Sandy, the network administrator, has funding to do a major upgrade of the company's LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
Conduct a vulnerability scan
Establish a network baseline
Conduct traffic analysis
Conduct a risk assessment
Sandy, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
Behavioral Based IDS
Signature Based IDS
Behavioral Based IPS
Signature Based IPS
Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
Set up an account with an Internet service provider.
Create a list of requirements and constraints.
Arrange a domain name with a suitable registrar.
Choose the correct operating system version.
Which of the following is an example of two-factor authentication?
A username and PIN
A username and password
A username, password, finger print scan, and smart card
A username, password, and key fob number
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
RJ-11
BNC
LC
DB-9
Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?
DNS suffixes
Leases
Static IP addressing
Reservations
Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the
Internet. Which of the following is the MOST likely cause of the problem?
The signal strength has been degraded and latency is increasing hop count.
An incorrect subnet mask has been entered in the WAP configuration.
The signal strength has been degraded and packets are being lost.
Users have specified the wrong encryption type and routes are being rejected.
Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?
MAC filtering
SSL VPN
PPPoE
WPA Enterprise
Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?
Bus
Peer-to-peer
Ring
Star
Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?
QoS
POP3
PAT
SMTP
Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
RAS
PPTP
IPSec
ICA
A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
Change the encryption method to WPA
Limit the DHCP scope to only have three addresses total
Enable the SSID broadcast
Enable and configure MAC filtering
Change the broadcast channel to a less commonly used channel
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)
High availability
Fault tolerance
Reduce latency
Wi-MAX
CARP
The location that the local network connection ends and the ISP responsibility begins is known as the:
Access point.
Default gateway.
IDF connection.
Demarcation point.
Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?
Incorrect subnet mask
Incorrect DNS
Missing default gateway
Incorrect IPv6 address
Which of the following sizes is the fixed cell length in ATM?
8 bytes
53 bytes
64 kilobytes
128 kilobytes
Which of the following network scanners detects and sends out alerts for malicious network activity?
Packet sniffers
IDS
Port scanners
IPS
Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port speed to 1000 Mbps. A user's PC is no longer able to access the network. Which of the following is MOST likely the problem?
The user's NIC does not support 1Gbps
The switch is not compatible with 1000Mbps.
The user's NIC does not support 100Mbps.
Joe needs to restart the DNS server.
Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?
The transport OSI model layer and the transport TCP/IP model layer
The transport OSI model layer and the Internet TCP/IP model layer
The network OSI model layer and the transport TCP/IP model layer
The network OSI model layer and the Internet TCP/IP model layer
Which of the following network appliances would facilitate an even amount of traffic hitting each web server?
Load balancer
VPN concentrator
Proxy server
Content filter
For which of the following reasons could a single server's NIC transmit packets from multiple MAC address sources?
The server contains several virtual machines and the MAC addresses are from the virtual machines
The server is hosting a web server and the MAC addresses are from connected browsers.
The server is hosting a proxy server and the MAC addresses are from the connected clients.
The server NIC is starting to fail and should be replaced
Which of the following cable types would have the LEAST amount of EMI?
CAT3
CAT5
STPCAT6
Plenum CAT6
Which of the following wireless standards operates on the same frequency as 802.11a?
Compatible with 802.11b wireless networks
Compatible with 802.11g wireless networks
Compatible with 802.11i wireless networks
Compatible with 802.11n wireless networks
Which of the following can Joe, a network technician, change to help limit war driving?
Signal strength
SSID
Frequency
Channel
Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
21
22
23
25
Which of the following uses eight groups of characters for addressing?
MAC
IPv4
IPv6
DHCP
A packet sniffer is MOST likely used to do which of the following?
Prevent network based attacks
Capture and analyze network traffic
Route IP packets to remote destinations
Record the switch ARP table
Which of the following could Karen, a network technician, use to find the approximate location of a break in a long network cable?
Protocol analyzer
Time domain reflectometer
Toner probe
Multimeter
Which of the following network access methods is the MOST secure?
PPPoE
SIP
RSH
IPSec
Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
20
53
80
3389
Which of the following ports carries IMAP traffic, by default, on modern email systems?
23
25
80
143
Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?
DHCP
ARP
DNS
PING
Joe, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?
VLAN
MTU
WPA
SSID
Which of the following allows for multiple backend web servers to be accessed through a single public IP address?
Traffic shaping
Caching engines
Port address translation
Quality of service prioritization
Sandy, a technician, is asked to install a wireless router in a company's public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
Content filtering on the wireless access point
Allow traffic from the wireless access point
Block traffic from the wireless access point
Packet filtering on the wireless access point
Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?
netstat
route
nslookup
arp
Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use?
CAT5e
CAT6
Coaxial
Multimode fiber
Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap?
2, 6, 10
1, 6, 11
1, 7, 10
1, 2, 3
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following
Intrusion detection software
PoE
Packet sniffer
Intrusion prevention software
Joe, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?
SSID masking
PPPOE
Transmission power
Encryption technology
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
RIP
OSPF
BGP
RIPv2
After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
Multimeter
Cable certifier
Cable tester
Toner probe
Which of the following would be an IP address received from APIPA?
10.0.0.100
172.168.0.100
169.254.0.100
192.168.0.100
Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this?
PAT
Content filter
Implicit deny
NAT
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
Smart jack
MDF
VPN
66 block
Which of the following OSI model layers is used for logical addressing?
Physical
Transport
Network
Data link
Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference?
FTP
STP
UTP
RTP
Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of the routing information. Which of the following protocols would be BEST for him to use?
RIP
VLSM
OSPF
STP
Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?
10GBaseLR
10GBaseSR
10GBaseX
10GBaseT
T568B wiring scheme is typically found on which of the following components?