Answer questions GOODLUCK FROM Pinguis Website Design in Tralee
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
1, 6, 11
2, 7, 10
2, 8, 13
3, 6, 9
Which of the following is the port number used by HTTP?
21
80
443
3389
Which of the following is most effective against threats when used with an updated server? (Select TWO)
Kerberos server
Stateful firewall
Content filter
IDS
VPN concentrator
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
Session
Application
Network
Physical
For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?
VPN concentrator
Virtual servers
Wireless
Multimode fiber
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
IS-IS
BGP
OSPF
RIP
A layer 3 switch can move packets between subnets based on which of the following criteria?
802.1q tag
Port
Application
IP address
Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
Honeynet
Honeypot
Vulnerability scanner
Network based IDS
A bridge handles frames at which of the following layers of the OSI model?
Network
Session
Transport
Data Link
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?
A 110 block
A demarc
A DB-9
A smart jack
Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?
The subnet mask is incorrect.
A routing loop has occurred.
Joe used a crossover cable to connect the switch to the gateway
The server is missing default-gateway information
Which of the following wireless technologies can support the MOST allowable MIMO streams?
802.11a
802.11b
802.11g
802.11n
Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
Hub
VLAN
Router
Server
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
Reverse ARP
Full duplex on the fiber link
PoE
802.1q trunking
Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?
Remotely connect to Sandy's laptop and review the network configuration settings.
Ping the web server from inside the network to ensure it is still up and running.
Check to make sure the company's website is accessible from the Internet.
Ensure the Ethernet cable is securely plugged into Sandy's laptop.
Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
Verify full system functionality and if applicable implement preventative measures.
Implement the solution or escalate as necessary.
Document findings, actions, and outcomes.
Establish a theory of probable cause (e.g. question the obvious).
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
802.11a
802.11b
802.11g
802.11n
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
WEP
Port filtering
WPA
Longer SSID broadcast intervals
Which of the following ports is the default telnet port?
20
21
22
23
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
This is a private address which cannot be seen by external users.
The address does not have the appropriate subnet mask assigned.
This is a public address which can only be seen by internal users.
This is a private address which can only be seen by external users.
Which of the following is the network topology in which computers connect to form a straight line?
Ring
Star
Bus
Mesh
Users have reported slow access limes when retrieving information from a server on the company's
network. Which of the following tools would provide access time information on each segment of the
network to reach the server?
arp
route
ipconfig
tracert
Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?
CAT3cable
Serial cable
Crossover cable
Rollover cable
Which of the following DNS record types provides the hostname to IP address mapping?
A record
NS record
CNAME record
MX record
The selection of the correct punch down tool to use depends on which of the following?
Connector type
Demarcation point location
Block type
Switch location
Which of the following uses a ring topology?
DSL
Ethernet
DOCSIS
SONET
A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?
WEP encryption
Channel rotation
Disable SSID
WPA encryption
1000BaseT has a MAXIMUM run distance of:
25 meters (82 feet)
100 meters (328 feet)
500 meters (1640 feet)
1000 meters (3280 feet)
Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?
Layer 1
Layer 4
Layer 5
Layer 7
Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?
SMTP
SIP
HTTP
SSL
Which of the following would Karen, a technician, use in voice over IP communications?
SNTP
SCP
SMTP
SIP
Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?
CAT3
STP
Coaxial
Fiber
Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO).
SSID
Channel
Antenna type
Wireless standard
NAT
Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?
Notify senior management of the issue.
Develop a probable cause theory.
Ask Joe if anything has changed on the system.
Escalate the issue to the vendor.
Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?
568A
568B
Crossover
Loopback
Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?
Baseline
Network map
Wire scheme
Asset management
Which of the following connector types is MOST commonly found with coaxial cabling?
DB-9
BNC
RJ-45
RJ-11
Which of the following connector types will MOST likely be located on a serial cable?
DB-9
LC
ST
BNC
Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?
The wrong cable type has been used
IDS has shut down the computer's switch port
The port on the switch is configured incorrectly
Spanning tree protocol was implemented
Which of the following basic devices blocks ports and can sometimes filter data?
Repeater
Hub
Firewall
Switch
Which of the following protocols is commonly used for VoIP technology?
Telnet
SMTP
SIP
SNMP
Which of the following metrics indentifies the number of connections that is between two devices?
Hop count
MTU
Latency
Bandwidth
A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?
NAT
IDS
NMAP
DMZ
Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
Install two CAT6 cables with a repeater.
Install a 500 foot (152 meter) CAT5 cable.
Install a 500 foot (152 meter) CAT5e cable.
Install three CAT6 cables with a repeater.
Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information:
Which of the following is the MOST likely cause of the slow connections?
The servers have not had VLAN tagging enabled on their NICs
Speed and duplex have not been set
VLAN tagging was not set on the trunk
The servers have been connected with CAT5 cable
Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
traceroute
ping
ipconfig
netstat
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
Coaxial
CAT3
CAT5
CAT5e
Which of the following regulates the amount of network traffic a single node receives in a server cluster?
Load balancer
Proxy server
Content filter
Quality of service
Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?
Device placement
MAC address filtering
User authentication
Encryption protocols
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
22
23
143
161
162
8080
Which of the following virtual components maintains a MAC-to-port forwarding table?
Virtual PBX
Virtual desktop
Virtual switch
Virtual server
In which of the following layers of the OSI model does the TCP protocol operate?
Session
Network
Data link
Transport
Which of the following DNS records would be queried to locate a company's mail server?
A
MX
AAAA
CNAME
Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?
CSMA/CA
CSMA/CD
Wireless encryption
Wireless bonding
Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?
Honeypots
Virtual switches
Virtual PBX
Virtual desktops
After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring?
Upgrade the firmware on all routers and switches
Reboot the entire network one device at a time
Conduct a network traffic analysis
Rerun the baseline to ensure the results were correct
he location where the Telco wiring stops and the clients wiring starts is known as the:
MDF
demarc
IDF
66 block
Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack?
(Select TWO).
Physical
Session
Data Link
Network
Transport
Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?
Baselines
Regulations
Logical network diagrams
Wiring schematics
Keyword and blacklist filtering would be handled at which level in a network?
Layer 2 managed switch
DHCP server
Hardware firewall
Bridge
A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.
spanning
address translation
mirroring
authentication
When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?
5 and 6
1 and 6
6 and 10
2 and 6
Which of the following devices transmits timed broadcasts onto an active network?
Bridge
Unmanaged switch
DHCP client
Firewall
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?
A short
Open pairs
ESD
EMI
Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?
Switch
Smart jack
Router
Patch panel
Which of the following can be an STP cable?
RG-6
CAT5e
Fiber
RG-59
Which of the following is used to identify active hosts along with their network addresses?
Port scan
Ping sweep
IDS
NIPS
A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?
Document the solution and process.
Establish the most probable cause.
Implement and test the solution.
Identify additional symptoms and problems
Which of the following tools should be used to determine the listening port of the web server?
Route
Ifconfig
Netstat
Nslookup
Which of the following utilities can be used to list the routing table?
ipconfig
nslookup
netstat
dig
Which of the following is a multifunction device in a SOHO network?
Bandwidth shaper
Proxy server
Wireless router
Load balancer
At which of the following layers does the TFTP protocol operate?
Layer 1
Layer 4
Layer 5
Layer 7
Which of the following is an EGP routing protocol?
IGP
OSPF
BGP
RIP
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Public key
CSU/DSU
Private key
Shared secret
Which of the following is the name of the routing update process involved when a change occurs in the routing environment?
Supernetting
Dynamic
Subletting
Convergence
Which of the following is MOST commonly powered using PoE?
Routers
Switches
Laptops
Access points
Which of the following should an administrator do after running a command from the console on the perimeter router?
Update the configuration logs
Update the network wiring schematics
Update the network configuration procedures
Compare the configuration with the baseline
Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?
ARP spoofing
VLAN
Mirroring
Spanning tree
Which of the following utilities would be used to display a NIC's cache of MAC addresses?
arp
nslookup
dig
netstat
Which of the following WAN technologies uses a telephone cable?
POTS
FDDI
SONET
Cable modem
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
Gateway
Hub
Bridge
Router
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?
IDS
VPN
NIPS
HIDS
At which of the following layers does the ICMP protocol operate?
Layer 1
Layer 3
Layer 4
Layer 5
A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?
The client does not support 802.11n.
Incorrect frequency on the client is being used.
Incorrect encryption on the AP.
The client distance from the AP.
Which of the following are common VPN transports? (Select TWO)
RDP
VNC
SSL
PPTP
RAS
Which of the following interfaces is used to connect analog devices to the Internet?
POTS
ATM
VDSL
SDSL
Which of the following would contain information regarding network device alerts using SNMP?
Syslog
Audit log
History log
Ping sweep reports
A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?
Network maps
Change management
Baselines
Cable management
Which of the following are valid MAC addresses? (Select TWO)
00-1C-1F-2C-13-43
FFFF.FFFF.FFFF
00-1B-26-3F-B1-16-34
00-01-1E-2F-B3-16-01
001C.1G2F.1234
Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?
nbtstat
dig
netstat
hostname
Which of the following is a correct IP ACL? (Select TWO)
PERMIT 192.268.20.1
DROP 00-12-34-56-78-9A
DENYO:::0:::0:::3
DENY ANY ANY
PERMIT 192.168 1.100 80
Which of the following is an example of a MAC address?
10.0.10.1
1A-23-F9-CD-06-9L
1A-23-F9-CD-06-9B
1A-23-F9-CD-06-9B-23-5C
Which of the following is a performance optimization technology?
QoS
Trunking
Spanning
VoIP
A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?
Identity symptoms and problems
Document the process and solutions
Establish the most probable cause
Escalate if necessary.
By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).
21
25
80
110
123
A Stateful firewall is MOST useful in protecting against which of the following network scans?
PING
UDP
Xmas
ACK
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?
Network layer firewall
Stateful inspection firewall
Zone aware firewall
Application layer firewall
An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?
NAT
Dynamic
Subnetting
Static
Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? (Select TWO).
Trap receivers
HTTPS
Authentication
Privacy
Availability
An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?