Network+ Midterm

Card Set Information

Author:
a2k2d2
ID:
237011
Filename:
Network+ Midterm
Updated:
2013-09-26 16:43:24
Tags:
Network Midterm
Folders:

Description:
Network+ Midterm
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user a2k2d2 on FreezingBlue Flashcards. What would you like to do?


  1. You are designing a network implementation for a startup business. Your Ethernet network design calls for the implementation of VLANs to separate design and development network traffic from administration and human resources traffic. In addition, you need to be able to customize each network port on your network switches to support the manufacturing devices used by the design and development teams. What should you do?

    A. Implement managed Ethernet switches.
    B. Purchase your network Ethernet switches and network interface cards from the same vendor.
    C. Implement Ethernet hubs.
    D. Implement unmanaged Ethernet switches.
    A. Implement managed Ethernet switches.
    (this multiple choice question has been scrambled)
  2. Which of the following are valid 48-bit MAC addresses? (Choose TWO.)

    A. 44:87:FC:E2:E5:D3:H0
    B. 44-87-FC-E2-E5-G3
    C. 44-87-FC-E2-E5
    D. 44:87:AA:E2:E5:D3
    E. 44-87-FC-E2-E5-D2
    • D. 44:87:AA:E2:E5:D3
    • E. 44-87-FC-E2-E5-D2
  3. Which interior gateway protocols are distance vector routing protocols? (Choose TWO.)

    A. Border Gateway Protocol (BGP).
    B. Routing Information Protocol (RIP).
    C. Open Shortest Path First (OSPF).
    D. Interior Gateway Routing Protocol (IGRP).
    E. Intermediate System–to–Intermediate System (IS-IS).
    • B. Routing Information Protocol (RIP).
    • D. Interior Gateway Routing Protocol (IGRP).
  4. The workstations on your network are unable to reach a Linux-based file and print server on a different network segment. You’ve checked and the server is up and running with a static IP address assignment of 172.18.0.1. Your workstations have been assigned IP addresses from your DHCP server using addresses in the 172.17.8.100 to 172.17.8.253 range with a subnet mask of 255.255.0.0. You are unable to ping the server from any workstation, yet the workstations are able to ping each other. What should you do?

    A. Assign the Linux server an IP address that is not being used in the range of 172.17.8.100 to 172.17.8.253.
    B. Verify that the network switch has power and is turned on.
    C. Check the subnet mask assigned to the Linux server.
    D. Verify that the workstations have the correct default gateway router address assigned.
    D. Verify that the workstations have the correct default gateway router address assigned.
    (this multiple choice question has been scrambled)
  5. You are making a straight-through Gigabit Ethernet drop cable using UTP and RJ-45 connectors that will be used to connect a desktop system to your network switch. Which pin on the switch should be connected to the TX+ pin on the host’s network interface board?

    A. RX-
    B.RX+
    C. TX
    D. TX+
    B.RX+
    (this multiple choice question has been scrambled)
  6. You’ve decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create fou rseparate subnets. The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest numbered IP address possible tothis system. What should you do?

    A. Assign the system an IP address of 172.17.127.254.
    B. Assign the system an IP address of 172.17.191.254.
    C. Assign the system an IP address of 172.17.255.254.
    D. Assign the system an IP address of 172.17.63.254.
    B. Assign the system an IP address of 172.17.191.254.
    (this multiple choice question has been scrambled)
  7. You manage a network within an office suite composed of three Windows 7 workstations configured to work together in a workgroup. Each system is connected to the same network switch using Gigabit Ethernet network interfaces and drop cables. What type of network is this? (Choose TWO.)

    A. Local area network
    B. Wide area network
    C. Metropolitan area network
    D. Client/server network
    E. Peer-to-peer network
    • A. Local area network
    • E. Peer-to-peer network
  8. Your Windows 7 workstation has an IP address of 11001101.00000000.00000000.00000001 (binary) assigned to it. Which class of IP addresses does this address fall within?
    A. Class B
    B. Class A
    C. Class D
    D. Class C
    D. Class C
    (this multiple choice question has been scrambled)
  9. Which functions are provided by the transport layer of the OSI model? (Choose two.)

    A. Ensuring that data on the sending system is formatted correctly for the recipient system
    B. Establishing, managing, and terminating communications between the sender and recipient
    C. Managing segment sequencing
    D. Creating TCP and UDP ports for the IP protocol
    E. Managing logical addressing information for network hosts
    • C. Managing segment sequencing
    • D. Creating TCP and UDP ports for the IP protocol
  10. You are helping a small startup business design its network. The business’s main server will store research and development files as well as a human resources database application that utilizes Microsoft SQL Server. The business will also provide a web server that customers can use to access a knowledge base application for self-support. Where should you place the main server in this scenario?

    A. In the public zone.
    B. In the demilitarized zone (DMZ).
    C. On the internal network.
    D. On the internal network behind a NAT router configured to forward port 1433 to the database service.
    C. On the internal network.
    (this multiple choice question has been scrambled)
  11. Which layer of the TCP/IP model receives packets from upper layers and encapsulates them in a frame prior to transmitting them on the network medium? (Choose two.)

    A. Application
    B. Network interface
    C. Transport
    D. Internet
    E. Link
    • B. Network interface
    • E. Link
  12. Which 10 Gigabit Ethernet standards encapsulate Ethernet data within SDH/SONET frames, allowing Ethernet equipment to work with SDH/SONET networking equipment? (Choose three.)

    A. 10GBase-SW
    B. 10GBase-LRM
    C. 10GBase-LW
    D. 10GBase-ER
    E. 10GBase-EW
    F. 10GBase-LX4
    • A. 10GBase-SW
    • C. 10GBase-LW
    • E. 10GBase-EW
  13. Which link state interior gateway protocols were designed to support VLSM IP addressing? (Choose TWO.)

    A. Enhanced Interior Gateway Routing Protocol (EIGRP)
    B. Routing Information Protocol (RIP).
    C. Open Shortest Path First (OSPF).
    D. Interior Gateway Routing Protocol (IGRP).
    E. Intermediate System–to–Intermediate System (IS-IS).
    • C. Open Shortest Path First (OSPF).
    • E. Intermediate System–to–Intermediate System (IS-IS).
  14. Your workstation needs to copy a file to a server on the same network segment with an IP address of 10.0.0.1. Part of this process involves resolving the server’s IP address into its MAC address using the ARP protocol. ARP has already looked in the ARP cache on your workstation, but it couldn’t find an entry for the server’s IP address. What happens next?

    A. ARP sends a unicast ARP request packet to the host with an IP address of 10.0.0.1 requesting itsMAC address.
    B. An ARP request packet is broadcast to all the machines on the network segment to determine the MAC address of the host with an IP address of 10.0.0.1.
    C. The file transfer fails and an error message is displayed to the end user.
    D. An ARP request packet is broadcast to all the machines on the network segment to determine the MAC address of the default gateway router.
    B. An ARP request packet is broadcast to all the machines on the network segment to determine the MAC address of the host with an IP address of 10.0.0.1.
    (this multiple choice question has been scrambled)
  15. What functionality does the IP protocol provide at the Internet layer of the TCP/IP
    model? (Choose two.) 

    A.  Ensuring
    that data reaches its destination by retransmitting any packets that are lost
    or corrupted
    B. Resolving logical addresses into physical
    addresses
    C.  Sharing network status and error information
    D.  Decrementing the TTL of network packets as they cross routers
    E.  Providing logical addressing
    • D.  Decrementing the TTL of network packets as they cross routers
    • E.  Providing logical addressing
  16. You are planning the implementation of a new Ethernet network. The layout of the office complex willrequire some runs between workstations and the network switches to be up to 90 meters long. In addition, the client has requested that the network be capable of Gigabit or faster data transfers.Which Ethernet standards could you consider using in your implementation plan? (Choose two.)

    A. 10Base-5
    B. 10Base-T
    C. 1000Base-CX
    D. 1000Base-T
    E. Fast Ethernet
    • C. 1000Base-CX
    • D. 1000Base-T
  17. You are implementing a home network using a DSL connection for Internet access. Your service provider gave you only a single registered IP address for the connection. However, you want to connect several home computers, your DVD player, and your IP phone to the Internet through this connection. What should you do?

    A. Switch to a cable TV provider for Internet access.
    B. Purchase additional registered addresses from the service provider for each device.
    C. Restrict Internet access to a single host on your network.
    D. Implement internal private IP addressing with a Network Address Translation (NAT) router facing the Internet.
    D. Implement internal private IP addressing with a Network Address Translation (NAT) router facing the Internet.
    (this multiple choice question has been scrambled)
  18. You are working with a Token Ring network, which uses token passing from host to host to controlaccess to the network media. The network uses twisted-pair wires to connect each network host to amultistation access unit (MSAU), which manages the passing of the token. What type of physica ltopology does this network use?

    A. Bus
    B. Ring
    C. Mesh
    D. Star
    D. Star
    (this multiple choice question has been scrambled)
  19. Which block of addresses is defined for use with Automatic Private IP Addressing (APIPA)?

    A. 192.168.1.0/24
    B. 169.254.0.0/16
    C. 172.16.0.0/16
    D. 10.0.0.0/8
    B. 169.254.0.0/16
    (this multiple choice question has been scrambled)
  20. Which layer of the OSI model defines rules for accessing the network media?

    A. Physical
    B. Transport
    C. Network
    D. Data Link
    D. Data Link
    (this multiple choice question has been scrambled)
  21. You manage a network for a small architectural consulting firm. The network is composed of three Ethernet switches that have been cascaded together. Two VLANs have been created: one for the firm’s president, treasurer, and administrative assistants and one for architectural development work. FS1, WS1, and WS2 are connected to Switch1; WS3, WS4, and FS2 are connected to Switch2; and WS5, WS6, and WS7 are connected to Switch 3. FS1, WS1, WS2, and WS3 are members of the first VLAN, while WS4, FS2, WS5, WS6, and WS7 are members of the second VLAN. What is the collision domain for the FS1 host?

    A. All hosts that are members of the first VLAN
    B. All hosts connected to Switch1, Switch2, and Switch3
    C. The network port to which the FS1 server is connected on the switch
    D. All hosts connected to Switch1
    C. The network port to which the FS1 server is connected on the switch
    (this multiple choice question has been scrambled)
  22. Which network protocols are commonly used to implement Voice over IP (VoIP) communications?(Choose two.)

    A. HTTP
    B. RTP
    C. SNMP
    D. TLS
    E. SIP
    • B. RTP
    • E. SIP
  23. Which IEEE project standard defines 100 Mbps Ethernet networking?

    A. 802.3u
    B. 802.ae
    C. 802.3z
    D. 802.3ab
    A. 802.3u
    (this multiple choice question has been scrambled)
  24. Which Interior Gateway Protocol does not use advertisements to populate each router’s routing table?

    A. Open Shortest Path First (OSPF)
    B. Routing Information Protocol (RIP)
    C. Interior Gateway Routing Protocol (IGRP)
    D. Enhanced Interior Gateway Routing Protocol (EIGRP)
    A. Open Shortest Path First (OSPF)
    (this multiple choice question has been scrambled)
  25. Users are complaining that they can’t access the company intranet site. You check and find that you can ping the intranet web server by IP address, but not by its DNS name. What should you do?

    A. Check your network switches for a switching loop.
    B. Verify that the intranet web server doesn’t have an incorrect subnet mask assigned.
    C. Verify that users’ workstations have the correct DNS resolver address configured.
    D. Verify that users’ workstations have the correct default gateway router address configured.
    C. Verify that users’ workstations have the correct DNS resolver address configured.
    (this multiple choice question has been scrambled)
  26. You need to connect your 1000Base-FX network switch to a singlemode fiber-optic backbone. Whichtype of media converter should you use?

    A. Multimode fiber to UTP
    B. Singlemode fiber to multimode fiber
    C. Multimode fiber to coaxial
    D. Singlemode fiber to UTP
    B. Singlemode fiber to multimode fiber
    (this multiple choice question has been scrambled)
  27. You are implementing a Network Address Translation router on your network to translate private IP addresses into a single registered IP address to enable Internet access. Which private IP address ranges could you choose to implement on your network with this router? (Choose two.)?

    A. 137.65.1.1–137.65.2.254
    B. 207.0.0.1–207.0.0.254
    C. 10.0.0.1–10.0.100.254
    D. 172.17.8.1–172.17.9.254
    E. 127.0.0.1–127.0.0.254
    • C. 10.0.0.1–10.0.100.254
    • D. 172.17.8.1–172.17.9.254
  28. You are working with a network that has a dedicated link from each host to every other host on thenetwork. What type of physical topology does this network use?
    A. Bus
    B. Star
    C. Mesh
    D. Ring
    C. Mesh
    (this multiple choice question has been scrambled)
  29. Your organization’s network is composed of four separate physical network segments connected by routers. Your organization uses the 10.0.0.0 private IP addressing scheme. You want to divide the 10.0.0.0 network into four separate networks. What should you do to accomplish this?

    A. Configure the subnet mask to include the last 2 bits of the second octet in the network address to create four subnets.
    B. Configure the subnet mask to include the first 3 bits of the second octet in the network address to create four subnets.
    C. Configure the subnet mask to include the first 2 bits of the second octet in the network address to create four subnets.
    D. Configure the subnet mask to include the last 2 bits of the third octet in the network address to create four subnets.
    C. Configure the subnet mask to include the first 2 bits of the second octet in the network address to create four subnets.
    (this multiple choice question has been scrambled)
  30. Which layer of the OSI model ensures the data being sent from the sender is formatted correctly so itcan be interpreted correctly by the recipient system?

    A. Transport
    B. Application
    C. Presentation
    D. Session
    C. Presentation
    (this multiple choice question has been scrambled)
  31. Which network appliance can be deployed as an intermediary that manages requests from clients seeking resources from servers?

    A. Proxy server
    B. Load balancer
    C. Content filter
    D. Gateway
    A. Proxy server
    (this multiple choice question has been scrambled)
  32. 32. Which protocols are application layer protocols?

    A. DHCP
    B. UDP
    C. SNMP
    D. RPC
    E. SDP
    • A. DHCP
    • C. SNMP
  33. You are developing an implementation plan for a network in a startup financial services firm. They are very concerned about security and have asked you to implement the most secure network media available. Which should you choose?

    A. 802.11g wireless
    B. 1000Base-TX
    C. 1000Base-SX
    D. 10Base-5
    C. 1000Base-SX
    (this multiple choice question has been scrambled)
  34. Some routing protocols determine the best route to take based on the bandwidth of network links.Which metric is used by these protocols to determine the bandwidth of a link?

    A. Distance vector
    B. MTU
    C. Link state
    D. Hop count
    B. MTU
    (this multiple choice question has been scrambled)
  35. You’ve just enabled routing on a Cisco router. You need to verify that the appropriate routes exist in the routing table. What should you do?

    A. Enter ip route add local at the command prompt of the router.
    B. Enter show ip route at the command prompt of the router.
    C. Enter ip routing at the command prompt of the router.
    D. Restart the router.
    B. Enter show ip route at the command prompt of the router.
    (this multiple choice question has been scrambled)
  36. Which connector is used to connect coaxial cabling for cable TV to your television set?

    A. AUI
    B. LC
    C. BNC
    D. F-type
    C. BNC
    (this multiple choice question has been scrambled)
  37. A private network uses a dynamic NAT router to connect to the Internet. A workstation on the private network behind the NAT router sends a packet to the Internet, and the NAT router replaces the private IP address of the sender in the source field of the packet header with the NAT router’s public IP address. What happens next?

    A. The NAT router adds an entry to its translation table listing the packet’s private IP address, sourceport, and translated port.
    B. The destination host sends a message to the NAT router requesting the private IP address and source port of the sender.
    C. The destination host receives the translated packet and establishes a connection to the port and IP address contained in the translated packet’s header.
    D. PAT assigns the connection a port number from a pool of available ports, inserting this port number in the source port field.
    D. PAT assigns the connection a port number from a pool of available ports, inserting this port number in the source port field.
    (this multiple choice question has been scrambled)
  38. Which of the following are characteristics of a client/server network? (Choose three.)?

    A. Each host maintains its own set of user accounts that must be kept synchronized with each other.
    B. All hosts on the network can use a common set of user and group accounts stored on a dedicated host for authentication.
    C. Printers and data folders on each network host are shared with other network hosts.
    D. Files are stored on and shared from a dedicated host on the network.
    E. All network hosts running a version of Windows are configured to be members of the same workgroup.
    F. All network hosts running a version of Windows are configured to be members of the same domain.
    • B. All hosts on the network can use a common set of user and group accounts stored on a dedicated host for authentication.
    • D. Files are stored on and shared from a dedicated host on the network.
    • F. All network hosts running a version of Windows are configured to be members of the same domain.
  39. Your Linux workstation has an IP address of 192.168.1.25 assigned with a subnet mask of255.255.255.0. It also has a DNS server address of 137.65.1.10 and a default gateway router address of 192.168.1.254 assigned. Your workstation needs to send a file to a server that has an IP address of 192.168.2.1 and a subnet mask of 255.255.255.0 assigned. Where will the packets be sent next?

    A. To the default gateway router
    B. To the DNS server
    C. Directly to the server
    D. Because of the difference in network addresses, the workstation can’t connect to the server
    A. To the default gateway router
    (this multiple choice question has been scrambled)
  40. You’ve opened a web browser on your workstation and have entered a URL in the Location field.Which layer of the OSI model initiates the HTTP request to the web server?

    A. Application
    B. Session
    C. Presentation
    D. Transport
    A. Application
    (this multiple choice question has been scrambled)
  41. A network administrator has installed and connected a new VoIP phone to a network jack. The phone is currently powered off. Which of the following allows the phone to power on when the network administrator enable its switch port?

    A. PoE
    B. SIP
    C. QoS
    D. Plain Old Telephone Service (POTS)
    A. PoE
    (this multiple choice question has been scrambled)
  42. A network administrator is monitoring switches on a network. Which of the following protocols isgenerating this traffic?

    A. PPoE
    B. SMTP
    C. SNMP
    D. PoE
    C. SNMP
    (this multiple choice question has been scrambled)
  43. Which of the following connector types is associated with RS-232?

    A. BNC
    B. DB-9
    C. RJ-11
    D. MTRJ
    B. DB-9
    (this multiple choice question has been scrambled)
  44. Which of the following is used to share traffic between multiple network connections?

    A. Content filter
    B. VPN concentrator
    C. Proxy server
    D. Load balancer
    D. Load balancer
    (this multiple choice question has been scrambled)
  45. Which of the following OSI model layers is located between the data link and the transport layers?

    A. Network
    B. Session
    C. Application
    D. Physical
    A. Network
    (this multiple choice question has been scrambled)
  46. Which of the following applications is extremely sensitive to latency? Choose TWO.

    A. VPN
    B. Video Conferencing
    C. HTTP traffic
    D. Peer-to-peer
    E. VoIP systems
    • B. Video Conferencing
    • E. VoIP systems
  47. A network technician has setup three VLANs on two of the company switches, enabled all the ports as access ports and assigned the ports to VLANs. How many connections will be needed to connect the two switches together?

    A. 2
    B. 3
    C. 5
    D. 1
    B. 3
    (this multiple choice question has been scrambled)
  48. Which of the following is considered an Exterior Gateway Protocol?

    A. BGP
    B. OSPF
    C. RIP
    D. IGRP
    A. BGP
    (this multiple choice question has been scrambled)
  49. An administrator notices that the local network, which handles both voice and data traffic, is extremely congested causing broken audio streams during phone conversations. Configuration of which of the following will MOST likely correct this issue?

    A. VLANs
    B. T1 lines
    C. NATs
    D. MAC filtering
    A. VLANs
    (this multiple choice question has been scrambled)
  50. Which of the following Ethernet technologies has the LONGEST distance possible?

    A. 1000BaseT
    B. 1000GBaseSR
    C. 1000BaseSX
    D. 1000BaseLX
    D. 1000BaseLX
    (this multiple choice question has been scrambled)
  51. Which of the following is BEST to use to transfer files to/from a web server?

    A. DHCP
    B. TACACS+
    C. IDS
    D. FTP
    D. FTP
    (this multiple choice question has been scrambled)
  52. Which of the following BEST describes the purpose of DHCP?

    A. DHCP is used to aggregate secure connections into a private network.
    B. DHCP is used to assign IP addresses to clients upon request.
    C. DHCP is used to detect unauthorized traffic on a network.
    D. DHCP is used to filter web traffic based on content restrictions.
    B. DHCP is used to assign IP addresses to clients upon request.
    (this multiple choice question has been scrambled)
  53. A company wants to implement VLANs and is upgrading their networking equipment to accommodatethis. Which of the following should be purchased to allow for the VLANs?

    A. Hubs
    B. Repeaters
    C. Layer 3 switches
    D. Routers
    C. Layer 3 switches
    (this multiple choice question has been scrambled)
  54. Which of the following would BEST be described as a central connection point for secured clientaccess to a private network from a public network?

    A. VPN concentrator
    B. Proxy server
    C. Load balancer
    D. Content filter
    A. VPN concentrator
    (this multiple choice question has been scrambled)
  55. A distribution layer switch with an SC GBIC that has a fiber connection back to the core has gone bad and needs to be replaced with a newer model and an LC GBIC. The fiber patch cable was replaced with a known good LC patch cable. After replacing the switch the fiber connection shows no link.Which is the MOST likely cause of the problem?

    A. TXRX reversed
    B. Incompatible GBIC
    C. DB loss
    D. Cross-talk
    A. TXRX reversed
    (this multiple choice question has been scrambled)
  56. Which of the following provides a device with an IP address that does not remain the same each timethe lease is renewed?

    A. Scope
    B. Static IP address
    C. Dynamic IP address
    D. Reservation
    C. Dynamic IP address
    (this multiple choice question has been scrambled)
  57. Redundant network devices are used to provide which of the following performance optimizations?(Select TWO)

    A. Load balancing
    B. High Availability
    C. QoS
    D. Traffic Shaping
    E. Content filtering
    • A. Load balancing
    • B. High Availability
  58. How many pairs of CAT5e wires are used for data with 1000BaseT?

    A. 2
    B. 4
    C. 8
    D. 6
    B. 4
    (this multiple choice question has been scrambled)
  59. A senior technician is inspecting a junior technician’s patch cables. There is a visible space between the copper wiring and the top of the plastic at each end of the cables. Which of the following is the reason these cables cannot be used?

    A. Bad connectors
    B. Open shorts
    C. UTP
    D. EMI
    A. Bad connectors
    (this multiple choice question has been scrambled)
  60. Which of the following best describes the operation of a VLAN?

    A. A VLAN gives higher priority to packets of a specific type to ensure consistent throughput
    B. A VLAN tracks user network traffic throughout the network to detect improper usage
    C. A VLAN allows for multiple logical subnets to coexist on a single physical switch
    D. A VLAN is used to scan all packets entering a network to ensure no viruses are present
    C. A VLAN allows for multiple logical subnets to coexist on a single physical switch
    (this multiple choice question has been scrambled)
  61. While troubleshooting network connectivity, a technician notices a computer has assigned itself an APIPA IP address of 169.254.0.1. Assuming the DNS servers have been properly configured, which of the following tools should the technician use to verify the DHCP server is reachable?

    A. tracert
    B. dig
    C. nslookup
    D. ipconfig
    A. tracert
    (this multiple choice question has been scrambled)
  62. Which of the following has a MAXIMUM speed of 100Mbps

    A. CAT5e
    B. CAT5
    C. CAT6
    D. CAT3
    C. CAT6
    (this multiple choice question has been scrambled)
  63. A network technician has configured a new firewall to accept all TCP port 80 traffic and deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies by attempting to access a popular website. Which of the following will MOST likely correct the error?

    A. UDP port 53 needs to be allowed
    B. DNS port 23 needs to be allowed
    C. HTTP needs port 443 allowed
    D. HTTP uses UDP
    D. HTTP uses UDP
    (this multiple choice question has been scrambled)
  64. A customer reports a network patch cable was unplugged from a switch and plugged back into an available switch port. The switch’s activity lights have been lit up constantly and network response times are extremely slow. Which of the following is most likely occurring?

    A. Switching Loop
    B. Mismatched MTU
    C. Port Mirroring
    D. DDoS Attack
    A. Switching Loop
    (this multiple choice question has been scrambled)
  65. A technician notices that the application server’s resources are momentary at full capacity for the amount of incoming and outgoing packets outside the LAN. Which of the following tools would be used to find out what IPs are connecting to the server and in active mode?

    A. tracert
    B. ipconfig
    C. netstat
    D. ping
    C. netstat
    (this multiple choice question has been scrambled)
  66. Which of the following is used to separate external untrusted hosts and internal trusted hosts?

    A. Load balancer
    B. Firewall
    C. DNS server
    D. Content filter
    B. Firewall
    (this multiple choice question has been scrambled)
  67. Which of the following port numbers is used by HTTP?

    A. 443
    B. 80
    C. 21
    D. 22
    B. 80
    (this multiple choice question has been scrambled)
  68. A network administrator added a new workstation using CAT6 UTP cable to a new area of the office.The cable was run across the ceiling tiles to the new workstation. The workstation is 50 meters (164 feet) from the switch and is having problems connecting to the network. Which of the following is the MOST likely the problem?

    A. The BNC connectors on the cable are not tight enough.
    B. The workstation needs to directly connect to the router.
    C. EMI is being emitted from the fluorescent lights.
    D. The maximum cable length was exceeded.
    C. EMI is being emitted from the fluorescent lights.
    (this multiple choice question has been scrambled)
  69. A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?

    A. Registered jack
    B. Demarc
    C. CSU
    D. DSU
    B. Demarc
    (this multiple choice question has been scrambled)
  70. A technician needs to connect a laptop to configure a switch. Which of the following would work BEST for the connection?

    A. RJ-11
    B. 110 block
    C. Console port
    D. BNC
    C. Console port
    (this multiple choice question has been scrambled)
  71. Which of the following ports does DHCP use? (Select TWO)

    A. 22
    B. 23
    C. 67
    D. 68
    E. 69
    • C. 67
    • D. 68
  72. Some of the computers connected to switches with CAT6 cables have slow performance. The cable runs were tested and the lengths were found to be between 30 meters (98 feet) to 160 meters (524 feet). Which of the following is the cause of the issue?

    A. VLAN assignment
    B. TX/RX reversed
    C. DB loss
    D. Collisions
    C. DB loss
    (this multiple choice question has been scrambled)
  73. Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors; however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?

    A. Allow UDP port 53
    B. Allow TCP port 80
    C. Allow TCP port 443
    D. Allow UDP port 340
    C. Allow TCP port 443
    (this multiple choice question has been scrambled)
  74. A technician needs to add an additional cable run. Which of the following hardware tools would a technician use to BEST connect cabling to a patch panel?

    A. Loopback plug
    B. Environmental monitor
    C. Punch down tool
    D. Protocol analyzer
    C. Punch down tool
    (this multiple choice question has been scrambled)
  75. A customer has recently implemented a VoIP system on a flat network. The customer reports issues with call clarity during business hours. Which of the following would a technician configure on the customer’s network to help alleviate this problem? (Select TWO)

    A. NAT
    B. Full duplex
    C. QoS
    D. VLANs
    E. MAC filtering
    • C. QoS
    • D. VLANs
  76. A network administrator is setting up an internal IIS server with a static IP address. When the user types the IP address for the IIS server into a web browser, it opens up to the printer configuration page. Which of the following is MOST likely the cause?

    A. Wrong subnet mask
    B. Duplicate IP address
    C. Wrong default gateway
    D. VLAN assignment
    B. Duplicate IP address
    (this multiple choice question has been scrambled)
  77. A user reports incredibly slow network connectivity speeds. The technician determines the computer has a properly configured Gigbit NIC connected to the wall outlet with a CAT5 cable. Which of the following should the technician replace next to BEST improve performance?

    A. Wall outlet
    B. Computer
    C. Cable
    D. NIC
    C. Cable
    (this multiple choice question has been scrambled)
  78. Karen, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Karen has permission to the server and the workstation is able to get to other network resources. What is the MOST likely cause?

    A. The onboard NIC has outdated drivers installed
    B. The department server is having network issues
    C. Karen’s workstation is a part of the wrong VLAN
    D. The wireless NIC has not been enabled for Karen’s workstation
    C. Karen’s workstation is a part of the wrong VLAN
    (this multiple choice question has been scrambled)
  79. Joe, a user, reports getting a “This page cannot be displayed” error message in his web browser. However, Joe can ping the default gateway. Which of the following is the MOST likely cause of theproblem?

    A. Incorrect DNS settings
    B. The browser is unsupported
    C. SSL certificates are expired
    D. Incorrect WINS server
    A. Incorrect DNS settings
    (this multiple choice question has been scrambled)
  80. At which of the following layers does the CSU/DSU operate?

    A. Physical
    B. Network
    C. Data link
    D. Transport
    A. Physical
    (this multiple choice question has been scrambled)
  81. Which of the following cables would require a punch down tool to attach a cable to it?

    A. MTRJ
    B. 110 block
    C. RJ-45
    D. DB-9
    B. 110 block
    (this multiple choice question has been scrambled)
  82. A technician installing a new switch notices that users on the switch can communicate with other devices on the network but not the Internet. Which of the following is the MOST likely cause?

    A. Wrong DHCP
    B. Wrong subnet mask
    C. Duplicate IP address
    D. Wrong VLAN configuration
    D. Wrong VLAN configuration
    (this multiple choice question has been scrambled)
  83. An administrator has been asked to connect an analog phone cabling in a server room. Which of the following should the administrator use?

    A. Smart jack
    B. Demarc
    C. Circuit switch
    D. 66-block
    D. 66-block
    (this multiple choice question has been scrambled)
  84. Which of the following does SNMPv3 BEST provide over previous versions?

    A. Simplified management
    B. Higher productivity
    C. More data types
    D. Increased security
    D. Increased security
    (this multiple choice question has been scrambled)
  85. At which of the following layers of the OSI model does an unmanaged switch operate?

    A. Layer 3
    B. Layer 2
    C. Layer 4
    D. Layer 1
    B. Layer 2
    (this multiple choice question has been scrambled)
  86. Which of the following ports would need to be disabled to block TFTP traffic?

    A. 21
    B. 69
    C. 123
    D. 20
    B. 69
    (this multiple choice question has been scrambled)
  87. Lisa a technician is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason?

    A. Distance
    B. TX/RX reversed
    C. Bad connectors
    D. Packet loss
    A. Distance
    (this multiple choice question has been scrambled)
  88. Which of the following OSI model layers is responsible for the transmission of bits?

    A. Layer 4
    B. Layer 1
    C. Layer 3
    D. Layer 2
    B. Layer 1
    (this multiple choice question has been scrambled)
  89. In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?

    A. 25
    B. 21
    C. 20
    D. 23
    A. 25
    (this multiple choice question has been scrambled)
  90. An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?

    A. Allow TCP port 3389 outbound
    B. Allow UDP port 3389 inbound
    C. Allow UDP port 3389 outbound
    D. Allow TCP port 3389 inbound
    D. Allow TCP port 3389 inbound
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview