Answer questions provided by Pinguis Website Design
Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?
Determine what has changed
Test a solution.
Establish the most probable cause
Escalate the problem to the right section
Which of the following authenticates a web server to the remote client in PKI?
FQDN
DNS name
Public key
Private key
An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?
nslookup
nbtstat
dig
netstat
Which of the following connector types is used for coax cable?
BNC
ST
LC
SC
In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:
MDF
Proxy
Demarcation point
Smart jack
Which of the following wireless standards has the highest maximum data rate?
802.11n
802.11b
802.11a
802.11g
Which of the following solutions will detect and disable a rogue access point?
Port scan
Packet sniffer
IPS
IDS
A zone transfer occurs over which of the following ports?
TCP 53
UDP 67
UDP 123
TCP 25
A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?
Since only half the leads are used, the cable will only work at 100Mbps.
The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.
There will be no proper data continuity; the standards utilize two different wiring diagrams.
The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables
An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?
Multicast
Unicast
Broadcast
Peer-to-peer
Which of the following protocols should be used to monitor network performance?
SNTP
SMTP
HTTP
SNMP
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?
Phishing
Smurf attack
Denial of service
Man-in-the-middle
Which of the following protocols requests membership to a multicast group?
IGMP
SNMP
SMTP
ICMP
A standard installation for wireless will use which of the following antenna types?
Sector
Patch
Yagi
Omni-Directional
Which of the following regulates the amount of network traffic a single node receives in a server cluster?
Load balancer
Proxy server
Content filter
Quality of service
A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
Peer to peer
Subnetting
VLAN
VPN
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?
Switch
Router
Repeater
Bridge
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?
Logical network diagram
History logs
Baseline configurations
Wiring schematics
Which of the following describes what the number two represents in l00Base2 cabling?
A. Fiber
B. Coaxial cable
C.
D.
UTP
Twisted pair
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
Session
Application
Network
Physical
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
Physical
Logical
Software
Authentication
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
1000BaseT
10GBaseSW
100BaseFX
100BaseTX
Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?
Network diagram
Performance baseline
Network security procedure
Company policy
Which of the following is a disadvantage of using the EIGRP protocol?
It does not scale well.
It converges slower than OSPF.
It is a proprietary protocol.
It is a distance vector protocol.
Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
RIP
DSI
BGP
ISIS
Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?
66 block
Demarc
Smart jack
110 block
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?
Setup an ACL that allows and logs all IP traffic between the two computers
Configure a spanning tree to check for a loop
Setup a span port on the switch to watch for CRC errors
Connect both computers using a crossover cable
Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
Switch
Hub
Modem
Repeater
Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)
NTP
VNC
RTP
SIP
TLS
Which of the following is a secure method of copying information over a public network?
SCP
SMTP
SNMP
TFTP
An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO).
TACACS+
RADIUS
Kerberos
802.1X
RRAS
An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?
2.4GHz
900MHz
1.1GHz
5GHz
An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?
Multimeter
Toner probe
Protocol analyzer
Butt set
An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?
netstat
traceroute
nbtstat
ping
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?
DSL
POTS
VDSL
Smart jack
Which of the following protocols uses UDP to transfer files?
FTP
SFTP
SMTP
TFTP
Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?
RG-6
STP
CAT3
UTP
Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?
Router
Hub
WAP
Switch
A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?
Port spanning
VLAN concentrator
Firewall
Router
Which of the following network topologies BEST describes a VPN? (Select TWO)
Point to Point
Point to Multipoint
VLAN
Ring
Bus
Which of the following cable speeds would provide the GREATEST theoretical bandwidth?
1000BaseT
100BaseT
10GBaseT
10BaseT
Which of the following is true about an IP address if the first bit is a zero?
The address is a Class A address.
The address is a Class B address.
The address is a Class C address.
The address is a Class D address.
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
Stripper
Punch down tool
Butt set
Snips
Which of the following is typically used In an LAN environment?
10GBaseSW
10GBaseLW
10GBaseSR
10GBaseEW
After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straightthru wires. Which of the following MOST likely describes this cable type?
Crossover cable with open pairs
Crossover cable
Rollover cable
Straight-thru cable with open pairs
A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?
Multimeter
Temperature monitor
Cable tester
Toner probe
Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?
GBIC
Hub
Bridge
Modem
An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
Butt set
Punch down tool
Cable tester
Cable stripper
Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?
NAT
Subnetting
DHCP
DNS
An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?
1, 6, and11
3, 6, and 9
11,16, and20
36, 40, and 44
An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?
Log the administrator password used
Test the air temperature
Update the network diagram
Review the evacuation procedures
Which of the following is a reason to block FTP at the corporate firewall?
It does not transfer encrypted files.
It cannot be tunneled in a VPN.
It is a deprecated protocol.
It transmits passwords in clear text.
A network IPS provides which of the following?
The layer 3 protocol on which other protocols like TCP and UDP communicate.
Enables the IPSec protocol on internal workstations.
Packet-based detection and prevention of network attacks.
Single mode IP communication for a fiber line between remote sites
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?
10.178.1.5/1
10.178.1.5/8
10.178.1.5/16
10.178.15/30
Which of the following should be configured to provide priority to voice traffic?
Port mirroring
DMZ
Qos
Trunking
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
WEP
PEAP
WPA
TKIP
Which of the following is an invalid subnet mask?
255.0.0.0
255.256.255.0
255.255.255.255
255.255.00
Which of the following tools would a technician use to check functionality of a physical network connection?
Butt set
Cable tester
Protocol analyzer
Voltage event recorder
Which of the following methods can move files in clear text and can be easily intercepted?
RSH
SNMP
FTP
TELNET
technician needs to troubleshoot connectivity between two devices located on the same network. Which
of the following BEST describes the type of protocol being used?
IGP
EIGRP
EGP
BGP
Which of the following ports are used by default for web servers? (Select TWO).
80
110
123
143
443
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?
Physical and logical network
Physical network
Logical network
DHCP tables and DNS records
Which of the following connectivity issues is likely to occur within a token ring network?
Crosstalk
Broadcast storm
Duplex mismatch
Collision
An administrator is having a hard time adding a new switch to the network. After verifying that all the ports are configured correctly on each switch, which of the following should the administrator verily NEXT?
Straight-through cable is used to connect both switches
Loopback plug is connected
Crossover cable is used to connect both switches
Cable is a rollover cable
Which of the following devices would MOST likely integrate a DHCP server?
Router
Hub
Switch
Bridge
The helpdesk is receiving calls about the corporate web server being down. Which of the following should be taken NEXT after verifying that the server is unreachable?
Escalate the call to a technician
Document any changes in the web server configuration.
Implement and test a solution.
Continuously ping the server until a ping response is obtained
Which of the following tools would an administrator BEST use to trace a network cable?
Toner
Cable tester
Butt set
Multimeter
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?
Multilayer switch
CSU
Proxy server
IDS
Which of the following technologies allows an administrator to submit traffic to an IDS for review?
Spanning tree
VLAN
PoE
Port mirroring
Which of the following is true of an ACL when a packet matching an ACE is found?
The matching ACE is skipped to allow all other ACEs to be examined.
The matching ACE is processed and then the last ACE is examined.
The matching ACE is processed and then the next ACE is examined.
The matching ACE is processed and the next packet is examined.
Which of the following technologies is used on the backbone of an ISDN?
VDSL
SDSL
OC3
ATM
A user connecting a laptop to a wall jack is prompted for user credentials before being granted access to the network. Which of the following is MOST likely implemented on the switch?
MAC filtering
PoE
IP filtering
802.1X
A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?
CAT3 cable
Serial cable
Crossover cable
Rollover cable
Which of the following is the purpose of QoS?
Load balance traffic across multiple LAN and WAN links.
Increase speed of network traffic.
Classify, mark, and prioritize traffic on WAN and LAN links
Guarantee traffic delivery.
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
10GBaseER
10GBaseSW
10GBaseLW
10GBaseEW
Prioritizing traffic between data and voice is defined as which of the following?
Caching engines
Proxy server
QoS
Load balancing
A demarcation point is usually installed and managed by which of the following providers?
Web host provider
VoIP company
Telephone company
Hardware manufacturer
Which of the following wiring distribution components should be chosen to provide level integrated diagnostic capabilities?
Vampire tap
Smart jack
Demarcation point
Programmable logic controller
A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?
The switches are not stackable.
The cable was not wired using 568A.
The cable needs to be a crossover cable
The switches have IGMP snooping enabled
Which of the following allows a WAP to be installed in a location where there are no power outlets available?
Port authentication
PoE
PPTP
Trunking
When testing a CAT5 cable, the technician notices that pin A is open. However, the cable still works fine. Which of the following describes how this is possible?
The cable was tested for 100BaseTX.
The cable is a 1000BaseT cable.
The switch uses link aggregation,
The switch was setup to use MDIX.
Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?
25
80
110
143
Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?
WPA-PSK encryption
SSID broadcast
Port forwarding
MAC filtering
Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO)
OSPF
RIP
EIGRP
IGRP
RIPv2
When installing a wireless network in a large area, which of the following is the FIRST thing that should be considered when trying to get the MOST coverage?
SSID naming
Device placement
Encryption methods
Channel selection
Which of the following utilities would be used to display a network's MX record?
dig
nbtstat
traceroute
route
Which of the following is the term used to describe the aggregation of multiple components to form one logical component?
Bonding
Circuit switching
CSMA/CD
Channelization
Which of the following performs posture assessments for unknown devices that connect to the network?
PKI
EAP
NAC
AAA
At which of the following OSI model layers is HTTPS encryption performed?
Layer 3
Layer 5
Layer 6
Layer 7
Which of the following network cable types requires grounding?
STP
UTP
Fiber
Serial
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?
Secure VPN
MAC filtering
IP filtering
Static IP addresses
Which of the following cables is the MOST susceptible to interference?
Fiber
Coax
UTP
STP
Which of the following ports is the default telnet port?
20
21
22
23
On which of the following network devices would an administrator configure an ACL?
Router
Hub
Repeater
NIC
Which of the following analyzes the entire subnet to identify all hosts that are active?
Ping sweep
Packet sniffer
Traceroute
Port scanner
A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the:
RJ-11 connector needs to be re-crimped
User has plugged into the laptop's NIC port
User has plugged the wrong end of the cable into the port
RJ-11 connector needs to be replaced with an RJ-45 connector
Which of the following is true of stateless inspection?
It is not able to determine which ports to block.
It is able to detect packets from established connections only.
It is able to determine the connection state of all packets going through the firewall
It is not able to determine if a packet is related to an established connection.
An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?
Hostname
Ipconfig
Netstat
Ping
Which of the following troubleshooting steps should be performed NEXT after a core router has been reported down?