Advertisement Upgrade to remove ads

Study Gudie for Network+ Exam

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).
A. Layer 2 switch
B. MAC address filtering
C. ACLs
D. IIS server
E. Port scanner
F. Firewall

C. ACLs
F. Firewall

Which of the following authentication solutions also provides AAA and uses TCP?
A. TACACS+
B. Kerberos
C. RADIUS
D. RAS

A. TACACS+

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS

A. Honeynet

The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5

C. Layer 4

Which of the following separates broadcast domains?
A. Port mirroring
B. Router
C. Convergence
D. Switch

B. Router

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C.Set monitoring SSID
D. Select WPA2

A. Enable an SNMP agent

Which of the following commands can Lisa, a technician, use on a server to display the default router setting?
A. ping
B. nslookup
C. route
D. arp

C. route

Which of the following commands can Lisa, a network technician, use to check whether the DNS
server for a given domain is reachable?
A. nmap
B. nbtstat
C. dig
D. arp

C. dig

Which of the following could Kim, a network technician, use to find the approximate location of a break in a long network cable?
A. Protocol analyzer
B. Time domain reflectometer
C. Toner probe
D. Multimeter

B. Time domain reflectometer

Which of the following protocols is commonly used for VoIP technology?
A. Telnet
B. SMTP
C. SIP
D. SNMP

C. SIP

Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as an option on an 802.11g device?
A. SSID
B. Encryption
C. Channels
D. Spectrum

D. Spectrum

Which of the following technologies could be implemented to improve call clarity when using VoIP Technology?
A. Static IP addressing
B. Caching engines
C. QoS
D. Port forwarding

C. QoS

When using high bandwidth applications over multiple WAN connections, which of the following should be used?


A. Static IP addressing
B. Half-duplex
C. PoE devices
D. Load balancing

D. Load balancing

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality?
A. Establish a plan of action to resolve the problem and identify potential effects.
B. Implement the solution.
C. Establish a theory of probable cause.
D. Document findings, actions, and outcomes.

D. Document findings, actions, and outcomes.

Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
A. Verify full system functionality and if applicable implement preventative measures.
B. Implement the solution or escalate as necessary.
C. Document findings, actions, and outcomes.
D. Establish a theory of probable cause (e.g. question the obvious).

B. Implement the solution or escalate as necessary.

Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
A. TDR
B. Protocol analyzer
C. Multimeter
D. Cable crimper

A. TDR

A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem?
A. Environmental monitor
B. Cable tester
C. TDR
D. Loopback plug

A. Environmental monitor

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20
B. 21
C. 22
D. 23

C. 22

Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23

D. 23

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?
A. Cable tester
B. Toner probe
C. Cable crimper
D. Punch down tool

B. Toner probe

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?
A. CNAME
B. A
C. MX
D. PTR

B. A

Which of the following is used to prevent Layer 2 switching loops within a local area network?
A. STP
B. MTU
C. EGP
D. IGP

A. STP

A bridge handles frames at which of the following layers of the OSI model?
A. Network
B. Session
C. Transport
D. Data Link

D. Data Link

Which of the following is a method to prioritize network traffic coming from VoIP phones?
A. PAT
B. DNS
C. SIP
D. QoS

D. QoS

Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO).
A. MAC addressing
B. IP addressing
C. Port speed
D. IPv6 addressing
E. Duplex

C. Port speed
E. Duplex

Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?
A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug

A. Cable tester

Which of the following technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree

D. Spanning Tree

A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
A. IS-IS
B. BGP
C. OSPF
D. RIP

B. BGP

Which of the following BEST describes a switch port?
A. Broadcast domain
B. Distance vector
C. Link state
D. Collision domain

D. Collision domain

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?
A. Loopback plugs
B. Butt set
C. Cable certifier
D. Toner probe

B. Butt set

In which of the following wireless standards is MIMO used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

D. 802.11n

Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?
A. netstat
B. route
C. nslookup
D. arp

C. nslookup

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel

C. WAP SSIDs are matching

Which of the following is the usual number of bits for the host identifier part of an IPv6 address?
A. 16
B. 32
C. 48
D. 64

D. 64

Which of the following can Jeff, a network technician, change to help limit war driving?
A. Signal strength
B. SSID
C. Frequency
D. Channel

A. Signal strength

Which of the following is the prefix for a link-local IPv6 address?
A. FE80::/10
B. FF00::/8
C. 2FFE::/16
D. FEEF:/12

A. FE80::/10

Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO).
A. Physical
B. Session
C. Data Link
D. Network
E. Transport

A. Physical
C. Data Link

Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server?
A. nbtstat command
B. dig command
C. ipconfig command
D. Protocol analyzer

D. Protocol analyzer

DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOST likely use to verify this problem?
A. arp
B. nbtstat
C. traceroute
D. dig

D. dig

Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?
A. OTDR
B. Protocol analyzer
C. Toner probe
D. TDR

C. Toner probe

Which of the following address blocks would MOST likely be blocked from crossing a border router?
A. 8.0.0.0/8
B. 172.16.0.0/12
C. 122.0.0.0/24
D. 248.0.0.0/8

B. 172.16.0.0/12

Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of a switch?
A. traceroute command
B. SNMP monitor
C. nbtstat command
D. dig command

B. SNMP monitor

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?
A. nslookup
B. route
C. nbtstat
D. arp

A. nslookup

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
A. Proxy server
B. Traffic shaping
C. Caching engines
D. Load balancing
E. Quality of service

B. Traffic shaping
E. Quality of service

Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?
A. Network map
B. Cable management
C. Change management
D. Asset management

C. Change management

Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
A. This is a private address which cannot be seen by external users.
B. The address does not have the appropriate subnet mask assigned.
C. This is a public address which can only be seen by internal users.
D. This is a private address which can only be seen by external users.

A. This is a private address which cannot be seen by external users.

Zach, a network technician, is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?
A. Latency
B. Attenuation
C. Crosstalk
D. Frequency hopping

A. Latency

Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?
A. VLAN malfunction
B. Broadcast storm
C. Quality of Service loss
D. Duplicate IP addresses

B. Broadcast storm

Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
A. 192.168.0.255
B. 192.168.0.1
C. 192.168.0.0
D. 192.168.0.253

A. 192.168.0.255

Which of the following protocols is used to securely connect to a multi-layer switch?
A. HTTP
B. SMTP
C. SSH
D. Telnet

C. SSH

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080

D. 161
E. 162

Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?
A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler

A. Loopback plug

Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets within the same subnet based on IP addresses

A. Switches packets within the same subnet based on MAC addresses

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be
used on that workstation to verify its current network settings?
A. net share
B. hostname
C. ipconfig
D. tracert

C. ipconfig

Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?
A. Butt set
B. Toner probe
C. Wire mapper
D. Cable certifier

A. Butt set

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe

B. Butt set

Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?
A. Multimeter
B. Loopback plug
C. Cable certifier
D. CAT3 coupler

B. Loopback plug

Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?
A. Reservations
B. Lease times
C. Removing IPs from the active leases
D. Configuring the DNS options

A. Reservations

Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device?
A. DNS suffixes
B. DHCP relay agent
C. Static IP addressing
D. Scope configuration

B. DHCP relay agent

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the wiring back to the patch panel?
A. Butt set
B. Cable certifier
C. Toner probe
D. Snips

B. Cable certifier

A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?
A. Butt set
B. Punch down tool
C. Toner probe
D. Protocol analyzer

C. Toner probe

Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
A. STP
B. PoE
C. VTP trunking
D. Port forwarding

B. PoE

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured?
A. IP address on the native VLAN interface
B. Port security
C. Port forwarding
D. IP address on the fiber interface

A. IP address on the native VLAN interface

Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing

D. Load balancing

Which of the following describes a rationale for a network with redundant paths?
A. VPN compatibility
B. Unified communications implementation
C. High availability requirement
D. QoS

C. High availability requirement

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?
A. OTDR
B. Multimeter
C. Punch down tool
D. Temperature monitor

C. Punch down tool

Which of the following is an example of a DHCP failover mechanism?
A. APIPA
B. Inactive lease
C. Reservations
D. Active lease

A. APIPA

Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?
A. WAP placement
B. PoE devices
C. MAC filtering
D. Encryption type

A. WAP placement

Lisa, a network technician, is troubleshooting a new wireless network that has been dropping connections. She notices another wireless network in the area. Which of the following BEST explains the reason for the dropped connections?
A. Latency
B. SSID mismatch
C. Interference
D. Encryption type

C. Interference

Which of the following limits the number of devices that can be assigned IP addresses by DHCP?
A. Lease
B. Reservation
C. DNS setting
D. Scope

D. Scope

Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11

A. 802.11a

Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN

D. VPN

Which of the following devices is used to distribute network traffic equally over multiple links?
A. Content filter
B. DNS server
C. Load balancer
D. Proxy server

C. Load balancer

Which of the following is used to restrict access according to user policies?
A. Content filter
B. DHCP server
C. DNS server
D. VPN concentrator

A. Content filter

Which of the following is used to filter outgoing network requests?
A. Proxy server
B. VPN concentrator
C. DHCP server
D. IIS server

A. Proxy server

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?
A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool

C. Toner probe

Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use?
A. Toner probe
B. Punch down
C. Wire tester
D. Crimper

B. Punch down

A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector?
A. Wire tester
B. Punch down
C. Crimper
D. Multimeter

C. Crimper

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?
A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor

A. Protocol analyzer

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption

C. Disable 802.11b and 802.11g

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?
A. Channel
B. WEP
C. SSID
D. WPA

C. SSID

Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach's NEXT step?
A. Test the theory
B. Establish a plan of action
C. Establish a theory
D. Document findings

D. Document findings

Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer

B. Content filter

Which of the following network devices hides network nodes behind one public IP address?
A. Layer 3 switch
B. Content filter
C. VPN server
D. Proxy server

D. Proxy server

A VPN concentrator is used for which of the following purposes?
A. MAC filtering
B. Content filtering
C. Secure network access
D. Connectivity troubleshooting

C. Secure network access

Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0

A. FastEthernet 0/0

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT

B. Cryptokey

Jeff, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?
A. PoE
B. Port mirroring
C. Convergence
D. Port speed

B. Port mirroring

Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information?
A. SNMP
B. NTP
C. SIP
D. PPTP

A. SNMP

Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?
A. Network map
B. Environmental monitor
C. Placement map
D. Syslog

D. Syslog

Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause?
A. Encryption type
B. Channel selection
C. Antenna placement
D. Signal strength

B. Channel selection

Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked

C. The cable is not a crossover.

Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should Jeff consider for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
E. VLANs

C. Port mirroring
E. VLANs

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?
A. Channel bonding
B. MIMO
C. Spatial reuse
D. 20MHz channel spacing

A. Channel bonding

Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?
A. Switch loop
B. Port bonding
C. Virtual switch
D. Port mirroring

A. Switch loop

Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?
A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs

C. Incorrect WEP key

Zach, a user, is unable to print to a network. The cable tests good and the correct VLAN is configured on the switch. Which of the following is MOST likely the cause?
A. The printer was configured for DHCP.
B. The switch was configured for trunking. C. The printer was configured for duplexing.
D. The switch was configured for PoE

A. The printer was configured for DHCP

Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP

A. SNMP v2

Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch?
A. SNMP trap
B. Bandwidth analyzer
C. Network sniffer
D. Syslog server

C. Network sniffer

Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
A. Change management
B. Baselines
C. Asset management
D. Cable management

A. Change management

A Windows server has a problem after booting up. Kim, a technician, should immediately check the:
A. history logs.
B. cron logs.
C. application logs.
D. system logs

D. system logs.

Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
A. Content filter
B. Proxy server
C. Layer 3 switch
D. Firewall

B. Proxy server

Jeff, a technician, was requested to change the wireless channel a WAP was operating on. Which of the following would be a valid reason for the change?
A. Interference
B. War driving
C. SSID
D. Frequency speeds

A. Interference

A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause?
A. Protocol mismatch
B. MTU size was not increased for the new distance
C. Incorrect VLAN assignment
D. Incorrect cabling

D. Incorrect cabling

A small office has asked to have six PCs networked together by Jeff, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Jeff need? (Select TWO).
A. Network bridge
B. RG-59 patch cabling
C. CAT5e patch cabling
D. Firewall
E. Switch

C. CAT5e patch cabling
E. Switch

Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?
A. Frequency interference
B. Low signal strength
C. Standard mismatch
D. Incorrect channel

A. Frequency interference

Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
A. A VPN client and VPN concentrator
B. A smart jack installed for each network jack
C. A managed switch with port mirroring
D. A proxy server with content filter

C. A managed switch with port mirroring

Which of the following DNS record types will be used for mail transfer if the MX record is not found?
A. CNAME
B. A
C. PTR
D. AAAA

B. A

Jeff, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal. Which of the following could be done together to solve this problem? (Select TWO).
A. Turn down the signal gain.
B. Increase the encryption method.
C. Change the wireless channel.
D. Replace the WAP's antennas with directional antennas.
E. Disable the SSID.

A. Turn down the signal gain
D. Replace the WAP's antennas with directional antennas.

Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?
A. VLAN
B. MTU
C. WPA
D. SSID

C. WPA

Which of the following should Jeff, a technician, do FIRST when setting up a SOHO network?
A. Set up an account with an Internet service provider.
B. Create a list of requirements and constraints.
C. Arrange a domain name with a suitable registrar.
D. Choose the correct operating system version

B. Create a list of requirements and constraints.

Which of the following issues is a common problem in wireless infrastructures?
A. Incorrect port number
B. Mismatched SSIDs
C. Invalid telnet sessions
D. Too many collisions

B. Mismatched SSIDs

Kim, a network administrator, is seeing workstations in building C authenticate to the building A
wireless access point. Which of the following would resolve this issue?
A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency

B. Reduce the transmission power

Lisa, a user, is unable to access the Internet. The network administrator notices that the workstation has an APIPA address. Which of the following is MOST likely not functioning correctly in this situation?
A. Broadcast address
B. Multicast address
C. DNS
D. DHCP

D. DHCP

Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?
A. PoE settings and VTP configuration
B. SNMP configuration only
C. IP address and SNMP configuration
D. QoS and PoE settings

C. IP address and SNMP configuration

After a recent generator test, several users are reporting network connectivity issues. Jeff, the network technician, is unable to connect via SSH to the main switch. Which of the following is the MOST likely cause of the connectivity issue?
A. Faulty cable
B. Misconfigured speed and duplex
C. Wrong gateway
D. Power loss

D. Power loss

Lisa, the network technician, has been instructed to provide connectivity to workstations within a SOHO that is over 800 feet (243 meters) away from the main switch. Which of the following would she install to provide connectivity?
A. CAT5e
B. CAT6
C. Coaxial
D. Multimode fiber

D. Multimode fiber

Which of the following DHCP options would need to be configured to ensure certain IP addresses within a scope are not leased out?
A. DNS IP address information
B. WINS IP address information
C. Superscopes
D. Reservations

D. Reservations

During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a

D. WPA2, SSID disabled, and 802.11a

A number of vendors visit a large corporation but are unable to connect to the company's wireless network. Kim, the network technician, verifies that other users are connected to the network and it seems to be fully operational. Which of the following steps should be taken NEXT to troubleshoot the issue?
A. Verify the SSID is enabled.
B. Ensure the WAP is up and running.
C. Ensure the transmission is not encrypted.
D. Verify the physical network is connected to the wireless network.

A. Verify the SSID is enabled.

Which of the following could cause employees to be redirected to an incorrect site after typing in the correct name in a web browser?
A. DNS cache poisoning
B. Mismatched MTU
C. Incorrect DHCP address
D. Duplicate IP address

A. DNS cache poisoning

Zach, a network technician, is trying to set up a SOHO network to allow Internet connectivity for all employees based on the following hardware: - 4 computers with LAN and wireless cards; - 1 router with 3 LAN ports; - 2 Ethernet cables
- 1 cable modem
The manager would like as many of the computers as possible to be physically connected, instead of using wireless. Which of the following scenarios would meet this requirement based on the equipment available?
A. The router should be connected to the modem and one PC can be physically connected to the router. All other PCs must connect wirelessly.
B. The modem should be physically connected to the router and two PCs can be physically connected to the router. All other PCs must connect wirelessly.
C. The router should be connected to the modem and three PCs can be physically connected to the router. The other PC must connect wirelessly.
D. The modem should be physically connected to one PC. All other PCs must connect wirelessly.

A. The router should be connected to the modem and one PC can be physically connected to the router. All other PCs must connect wirelessly

An 801.11g wireless access point was configured as follows:- AP encryption forced to WPA2-AES mode only; - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40; Which is true about the above configuration?
A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the
MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client.
B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client.

C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

Which of the following is the correct representation of an IPv6 address?
A. ::
B. 0:0:0:0:0:0:0:0:1
C. 1:2:3:4:AB:CD:EF
D. 2001::4860:800f::

A. ::

Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67
A. DHCP
B. FTP
C. SNMP
D. DNS

A. DHCP

Which of the following default ports are used with DHCP? (Select TWO).
A. 22
B. 23
C. 53
D. 67
E. 68

D. 67
E. 68

Which of the following is a reason to use dynamic DNS?
A. The host IP address is not listed in the firewall.
B. The host IP address is assigned by DHCP.
C. Static routes cannot be used on the host network.
D. A third-party certificate is being used.

B. The host IP address is assigned by DHCP.

Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?
A. Notify senior management of the issue.
B. Develop a probable cause theory.
C. Ask Jeff if anything has changed on the system.
D. Escalate the issue to the vendor.

C. Ask Jeff if anything has changed on the system.

Which of the following virtual components maintains a MAC-to-port forwarding table?
A. Virtual PBX
B. Virtual desktop
C. Virtual switch
D. Virtual server

C. Virtual switch

Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room. Arriving at the conference room, Jeff realizes that the laptop is in process of reconnecting to the wireless network. Which of the following is a common wireless problem that can cause this issue?
A. Mismatched SSID
B. Incorrect encryption type
C. Weak signal strength
D. Increased latency

C. Weak signal strength

Which TCP/IP model layer does the OSI model layer named 'session' respond to?
A. Application
B. Presentation
C. Internet
D. Transport

A. Application

Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?
A. SSID masking
B. PPPoE
C. Transmission power
D. Encryption technology

C. Transmission power

Zach, a network administrator, is checking work on some new CAT5 LAN network cabling installed at an organization. Multiple lines are receiving poor signals, and Zach finds the lengths of the runs to be sometimes over 350 feet (107 meters). Which of the following is the cause of the issue?
A. CAT5 cable runs over 330 feet (100 meters) need to utilize STP instead of UTP.
B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters).
C. CAT5 cabling is limited to single-run lines of 250 feet (76 meters).
D. CAT5 cabling needs to have terminators installed at each end for runs over 330 feet (100 meters).

B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters).

Many users on a small network are reporting that while they can share files amongst each other, access to the Internet has been lost. Lisa, the technician, finds that the Internet addresses are failing to resolve to IP addresses. Which of the following is malfunctioning?
A. DHCP
B. DNS
C. RADIUS
D. VPN

B. DNS

Kim, a network administrator, has made changes to the DHCP leasing setup for a given network and is expecting all devices to recognize the changes shortly. However, after a full week, none of the machines on the company network are grabbing new addresses with the new lease time. Which of the following is the problem?
A. The lease time on the original configuration was too long.
B. The firewall was never configured to recognize the changes.
C. The DHCP server was never restarted, so changes never took affect.
D. The lease time on the original configuration was too short.

A. The lease time on the original configuration was too long.

Kim, a network consultant, noticed that a new installation for a network backbone looked like this: ISP Switch Firewall PC. Which of the following is the BEST configuration for a properly setup environment?
A. Switch ? ISP ? Firewall ? PC
B. ISP ? Firewall ? Switch ? PC
C. Firewall ? ISP ? PC ? Switch
D. ISP ? PC ? Firewall ? Switch

B. ISP ? Firewall ? Switch ? PC

Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to host a website from a server within a privately addressed network and make it publicly available. Which of the following would have to be configured on the router to allow the public to access the website from one of the static IP addresses?
A. QoS monitoring
B. Static NAT
C. VLAN tagging
D. MAC filtering

B. Static NAT

Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks?
A. PPPoE authentication
B. MAC filtering
C. WPA encryption
D. Wireless channel

D. Wireless channel

In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?
A. Incorrect subnet mask
B. Mismatched MTU
C. Switching loop
D. VLAN mismatch

C. Switching loop

A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering

D. MAC filtering

A company's database software runs in the cloud. The device hosting the software is an example of which of the following?
A. Virtual server
B. Virtual switch
C. Virtual desktop
D. Virtual PBX

A. Virtual server

Lisa, a technician, is troubleshooting a laptop's connection to a wireless network and notices the user has placed their cell phone on top of the wireless router. Which of the following is the cell phone MOST likely generating?
A. Wrong encryption
B. An SSID mismatch
C. Latency
D. Interference

D. Interference

Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
A. Install two CAT6 cables with a repeater.
B. Install a 500 foot (152 meter) CAT5 cable.
C. Install a 500 foot (152 meter) CAT5e cable.
D. Install three CAT6 cables with a repeater.

A. Install two CAT6 cables with a repeater

Which of the following default services uses TCP/UDP port 88?
A. LDAP
B. IGMP
C. HTTP
D. Kerberos

D. Kerberos

Which of the following virtualized components would provide a secure operating environment for a business user?
A. Virtual PBX
B. Virtual switch
C. Virtual desktop
D. Virtual SAN

C. Virtual desktop

Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (Select TWO).
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5

B. Layer 2
C. Layer 3

Which of the following examples would require a private static IP address, but not a public static IP address?
A. A PDA connecting to the wireless network.
B. A laptop that is deployed on a LAN.
C. A file server deployed in the internal datacenter.
D. An Internet facing web server for external access.

C. A file server deployed in the internal datacenter.

Kim, a user, is experiencing performance issues with a home wireless network. She has performed the following steps:
- Checked to make sure the laptop is within the appropriate wireless network range; - Checked the connected SSID and wireless channel; - Checked that the laptop is the only device connected to the wireless network; Which is the MOST likely cause for the performance issues?
A. Kim has put in a static IP address on the wireless NIC, which is not within the appropriate home network IP range.
B. Another computer is on the network and is downloading video content. This is overloading and flooding the wireless link.
C. There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.
D. Kim has misconfigured the setting on the wireless client resulting in the WPA-TKIP password being incorrectly entered.

C. There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.

Which of the following would Zach, a network engineer, use to ensure a statically addressed device would receive the same IP address, if it reverted to dynamic addressing?
A. DHCP option 3
B. DHCP exclusion
C. DHCP lease
D. DHCP reservation

D. DHCP reservation

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set