Beruflich Dokumente
Kultur Dokumente
RTP
SIP
Which of the following commands would allow a technician to see the DNS servers
that a computer is configured to use?
nslookup
A technician needs to connect a laptop via the small office, home office (SOHO)
wireless access point. When the technician does a site survey using the laptop, the
wireless network is not discovered. Computers previously on the wireless network
were connected, and the wireless card appears to be working. Which of the following
could be causing the issue?
The SSID is set to not broadcast.
A packet sniffer has been placed on a network and shows client A is sending TCP
SYN packets to server B. Which of the following packets should be sent from server
B in response?
SYN-ACK
An automated application capable of infecting computers without user interaction
would be described as which of the following?
Worm
Which of the following does a star ring topology use for data transfer?
Token passing
A network technician has addressed an issue where many workstations have lost
network connectivity, but is not able to establish the most probable cause. Which of
the following steps should be taken next to resolve this issue?
Escalate the issue to a senior network associate.
Which of the following protocols allows secure access to a VPN??
PPTP
An administor is using a packet analyzer across a single switch but is only receiving
partial packet information. Which of the following would need to be implemented on
the switch for the administrator?
Port Mirroring
A network technician has been asked to retrieve device statistics, information, and
errors. Which of the following tools would the technician likely use??
SNMP
Which of the following IEEE standards describesd the power output of a standard
port?
802.3af
Which of the following WAN technologies uses thirty 64Kbs channels?
E-1
A technician is extending a data circuit to the other side of the building. Which of
the following would the technician set up at the new location?
IDF (intermediate distribution frame)
Which of the following is a benefit of using dynamic routing as opposed to static
routing?
Scales to large networks
Which of the following would be an appropriate use of an EGP?
Advertising a /24 to an upstream provider.
All of the workstations at a company have a static IP address. A newly deployed
workstation is unable to connect to the company intranet server using an Internet
browser. The technician can ping the intranet servers IP adderss. The MOST likely
cause of this in an incorrect:
DNS server setting on the client.
Which of the following is an example of a valid MAC address for a workstation?
00:08:38:05:B5:F4
A technician wants to see how many server connections are open on a client
machine. Which of the following is the command to see these connections?
netstat
Which of the following is a valid IP address in the public addressing scheme?
168.192.10.1
Which of the following will have problems functioning if a firewall has been set up
to block all UDP traffic?
A VoIP device
The difference between 10Base-T and 100Bse-T is:
shorter timing between Ethernet frames
Which of the following is a part of the TCP/IP protocol suite?
UDP
Which of the following BEST explains the purpose of a DMZ??
To create a security zone that allows public traffic but is isolated from the private network.
How much bandwidth does an OC-12 provide?
622Mbps
Which of the following protocols should be used to securely copy a file?
SFTP
SCP
A mail server was recently placed in the network. The users report email is slow.
Upon closer inspection a technician notices that error counters on the error counters
on the interface are incrementing. Which of the following could be causing the
problems?
Duplex mismatch
Which of the following equipment would allow for routing based on logical
addresses?
Layer 3 switch
A client is using a device that allows them to synchronize their wireless device to
their computer, but the device must be within 3 feet (1 meter) in order for the
synchronization to complete. Which of the following BEST describes the type of
wireless device being used?
Infared
A network administrator configured several network devices earlier today, but now
the Internet is no longer avialable to sever users. Which of the following logs should
the network administrator reference to help identify the problem?
History logs
Which of the following items changes the encryption key on a users session after a
set period of time?
TKIP
Which of the following is the maximum speed available from a full T1 line?
1.544Mbps
According to the OSI model, which of the following layers is responsible for
providing reliable communication?
Transport
A network technician is trying to find out the NETBIOS name of another
workstation using its IP address, which of the following commands would be used to
find this information?
nbstat
Which of the following is the number of bits used for IPv6?
128
Which of the following protocols would a multilayer switch use to learn the IP
address of a directly connected device?
ARP
Which of the following remote access solutions allows the LEAST connection
overhead?
SSL VPN
Which of the following is a utility that translates the IP address to its physical
network address?
arp
Which of the following is the default port for SMTP?
25
A network administrator is configuring a network with a dynamic routing protocol.
Which of the following would support equal cost load balancing and have all routers
contain the same topology view?
OSPF
Which of the following protocols allows email to be viewed while remaining on the
email server?
IMAP4
When creating a fault tolerant switched network, which of the following will allow
for loops in the switched topology while preventing a broadcast storm?
Spanning tree protocol
Which of the following logical topologies uses centralized authentication?
Client/server
A new virus was just released and has infected several workstations. A technician
receives a newly released patch. Which of the following troubleshooting steps should
the technician take FIRST?
Implement an action plan
An administrator is implementing a new wireless network. Which of the following
is the highest level of wireless encryption that the administrator can run?
WPA2 AES
When connecting two switches together, which of the following protocols would be
used to trunk multiple VLAN traffic across the same physical link?
802.1q
A user reports that they cannot access any network resources. Which of the
following tools would a technician use to troubleshoot the problem?
Cable tester
Which of the following layers of the OSI model does a network router perform
traffic routing at?
Layer 3
How many DS0s are used in a T1?
24
When connecting two devices for voice on a vertical connect, which of the
following cables would be used to connect the two devices?
25 pair cable
After installing a new switch and connecting redundant uplinks to other switches, a
LAN experiences a broadcast storm causing severe throughput problems. Which of
the following is the MOST likely cause of the broadcast storm?
Spanning-tree protocol was not operational on the LAN.
Which of the following is the maximum range of 10GBase-SR?
990 feet (302 meters)
A technician is troubleshooting a switch and has identified the symptoms. Which of
the following steps should the technician take NEXT?
Determine the scope of the problem
A network technician is installing a series of three access points to cover the entire
wing of a building. Only one access point has wired connection. 802.11g is being used
for the wireless transmission. Which of the following channels should be used for the
access points?
Channels 6-6-6
Which of the following network topologies would BEST prevent downtime in a
WAN environment?
Mesh
A technician can successfully remote into the company's server. However, the
technician cannot connect to any of the servers directories from the server itself, but
can ping them via an IP address. Which of the following could be the problem?
DNS is not correctly configured
Which of the following protocols enables administrators to control network devices
like routers and switches?
SNMP
Which of the following types of WAN technologies uses cell switching?
ATM
Which of the following network devices routes packets over a wireless network?
WAP
A corporate network has grown and manual monitoring of the network devices are
no longer feasible. Which of the following would provide central logging for all
devices with message priority levels?
Install a syslog server and configure the network devices to send log messages to it.
Routing convergence time is which of the following?
Time required by protocols to update their forwarding tables after changes have occurred
A users workstation is able to resolve IP addresses of any host, and can ping other
workstations on the local subnet, but is unable to ping addresses on other subnets.
Which of the following is the MOST likely cause of the problem?
The workstation is configured with the incorrect default gateway.
Which of the following cables has a solid Kevlar center to restrict it from making a
90 degree bend?
CAT6
Which of the following network media has the maximum segment length?
Single Mode Fiber
Which of the following logs would let the network administrator know that there are
performance and network issues within the LAN?
System logs
Which of the following logs would let the network administrator know that there are
performance and network issues within the LAN?
System logs
A network administrator has been receiving work orders about poor voice quality
crossing a branch T1. The cause is determined to be users running high bandwidth file
sharing applications across the T1 sending large packets delaying the smaller voice
streams. Which of the following would improve voice quality?
Configure traffic shaping to reduce the bandwidth available to the file sharing application.
Which of the following VPN protocols runs over port 1723 and allows encryption to
be done at teh data level?
PPTP
Which of the following is implemented on multiple switches to allow alternate
paths?
Spanning tree
Which of the following cables is used to connect multiple layer 2 switches?
Crossover
Which of the following is the MOST secure wireless encryption?
WPA2
Which of the following cable types transmits data over 100Mbps per direction?
10GBase-T
Which of the following are forms of gigabet Ethernet that require the use of fiber
optic cables?
1000Base-SX
1000Base-LX
1000Base-CX
Which of the following cable types allows for the maximum cable run distance?
Single-mode fiber
Which of the following data is included in a wireless access points beacon frame?
A SSID and MAC address
On a wireless network, a user is able to connect to local resources, but not to be the
Internet. Which of the following is the MOST likely cause?
The gateway is not configured on the router
A technician received a call from a remote user who is having issues connecting to a
new VPN. Which of the following is the FIRST step the technician should take?
Identify the symptoms and potential causes
Which of the following is an advantage of 100Base-FX over 100Base-TX?
Longer cable runs
Which of the following devices allows segregation of collision domains but not
broadcasting domains?
Switch
Which of the following is the function of a NIC?
It transceives digital data
A network administrator is developing a solution that will allow a new remote site
with 400 users access to the Internet using only one public routable IP address. The
solution must allow for direct user access to the Internet. Which of the following
technologies is teh BEST to implement?
PAT (Port Address Translation)
Which of the following IEEE standards has a maximum bandwidth of 54Mbps
operating at 5GHz?
802.11a
Which of the following protocols is used for connecting clients to a news server?
NNTP (Network News Transfer Protocol)
A company has installed a new 802.11g point-to-point connection between two
buildings and is experiencing low throughput across the link. The current setup
involves a wireless bridge on the roof with an omni-directional antenna.
Which of the following would BEST improve the link performance?
Replace the omni-directional antennas with Yagi antennas
Which of the following technologies do the 802.11 networks utilize to prevent
packet collisions?
CSMA/CA
Users on the network can no longer access a custom application that uses TCP 8090
hosted on the DMZ. A technician has verified that the firewall is permitting the TCP
port. Which of the following commands would verify the server is still accepting
connections on TCP 8090?
netstat
A network technician is connecting through the console port to configure a switch.
Which of the following ports would be used to transfer configuration files from the
switch?
UDP 69
A user states that they have decreased signal strength on their wireless connection.
They have been using the wireless network previously without problems and the
network configuration has not been changed. Which of the following is MOST likely
the cause of the degraded signal?
Environmental factors
After a technician came out and installed a new wireless router, one of the wired
workstations began having problems connecting to the file server. This is only an
intermittent problem. Which of the following actions will the technician MOST likel
perform to resolve this problem?
Check the cable ends
In the OSI model, which of the following layers would be the cause of a session
time-out while browsing the web?
Layer 5
Which of the following network protocols allows for automated alerts and reports
on network devices?
SNMP
An employee is having issues accessing shared resources on a file server. Which of
the following troubleshooting steps should the technician take FIRST?
Identify the symptoms
Which of the following port numbers does SSH use?
22
Which of the following protocols maps an IP address to a MAC address?
ARP
Which of the following is the maximum CAT5 length acceptable for a horizontal
cross-connect?
328 feet (100 meters)
Which of the following is the FIRST criterion used to select from the routing table?
Most precise matching prefix
A network technician discovers that the phone company has installed the smart jack
in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room.
Which of the following should be requested?
A demarc extension
Which of the following protocols provides teh actual encryption used over VPN?
PPTP
Which of the following documentation would a network administrator need to
update if they have just finished upgrading the firmware on all the switches within the
LAN?
Baseline and configuration documentation
Which of the following WAN technologies would a technician find dense
wavelength division multiplexing (DWDM)?
SONET
Which of the following network services is responsible for mapping names to IP
addresses?
DNS
QoS is used to accomplish which of the following objectives?
Provide priority of one or more types of traffic over others
Which of the following TCP connect scanners is always set for normal data flow
once a connection is established?
ACK
Which of the following is required to pass traffic from one VLAN to another?
A layer three switch
Which of the following protocols are used to transfer files between two systems?
SCP
FTP
Which of the following LAN connection technologies has a full duplex speed of
200Mbps and uses and CAT5e cable?
100Base-T
Which of the following connector types would a technician utilize with fiber lines
by pushing it directly into the port without twisting?
SC
Which of the following is the BEST reason to implement QoS when real-time
applications are in use in the network?
Prioritize delay sensitive traffic
Which of the following technologies is BEST suited for a point-to-point circuit that
is 6 kilometers (3.7 miles) in distance?
10GBase-LR
In a network constructed using star topology, all the devices are connecting to one
central device known as the:
hub
Which of the following is the maximum segment distance of a 100Base-FX
network?
2,000 meters (6,561 feet)
Which of the following protocols is the MOST susceptible to a packet sniffer?
SNMPv2
A user reports that the wireless network is slow and is able to see and access shared
folders taht are unknown to the user. Which of the following is the cause of the
problem?
The user is connecting to the wrong SSID
Which of the following network protocols is needed to ensure that users can type in
a FQDN insteand of the IP address?
DNS
Which of the following are features of a DHCP server?
Dynamic IP addressing
Static IP address reservations
The data center power will not be restored for several hours. Which of the following
can be implemented in the future to allow the data center to keep running?
Connect the data centers power to a generator
Which of the following is the length of a MAC address?
48bit
Which of teh following cable types is typically used to connect a hub to a hub that
does not support MDI-X?
Crossover
Which of the following wireless communication standards allows for
communication at both 2.4GHz and 5GHz frequencies?
802.11n
Which of the following can an application layer firewall filter that a network layer
firewall cannot?
HTTP URLs
Which of the following devices would administer routing in a network?
Multilayer switch
A new segment needs to be added to a network to provide access for 64 servers.
Which of teh following subnets will provide the needed access and still conserve IP
addresses?
192.168.1.30/25
Which of the following protocols allows usernames and passwords to be transmitted
asclear-text?
PAP (Password authentication protocol)
A user has plugged a computer into a switch port and now is unable to access any
server resources on the network. Which of the following are the MOST likely reasons
for the access problem?
Which of the following will allow certain ports to be part of the same group while
other ports within that switch are part of a different group?
Enabling VLANs
A company is in the process of upgrading their network infrastructure to support
new VoIP telephony equipment. Which of the following is a primary feature to
consider when selecting a new switch to support the phones?
PoE
A user has been transferred from the accounting team to the human resources team.
The user can only print to the accounting teams printer and cannot print to the human
resources teams printer. Which of the following is the cause of the problem?
Wrong VLAN
Which of the following are the IEEE designations for the spanning tree protocol?
802.1d
802.1w
At which of the following layers of the OSI model would a repeater operate?
Layer 1
Which of the following commands would allow the technician to identify the
currently assigned DNS server?
nslookup
To forward traffic from a host with the IP address of 10.0.0.100/25 to 10.0.0.200/25
which of the following devices will be required?
A router
Which of the following software types would BEST be used for identyfying an
attack?
IDS
Which of the following types would BEST be used at identifying and reacting to an
attack by shutting down a port or dropping certain types of packets?
IPS
Which of the following properties describes a rate at which bits are transmitted over
a WAN link?
Transmission speed
Which of the following is a secure method for file transfer to a network device?
SCP
Which of the following frequency ranges does 802.11a operate at?
5GHz
A company requires a hub and spoke WAN solution. Which of the following are
BEST suited to meet this need?
MPLS
Frame-relay
ATM
Which of the following OSI layers handles the routing of data across segments?
Network
A client wants to extend the range of their wireless network without running wires
throughout the small office. Which of the following could be implemented with the
LEAST administrative effort?
Install a WAP in the middle of the office
Which of the following components in a structured wiring system supports an
Ethernet network?
110 block
Which of the following protocols is used to ensure consistent time across network
devices on teh domain?
NTP
Which of the following cable types has the shortest maximum cable run length?
CAT3
When would a technician use plenum-rated cable?
When installing cable in ceilings
Which of the following protocols provides a secure method to remotely administer a
server?
SSH
Which of the following traffic types would a network layer firewall be unable to
filter?
Email sender verification
Which of the following mechanisms is used to calculate back-off time on an
Ethernet link after a collision?
CSMA/CD
Which of the following features from the switch eliminates a delay in acquiring an
IP address?
Enable spanning tree on the interface
Which of the following cable standards has teh highest effective range at a greater
expense?
1000Base-LX
How many broadcast domains are created by a 24 port switch configured with 12
VLANs with all of the ports being actively used?
12
A network device taht is used to connect multiple devices without segmenting a
network is a:
hub
Which of the following is an advantage of 100Base-FX?
Uses a more flexible cable
Which of the following could be installed to improve network performance when
accessing Internet websites?
Caching engine
Users are reporting that they can access Internet web pages but cannot access the
internal company website. Which of the following is the MOST likely source of the
problem?
The intranet server is down
Which of the following LAN types would utilize CAT5 UTP?
100Base-TX
When troubleshooting a network error, a technician using a laptop as a network
sniffer can see all the communications on the network segment. Which of the
following network devices is the laptop plugged into?
Hub
To support roaming across a wireless 802.11g network, each access point should be
configured to use which of the following?
The same SSID
A new laptop has been purchased with an 802.11n wireless card. The laptop will not
connect to their existing 802.11a network. Which of the following is MOST likely the
reason teh laptop will not connect?
Standard mismatch
Which of the following will allow an administrator to restrict communication
between network devices?
ACL
Which of teh following is the strongest type of wireless encryption?
AES
Which of the following routing protocols is a link state and uses a backbone called
area 0?
OSPF
A user contacts a technician and states taht they are unable to access the network.
The technician discovers that the IP address of teh workstation is 169.123.142.34.
Which of the following has occurred?
The workstation has obtained an APIPA address
The 66 block termination point is:
CAT3 compliant
The role of intelligently forwarding frames from one broadcast domain to another
would be performed by which of the following network equipment?
Router
Which of the following is the maximum transmission distance of 10GBase-LR?
6 miles (9.7 kilometers)
Which of the following is teh maximum distance a 10GBase-EW connection can
transmit with one repeater?
80,000 meters (262,467 feet)
Which of the following is the component in a wiring system designed to support
legacy phone systems?
66 block
Remote users are having problems accessing files from a file server. Which of the
following should a technician check FIRST?
Connectivity
Which of the following is a utility that translates the physical network address to its
IP address?
rarp
Which of the following networks has the LEAST likelihood of collisions?
Ring
Which of the following tools would be used to establish a connection on a wall jack
to connect to the desktop?
Punch down tool
Which of the following network devices filters packets based on rules that have
been configured for it?
Firewal
A network technician is implementing new wireless access pionts in an existing
wireless infrastructure. The security is the WPA2 standard. Which of the following
encryption methods may not be compatible with the previously installed access
points?
AES
A technician is working on a new employees workstation in the accounting
department. The workstation needs access to the accounting server. Currently the
technician notices that the employee can only access the Internet. Which of the
following would the technician need to verify?
Connect VLAN setting
Which of the following techniques would increase teh bandwidth for network
ttransmission by joining together multiple connections into one logical connection?
Bonding
Which of the following protocols permits secure polling of network devices?
SNMPv3
Which of the following routing protocols uses AS-Path as one of the methods
tobuild the routing table?
BGP
Ensuring that data is transmitted securely over an IP network is the main purpose
of:
TLS
Which of the following network segmetns is located outside the firewall?
DMZ
A technician is troubleshooting connectivity issues on a clents machine. The
technician needs to see the current NetBIOS configuration and open connections,
which of teh following commands would allow this information to be displayed?
nbstat
A technician has just finished implementing a solution for a network issue. Which
of the following steps in troubleshooting should the technician do NEXT?
Test if the solution works and identify other effects it may have.
Which of the following address ranges should a netowrk administrator deny in teh
ACL to prevetn multicast packets from crossing the WAN interface?
224.0.0.0 - 239.255.255.255
A company guest is requesting to use their personal laptop on the company wireless
network. DHCP is configured correctly for wireless and a temporary WEP key is
assigned. The laptop cannot connect to the network because:
MAC filtering is enabled on the WAP
An active/passive server cluster in chich only one server is active and handling
requests, is an example of which of the following network performance optimization?
high availability
Which of the following utilities shows the relationship between a MAC address and
the corresponding IP address?
arp
Which of the following is teh recommended maximum distance CAT6 cable should
be run?
328 feet (100 meters)
When configuring a wireless access point, which of the following principles should
be used to select a channel to operate on?
Select the channel with the frequency range least used in the given area
Which of the following is the default port for HTTPS?
443
Which of the following WAN layer two protocols would be BEST suited for a full
mesh topology?
MPLS
When connecting two devices for data on a vertical cross connect, which of the
following cables would be used to connect those devices?
Fiber
Which of the following authentication protocols uses certificates to negotiate access
to the network?
EAP-TLS
A network using RIP has taken several minutes to begin routing traffic around a
failed piece of equipment. Which of the following could be implemented to imporove
convergence time?
Replace RIP with a link state routing protocol such as OSPF
A technician is setting up a public server for their company. The IP address is
19.19.0.1. Which of the following is teh default subnet mask for the server?
255.0.0.0
A user is trying to establish an FTP connection to a computer at home. The home
computer is turned on and has Internet connectivity. However, they are unable to
connect from the PC at work. The IP address that the user is trying to connect to is
192.168.1.125. Which of the following is the MOST likely problem?
The IP address of the home computer is not routable across the Internet
A corporate office network has 40 computers all in teh same private IP subnet. The
corporate office has purchased an Internet connection from their local ISP. They were
assigned one static public IP address and all 40 computers will require access to the
Internet. How can this be accomplished?
PAT will allow access to the Internet
A company has one headquarters location and ten remote sites. The remote sites do
not need to communicate with each other, just with headquarters. Which of the
following is the BEST topology to use?
Star
Which of the following would limit the availability of the types of sites that users on
a LAN have access to?
A proxy server
Which of the following BEST describes teh use of plenum cable?
Reduces toxic gas released during a fire
When using the ping utility, which switch pings a network device until stopped?
ping-t
A network administrator of a company has many branch locations each using a
subnet mask of 255.255.255.224. Which of the following dynamic routing protocols
should be used?
RIPv2
Which of the following would be a correct statement about VLANs?
VLANs help isolate network traffic
A user is experiencing slow connections. Which of the following commands would
be used to determine the delay time between the hops?
tracert
Which of the following protocols uses port 22 by default?
SSH
Which of the following devices can be remotely looped for troubleshooting
purposes?
A smart jack
Which of the following authentication methods allows for domain level
authencation on a wireless network?
RADIUS
An RJ-11 connector is capable of having up to how many pins?
6
A network technician is installing a small wireless network. A requirement is that
individual users must authenticate using usernames and passwords. Which of the
following technologies would support users authenticating with encrypted usernames
and passwords?
WPA PEAP