1000Base T
D) 1000Base LX |
|
Definition
|
|
Term
Bambi needs to spec the equipment for the installation of a complete network system: cables, switches, PC's...everything. The network only needs to be 100Base T but must be easy to upgrade to 1000Base T in the future. Which one of the following, although good to have, would be the least important element for Bambi to buy now?
A) Cat5e UTP horizontal cabling
B) Cat5e patch panel
C) 100/1000 Mbps
D) 100/1000 Mbps NIC's
|
|
Definition
|
|
Term
You need to make a network connection between two communications closets. The distance between each closet is roughly less than 500 meters. Which type of cabling would BEST be used in this situation?
A) 1000BaseSX
B) 10GBaseER
C) 1000BaseT
D) 1000BaseLX |
|
Definition
|
|
Term
Kim's network has two network servers. Each server is running the DHCP service. They can have a DHCP scope passing out 192.168.4.100 to 192.168.4.199. There are, on average, about 75-80 DHCP clients. How can Kim reconfigure the network so that these two DHCP servers will not pass out conflicting IP addresses while still providing fault tolerance for DHCP?
A) Remove one of the DHCP servers?
B) Change half of the clients to use static IP addresses
C) Split the range so one DHCP server passes out 192.168.4.100 to 192.168.4.150 and the other passes out 192.168.4.151 to 192.168.4.199
D) Make one of the DHCP servers a DHCP relay
|
|
Definition
|
|
Term
You are planning to implement a network with 400 hosts. Which subnet mask would accomodate for that many devices?
A) /23
B) /24
C) /25
D) /26
|
|
Definition
|
|
Term
John is talking to his cable installer about running new UTP Cat 5e cable to two new office spaces being set up in his building. These are the last available spaces in this building and no more office slots will ever be made here. The cable installer says that the cable runs for those locations will be 92 meters. At 92 meters, the wall outlets will just make it into the office. What is the most cost efficient suggestion the installer can make?
A) Go ahead, just keep the combined length of the patch panels under 8 meters
B) Run backbone cabling to a closer location and set up a new equipement room
C) Keep the horizontal cabling at 90 meters, just make longer patch cables to the PC
D) Use Cat 3 cabling for the run instead of Cat 5 |
|
Definition
|
|
Term
In order for a DHCP server to provide IP information to hosts, it keeps track of all of the ____ to differentiate each system.
A) NAT types
B) DNS names
C) IP names
D) MAC addresses |
|
Definition
|
|
Term
While there is no law that dermines the IP address of a default gateway, there are certain unwritten rules that are often used. Of the following, which is most likely the default gateway for a 192. 168.3 /24 network? |
|
Definition
|
|
Term
Which device helps you locate and identify cables?
A) Toner
B) TDR
C) Continuity Tester
D) Protocol analyzer |
|
Definition
|
|
Term
What TCP/IP protocol is used to resolve an IP address to a MAC address?
A) BootP
D) UDP
C) DHCP
D) ARP |
|
Definition
|
|
Term
A helpdesk technician has received an urgent ticket from a user who cannot access any network resources after moving their computer to a new office. What tool would the technician use FIRST to troubleshoot the issue?
A) Time domain reflectometer
B) Cable tester
C) Butt set
D) OTDR
|
|
Definition
|
|
Term
An SSL URL connection starts with which prefix?
A) HTTP
B) WWW
C) FTP
D) HTTPS |
|
Definition
|
|
Term
Which statements about netstat switches (in windows) are true? (Select three)
A) -a shows all used ports
B) -n shows raw port numbers and Ip addresses
C) -o shows the process ID
D) -s shows the application name |
|
Definition
|
|
Term
Which file transfer protocol uses UDP
A) HTTP
B) FTP
C) SNMP
D) TFTP |
|
Definition
|
|
Term
You have just been given an IP address for your small company. You must use this IP address to get your company's Web server access to the public internet, but at the same time, you want the server hidden behind your private network. Which of the following would be used to implement this?
A) SNAT
B) DNAT
C) BGP
D) RIP |
|
Definition
|
|
Term
Henry is setting up e-mail account for his users. Which TCP/IP protocol does he use to download messages from mail servers?
A) SMTP
B) SNMP
C) HTTP
D) POP3 |
|
Definition
|
|
Term
Which of the following types of requests are ALWAYS stopped by routers? (Select two)
A) DHCP broadcasts
B) NetBios broadcasts
C) WINS requests
D) DHCP lease renewals |
|
Definition
|
|
Term
A protocol that uses a three-way handshake operates at which layer of the OSI Model?
A) Data link
B) Network
C) Transport
D) Session |
|
Definition
|
|
Term
You have a segment of computers with a network ID of 172.20.2./16. To enable this segment to access the public internet, which of the following must the router perform?
A) NAT
B) RIP
C) DHCP
D) APIPA |
|
Definition
|
|
Term
The NETSTAT utility does what? (Select two)
A) Shows network statistics such as total bytes and number of discarded packets
B) Shows the currently active network connections and their states
C) Shows the route taken by each network connection over the Internet
D) Displays the latency for all active network connections |
|
Definition
|
|
Term
HTTPS requires you to open which additional port in your firewall?
A) 80
B) 443
C) 143
D) 3389 |
|
Definition
|
|
Term
NetBios uses what type of name space?
A) Hierarchical name space
B) People name space
C) DNS name space
D) Flat name space |
|
Definition
|
|
Term
The users on your network haven't been able to connect to the server for 30 minutes. You check and reboot the server, but you're unable to ping either its own loopback address or any of your client systems. What should you do?
A) Restart the DHCP server
B) Restart the DNS server
C) Replace the NIC on the server because it has failed
D) Have your users ping the server |
|
Definition
|
|
Term
What is checked first when trying to resolve an FQDN to an IP address?
A) Hosts file
B) LMHOSTS file
C) DNS Server
D) WINS Server |
|
Definition
|
|
Term
Which command enables you to eliminate DNS cache?
A) ipconfig
B) ipconfig /all
C) ipconfig /dns
D) ipconfig /flushdns |
|
Definition
|
|
Term
Which tool enables you to query the functions of a DNS server?
A) ipconfig
B) nslookup
C) ping
D) xdns |
|
Definition
|
|
Term
A hash function is by definition
A) A complex function
B) A PKI function
C) A one-way function
D) A systematic function |
|
Definition
|
|
Term
Which of the following is a common hash function?
A) MD5
B) RC4
C) AES D) BMX |
|
Definition
|
|
Term
In order to have a PKI infrastructure you must have a(n)
A) Web server
B) Web of trust
C) Root authority
D) Unsigned certificate
|
|
Definition
|
|
Term
Which type of access control requires a label to define its sensitivity?
A) MAC
B) DAC
C) RBAC
D) VAC |
|
Definition
|
|
Term
IF you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?
A) PPP
B) Radius
C) MS-CHAP
D) TACACS+ |
|
Definition
|
|
Term
You are a network administrator attempting to troubleshoot a WINS server. Which tool would you most likely use to diagnose this?
A) Nbstat
B) Netstat
C) Nslookup
D) Dig |
|
Definition
|
|
Term
Which of the following methods of authentication will also provide AAA and uses UDP?
A) TACACS+
B) Radius
C) RAS
D) Kerberos |
|
Definition
|
|
Term
A user is concered that his password is being sent in a clear text when he connects to the Radius server using PAP. Which of the following is true about security using Radius?
A) it uses a public key to encrypt messages between the client and server
B) it uses a private key to encrypt messages between the client and server
C) It uses a shared secret to encrypt messages between the client and server
D) It uses a CUS/DSU to encrypt the data between the client and server |
|
Definition
|
|
Term
You are wanting to use FTP to transfer files on the internet at your office, but your network administrator says that it is not a good idea and that they have blocked FTP access using the firewall. What could the network admin's reasons be for blocking FTP?
A) FTP is unable to transfer encrypted files
B) FTP can't be tunneled using a VPN connection
C) FTP is a legacy protocol and can't be used on modern networks
D) FTP Transmits all passwords in plain text |
|
Definition
|
|
Term
Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening?
A) 802.3ad
B) TKI
C) WPA2
D) 802.1X |
|
Definition
|
|
Term
Which of the following do you need to be able to use a digital signature?
A) Fingerprint
B) Digital Certificate
C) Encryption Certificate
D) Algorithm Certificate |
|
Definition
|
|
Term
Which protocol uses time synchronization across the internet?
A) NTP
B) NCP C) NTFS
D) NNTP |
|
Definition
|
|
Term
What Windows utility enables you to query information from the DNS server and change how your system uses DNS?
A) Arp
B) NBtstat
C) tracert
D) nslookup |
|
Definition
|
|
Term
What utility generates this output:
Server: Unknown
Address: 192.168.4.11
Non-authoritative answer
Name: www.totalsem.com
Address 209.29.33.25
A) Ping
B) Netstat
C) Ipconfig
D) Nslookup |
|
Definition
|
|
Term
A static VLAN assigns VLANs to
A) IP addresses
B) MAC addresses
C) Ports
D) Trunks |
|
Definition
|
|
Term
A content switch always works at least at which layer of the OSI model?
A) 2
B) 3
C) 4
D) 7 |
|
Definition
|
|
Term
What is the main difference between an IDS and an IPS?
A) An IPS documents intrusions
B) An IPS is always a stand-alone box
C) An IPS reacts to an attack
D) An IPS uses port mirroring |
|
Definition
|
|
Term
How do IPv6 multicasts different from broadcasts?
A) Broadcasts are sent to all network nodes: multicasts are sent only to specific network nodes B) Both broadcasts and multicasts are sent to all network nodes, but in a multicast, only the destination nodes process the incoming packets
C) Broadcasts can cross over a router, whereas multicasts cannot
D) Broadcasts are used on local networks; multicasts are used on the Internet |
|
Definition
|
|
Term
What is the /16 prefix for all 6to4 address?
A) 2001
B) 2003
C) 2002
D) 2021
|
|
Definition
|
|
Term
Which of the following is the valid reduced version of the address 2001:0489:000f:0000:0000:1f00:0000:000d
A) 2001:489:000f:0000:0000:1f00:0000:000d
B) 2001:489:f::f00::d
C) 2001:0489:000f::1f00:0000:000d
D) 2001:489:f::1f00:0:d |
|
Definition
|
|
Term
A small bookstore and a hand-crafted jewely company share the same building. To save costs on infrastructure, they want to use a single advanced switch, but still retain two seperate networks. What feature would accomplish that goal?
A) Bandwitch Shaping
B) Load balancing
C) Trunking
D) VLAN |
|
Definition
|
|
Term
You have just recently made changes to your network by seperating the printers into their own network in order to increase security. An employee begins their day at work by moving their workstation and printer to a new desk. They hookup their equipment and connect both devices to the network using a nearby wall jack. Both devices attain an IP address from the DHCP server. The user can no longer access the internet from the PC. Priting works just fine. What is the problem?
A) The laptop connects to a switch that is having a duplex mismatch
B) The laptop has a 100Base TX NIC, while the switch is 1000BaseT
D) The desktop is in the wrong VLAN |
|
Definition
|
|
Term
You are looking into setting up a VPN connection at your offices and you want the VPN to operate at the highest layer of the OSI model. Which protocol would allow this?
A) PPTP
B) IPSec
C) L2TP D) SSL |
|
Definition
|
|
Term
What is the function of a proxy server?
A) It protects the internet from internal network traffic
B) It converts external ip addresses to private IP addresses for clients on the internal network so that applications running on those clients do not have to be configured for proxy service
C) It acts as an intermediary that encrypts all incoming and outgoing data packets
D) It hides internal network IP addresses from computers on the internet |
|
Definition
|
|
Term
A network IPS will give your network which of the following capabilities?
A) Packet-based detection and prevention of network attacks
B) Enables IPsec for all workstations on your local network
C) Uninterruptible power for the network devices on the LAN
D) Bandwith shaping for all packets entering the private, internal network |
|
Definition
|
|
Term
You are concered about malicious attacks on your network. Which of the following would you get in order to screen and prevent these attacks?
A) IDS
B) VLAN
C) NIPS D) HIDS
|
|
Definition
|
|
Term
A ______ enables the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently, because the information can be downloaded once for the use by multiple hosts
A) SMTP Server
B) Proxy Server
C) NAT Server
D) DNS Server |
|
Definition
|
|
Term
This server acts as a go-between on Rocky's network, enabling the clients on his network to connect through it to access web pages instead of connecting to web sites directly
A) SMTP server
B) WINS Server
C) Proxy Server
D) DNS Server |
|
Definition
|
|
Term
What are available options for transporting data through a VPN? (Select three)
A) SSL B) PPTIP
C) ISEC
D) RDP
E) RAS F) VLAN |
|
Definition
|
|
Term
John, the network administrator for the ACME building needs to set up network for two different groups. What feature would he need to use on his switch to enable both groups to use the sae switch yet remain seperate?
A) Enable trunking
B) Enable VLANs
C) Enable port mirroring
D) It can't be done. He needs two switches
|
|
Definition
|
|
Term
Tracy is a network administrator for a company. She has setup VoIP and data traffic on different subnets. Which of the following strategies could she use to provide both services to hosts on the same UTP cable?
A) Change the RJ-45 connectors from 568A to 568B
B) Enable STP on the switches
C) Use PPP
D) Implement seperate VLANs
|
|
Definition
|
|
Term
A user calls from the account department complaning that he only sees the server used by distribution, not the accounting server. A check of his IP address shows that he indeed got the wrong IP address from the DHCP server. What could be the problem?
A) Wrong gateway
B) Port Duplex mismatch
C) Incorrect VLAN
D) Wrong subnet mask |
|
Definition
|
|
Term
Which protocol creates a safe, encrypted private network connection over the internet?
A) VPN
B) TCP
C) DNS
D) PPTP |
|
Definition
|
|
Term
Lizanne wants all the hosts in her TCP/IP network to share a single IP address to the internet. What type of server could she use?
A) DHCP server
B) WINS server
C) DNS Server
D) Proxy Server |
|
Definition
|
|
Term
Select all the advantages of having a managed switch over an unmanaged switch
A) Fewer collision domains
B) The switch will have trunking capabilities
C) Your switch will have use of SNMP
D) You will have a gigabit ready switch
E) You will have more broadcast domains
|
|
Definition
|
|
Term
You have only one switch but you want it to support two seperate network segments. What should you do to accomplish this?
A) Enable SNMP
B) Enable SMTP
C) Implement Qos on the switch
D) Implement VLANs on the switch |
|
Definition
|
|
Term
BRI ISDN uses
A) 1 B channel and 24 D channels
B) 24 B channels and 1 D channel
C) 1 B channel and 2 D channels
D) 2 B channels and 1 D channel |
|
Definition
|
|
Term
The V.90 standard defines a modem speed of
A) 56 kbps
B) 33.6 K baud
C) 28.8 kbps
D) 2400 baud |
|
Definition
|
|
Term
You have just had DSL installed at your house and while the Internet connection is fast, your phones no longer work. What is the problem?
A) The installer failed to install the POTS filters on the phones
B) Nothing; the phones can't function at the same time as the Internet
C) The house phone lines can't handle the bandwith of both the phone and DSL
D) The DSL modem is missing the filter and is causing line interference |
|
Definition
|
|
Term
Sonet is used for long-distance, high speed, fiber-optic transmission
A) Short-distance, high-speed, fiber optic transmission
B) Long-distance, high-speed, fiber-optic transmission
C) Long distance, low speed, copper cable transmission
D) Short distance, low speed copper cable transmission
|
|
Definition
|
|
Term
What does SIP stand for?
A) Standard Initiation Protocol
B) System Internetworking Protocol
C) Session Initiation Protocol
D) Sector Information Protocol |
|
Definition
|
|
Term
What function does CSMA/CD provide that CSMA/CA does not?
A) Data packet collission detection
B) End-to end data packet encryption
C) Data packet collision avoidance
D) Data packet error checking |
|
Definition
|
|
Term
Which of the following advantages does WPA have over WEP? (Select three)
A) End-to end data packet encryption
B) EAP user authentication
C) Encryption key integrity checking
D) 128-bit data encryption
|
|
Definition
|
|
Term
What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two)
A) An access point
B) A router
C) A hub
D) A wireless bridge |
|
Definition
|
|
Term
What do you call a wireless Ethernet network in infrastructure mode with more than one access point?
A) BSS
B) EBSS C) WBSS
D) Exnet |
|
Definition
|
|
Term
What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard?
A) WAP Server
B) Wep server
C) Radius Server
D) NAS Server |
|
Definition
|
|
Term
Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a seperate authentication server to gain access to the network. Which method would work BEST?
A) WEP2
B) Radius
C) Kerberos
D) AES |
|
Definition
|
|
Term
A BRI ISDN circuit transmits data at what rate?
A) 28.8 kbps
B) 33.6 kbps
C) 56 kbps
D) 128 kbps |
|
Definition
|
|
Term
Which of the following has the greatest bandwith?
A) T3
B) ADSL
C) SDSL
D) OC-3 |
|
Definition
|
|
Term
How should you configure multiple 802.11g wireless access points to create a single network that enables users to roam freely?
A) Configure all the WAPs to use the same SSID
B) Configure all the WAPs to use the same frequency
C) Configure all the WAPs to use the same channel
D) Configure each WAP to use a unique security setting |
|
Definition
|
|
Term
Sally has a wireles network and has noticed significant slow downs at random times during the day. She believes her neighbors may be connecting to her wireless network. Of the following choices, which would be used to limit access to her network? (Choose two)
A) WPA2 encryption
B) Switching the channels
C) Mac filtering
D) Changing from 802.11g to 802.11n
E) Disabiling the SSID |
|
Definition
|
|
Term
A user on an IEEE 802.11b network has entered an incorrect WEP key. What will be the result?
A) She will receive a signal, but will not be able to access the network
B) The signal strength will be too low to be useable
C) A warning message will appear on the user's screen
D) She will have only limited access to the network |
|
Definition
|
|
Term
Which types of WAN communication can be tested using a BERT? (Select two)
A) Cable Modem
B) Satellite
C) DSL
D) TI
E) WiMax
|
|
Definition
|
|
Term
What does WPA2 include that WPA did not?
A) AES
B) TKIP
C) 3DES
D) Radius |
|
Definition
|
|
Term
A client wants secure wireless network installed. Which of the following should be implemeneted on the wireless router to provide the highest level of security?
A) IPSec
B) VPN
C) WEP
D) WPA |
|
Definition
|
|
Term
Which of the following would be the best place to use a dipole antenna?
A) In a hallway
B) Outside
C) On a wall
D) To connect two building wirelessly |
|
Definition
|
|
Term
What is the most common technique for protecting a network?
A) Port Filtering
B) Hiding IP addresses
C) Packet Filtering
D) Encryption |
|
Definition
|
|
Term
What are the names of the administrative accounts on Windows and Linux?
A) "Administrator" on both
B) Administrator on Windows, admin on Linux
C) Admin on Windows, root on Linux
D) Administrator on Windows, root on Linux |
|
Definition
|
|
Term
You receive a call at your desk from someone claiming to be this new supervisor for the sales department. The caller says he forgot his password and asks if you can remind him what it is. How is this categorized? (Select three)
A) Internal Threat
B) External Threat
C) Social Engineering
D) Denial of Service |
|
Definition
|
|
Term
RAID is an implementatin of what concept?
A) Phising prevention
B) Fault tolerance
C) Network encryption
D) User account control |
|
Definition
|
|
Term
John is a member of the sales group, which has read permissions on a file. He is also a member of the tech group, which has write permissions on the same file. What are John's effective permissions on the file?
A) Read only
B) Write only
C) Read and write
D) No access |
|
Definition
|
|
Term
Which are examples of malware (Select all that apply)
A) Virus
B) Worm
C) Trojan
D) Rootkit
|
|
Definition
|
|
Term
Difference between a DoS and DDos?
A) A DoS uses a single zombie whereas a DDos uses a botnet to attack a single system
B) A DoS uses a botnet whereas a DDoS uses a zombie to attack a single system
C) A DoS attacks a single system whereas a DDos attacks multiple systems
D) A DoS attacks systems on the Internet whereas a DDos attacks systems in a DMZ |
|
Definition
|
|
Term
Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously?
A) CPU
B) Hard Drive
C) RAM
D) Windows |
|
Definition
|
|
Term
What enables two VMs hosted on the same physical machine to communicate without leaving the machine itself?
A) NaaS
B) Virtual LAN
C) Virtual PBX
D) Virtual switch |
|
Definition
|
|
Term
Difference between a virtual machine and an emulator?
A) A VM converts commands to and from a host machine to an entirely different platform, whereas an emulator creates an environment base on the host machine and does no converting
B) An emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting
C) Emulator requires a host OS, whereas a VM runs on bare-metal server without an OS
D) A VM requires a host OS whereas an emulator runs on bare-metal servers without an OS |
|
Definition
|
|
Term
Which program handles telephone switching in software rather than hardware?
A) Virtual LAN
B) Virtual PBX
C) Virtual switch
D) Virtual 64 block |
|
Definition
|
|
Term
What do you make when you save a copy of a VM?
A) Replacement
B) Save
C) Snapshot
D) Zip |
|
Definition
|
|
Term
What is the benefit of Network as a Server (Naas)?
A) The network hardware is managed locally
B) The network service is managed by someone else
C) The network service is managed locally
D) The montly subscription fee reduces cost
|
|
Definition
|
|
Term
What is the one benefit of ESX over VMware Workstation?
A) ESX costs less
B) ESX is easier to set up
C) ESX uses less electricity
D) You can move a running VM from one machine to another with ESX |
|
Definition
|
|
Term
VMware Workstation replace control-alt-delete with
A) a mouse click
B) ctrl-alt-insert
C) ctrl-alt-tab
D) ctrl-alt-shift |
|
Definition
|
|
Term
Jim is about to install a wireless network. A fellow network admin warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers?
A) WAP placement
B) MAC address filtering
C) Authentication method
D) Encryption type |
|
Definition
|
|
Term
You have just installed a new device that performs stateful packet filtering on your company's network. Which of the following describes this device?
A) Proxy server
B) Firewall
C) DNS Server
D) IDS |
|
Definition
|
|
Term
Your company wants to test out the security of your network by allowing attackers to hit a fake network that you create. Which technology would you need to use?
A) Honeynet
B) Honeypot
C) NIDS
D) NMAP |
|
Definition
|
|
Term
Your company requires the use of a smart card, biometric device, and a password to login to your system. What kind of authentication are they using?
A) Single sign-on
B) Two-factor authentication
C) Multifactor authentication D) Kerberos |
|
Definition
|
|
Term
Your company wants to reduce power consumption on a wide scale. Which technology would help in accomplishing this?
A) Managed switches
B) Load balancing
C) Virtual Servers
D) Power over enternet |
|
Definition
|
|
Term
Firewalls can be used for which of the following?
A) protocol analysis, packet filtering, and content filtering
B) Packet sniffing, protocol analysis, and content filtering
C) Content filtering, packet filtering and port filtering
D) port scanning, packet sniffing and packet filtering |
|
Definition
|
|
Term
Because of security, you want to install a Microsoft Exchange server, Apache Web server and Microsoft Active Directory on three different servers. Which of the following technologies would help you do this while reducing your hardware costs?
A) Virtual Servers
B) WPA Encryption
C) A VPN connection
D) 802.1X
|
|
Definition
|
|
Term
Which of the following would be a reason to use a firewall?
A) To prevent your system from overheating
B) Save money on equipement costs
C) To prevent hardware failures
D) restrict unauthorized users from accessing the network from the outside |
|
Definition
|
|
Term
Which networking device can you configure to block or allow ports and IP addresses from accessing the internet?
A) unmanaged switch
b) router
C) IIS server
D) firewall |
|
Definition
|
|
Term
Bebe is connecting her network to the internet. What does she need to install between her network and the internet to provide security for her systems?
A) A gateway
B) a firewall
C) A router
D) A VLAN |
|
Definition
|
|
Term
Which of the following describes standards for physical wiring in a network?
A) Baseline
B) Demarc
C) Network diagram
D) Wiring Scheme |
|
Definition
|
|
Term
Which of the following defines the type of connection or technology used in a network and maps how each machine connects?
A) Baseline
B) Demarc
C) Network Diagram
D) Wiring Scheme |
|
Definition
|
|
Term
John wants to analyze the procedure for adding a new file server on his network. What should he do?
A) Ask his supervisor
B) Check the change management documentation
C) Redraw the network diagram
D) Refraw the wiring diagram
|
|
Definition
|
|
Term
What defines the performance of the network when everything is working properly?
A) Baseline
B) Demarc
C) Network diagram
D) Wiring Diagram |
|
Definition
|
|
Term
What is a record of data about your system?
A) Counter
B) Log
C) Node
D) Object |
|
Definition
|
|
Term
How can you ensure that your servers will continue to run during a blackout?
A) Implement load balancing
B) Implement network monitoring
C) Install a backup generator
D) Install a traffic shaper |
|
Definition
|
|
Term
Grandfather, father, son is an example of what?
A) Backup rotation
B) Log file entries
C) RAID array
D) Bandwidth shaping |
|
Definition
|
|
Term
What is the minimum number of drives required for a RAID 5 array?
A) One
B) Two
C) Three
D) Four |
|
Definition
|
|
Term
What tool in Windows enables you to look at log files?
A) Baseline Viewer
B) Event Viewer
C) Network Monitor
D) Performance Monitor |
|
Definition
|
|
Term
You have just arrived at work and find that users are having issues connecting to the Web server. Last night, another network technician made an upgrade to the Web server. Which document might help you in resolving the problem?
A) Change management
B) Cable management
C) Network maps
D) Wire schemes |
|
Definition
|
|
Term
A network technician is trying to determine which TIA/EIA standard is being used for his MDF's patch panels. Where should he look to find this information?
A) Network Map
B) Asset Management
C) Wiring Schemes
D) Baselines |
|
Definition
|
|
Term
What's the first step needed when building a SOHO network?
A) Define the network needs
B) Design the network
C) Select network infrastructure
D) Pull Cable |
|
Definition
|
|
Term
When you have a cable pulled, what should the installer provide you in terms of documentation?
A) The documentation should show the length of the runs, labeling, CAT ratings and a floor plan
B) The isntaller only needs to label the cabels
C) The installer only needs to pull the cables
D) The documentation should show the witdh of the cables an the cost of the runs |
|
Definition
|
|
Term
What program enables you to access a server when the server is turned off?
A) GBIC
B) LOM
C) PBX
D) Virtual PBX |
|
Definition
|
|
Term
Which of the following block of IP addresses would be best for a private network that has an internet connection through a gateway router?
A) 10.200.65.0 /8
B) 135.10.0.0 /16
C) 192.168.1.0 /24
D) 225.1.1.0/16 |
|
Definition
|
|
Term
Which of the following devices would enable you to add, not replace, a port on a typical Cisco switch?
A) GBIC
B) HWIC
C) PBX
D) SFP |
|
Definition
|
|
Term
John installed a new router that's running more slowly than it should. He suspects some type of mismatch between the Ethernet frame and the frame needed by the DSL. When he tries to ping the router, though, he gets no response. He can access the router through its Web interface just fine. What could the problem be?
A) The connection between his system and the router is down
B) The router is an MTU black hole
C) The MTU mismatch has blocked ping
D) The router is running PMTU |
|
Definition
|
|
Term
Melissa replaced a faulty SFP with another one from the server room. The new one doesn't enable a connection. What's an option to fix the problem?
A) Replace the router
B) Replace the server
C) Replace the new SFP
D) Reinstall Windows Server |
|
Definition
|
|
Term
Which of the following is a dedicated computer that's preconfigured to offer file storage for many types of client computers?
A) Active Directory
B) NAS
C) PAN
D) SPAN |
|
Definition
|
|
Term
What type of electrical setup is ideal for a network closet?
A) Circuits shared with no more than two other locations
B) Dedicated circuit
C) High-voltage circuit
D) Any circuit will do |
|
Definition
|
|
Term
What does nslookup do?
A) Retrieves the name space for the network
B) Queries DNS for the IP address of the supplied host name
C) Performs a reverse IP lookup
D) Lists the current running network services on localhost |
|
Definition
|
|
Term
What is wireshark
A) Protocol analyzer
B) Packet sniffer
C) Packet analyzer
D) All of the above |
|
Definition
|
|
Term
When trying to establish symptoms over the phone, what kind of questions should you ask of a novice or confused user?
A) You should ask open-ended questions and let the user explain the problem in his or her own words
B) You should ask detailed, closed-ended questions to try and narrow down the possible causes
C) Leading questions are your best choice for pointing the user in the right direction
D) None, ask the user the bring the machine in because it is useless to troubleshoot over the phone |
|
Definition
|
|
Term
While you are asking the user problem-isolating questions, what else should you be doing?
A) Asking yourself if there is anything on your side of the network that could be causing the problem? B) Nothing; just keep asking the user questions
C) Using an accusatory tone with the user
D) Playing solitaire |
|
Definition
|
|
Term
Once you have implemented your solution, you should always ___
A) Close the ticket
B) Verify full system functionality
C) Return the machine
D) Reboot |
|
Definition
|
|
Term
What is the last step in the troubleshooting process?
A) Implementing the solution
B) Testing the solution
C) Documenting the solution
D) Closing the help ticket |
|
Definition
|
|
Term
Which of the following types of protocols might lead to a user's credentials being discolsed to possible attackers if a protocol analyzer is used? (Select as many as appropriate)
A) TFTP
B) Telnet
C) FTP
D) SCP
E) SNMPv3 |
|
Definition
|
|
Term
Sam is troubleshooting a network issue and has just established his place of action to fix it. Which of the following will be his NEXT step to resolve the problem?
A) Implement the plan of action and contact management if necessary.
B) Ensure that the network is functioning correctly
C) Document the outcomes of the plan
D) Determine if that anything has changed on the network |
|
Definition
|
|
Term
You have a network with 25 users. All the users are complaining about the network moving too slowly, even when only one person is accessing the server. Which of the following tools could you use to troubleshoot the bottleneck (Select three)
A) Network analyzer
B) Loopback device
C) Packet Sniffer
D) Protocol analyzer
E) TDR |
|
Definition
|
|
Term
You are troubleshooting and repairing a network by implementing a new IPS. After installing the new device and configuring it for the network, what should you do next?
A) Verify network functionality
B) Identify the problem
C) Document you installation and the results
D) Contact your network administrator for further instructions |
|
Definition
|
|
Term
Your Windows 7 system suddenly can't reach the internet. You know that your DHCP server has been intermittently malfunctioning. What command can you type to see if it gave you an IP address, default gateway and other necessary IP configuration before it crashed?
A) Ifconfig
B) ipconfig
C) NSlookup
D) Route print |
|
Definition
|
|
Term
Everyday at the office, we play Counter Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action-our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occuring?
A) Tracert
B) Tracerout
C) Ping
D) ARP |
|
Definition
|
|
Term
Carl is complaining that his internet connection is moving at a snail's pace. Which command line utility could you use to find out why?
A) Tracert
B) Ping C) Netstat
D) Nbstat |
|
Definition
|
|
Term
Fred has just purchased a new home router for his SOHO Internet connection. He can't get on the Internet. He opens the web browser interface for the router and determines that his WAN address is 0.0.0.0. Which of the following is the BEST way to resolve this?
A) Run ipconfig /renew on his PC
B) Do a DHCP renew via the router's Web brower interface
C) Restart his PC
D) Verify the router is configured for a static WAN IP address |
|
Definition
|
|
Term
I can't see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following commands might I try to test my connection with your machine?
A) Ping Woobie
B) Netstat Woobie
C) Nbstat Woobie
D) SMTP Woobie |
|
Definition
|
|
Term
Which of the following utilities can you use to confirm connectivity to another TCP/IP host?
A) ARP
B) Ping
C) Nbstat
D) Netstat |
|
Definition
|
|
Term
You have just opened a new business in a recently renovated loft in the downtown area of a busy city. The owner of the building says that they are unable to run additional wiring for networking because they need to preserve the history of the building. Because of this, you have decided to implement a wireless network. What is going to be your FIRST step in setting up your SOHO network?
A) Run a wireless site survery
B) Convince the landlord that wired Ethnernet is more secure
C) Setup new switches in your office
D) Find drivers for your new wireless cards |
|
Definition
|
|
Term
You get a "duplicate IP address" error. Which tool could you use to help identify the conflicting system?
A) Arp -a
B) tracert
C) ipconfig /all
D) netstat -a |
|
Definition
|
|
Term
Which two of the following should you do first when you are designing and implementing a new network (Select two.)
A) Run a network analyzer
B) Buy all new NICs
C) Begin documentation on your system and network
D) Determine the company's network needs and expectations |
|
Definition
|
|
Term
Which of the following tools enables you to inspect network traffic?
A) Throughput tester
B) Protocol Analyzer
C) Connectivity Software
D) Ping |
|
Definition
|
|