Practice Exam A

Card Set Information

Author:
a2k2d2
ID:
245852
Filename:
Practice Exam A
Updated:
2013-11-08 14:35:41
Tags:
Practice Exam
Folders:

Description:
Practice Exam A
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user a2k2d2 on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable?

    A. nmap
    B. dig
    C. arp
    D. nbtstat
    B. dig
    (this multiple choice question has been scrambled)
  2. Which of the following standards can operate at either 20MHz
    or 40MHz channel spacing?

    A. 802.11a
    B. 802.11b
    C. 802.11g
    D. 802.11n
    D. 802.11n
    (this multiple choice question has been scrambled)
  3. Which of the following would a technician do to monitor
    remote traffic through an access point?

    A. Select WPA2
    B. Set monitoring SSID
    C. Enable an SNMP agent
    D. Enable network mapping
    C. Enable an SNMP agent
    (this multiple choice question has been scrambled)
  4. A client's computer is unable to access any network
    resources. Which of the following utilities can a technician use to determine
    the IP address of the client's machine?

    A. ipconfig
    B. nslookup
    C. dig
    D. tracert
    A. ipconfig
    (this multiple choice question has been scrambled)
  5. A user's computer is unable to access the Internet. Which of
    the following utilities can a technician use to determine if DNS is working?

    A. nslookup
    B. nbstat
    C. arp
    D. ipconfig
    A. nslookup
    (this multiple choice question has been scrambled)
  6. Which of the following can MOST likely cause intermittent
    connection problems with a CAT5 network cable?

    A. Cable has been looped too many times.
    B. Cable has a twist tie attached too close to the
    connector.
    C. Cable is too warm.
    D. Cable is run too close to a fluorescent light.
    D. Cable is run too close to a fluorescent light.
  7. Given a subnet mask of 255.255.255.0, how many usable IP
    addresses would be in that subnet?

    A. 254
    B. 256
    C. 250
    D. 255
    A. 254
    (this multiple choice question has been scrambled)
  8. On which of the following OSI model layers would a MAC
    address be used?

    A. Transport
    B. Network
    C. Data Link
    D. Physical
    C. Data Link
    (this multiple choice question has been scrambled)
  9. Joe, a network technician, is troubleshooting in a wiring
    closet in 2011. The cabling to all the equipment does not match the
    documentation from 2007. Which of the following configuration management
    methods has been overlooked?

    A. Baselining
    B. Asset management
    C. Change management
    D. System logs
    C. Change management
    (this multiple choice question has been scrambled)
  10. Which of the following TCP/IP model layers does the OSI
    model Presentation layer map to?

    A. Internet
    B. Transport
    C. Network Interface
    D. Application
    D. Application
    (this multiple choice question has been scrambled)
  11. Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?

    A. Reservations
    B. Removing IPs from the active leases
    C. Lease times
    D. Configuring the DNS options
    A. Reservations
    (this multiple choice question has been scrambled)
  12. A network technician needs to configure a port on a switch
    to provide connectivity and electrical support to a WAP being installed in a warehouse.
    Which of the following features needs to be configured on the switch?

    A. Port forwarding
    B. PoE
    C. STP
    D. VTP trunking
    B. PoE
    (this multiple choice question has been scrambled)
  13. Which of the following reasons would MOST likely be used to
    implement QoS and traffic shaping solutions?

    A. Fault tolerance
    B. Redundancy
    C. Unified communications
    D. Uptime requirements
    C. Unified communications
    (this multiple choice question has been scrambled)
  14. Which of the following uses SSL encryption?

    A. SMTP
    B. HTTPS
    C. FTP
    D. SNMP
    B. HTTPS
    (this multiple choice question has been scrambled)
  15. Users notice a problem with their network connectivity when
    additional lights are turned on. Which of the following would be the cause for
    this problem?

    A. EMI
    B. Open short
    C. DDOS
    D. Cross talk
    A. EMI
    (this multiple choice question has been scrambled)
  16. Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step?

    A. Document findings
    B. Establish a plan of action
    C. Establish a theory
    D. Test the theory
    A. Document findings
    (this multiple choice question has been scrambled)
  17. A network technician is troubleshooting a user's
    connectivity problem, and has determined a probable cause.

    The technician is at which step in the troubleshooting
    methodology?

    A. Implement the solution
    B. Identify the problem
    C. Establish a theory
    D. Verify full system functionality
    C. Establish a theory
    (this multiple choice question has been scrambled)
  18. Spanning-Tree Protocol is used with which of the following
    network devices?

    A. Switch
    B. DHCP server
    C. Router
    D. NIC
    A. Switch
    (this multiple choice question has been scrambled)
  19. In a SOHO environment, placing a VoIP unit on the outside
    edge of a LAN router enhances which of the following network optimization
    methods?

    A. Fault tolerance
    B. Traffic shaping
    C. Quality of service
    D. Load balancing
    C. Quality of service
    (this multiple choice question has been scrambled)
  20. The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience
    very slow download speeds. Which of the following is MOST likely the problem?

    A. Low signal strength or interference
    B. Incorrect IP address or subnet mask
    C. Incorrect service set identifier
    D. Incorrect encryption scheme
    A. Low signal strength or interference
    (this multiple choice question has been scrambled)
  21. A technician wants to separate networks on a switch. Which
    of the following should be configured to allow this?

    A. Spanning tree
    B. VLAN
    C. Traffic filtering
    D. Trunking
    B. VLAN
    (this multiple choice question has been scrambled)
  22. A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

    1-----------1

    2-----------2

    3-----------3

    4-----------4

    5-----------5

    6-----------6

    7-----------7

    8-----------8

    Which of the following should the technician do NEXT?

    A. Pin 3 is not used for data, replace the NIC
    B. Pin 3 is not used for data, continue troubleshooting
    C. Redo the cable's connectors
    D. Cable is a crossover, continue troubleshooting
    C. Redo the cable's connectors
    (this multiple choice question has been scrambled)
  23. Which of the following is the difference between 802.11b and
    802.11g?

    A. Distance
    B. Transmission power
    C. Speed
    D. Frequency
    C. Speed
    (this multiple choice question has been scrambled)
  24. A technician decides to upgrade a router before leaving for
    vacation. While away, users begin to report slow performance. Which of the
    following practices allows other technicians to quickly return the network to
    normal speeds?

    A. Cable management
    B. Asset management
    C. Change management
    D. Baselines
    C. Change management
    (this multiple choice question has been scrambled)
  25. What would a network administrator recommend to satisfy
    fault tolerance needs within the datacenter?

    A. Central KVM system
    B. Setting up a new hot site
    C. Multimode fiber
    D. Central UPS system
    D. Central UPS system
    (this multiple choice question has been scrambled)
  26. During a disaster recovery test, several billing
    representatives need to be temporarily setup to take payments from customers.
    It has been determined that this will need to occur over a wireless network,
    with security being enforced where possible. Which of the following
    configurations should be used?

    A. WEP, SSID enabled, and 802.11b.
    B. WPA2, SSID disabled, and 802.11a.
    C. WPA2, SSID enabled, and 802.11n.
    D. WEP, SSID disabled, and 802.11g.
    B. WPA2, SSID disabled, and 802.11a.
    (this multiple choice question has been scrambled)
  27. Which of the following wiring distribution types, often
    found in company closets, is used to connect wiring from individual offices to
    the main LAN cabling?

    A. Patch panel
    B. 66 block
    C. IDF
    D. MDF
    A. Patch panel
    (this multiple choice question has been scrambled)
  28. Which of the following network access security methods
    ensures communication occurs over a secured, encrypted channel, even if the
    data uses the Internet?

    A. MAC filtering
    B. RAS
    C. SSL VPN
    D. L2TP
    C. SSL VPN
    (this multiple choice question has been scrambled)
  29. A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be
    considered for these requirements? (Select TWO).

    A. Routing table
    B. Next hop
    C. Port mirroring
    D. Port monitoring
    E. VLANs
    • C. Port mirroring
    • E. VLANs
  30. Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?

    A. Protocol analyzer
    B. Tracert
    C. Ping
    D. Dig
    B. Tracert
    (this multiple choice question has been scrambled)
  31. A network administrator is responding to senior management direction to implement network protection that inspects packets as they enter the network. Which of the following would be used?

    A. Packet filter
    B. Stateful firewall
    C. Stateless firewall
    D. Packet sniffer
    B. Stateful firewall
    (this multiple choice question has been scrambled)
  32. In contrast to earlier Wi-Fi speeds, which of the following
    BEST describes the antenna and channelization properties used in 802.11n?

    A. MIMO, OFDM
    B. CSMA, CDMA
    C. CSMA, DSSS
    D. MIMO, DSSS
    A. MIMO, OFDM
    (this multiple choice question has been scrambled)
  33. A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

    A. RADIUS
    B. Two-factor authentication
    C. Single sign on
    D. Multifactor authentication
    C. Single sign on
    (this multiple choice question has been scrambled)
  34. A strong network firewall would likely support which of the following security features for controlling access?

    (Select TWO).

    A. War driving
    B. War chalking
    C. MAC filtering
    D. FTP bouncing
    E. Port filtering
    • C. MAC filtering
    • E. Port filtering
  35. A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation?

    A. Plenum
    B. UTP
    C. STP
    D. Coaxial
    C. STP
    (this multiple choice question has been scrambled)
  36. Which of the following wireless standards provide speeds up to 150Mbps?

    A. 802.11g
    B. 802.11n
    C. 802.11a
    D. 802.11b
    B. 802.11n
    (this multiple choice question has been scrambled)
  37. Which of the following defines a rack located in an office building between the main rack and other office equipment?

    A. MDF
    B. CSU
    C. IDF
    D. DSU
    C. IDF
    (this multiple choice question has been scrambled)
  38. Which of the following connectors is usable in SFP modules?

    A. SX
    B. ST
    C. LX
    D. LC
    D. LC
    (this multiple choice question has been scrambled)
  39. A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering?

    A. A WEP encrypted wireless bridge with directional antennae between offices.
    B. CAT5e connection between offices via the patch panel located in building's communication closet.
    C. VPN between routers located in each office space.
    D. CAT5e cable run through ceiling in the public space between offices.
    C. VPN between routers located in each office space.
    (this multiple choice question has been scrambled)
  40. Which of the following would MOST likely be used by a network administrator to test DNS resolution?

    A. nbtstat
    B. ipconfig
    C. netstat
    D. dig
    D. dig
    (this multiple choice question has been scrambled)
  41. A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?

    A. MAC spoofing
    B. MAC filtering
    C. Static IPs
    D. Dynamic IPs
    C. Static IPs
    (this multiple choice question has been scrambled)
  42. A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the
    following tools should the technician use FIRST to understand the NIC configuration?

    A. Protocol analyzer
    B. nslookup
    C. tracert
    D. ipconfig
    D. ipconfig
    (this multiple choice question has been scrambled)
  43. A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong
    signal wherever the users are. Which of the following is the MOST likely cause of the problem?

    A. Latency
    B. Channel overlap
    C. Incompatible network card
    D. WEP encryption
    B. Channel overlap
    (this multiple choice question has been scrambled)
  44. Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows:

    IP address: 192.168.0.124

    Subnet Mask: 255.255.255.128

    Default Gateway: 192.168.0.254

    Which is MOST likely preventing the user from accessing the Internet?

    A. Duplicate IP address
    B. Incorrect VLAN
    C. Incorrect gateway
    D. Bad switch port
    C. Incorrect gateway
    (this multiple choice question has been scrambled)
  45. A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).

    A. WEP
    B. PoE
    C. VLANs
    D. SSL VPN
    E. IDS
    F. QoS
    • B. PoE
    • C. VLANs
    • F. QoS
  46. A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other
    wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network?

    A. Change the encryption type to a different mechanism to avoid interference.
    B. Change the SSID to match other wireless networks for increased throughput.
    C. Change the channel to a different channel than the other wireless networks.
    D. Change the WAP to a different manufacturer than the other wireless networks.
    C. Change the channel to a different channel than the other wireless networks.
    (this multiple choice question has been scrambled)
  47. Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?

    A. Physical
    B. Presentation
    C. Application
    D. Session
    D. Session
    (this multiple choice question has been scrambled)
  48. A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

    A. IP address filtering
    B. NetBIOS name filtering
    C. MAC address filtering
    D. Computer name filtering
    C. MAC address filtering
    (this multiple choice question has been scrambled)
  49. Which of the following is the common port used for IMAP?

    A. 143
    B. 53
    C. 443
    D. 25
    A. 143
    (this multiple choice question has been scrambled)
  50. A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

    A. QoS
    B. DHCP
    C. NAT
    D. WINS
    A. QoS
    (this multiple choice question has been scrambled)
  51. Which of the following network protocols is used to resolve FQDNs to IP addresses?

    A. DHCP
    B. FTP
    C. DNS
    D. APIPA
    C. DNS
    (this multiple choice question has been scrambled)
  52. Which of the following network protocols is used for a secure command line interface for management of network devices?

    A. HTTP
    B. SSH
    C. TELNET
    D. IGMP
    B. SSH
    (this multiple choice question has been scrambled)
  53. Which of the following network protocols is used to transport email between servers?

    A. IMAP4
    B. SNMP
    C. POP3
    D. SMTP
    D. SMTP
    (this multiple choice question has been scrambled)
  54. A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has
    failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which network troubleshooting methodology steps should the technician do NEXT?

    A. Implement the solution or escalate as necessary.
    B. Re-establish a new theory or escalate.
    C. Test the theory to determine a cause.
    D. Establish a plan of action to resolve the problem.
    B. Re-establish a new theory or escalate.
    (this multiple choice question has been scrambled)
  55. Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?

    A. Users have specified the wrong encryption type and routes are being rejected.
    B. The signal strength has been degraded and latency is increasing hop count.
    C. An incorrect subnet mask has been entered in the WAP configuration.
    D. The signal strength has been degraded and packets are being lost.
    C. An incorrect subnet mask has been entered in the WAP configuration.
    (this multiple choice question has been scrambled)
  56. An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a
    lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?

    A. SMTP
    B. TELNET
    C. SSH
    D. DNS
    A. SMTP
    (this multiple choice question has been scrambled)
  57. Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?

    A. Turn off SSID broadcast.
    B. Reduce the signal strength to 0 percent.
    C. Create a MAC filter containing the current users.
    D. Change the encryption type to AES 256-bit for current users.
    C. Create a MAC filter containing the current users.
    (this multiple choice question has been scrambled)
  58. Which of the following should be used when throughput to the destination network is a priority?

    A. MTU
    B. Hop count
    C. Reliability of the path
    D. Bandwidth
    D. Bandwidth
    (this multiple choice question has been scrambled)
  59. Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?

    A. ping
    B. arp
    C. route
    D. netstat
    A. ping
    (this multiple choice question has been scrambled)
  60. A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user's
    PC?

    A. Nslookup
    B. Network sniffer
    C. History log
    D. System log
    B. Network sniffer
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview