Shared Flashcard Set

Details

Network +
Practice Questions for the CompTia Network + Exam
195
Computer Networking
Professional
09/03/2012

Additional Computer Networking Flashcards

 


 

Cards

Term

2)  Which networking topology connects computers using a central hub?

       A) Bus

       B) Ring

       C) Star

       D) Mesh

Definition
C
Term

3) Which of the following network protocol does NOT function at the Transport layer of the OSI seven-layer model?

 

A)     ICMP

B)      TCP

C)      UDP

D)     IP

Definition
D
Term

5) Of the following choices, which are legitimate MAC addresses? (Select Two)

  

A)     02:45:A2:96:DF45

B)      FFFF.FFFF.FFFF

C)      00-2C-37-4A-C3-29-17

D)     00-49-3B-5B-D5-84-11

E)      0211:3H5B.64D5

Definition
A&B
Term

 

 

8) Which of the following networking topologies requires less hardware and cabling than the others?

 

A)     Bus

B)      Ring

C)      Star

D)     Mesh

Definition
A
Term

 

9) Which layer of the OSI model includes HTTP?

 

A)     Application Layer

B)      Presentation Layer

C)      Session Layer

D)     Transport Layer

E)      Network Layer

F)      Data Link Layer

Definition
A
Term

 

 

 

10) A NIC creates ____ in the data link layer

 

A)     Segments

B)      Packets

C)      Frames

D)     Layers

Definition
C
Term

11) Of the following OSI layers, which one converts the ones and zeros to electrical signals and places these signals on the cable?

 

A)     Physical Layer

B)      Data Link Layer

C)      Network Layer

D)     Transport Layer

E)      Session Layer

F)      Presentation Layer

Definition
A
Term

14) In a star topology

  

A)     All systems connect to a central hub

B)      All system connect to every other system

C)      All systems connect to a single cable

D)     All systems connect to a central ring

Definition
A
Term

17) You are a network administrator and you want to create a MAN while having fault tolerance between all of the routers on your network.  Which topology will work best for you?

 

A)     Star

B)      Bus

C)      Ring

D)     Mesh

Definition
D
Term

 

18) Which OSI layer do routers function on?

 

A)     Physical

B)      Data Link

C)      Network

D)     Transport

E)      Presentation

F)      Application

Definition
C
Term

19) How many fiber optic cables are needed by 100BaseFX?

 

A)     1

B)      2

C)      3

D)     4

Definition
B
Term

21) Which of the following statements best describes the ST and SC Connectors? (Select 2)

 

A)     Threaded type connector for fiber optic cable

B)      Twist on type connector for fiber optic cable

C)      Push type connector for fiber optic cable

D)     A serial port type connector for fiber optic cable

Definition
B&C
Term

22) Every Ethernet NIC card has a unique number assigned to it.  What is that number called?

 

A)     Node address

B)      Invoice address

C)      IP address

D)     MAC Address

Definition
D
Term

23) Which layer of the OSI seven-layer model handles data formatting?

 

A)     Physical

B)      Transport

C)      Data link

D)     Application

E)      Presentation

F)      Network

Definition
E
Term

28) A Mac address is known as a(n) ___address

a)      IP

b)      Logical

c)       Physical

d)      OEM

Definition
C
Term

You are wanting to make a short straight-through cable to connect a router to a switch in your MDF. Your company uses the 568B wire pattern.  Which color pairs will be crimped down on the outer pins of the rj-45 connector? (select two)

 

A) white/orange, orange

B) white/brown. brown

C) white/green. green

d) white blue/blue

e) white/green, blue

f) white orange, blue

 

 

Definition
A&B
Term

How many pairs of wires are used in a 1000Base T CAT 5e cable?

 

A) 1

B) 2

C) 4

D) Not enough information

Definition
C
Term

A 10Base T node must be within how many meter of its hub?

 

A) 100

B) 185

C) 200

D) 2000

Definition
A
Term

Which networking technology used in LAN's is desribed as Fast Ethernet and uses two pairs of cabling for transmitting and receiving?

 

A) 100Base T4

B) 100Base TX

C) 100 Base FX

D) 1000 BaseT

Definition
B
Term

Which of the following network technologies has the shortest maximum length?

 

A) 10Base FL

B) 10Base T

C) 10 Base 2

D)10 Base 5

Definition
B
Term

Which type of cable do you need to connect a client to a 100 Base TX Network?

A)STP

B) RG-58

C) Category 3 UTP

D) Category 5 UTP

Definition
D
Term

Which cable type has a maximum length of 300 meters?

 

A) 10GBase SW

B) 100Base FX

C) 100 Base T

D) 10GBase T

Definition
A
Term

You are using Gigabit Ethernet for the backbone of you LAN. Which of the following access methods does Gigabit Ethernet use?

 

A) CSMA/CD

B) Bonding

C) Broadcast

D) CSMA/CA

 

 

Definition
A
Term

You are wanting to make a short crossover cable to connect two switches in your IDF. You have just finished crimping down one end of the cable using the 568B wire pattern. Which color pairs will be crimped down on the outer pins of the RJ-45 connector on the other end of the cable?

 

A) white orange/orange

B) white brown/brown

C) White green/green

D) White blue/blue

E) white green/blue

Definition
B&C
Term

You are about to install a switch in the communications closet when a fellow technician notices you using a crossover cable to hook the switch to the existing switch in the closet.  He says you don't need the crossover cable. Why is that?

 

A) The switch has an MDIX port

B) The switch is has STP enabled

C) The switch uses CSMA/CD

D) The switch needs a plenum-grade cable

Definition
A
Term

Which network technology is best defined as Fast Ethernet?

 

A) 10BaseFL

B) 100BaseT

C) 1000 Base SX

D) 1000 Base T

 

 

Definition
B
Term

You are setting up a static IP on a workstation on your network.  Which of the following are valid numbers you can use for the subnet mask ? (Select 3)

 

A) 0

B) 1

C) 254

D) 255

E) 256

F) 253

Definition
A,C,D
Term

What begins an Ethernet frame?

 

A) MAC Address

B) Length

C) Preamble

D) CRC

Definition
C
Term

What type of bus does 10 Base T use?

 

A) Bus

B) Ring

C) Star Bus

D) Bus Ring

Definition
C
Term

When used for Ethernet, unshielded twisted pair uses what type of connection?

 

A) RG-58

B) RJ-45

C)RJ-11

D) DRS-232

Definition
B
Term

What is the maximum number of nodes that can be connected to a 10 BaseT Hub?

 

A) 1024

B) 500

C) 100

D) 185

Definition
A
Term

Which of the following is not true of crossover cables?

 

A) They are a type of twisted-pair cabling

B) They reverse the sending and receiving wire pairs

C) They are used to connect hubs

D) Both ends of a crossover cable are wired according to the TIA/EIA 568B standard

Definition
D
Term

Which of the following connectors are used by 10Base FL cable? (Select two)

 

A) SC

B) RJ-45

C) RJ-11

D) ST

Definition
A&D
Term

Which networking devices can use the Spanning Tree Protocol (STP)

 

A) Hubs

B) Media Converters

C) UTP Cables

D) Switches

Definition
D
Term

What device directs packets based on MAC addresses?

 

A) Router

B) Hub

C) Bridge

D) Switch

Definition

 

C

Term

With 100Base T, what is the maximum distance between the hub (or switch) and the node?

 

A) 1000 meters

B) 400 meters

C) 100 meters

D) 150 meters

Definition
C
Term

What type of cable and connector does 100 Base FX use?

 

A) Multimode fiber with ST or SC connectors

B) STP CAT 6 with RJ-4 Connectors

C) Single-mode fiber with MT-RJ connectors

D) UTP Cat 5e with RJ-45 connectors

 

 

Definition
A
Term

How many pairs of wires do 10BaseT and 100Base T use?

 

A) 4

B) 1

C) 3

D) 2

 

Definition
D
Term

What is the biggest physical difference between 1000 Base SX and 100 Base FX?

 

A) 1000 BaseSX uses the SC connector exclusively

B) 1000 BaseSX is single-mode, whereas 100Base FX is multimode

C) 1000BaseSX uses the ST connector exclusively

D) There is no difference

Definition
A
Term

What is the maximum distance for 1000Base LX without repeaters?

 

A) 1 mile

B) 2,500 meters

C) 20,000 feet

D) 5,000 meters

Definition
D
Term

What is the big advantage to using fiber-optic cable?

 

A) Fiber is common glass; therefore, it's less expensive

B) Fiber is not affected by EM intereference

B) Making custom cable lengths is easier with fiber

D) All that orange fiber looks mpressive in the network closet

Definition
B
Term

How many wire pairs does 1000Base T use?

 

A) 1

B) 2

C) 3

D) 4

Definition
D
Term

What is the maximum cable length of 10GBase T on Cat 6?

 

A) 55 meters

B) 100 meters

C) 20 meters

D) 70 meters?

Definition
A
Term

Which of the following statements is not true regarding 1000Base CX?

 

A) 1000Base CX uses Cat6 UTP

B) 1000 Base CX has a maximum distance of 25 meters

C) 1000BaseCX is a Gigabit Ethernet standard

D) 1000Base CX uses copper, not fiber optics

Definition
A
Term

Which of the following versions of Fiber Ethernet will enable you to create a successful cable run of up to 5 kilometers or more (Select two)

 

A) 10GBase-ER

B) 100Base-FX

C) 1000Base-SX

D)1000Base-LX

E) 10GBase-T

Definition
A&D
Term

Elsa needs to connect two switches together with no MDIX ports.  Which of the following might she use?

 

A) Bridge

B) Spanning Tree

C) Crossover cable

D) Straight-through cable

Definition
C
Term

Which 1000Base X Ethernet network supports copper cabling? (Select two)

 

A) 1000BaseSX

B) 1000Base CX

C) 1000Base T

D) 1000Base LX

Definition
B&C
Term

Bambi needs to spec the equipment for the installation of a complete network system: cables, switches, PC's...everything. The network only needs to be 100Base T but must be easy to upgrade to 1000Base T in the future.  Which one of the following, although good to have, would be the least important element for Bambi to buy now?

 

A) Cat5e UTP horizontal cabling

B) Cat5e patch panel

C) 100/1000 Mbps

D) 100/1000 Mbps NIC's

 

 

 

Definition
C
Term

You need  to make a network connection between two communications closets.  The distance between each closet is roughly less than 500 meters.  Which type of cabling would BEST be used in this situation?

 

A) 1000BaseSX

B) 10GBaseER

C) 1000BaseT

D) 1000BaseLX

Definition
A
Term

Kim's network has two network servers. Each server is running the DHCP service. They can have a DHCP scope passing out 192.168.4.100 to 192.168.4.199. There are, on average, about 75-80 DHCP clients. How can Kim reconfigure the network so that these two DHCP servers will not pass out conflicting IP addresses while still providing fault tolerance for DHCP?

 

A) Remove one of the DHCP servers?

B) Change half of the clients to use static IP addresses

C) Split the range so one DHCP server passes out 192.168.4.100 to 192.168.4.150 and the other passes out 192.168.4.151 to 192.168.4.199

D) Make one of the DHCP servers a DHCP relay

 

Definition
C
Term

You are planning to implement a network with 400 hosts.  Which subnet mask would accomodate for that many devices?

 

A) /23

B) /24

C) /25

D) /26

 

Definition
A
Term

John is talking to his cable installer about running new UTP Cat 5e cable to two new office spaces being set up in his building.  These are the last available spaces in this building and no more office slots will ever be made here.  The cable installer says that the cable runs for those locations will be 92 meters.  At 92 meters, the wall outlets will just make it into the office.  What is the most cost efficient suggestion the installer can make?

 

 

A) Go ahead, just keep the combined length of the patch panels under 8 meters

B) Run backbone cabling to a closer location and set up a new equipement room

C) Keep the horizontal cabling at 90 meters, just make longer patch cables to the PC

D) Use Cat 3 cabling for the run instead of Cat 5

Definition
A
Term

In order for a DHCP server to provide IP information to hosts, it keeps track of all of the ____ to differentiate each system.

 

A) NAT types

B) DNS names

C) IP names

D) MAC addresses

Definition
D
Term
While there is no law that dermines the IP address of a default gateway, there are certain unwritten rules that are often used.  Of the following, which is most likely the default gateway for a 192. 168.3 /24 network?
Definition
B
Term

Which device helps you locate and identify cables?

 

A) Toner

B) TDR

C) Continuity Tester

D) Protocol analyzer

Definition
A
Term

What TCP/IP protocol is used to resolve an IP address to a MAC address?

 

A) BootP

D) UDP

C) DHCP

D) ARP

Definition
D
Term

A helpdesk technician has received an urgent ticket from a user who cannot access any network resources after moving their computer to a new office.  What tool would the technician use FIRST to troubleshoot the issue?

 

A) Time domain reflectometer

B) Cable tester

C) Butt set

D) OTDR

 

Definition
B
Term

An SSL URL connection starts with which prefix?

 

A) HTTP

B) WWW

C) FTP

D) HTTPS

Definition
D
Term

Which statements about netstat switches (in windows) are true? (Select three)

 

A) -a shows all used ports

B) -n shows raw port numbers and Ip addresses

C) -o shows the process ID

D) -s shows the application name

Definition
A,B,C,
Term

Which file transfer protocol uses UDP

 

A) HTTP

B) FTP

C) SNMP

D) TFTP

Definition
D
Term

You have just been given an IP address for your small company.  You must use this IP address to get your company's Web server access to the public internet, but at the same time, you want the server hidden behind your private network.  Which of the following would be used to implement this?

 

A) SNAT

B) DNAT

C) BGP

D) RIP

Definition
A
Term

Henry is setting up e-mail account for his users.  Which TCP/IP protocol does he use to download messages from mail servers?

 

 

A) SMTP

B) SNMP

C) HTTP

D) POP3

Definition
D
Term

Which of the following types of requests are ALWAYS stopped by routers? (Select two)

 

A)  DHCP broadcasts

B) NetBios broadcasts

C) WINS requests

D) DHCP lease renewals

Definition
A&B
Term

A protocol that uses a three-way handshake operates at which layer of the OSI Model?

 

A) Data link

B) Network

C) Transport

D) Session

Definition
C
Term

You have a segment of computers with a network ID of 172.20.2./16. To enable this segment to access the public internet, which of the following must the router perform?

 

A) NAT

B) RIP

C) DHCP

D) APIPA

Definition
A
Term

The NETSTAT utility does what? (Select two)

 

A) Shows network statistics such as total bytes and number of discarded packets

B) Shows the currently active network connections and their states

C) Shows the route taken by each network connection over the Internet

D) Displays the latency for all active network connections

Definition
A&B
Term

HTTPS requires you to open which additional port in your firewall?

 

A) 80

B) 443

C) 143

D) 3389

Definition
B
Term

NetBios uses what type of name space?

 

A) Hierarchical name space

B) People name space

C) DNS name space

D) Flat name space

Definition
D
Term

The users on your network haven't been able to connect to the server for 30 minutes.  You check and reboot the server, but you're unable to ping either its own loopback address or any of your client systems.  What should you do?

 

A) Restart the DHCP server

B) Restart the DNS server

C) Replace the NIC on the server because it has failed

D) Have your users ping the server

Definition
C
Term

What is checked first when trying to resolve an FQDN to an IP address?

 

A) Hosts file

B) LMHOSTS file

C) DNS Server

D) WINS Server

Definition
A
Term

Which command enables you to eliminate DNS cache?

 

A) ipconfig

B) ipconfig /all

C) ipconfig /dns

D) ipconfig /flushdns

Definition
D
Term

Which tool enables you to query the functions of a DNS server?

 

A) ipconfig

B) nslookup

C) ping

D) xdns

Definition
B
Term

A hash function is by definition

 

A) A complex function

B) A PKI function

C) A one-way function

D) A systematic function

Definition
C
Term

Which of the following is a common hash function?

 

A) MD5

B) RC4

C) AES
D) BMX

Definition
A
Term

In order to have a PKI infrastructure you must have a(n)

 

A) Web server

B) Web of trust

C) Root authority

D) Unsigned certificate

 

Definition
C
Term

Which type of access control requires a label to define its sensitivity?

 

A) MAC

B) DAC

C) RBAC

D) VAC

Definition
A
Term

IF you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?

 

A) PPP

B) Radius

C) MS-CHAP

D) TACACS+

Definition
B
Term

You are a network administrator attempting to troubleshoot a WINS server.  Which tool would you most likely use to diagnose this?

 

A) Nbstat

B) Netstat

C) Nslookup

D) Dig

Definition
A
Term

Which of the following methods of authentication will also provide AAA and uses UDP?

 

A) TACACS+

B) Radius

C) RAS

D) Kerberos

Definition
B
Term

A user is concered that his password is being sent in a clear text when he connects to the Radius server using PAP.  Which of the following is true about security using Radius?

 

A) it uses a public key to encrypt messages between the client and server

B) it uses a private key to encrypt messages between the client and server

C) It uses a shared secret to encrypt messages between the client and server

D) It uses a CUS/DSU to encrypt the data between the client and server

Definition
C
Term

You are wanting to use FTP to transfer files on the internet at your office, but your network administrator says that it is not a good idea and that they have blocked FTP access using the firewall.  What could the network admin's reasons be for blocking FTP?

 

A) FTP is unable to transfer encrypted files

B) FTP can't be tunneled using a VPN connection

C) FTP is a legacy protocol and can't be used on modern networks

D) FTP Transmits all passwords in plain text

Definition
D
Term

Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening?

 

A) 802.3ad

B) TKI

C) WPA2

D) 802.1X

Definition
D
Term

Which of the following do you need to be able to use a digital signature?

 

A) Fingerprint

B) Digital Certificate

C) Encryption Certificate

D) Algorithm Certificate

Definition
B
Term

Which protocol uses time synchronization across the internet?

 

A) NTP

B) NCP
C) NTFS

D) NNTP

Definition
A
Term

What Windows utility enables you to query information from the DNS server and change how your system uses DNS?

 

A) Arp

B) NBtstat

C) tracert

D) nslookup

Definition
D
Term

What utility generates this output:

 

Server: Unknown

Address: 192.168.4.11

 

Non-authoritative answer

Name: www.totalsem.com

Address 209.29.33.25

 

A) Ping

B) Netstat

C) Ipconfig

D) Nslookup

Definition
D
Term

A static VLAN assigns VLANs to

 

A) IP addresses

B) MAC addresses

C) Ports

D) Trunks

Definition
C
Term

A content switch always works at least at which layer of the OSI model?

 

A) 2

B) 3

C) 4

D) 7

Definition
D
Term

What is the main difference between an IDS and an IPS?

 

A) An IPS documents intrusions

B) An IPS is always a stand-alone box

C) An IPS reacts to an attack

D) An IPS uses port mirroring

Definition
C
Term

How do IPv6 multicasts different from broadcasts?

 

A) Broadcasts are sent to all network nodes: multicasts are sent only to specific network nodes
B) Both broadcasts and multicasts are sent to all network nodes, but in a multicast, only the destination nodes process the incoming packets

C) Broadcasts can cross over a router, whereas multicasts cannot

D) Broadcasts are used on local networks; multicasts are used on the Internet

Definition
B
Term

What is the /16 prefix for all 6to4 address?

 

A) 2001

B) 2003

C) 2002

D) 2021

 

Definition
C
Term

Which of the following is the valid reduced version of the address 2001:0489:000f:0000:0000:1f00:0000:000d

 

A) 2001:489:000f:0000:0000:1f00:0000:000d

B) 2001:489:f::f00::d

C) 2001:0489:000f::1f00:0000:000d

D) 2001:489:f::1f00:0:d

Definition
D
Term

A small bookstore and a hand-crafted jewely company share the same building. To save costs on infrastructure, they want to use a single advanced switch, but still retain two seperate networks. What feature would accomplish that goal?

 

A) Bandwitch Shaping

B) Load balancing

C) Trunking

D) VLAN

Definition
D
Term

You have just recently made changes to your network by seperating the printers into their own network in order to increase security.  An employee begins their day at work by moving their workstation and printer to a new desk. They hookup their equipment and connect both devices to the network using a nearby wall jack.  Both devices attain an IP address from the DHCP server.  The user can no longer access the internet from the PC. Priting works just fine.  What is the problem?

 

A) The laptop connects to a switch that is having a duplex mismatch

B) The laptop has a 100Base TX NIC, while the switch is 1000BaseT

D) The desktop is in the wrong VLAN

Definition
D
Term

You are looking into setting up a VPN connection at your offices and you want the VPN to operate at the highest layer of the OSI model. Which protocol would allow this?

 

A) PPTP

B) IPSec

C) L2TP
D) SSL

Definition
D
Term

What is the function of a proxy server?

 

A) It protects the internet from internal network traffic

B) It converts external ip addresses to private IP addresses for clients on the internal network so that applications running on those clients do not have to be configured for proxy service

C) It acts as an intermediary that encrypts all incoming and outgoing data packets

D) It hides internal network IP addresses from computers on the internet

Definition
D
Term

A network IPS will give your network which of the following capabilities?

 

A) Packet-based detection and prevention of network attacks

B) Enables IPsec for all workstations on your local network

C) Uninterruptible power for the network devices on the LAN

D) Bandwith shaping for all packets entering the private, internal network

Definition
A
Term

You are concered about malicious attacks on your network.  Which of the following would you get in order to screen and prevent these attacks?

 

A) IDS

B) VLAN

C) NIPS
D) HIDS

 

Definition
C
Term

A ______ enables the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently, because the information can be downloaded once for the use by multiple hosts

 

A) SMTP Server

B) Proxy Server

C) NAT Server

D) DNS Server

Definition
B
Term

This server acts as a go-between on Rocky's network, enabling the clients on his network to connect through it to access web pages instead of connecting to web sites directly

 

A) SMTP server

B) WINS Server

C) Proxy Server

D) DNS Server

Definition
C
Term

What are available options for transporting data through a VPN? (Select three)

 

A) SSL
B) PPTIP

C) ISEC

D) RDP

E) RAS
F) VLAN

Definition
A,B,C
Term

John, the network administrator for the ACME building needs to set up network for two different groups.  What feature would he need to use on his switch to enable both groups to use the sae switch yet remain seperate?

 

A) Enable trunking

B) Enable VLANs

C) Enable port mirroring

D) It can't be done. He needs two switches

 

Definition
B
Term

Tracy is a network administrator for a company. She has setup VoIP and data traffic on different subnets. Which of the following strategies could she use to provide both services to hosts on the same UTP cable?

 

A) Change the RJ-45 connectors from 568A to 568B

B) Enable STP on the switches

C) Use PPP

D) Implement seperate VLANs

 

Definition
D
Term

A user calls from the account department complaning that he only sees the server used by distribution, not the accounting server. A check of his IP address shows that he indeed got the wrong IP address from the DHCP server.  What could be the problem?

 

A) Wrong gateway

B) Port Duplex mismatch

C) Incorrect VLAN

D) Wrong subnet mask

Definition
C
Term

Which protocol creates a safe, encrypted private network connection over the internet?

 

A) VPN

B) TCP

C) DNS

D) PPTP

Definition
D
Term

Lizanne wants all the hosts in her TCP/IP network to share a single IP address to the internet. What type of server could she use?

 

A) DHCP server

B) WINS server

C) DNS Server

D) Proxy Server

Definition
D
Term

Select all the advantages of having a managed switch over an unmanaged switch

 

A) Fewer collision domains

B) The switch will have trunking capabilities

C) Your switch will have use of SNMP

D) You will have a gigabit ready switch

E) You will have more broadcast domains

 

Definition
B&C
Term

You have only one switch but you want it to support two seperate network segments.  What should you do to accomplish this?

 

A) Enable SNMP

B) Enable SMTP

C) Implement Qos on the switch

D) Implement VLANs on the switch

Definition
D
Term

BRI ISDN uses

 

A) 1 B channel and 24 D channels

B) 24 B channels and 1 D channel

C) 1 B channel and 2 D channels

D) 2 B channels and 1 D channel

Definition
D
Term

The V.90 standard defines a modem speed of

 

A) 56 kbps

B) 33.6 K baud

C) 28.8 kbps

D) 2400 baud

Definition
A
Term

You have just had DSL installed at your house and while the Internet connection is fast, your phones no longer work.  What is the problem?

 

A) The installer failed to install the POTS filters on the phones

B) Nothing; the phones can't function at the same time as the Internet

C) The house phone lines can't handle the bandwith of both the phone and DSL

D) The DSL modem is missing the filter and is causing line interference

Definition
A
Term

Sonet is used for long-distance, high speed, fiber-optic transmission

 

A) Short-distance, high-speed, fiber optic transmission

B) Long-distance, high-speed, fiber-optic transmission

C) Long distance, low speed, copper cable transmission

D) Short distance, low speed copper cable transmission

 

Definition
B
Term

What does SIP stand for?

 

A) Standard Initiation Protocol

B) System Internetworking Protocol

C) Session Initiation Protocol

D) Sector Information Protocol

Definition
C
Term

What function does CSMA/CD provide that CSMA/CA does not?

 

A) Data packet collission detection

B) End-to end data packet encryption

C) Data packet collision avoidance

D) Data packet error checking

Definition
A
Term

Which of the following advantages does WPA have over WEP? (Select three)

 

A) End-to end data packet encryption

B) EAP user authentication

C) Encryption key integrity checking

D) 128-bit data encryption

 

Definition
A,B,C
Term

What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two)

 

A) An access point

B) A router

C) A hub

D) A wireless bridge

Definition
A&D
Term

What do you call a wireless Ethernet network in infrastructure mode with more than one access point?

 

A) BSS

B) EBSS
C) WBSS

D) Exnet

Definition
B
Term

What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard?

 

A) WAP Server

B) Wep server

C) Radius Server

D) NAS Server

Definition
C
Term

Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a seperate authentication server to gain access to the network.  Which method would work BEST?

 

A) WEP2

B) Radius

C) Kerberos

D) AES

Definition
B
Term

A BRI ISDN circuit transmits data at what rate?

 

A) 28.8 kbps

B) 33.6 kbps

C) 56 kbps

D) 128 kbps

Definition
D
Term

Which of the following has the greatest bandwith?

 

A) T3

B) ADSL

C) SDSL

D) OC-3

Definition
D
Term

How should you configure multiple 802.11g wireless access points to create a single network that enables users to roam freely?

 

A) Configure all the WAPs to use the same SSID

B) Configure all the WAPs to use the same frequency

C) Configure all the WAPs to use the same channel

D) Configure each WAP to use a unique security setting

Definition
A
Term

Sally has a wireles network and has noticed significant slow downs at random times during the day.  She believes her neighbors may be connecting to her wireless network. Of the following choices, which would be used to limit access to her network? (Choose two)

 

A) WPA2 encryption

B) Switching the channels

C) Mac filtering

D) Changing from 802.11g to 802.11n

E) Disabiling the SSID

Definition
A&C
Term

A user on an IEEE 802.11b network has entered an incorrect WEP key. What will be the result?

 

A) She will receive a signal, but will not be able to access the network

B) The signal strength will be too low to be useable

C) A warning message will appear on the user's screen

D) She will have only limited access to the network

Definition
A
Term

Which types of WAN communication can be tested using a BERT? (Select two)

 

A) Cable Modem

B) Satellite

C) DSL

D) TI

E) WiMax

 

 

 

Definition
C&D
Term

What does WPA2 include that WPA did not?

 

A) AES

B) TKIP

C) 3DES

D) Radius

Definition
A
Term

A client wants secure wireless network installed.  Which of the following should be implemeneted on the wireless router to provide the highest level of security?

 

A) IPSec

B) VPN

C) WEP

D) WPA

Definition
D
Term

Which of the following would be the best place to use a dipole antenna?

 

A) In a hallway

B) Outside

C) On a wall

D) To connect two building wirelessly

Definition
B
Term

What is the most common technique for protecting a network?

 

A) Port Filtering

B) Hiding IP addresses

C) Packet Filtering

D) Encryption

Definition
B
Term

What are the names of the administrative accounts on Windows and Linux?

 

A) "Administrator" on both

B) Administrator on Windows, admin on Linux

C) Admin on Windows, root on Linux

D) Administrator on Windows, root on Linux

Definition
D
Term

You receive a call at your desk from someone claiming to be this new supervisor for the sales department. The caller says he forgot his password and asks if you can remind him what it is. How is this categorized? (Select three)

 

A) Internal Threat

B) External Threat

C) Social Engineering

D) Denial of Service

Definition
A,B,C
Term

RAID is an implementatin of what concept?

 

A) Phising prevention

B) Fault tolerance

C) Network encryption

D) User account control

Definition
B
Term

John is a member of the sales group, which has read permissions on a file. He is also a member of the tech group, which has write permissions on the same file. What are John's effective permissions on the file?

 

A) Read only

B) Write only

C) Read and write

D) No access

Definition
C
Term

Which are examples of malware (Select all that apply)

 

A) Virus

B) Worm

C) Trojan

D) Rootkit

 

Definition
All
Term

Difference between a DoS and DDos?

 

A) A DoS uses a single zombie whereas a DDos uses a botnet to attack a single system

B) A DoS uses a botnet whereas a DDoS uses a zombie to attack a single system

C) A DoS attacks a single system whereas a DDos attacks multiple systems

D) A DoS attacks systems on the Internet whereas a DDos attacks systems in a DMZ

Definition
A
Term

Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously?

 

A) CPU

B) Hard Drive

C) RAM

D) Windows

Definition
C
Term

What enables two VMs hosted on the same physical machine to communicate without leaving the machine itself?

 

A) NaaS

B) Virtual LAN

C) Virtual PBX

D) Virtual switch

Definition
D
Term

Difference between a virtual machine and an emulator?

 

A) A VM converts commands to and from a host machine to an entirely different platform, whereas an emulator creates an environment base on the host machine and does no converting

B) An emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting

C) Emulator requires a host OS, whereas a VM runs on bare-metal server without an OS

D) A VM requires a host OS whereas an emulator runs on bare-metal servers without an OS

Definition
B
Term

Which program handles telephone switching in software rather than hardware?

 

A) Virtual LAN

B) Virtual PBX

C) Virtual switch

D) Virtual 64 block

Definition
B
Term

What do you make when you save a copy of a VM?

 

A) Replacement

B) Save

C) Snapshot

D) Zip

Definition
C
Term

What is the benefit of Network as a Server (Naas)?

 

A) The network hardware is managed locally

B) The network service is managed by someone else

C) The network service is managed locally

D) The montly subscription fee reduces cost

 

 

Definition
B
Term

What is the one benefit of ESX over VMware Workstation?

 

A) ESX costs less

B) ESX is easier to set up

C) ESX uses less electricity

D) You can move a running VM from one machine to another with ESX

Definition
D
Term

VMware Workstation replace control-alt-delete with

 

A) a mouse click

B) ctrl-alt-insert

C) ctrl-alt-tab

D) ctrl-alt-shift

Definition
B
Term

Jim is about to install a wireless network. A fellow network admin warned him about war drivers. What should Jim do to reduce the chance of exposing the wireless signals to war drivers?

 

A) WAP placement

B) MAC address filtering

C) Authentication method

D) Encryption type

Definition
A
Term

You have just installed a new device that performs stateful packet filtering on your company's network. Which of the following describes this device?

 

A) Proxy server

B) Firewall

C) DNS Server

D) IDS

Definition
B
Term

Your company wants to test out the security of your network by allowing attackers to hit a fake network that you create. Which technology would you need to use?

 

A) Honeynet

B) Honeypot

C) NIDS

D) NMAP

Definition
A
Term

Your company requires the use of a smart card, biometric device, and a password to login to your system. What kind of authentication are they using?

 

A) Single sign-on

B) Two-factor authentication

C) Multifactor authentication
D) Kerberos

Definition
C
Term

Your company wants to reduce power consumption on a wide scale. Which technology would help in accomplishing this?

 

A) Managed switches

B) Load balancing

C) Virtual Servers

D) Power over enternet

Definition
C
Term

Firewalls can be used for which of the following?

 

A) protocol analysis, packet filtering, and content filtering

B) Packet sniffing, protocol analysis, and content filtering

C) Content filtering, packet filtering and port filtering

D) port scanning, packet sniffing and packet filtering

Definition
C
Term

Because of security, you want to install a Microsoft Exchange server, Apache Web server and Microsoft Active Directory on three different servers. Which of the following technologies would help you do this while reducing your hardware costs?

 

A) Virtual Servers

B) WPA Encryption

C) A VPN connection

D) 802.1X

 

 

Definition
A
Term

Which of the following would be a reason to use a firewall?

 

A) To prevent your system from overheating

B) Save money on equipement costs

C) To prevent hardware failures

D) restrict unauthorized users from accessing the network from the outside

Definition
D
Term

Which networking device can you configure to block or allow ports and IP addresses from accessing the internet?

 

A) unmanaged switch

b) router

C) IIS server

D) firewall

Definition
D
Term

Bebe is connecting her network to the internet. What does she need to install between her network and the internet to provide security for her systems?

 

A) A gateway

B) a firewall

C) A router

D) A VLAN

Definition
B
Term

Which of the following describes standards for physical wiring in a network?

 

A) Baseline

B) Demarc

C) Network diagram

D) Wiring Scheme

Definition
D
Term

Which of the following defines the type of connection or technology used in a network and maps how each machine connects?

 

A) Baseline

B) Demarc

C) Network Diagram

D) Wiring Scheme

Definition
C
Term

John wants to analyze the procedure for adding a new file server on his network. What should he do?

 

A) Ask his supervisor

B) Check the change management documentation

C) Redraw the network diagram

D) Refraw the wiring diagram

 

Definition
B
Term

What defines the performance of the network when everything is working properly?

 

A) Baseline

B) Demarc

C) Network diagram

D) Wiring Diagram

Definition
A
Term

What is a record of data about your system?

 

A) Counter

B) Log

C) Node

D) Object

Definition
B
Term

How can you ensure that your servers will continue to run during a blackout?

 

A) Implement load balancing

B) Implement network monitoring

C) Install a backup generator

D) Install a traffic shaper

Definition
C
Term

Grandfather, father, son is an example of what?

 

A) Backup rotation

B) Log file entries

C) RAID array

D) Bandwidth shaping

Definition
A
Term

What is the minimum number of drives required for a RAID 5 array?

 

A) One

B) Two

C) Three

D) Four

Definition
C
Term

What tool in Windows enables you to look at log files?

 

A) Baseline Viewer

B) Event Viewer

C) Network Monitor

D) Performance Monitor

Definition
B
Term

You have just arrived at work and find that users are having issues connecting to the Web server. Last night, another network technician made an upgrade to the Web server. Which document might help you in resolving the problem?

 

A) Change management

B) Cable management

C) Network maps

D) Wire schemes

Definition
A
Term

A network technician is trying to determine which TIA/EIA standard is being used for his MDF's patch panels. Where should he look to find this information?

 

A) Network Map

B) Asset Management

C) Wiring Schemes

D) Baselines

Definition
C
Term

What's the first step needed when building a SOHO network?

 

A) Define the network needs

B) Design the network

C) Select network infrastructure

D) Pull Cable

Definition
A
Term

When you have a cable pulled, what should the installer provide you in terms of documentation?

 

A) The documentation should show the length of the runs, labeling, CAT ratings and a floor plan

B) The isntaller only needs to label the cabels

C) The installer only needs to pull the cables

D) The documentation should show the witdh of the cables an the cost of the runs

Definition
A
Term

What program enables you to access a server when the server is turned off?

 

A) GBIC

B) LOM

C) PBX

D) Virtual PBX

Definition
B
Term

Which of the following block of IP addresses would be best for a private network that has an internet connection through a gateway router?

 

A) 10.200.65.0 /8

B) 135.10.0.0 /16

C) 192.168.1.0 /24

D) 225.1.1.0/16

Definition
A&C
Term

Which of the following devices would enable you to add, not replace, a port on a typical Cisco switch?

 

A) GBIC

B) HWIC

C) PBX

D) SFP

Definition
B
Term

John installed a new router that's running more slowly than it should. He suspects some type of mismatch between the Ethernet frame and the frame needed by the DSL. When he tries to ping the router, though, he gets no response. He can access the router through its Web interface just fine. What could the problem be?

 

A) The connection between his system and the router is down

B) The router is an MTU black hole

C) The MTU mismatch has blocked ping

D) The router is running PMTU

Definition
B
Term

Melissa replaced a faulty SFP with another one from the server room. The new one doesn't enable a connection. What's an option to fix the problem?

 

A) Replace the router

B) Replace the server

C) Replace the new SFP

D) Reinstall Windows Server

Definition
C
Term

Which of the following is a dedicated computer that's preconfigured to offer file storage for many types of client computers?

 

A) Active Directory

B) NAS

C) PAN

D) SPAN

Definition
B
Term

What type of electrical setup is ideal for a network closet?

 

A) Circuits shared with no more than two other locations

B) Dedicated circuit

C) High-voltage circuit

D) Any circuit will do

Definition
B
Term

What does nslookup do?

 

A) Retrieves the name space for the network

B) Queries DNS for the IP address of the supplied host name

C) Performs a reverse IP lookup

D) Lists the current running network services on localhost

Definition
B
Term

What is wireshark

 

A) Protocol analyzer

B) Packet sniffer

C) Packet analyzer

D) All of the above

Definition
D
Term

When trying to establish symptoms over the phone, what kind of questions should you ask of a novice or confused user?

 

A) You should ask open-ended questions and let the user explain the problem in his or her own words

B) You should ask detailed, closed-ended questions to try and narrow down the possible causes

C) Leading questions are your best choice for pointing the user in the right direction

D) None, ask the user the bring the machine in because it is useless to troubleshoot over the phone

Definition
A
Term

While you are asking the user problem-isolating questions, what else should you be doing?

 

A) Asking yourself if there is anything on your side of the network that could be causing the problem?
B) Nothing; just keep asking the user questions

C) Using an accusatory tone with the user

D) Playing solitaire

Definition
A
Term

Once you have implemented your solution, you should always ___

 

A) Close the ticket

B) Verify full system functionality

C) Return the machine

D) Reboot

Definition
B
Term

What is the last step in the troubleshooting process?

 

A) Implementing the solution

B) Testing the solution

C) Documenting the solution

D) Closing the help ticket

Definition
C
Term

Which of the following types of protocols might lead to a user's credentials being discolsed to possible attackers if a protocol analyzer is used? (Select as many as appropriate)

 

A) TFTP

B) Telnet

C) FTP

D) SCP

E) SNMPv3

Definition
B&C
Term

Sam is troubleshooting a network issue and has just established his place of action to fix it. Which of the following will be his NEXT step to resolve the problem?

 

A) Implement the plan of action and contact management if necessary.

B) Ensure that the network is functioning correctly

C) Document the outcomes of the plan

D) Determine if that anything has changed on the network

Definition
A
Term

You have a network with 25 users. All the users are complaining about the network moving too slowly, even when only one person is accessing the server. Which of the following tools could you use to troubleshoot the bottleneck (Select three)

 

A) Network analyzer

B) Loopback device

C) Packet Sniffer

D) Protocol analyzer

E) TDR

Definition
A,C,D
Term

You are troubleshooting and repairing a network by implementing a new IPS. After installing the new device and configuring it for the network, what should you do next?

 

A) Verify network functionality

B) Identify the problem

C) Document you installation and the results

D) Contact your network administrator for further instructions

Definition
A
Term

Your Windows 7 system suddenly can't reach the internet. You know that your DHCP server has been intermittently malfunctioning. What command can you type to see if it gave you an IP address, default gateway and other necessary IP configuration before it crashed?

 

A) Ifconfig

B) ipconfig

C) NSlookup

D) Route print

Definition
B
Term

Everyday at the office, we play Counter Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action-our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occuring?

 

A) Tracert

B) Tracerout

C) Ping

D) ARP

Definition
A
Term

Carl is complaining that his internet connection is moving at a snail's pace. Which command line utility could you use to find out why?

 

A) Tracert

B) Ping
C) Netstat

D) Nbstat

Definition
A
Term

Fred has just purchased a new home router for his SOHO Internet connection. He can't get on the Internet. He opens the web browser interface for the router and determines that his WAN address is 0.0.0.0. Which of the following is the BEST way to resolve this?

 

A) Run ipconfig /renew on his PC

B) Do a DHCP renew via the router's Web brower interface

C) Restart his PC

D) Verify the router is configured for a static WAN IP address

Definition
B
Term

I can't see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following commands might I try to test my connection with your machine?

 

A) Ping Woobie

B) Netstat Woobie

C) Nbstat Woobie

D) SMTP Woobie

Definition
A
Term

Which of the following utilities can you use to confirm connectivity to another TCP/IP host?

 

A) ARP

B) Ping

C) Nbstat

D) Netstat

Definition
B
Term

You have just opened a new business in a recently renovated loft in the downtown area of a busy city. The owner of the building says that they are unable to run additional wiring for networking because they need to preserve the history of the building. Because of this, you have decided to implement a wireless network. What is going to be your FIRST step in setting up your SOHO network?

 

A) Run a wireless site survery

B) Convince the landlord that wired Ethnernet is more secure

C) Setup new switches in your office

D) Find drivers for your new wireless cards

Definition
A
Term

You get a "duplicate IP address" error. Which tool could you use to help identify the conflicting system?

 

A) Arp -a

B) tracert

C) ipconfig /all

D) netstat -a

Definition
A
Term

Which two of the following should you do first when you are designing and implementing a new network (Select two.)

 

A) Run a network analyzer

B) Buy all new NICs

C) Begin documentation on your system and network

D) Determine the company's network needs and expectations

Definition
C&D
Term

Which of the following tools enables you to inspect network traffic?

 

A) Throughput tester

B) Protocol Analyzer

C) Connectivity Software

D) Ping

Definition
B
Supporting users have an ad free experience!