COMPTIA
Exam Questions
Which of the following is a standard measure
of signal power?
 A) MhZ
 B) mips
 C) dBm
 D) Gbps
Which of the following is the network topology
in which computers connect in a closed circle?
 A) Bus
 B) Mesh
 C) Ring...
The Transport Layer of the TCP/IP model
corresponds to which of the following
layers of the OSI model?
 A) 1
 B) 3
 C) ...
Which of the following is the correct
representation of an IPv6 address?
 A) ::
 B) 0:0:0:0:0:0:0:0:1
 C) 1:2:3:4:AB:CD...
Which of the following security devices would
MOST likely be used on a network to screen &
prevent malicious traffic?
 A)...
What is a client?
 A Client is a device an end user uses to
access a network . This device can be
a workstation, laptop, ...
Users report that their internet connection is slow.
Zach, the network technician, has a suspicion that users
are streamin...
A company is about to install a second network
connection with a new ISP. Which of the following
routing protocols is the ...
Lisa, a technician, is troubleshooting a problem
with a managed network switch. She determines the
resolution to the probl...
A server technician notices that some changes were
implemented on a server during non-business hours.
Which of the followi...
Which of the following is an intelligent repeater
that is aware of the MAC addresses of the nodes on
either side of the da...
Which of the following 802.11 standards is
MIMO used in?
 A) a
 B) b
 C) g
 D) n
A technician is troubleshooting a problem
with a network printer. The technician
thinks the network printer is out of pape...
Which of the following would be the BEST IDS
topology for monitoring one specific device?
 A) Signature-based
 B) Networ...
Which of the following is the name of the
routing update process involved when a
change occurs in the routing environment?...
Which of the following fiber types is MOST
often used indoors?
 A) Plenum
 B) Modal conditioning
 C) Singlemode
 D) Mu...
Which of the following ports should be
allowed through a firewall to allow DNS
resolution to occur to an outside DNS
serve...
A customer reports a network patch cable was
unplugged from a switch & plugged back into an
available switch port. The swi...
Which of the following protocols is
used to assign IP addresses to network
devices?
 A) UTP
 B) DHCP
 C) FTP
 D) TCP/IP
Network upgrades have been completed and the WINS
server was shutdown. It was decided that NetBIOS
network traffic will no...
Which of the following allows access to a
network, based on the hardware address of a
network card?
 A) Content filtering...
Which of the following is true of
NIPS?
 A) Routes traffic to the proper port
 B) Detects malicious host traffic
 C) De...
Which of the following protocols is
used for remote management of devices?
 A) TFTP
 B) SNMP
 C) Syslog
 D) SMTP
Which encryption type uses only a 28
character key?
 A) 40/64 bitWEP
 B) WPA Personal
 C) 104/128 bitWEP
 D) WPA@PSK
At which of the following layers of the
OSI model do frames exist?
 A) Application
 B) Network
 C) Transport
 D) Data ...
Which of the following utilities can be used
to list the routing table?
 A) Ipconficj
 B) Nslookup
 C) Dig
 D) Netstat
Which of the following OSI model layers is
between the Network and Session layers?
 A) Presentation
 B) Data link
 C) P...
Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?...
Which of the following tools would BEST be
used to verify if a network cable is properly
terminated?
 A) Multimeter
 B) ...
Which of the following uses port 53 by
default?
 A) RDP
 B) QoS
 C) DHCP
 D) DNS
Network administrators use which of the
following to monitor and map network
availability, performance, and error rates?
...
Jeff, a network administrator, needs to
forward HTTP traffic from a SOHO firewall
public IP to the internal web server’s
p...
A firewall that examines all the incoming traffic
and decides if the traffic is going to be allowed
through or dumped is a...
Zach, a client, has a home office and also works
out of a garage on the property located 150 feet
(45 meters) from the hou...
A power failure caused a router to reboot.
Now users are not able to reach remote
networks. Which of the following is the ...
Which of the following is a
device directly used by an end
user to access a network?
 A) Server
 B) LAN
 C) Client
 D)...
What does a Switch do?
 Interconnects network components like a hub
except the switch interrogates the traffic to
find ou...
Which device makes traffic-
forwarding decisions based on
the MAC address?
 A) Hub
 B) Router
 C) Switch
 D) Multiplex...
What type of network is a MAN?
 MAN or Metro Ethernet is smaller
than aWAN. a MAN interconnects
locations throughout a me...
A company has various locations
in a city interconnected using
Metro Ethernet connections. This
is an example of what type...
What type of network is a PAN?
 PAN is network whose range is only a few
meters and much smaller than a LAN. It
consists ...
A network formed by interconnecting a
PC to a digital camera via a USB cable
is considered what type of network?
 A) WAN
...
What are some characteristics of the
star topology?
 Most popular physical LAN topology used today.
The Ethernet switch i...
Which of the following LAN topologies
requires the most cabling?
 A) Bus
 B) Ring
 C) Star
 D) WLAN
Which of all the Network
Topologies is the least fault
tolerant and why?
 A bus network requires only a single cable per
...
What are the characteristics of a Full-
Mesh topology?
 Offers the highest level of redundancy. Each
site is directly con...
Which of the following topologies
offers the highest level of
redundancy?
 A) Full Mesh
 B) Hub & Spoke
 C) BUS
 D) Pa...
How to calculate the number of
required WAN connections for a
Full-Mesh topology?
 Example: If you have 5 remote sites
 ...
How many WAN links are required to
create a full mesh of connections
between 5 remote sites?
 A) 5
 B) 10
 C) 15
 D) 20
How does the Hub and Spoke
topology differ from the Full-
Mesh topology?
 Costs are reduced because each site is
connecte...
Identify two advantages of a hub-and-
spoke WAN topology as compared to a
Full-Mesh WAN topology? (Pick 2)
 A) Lower Cost...
What are the characteristics of a
Peer-to- peer network?
 Used for small or home based
businesses, less than 10 PC’s. It ...
Which type of network is based on
clients sharing resources with
one another?
 A) Client-server
 B) Client- peer
 C) Pe...
Which of the following is an
advantage of a peer–to-peer
network, as compared with a
client-server network?
 A) More scal...
What is a Server?
 A server, serves up resources to a
network. These resources might
include e-mail access, (as provided ...
What is a Hub?
 It is a device that interconnects network
components, such as clients, and servers.
Hubs vary in their nu...
What are the 7 layers of the OSI Model?
 Layer 1 The Physical Layer
 Layer 2 The Data Link Layer
 Layer 3 The Network L...
What is the difference between the OSI
reference model and the TCP/IP model?
 *The OSI ensures reliable delivery of packe...
What is the function of the second layer
know as The Data Link Layer?
 The Data Link Layer
has 2 sub layers
The 1st sub l...
Which layer of the OSI reference
model contains the MAC and LLC
sub layers?
 A) The Network Layer
 B) TheTransport Layer...
What is Baseband?
 Baseband resides in the 1st layer of the OSI
Model in the Physical Layer unlike broadband
where it div...
Which approach to bandwidth usage
consumes all available frequencies on
a medium to transmit data?
 A) Broadband
 B) Bas...
Windowing is provided at what layer of the
OSI reference model?
 A) Data Link Layer
 B) Network Layer
 C) Transport Lay...
Which of the following IP addresses would be
classified as private?
 A) 10.100.200.0
 B) 169.253.5.0
 C) 172.168.5.0
 ...
Two duplicate pieces of equipment can be used in
conjunction for which of the following purposes?
(Select TWO)
 A) High a...
PKI is a method of user authentication which
uses which of the following?
 A) Various router commands
 B) Access control...
Kim and Zach, attackers, use which of the
following network scanners to see the protocols
that are being used? (Select TWO...
IP addresses reside at which layer of the OSI
reference model?
 A) Network Layer
 B) Session Layer
 C) Data Link Layer
...
Which of the following is a connectionless
transport layer protocol?
 A) IP
 B) TCP
 C) UDP
 D) H.323
Identify the 4 layers of the TCP/IP stack
(Choose four)
 A) Session Layer
 B) Transport Layer
 C) Internet Layer
 D) D...
What is the range of well-known TCP and UDP
ports?
A) Below 2048
 B) Below 1024
 C) 16,384 – 32,768
 D) Above 8192
Which protocol supports a secure connection
to a remote host via terminal emulation
software?
 A) Telnet
 B) SSH
 C) FT...
Identify the well known port number for
NTP?
 A) 53
 B) 69
 C) 123
 D) 143
Identify 3 e-mail protocols? (choose 3)
 A) SNMP
 B) SMTP
 C) POP3
 D) IMAP4
What type of coaxial cable was often used for
10Base2 Ethernet networks?
 A) RG – 6
 B) RG – 45
 C) RG – 58
 D) RG - 59
Which of the following categories of UTP
cabling are commonly used for 1000Base-T
networks? (choose 2)
 A) CAT 5
 B) CAT...
Which type of cable might be required for
installation in a drop ceiling, which is
used as an open air return duct?
 A) R...
Which network infrastructure device
primarily makes forwarding decisions based
on MAC addresses?
 A) Router – (Layer 3 de...
A router(Layer 3) primarily makes its
forwarding decisions based on what address?
 A) Destination MAC address
 B) Source...
Identify 2 differences between an Ethernet
bridge and an Ethernet switch (Choose 2)
 A) Switches use ASIC’s to make forwa...
What layer do Bridges operate
at?
 Bridges operate at the Data Link Layer or
Layer 2
What is the purpose of the SMB
(server message block)
protocol?
 The SMB protocol runs on the UNIX or Linux
server and he...
What are BNC connectors used
for?
 BNC connectors are used to connect
computers to a 10Base2 (thinnet) cable in the
BUS t...
A router has 12 ports. How many broadcast
domains does the router have?
 A) None
 B) One
 C) Two
 D) Twelve
A switch has 12 ports. How many collision
domains does the switch have?
 A) None
 B) One
 C) Two
 D) Twelve
What is the first DHCP message sent by a
client attempting to obtain IP address
information from a DHCP server?
 A) DHCPO...
What specialized network device is commonly
used to load balance traffic across multiple
servers in a group?
 A) Content ...
What is CSMA/CA AND WHAT DOES IT
DO?
 Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA) It is the basic me...
What is DNS?
 Domain Name System (DNS) A system that
provides a way to map friendly host names or
URL’s to IP addresses.
What is meant by Default Gateway?
 It is the route taken so that a computer on
one segment can communicate with a
compute...
What is the Demilitarized Zone
(DMZ) and what does it do?
 The DMZ describes the area in a network
design that is located...
Which of the following describes a DNS
server?
 A) Translates an IP address to a name
 B) Caches commonly viewed web pag...
After Kim, a new user, moves furniture into a
cubicle, the computer does not connect to the
network any longer. Which of t...
Which of the following provides the use of a
secure tunnel for telecommuting without manually
installing and configuring e...
Which of the following can be an
STP cable?
 A) RG-6
 B) CAT5E
 C) Fiber
 D) RG-59
Which of the following wireless
authentication methods provides the GREATEST
amount of security?
 A) WEP
 B) WPA Enterpr...
Which of the following OSI model
layers is used for logical
addressing?
 A) Physical
 B) Transport
 C) Network
 D) Dat...
In which of the following layers of the OSI
model does the TCP protocol operate?
 A) Session
 B) Network
 C) Data link
...
A new wiring closet is setup to serve users in the east
wing of a campus. Equipment is moved from the old
closet, 50 feet ...
Which of the following protocols is used by
the ping command?
 A) SMTP
 B) ICMP
 C) TFTP
 D) ARP
Which of the following documents will allow
Kim, an administrator, to determine a change from
the standard default system ...
Which of the following
authenticates, allows, and controls the
execution of router commands?
 A) PKI
 B) RADIUS
 C) Ker...
A section of the building has been having
intermittent connectivity problems lately. An
action plan and solution has been ...
A firewall that looks at the source IP and
destination IP then routes them accordingly
is an example of which of the follo...
Which of the following is a valid IPv6
address?
 A) 1056: 958: E486:: F8:8962
 B) 1596:H593:B5D8::B589
 C) 2048:9584:A6...
Zach, a user, cannot access the Internet. A similar problem
occurred several times last week to other users, and the
solut...
Logically separating the ports on a switch
without physically separating them can be
done using which of the following?
 ...
Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is ...
A customer wants to have several internal
services hosted on multiple servers, all of which
need to be available to the In...
Which of the following communication modes
has the LOWEST overhead necessary to support
streaming protocols such as RTP?
...
Lisa, a home user, wishes to confine a
wireless network to devices ONLY inside of
her house. Which of the following will
a...
Which of the following security measures is
the LEAST intrusive on an end device?
 A) NIPS
 B) Host-based firewall
 C) ...
At which of the following layers of the OSI
model does an unmanaged switch operate?
 A) Layer 1
 B) Layer 2
 C) Layer 3...
Jeff, an administrator, has just finished installing a new switch and connected
two servers with IPs of 192.168.105.20 and...
An administrator is setting up a secure wireless network. The
administrator decides to support 802.11n and 802.11g with a
...
When configuring a WAP for a SOHO, which
parameter will BEST limit access to the
office area?
 A) Signal strength
 B) SS...
Which of the following is an environment where
only a username and password are required for
successful authentication res...
Which of the following methods limits access
to a network based on characteristics of the
network card?
 A) IP filtering
...
Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
 A) DoS
 B) Smurf attack
...
Which of the following Ethernet
technologies has the LONGEST
distance possible?
 A) 1000BaseLX
 B) 1000GBaseSR
 C) 1000...
Which of the following technologies
allows for redundant links within a
layer 2 segment?
 A OSPF
 B RIP
 C Port Mirrori...
Which of the following defines access for a
network?
 A) ACL
 B) RDP
 C) RAS
 D) ARP
A network administrator notices that all of the
company switches are running at capacity on a
given day, which is abnormal...
Which of the following problems is MOST likely to
arise when configuring an IPv6 over IPv4 tunnel?
 A) Routing loop
 B) ...
Kim, an administrator, wants to list all the
network connections to and from the server. Which
of the following commands w...
A network device is more than 100 meters (328
feet) from a 24-port copper switch. Which of the
following can be used to co...
A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch wi...
Which of the following is an example of two
factor authentication?
 A) Password device certificate and PIN
 B) SSL web s...
Which of the following is used to restrict
access according to user policies?
 A) Content filter
 B) DHCP server
 C) DN...
Which of the following describes a rationale
for a network with redundant paths?
 A) VPN compatibility
 B) Unified commu...
Teachers and students at a school currently share
the same bandwidth. The Internet performance for
the teachers in the cla...
Zach, a technician, wants to test a laptop’s NIC
for functionality but has no other networking
equipment to attach it to. ...
A computer on VLAN 10 with the IP address of 192.168.1.45/27
cannot ping a computer on VLAN 20 with the IP address of
192....
Identify the distance limitation of a 10BASE5
(thicknet)Ethernet network?
 A) 100m
 B) 185m
 C) 500m
 D) 2km
 m = met...
If 2 devices simultaneously transmit data on an Ethernet network &
a collision occurs, what does each station do in an att...
What kind of media is used by 100GBASE-
SR10 Ethernet?
 A) UTP
 B) MMF
 C) STP
 D) SMF
Which of the following statements are true
regarding VLAN’s? (choose 2)
 A) A VLAN has a single broadcast domain
 B) For...
What name is given to a VLAN on an
IEEE 802.1Q trunk whose frames are not
tagged?
 A) NativeVLAN
 B) DefaultVLAN
 C) Ma...
In a topology running STP, every network
segment has a single __________ port, which
is the port on that segment that is c...
What is the IEEE standard for link
aggregation?
 A) 802.1Q
 B) 802.3ad
 C) 802.1d
 D) 802.3af
What is the maximum amount of power a switch
is allowed to provide per port according to
the IEEE 802.3af standard?
 A) 7...
What switch feature allows you to connect a network
sniffer to a switch port & tells the switch to send
a copy of frames s...
Which IEEE 802.1X component checks the
credentials of a device wanting to gain
access to the network?
 A) Supplicant
 B)...
What is the binary representation of the
decimal number 117?
 A) 10110101
 B) 01110101
 C) 10110110
 D) 01101001
The binary number 10110100 has what decimal
equivalent?
 A) 114
 B) 190
 C) 172
 D) 180
What is the class of IP address 10.1.2.3/24?
 A) Class A
 B) Class B
 C) Class C
 D) Class D
Which of the following are dynamic
approaches to assigning routable IP
addresses to networked devices? (choose 2)
 A) BOO...
How many assignable IP addresses exist in the
172.16.1.10/27 network?
 A) 30
 B) 32
 C) 14
 D) 64
What is the prefix notation for a subnet mask
of 255. 255. 255. 240?
 A) /20
 B) /24
 C) /28
 D) /29
Your company has been assigned the 192.168.30.0/24
network for use at one of its sites. You need to use a
subnet mask that...
A client with an IP address of 172.16.18.5/18
belongs to what network?
 A) 172.16.0.0/18
 B) 172.16.4.0/18
 C) 172.16.8...
How can the following IPv6 address be
condensed?
0AA0:0123:4040:0000:0000:000:000A:100B
 A) AA0::123:404:A:100B
 B) AA::...
If a PC on an Ethernet network attempts to
communicate with a host on a different subnet, what
destination IP address & de...
What protocol is used to request a MAC address
that corresponds to a known IP address?
 A) IGMP
 B) TTL
 C) ICMP
 D) A...
What is the network address & subnet mask of a
default route?
 A) 255.255.255.255/32
 B) 0.0.0.0/32
 C) 255.255.255.255...
What routing protocol characteristic indicates
the believability of the routing protocol (as
opposed to other routing prot...
Which of the following are distance vector
routing protocol features that can prevent
routing loops? (choose 2)
 A) Rever...
Which of the following is a distance-vector
routing protocol with a maximum hop count of
15?
 A) BGP
 B) IS-IS
 C) RIP
...
Which of the following routing protocols is an
EGP?
 A) BGP
 B) IS-IS
 C) RIP
 D) OSPF
What NAT IP address is a public IP address
that references an inside device?
 A) Inside Local
 B) Inside Global
 C) Out...
What NAT variation automatically assigns an
inside global address from a pool of available
addresses?
 A) SNAT
 B) DNAT
...
What multicast protocol is used between clients &
routers to let routers know which of their
interfaces are connected to a...
ISDN is considered to be what type of WAN
connection?
 A) Dedicated leased line
 B) Circuit-switched connection
 C) Pac...
What is the data rate of an OC-3 connection?
 A) 51.84 Mbps
 B) 622 Mbps
 C) 155.52 Mbps
 D) 159.25 Gbps
Which of the following WAN technologies
commonly use unshielded twisted pair (UTP)?
(choose 3)
 A) Cable modem
 B) ISDN
...
How many channels on an E1 circuit are
available for voice, video, or data?
 A) 23
 B) 24
 C) 30
 D) 32
Which PPP authentication method provides one-
way authentication & sends credentials in
clear text data?
 A) WEP
 B) MS-...
What DSL variant has a distance limitation of
18,000 ft. between DSL modem & its DSLAM?
 A) HDSL
 B) ADSL
 C) SDSL
 D)...
What kind of network is used by many cable
companies to service their cable modems, &
contains both fiber-optic and coaxia...
What locally significant identifier is used by
a frame Relay network to reference a virtual
circuit?
 A) VPI/VCI
 B) DLC...
How big is the payload portion of an ATM cell?
 A) 5 bytes
 B) 48 bytes
 C) 53 bytes
 D) 64 bytes
What type of antenna, commonly used in wireless AP’s
& wireless routers in SOHO locations, radiates
relatively equal power...
When using the 2.4 GHz band for multiple access points in a WLAN
located in the United States, which nonoverlapping channe...
What technology do WLAN’s use to determine when
they gain access to the wireless media?
 A) SPF
 B) CSMA/CA
 C) RSTP
 ...
What IEEE 802.11 variant supports a maximum
speed of 54 Mbps & uses 2.4 GHz band?
 A) 802.11a
 B) 802.11b
 C) 802.11g
...
Which of the following is used by IEEE 802.11n to
achieve high through-put through the use of multiple
antennas for transm...
A WLAN formed directly between wireless clients
(without the use of a wireless AP) is referred to as
what type of WLAN?
 ...
When extending the range for a 2.4-GHz WLAN, you can use
nonoverlapping channels for adjacent coverage cells.
However, the...
If a WLAN does not require a user to provide any
credentials to associate with a wireless AP &
access the WLAN, what type ...
WEP’s RC4 approach to encryption uses a 24-
bit string of characters added to
transmitted data, such that the same plain
t...
What standard developed by the Wi-Fi
Alliance implements the requirements of IEEE
802.11i ?
 A) TKIP
 B) MIC
 C) WEP
 ...
What is the MPLS header?
 A) 4 bits
 B) 8 bits
 C) 16 bits
 D) 32 bits
Which of the following is a social
engineering attack?
 A) Man in the middle
 B) Worms
 C) EvilTwin
 D) Phishing
00:12:34:56:78 can be used in which of
the following?
 A Channel selection
 B WPA-PSK password
 C WEP key
 D MAC filte...
Which of the following devices
will monitor for propagating
worms?
 A IDS
 B Firewall
 C Proxy server
 D Mail server
T568B wiring scheme is typically found on
which of the following components?
 A 66 block
 B Demarc extension
 C Patch P...
Something you have, something you
are and something you know are the
three tenets of:
 A) access control
 B) remote acce...
After moving office furniture around a
user can no longer connect to the
network. Which of the following is Most
likely th...
A company wishes to have a wireless signal
broadcast only through a special tunnel.
Which of the following measures will
a...
In IPSec, which of the following
is an agreement on how devices
will securely transmit
information?
 A) ESP
 B) SA
 C) ...
Which of the following could be
used to estimate RTT across a
router?
 A traceroute
 B dig
 C arp
 D uptime
The cable tester displays the
following information
 11
 2------- 2
 3------- 3
 4xxxxx 4
 5xxxxx 5
 6------- 6
 7-...
Which of the following represents
the physical address of a network
access card
 A 00-30-48-83-9B-C8
 B FF01:D2:C4:87::1...
Which of the following records
would be used for a Reverse
DNS lookup?
 A) MX
 B) PTR
 C) A
 D) AAAA
Which of the following defines access for a
network?
 A) ACL
 B) RDP
 C) RAS
 D) ARP
A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch wi...
Which of the following is used to restrict
access according to user policies?
 A) Content filter
 B) DHCP server
 C) DN...
Which of the following describes a rationale
for a network with redundant paths?
 A) VPN compatibility
 B) Unified commu...
Kim, an administrator, would like to inspect
all traffic flowing over the SMTP protocol
on a given network. Which of the f...
For which of the following reasons could a
single server’s NIC transmit packets from
multiple MAC address sources?
 A) Th...
Which of the following does SNMPv3 BEST
provide over previous versions?
 A) Simplified management
 B) Increased security...
In which of the following would Lisa, a
technician, find the LARGEST number of 110
block patch panels?
 A) MDF
 B) Cachi...
A company’s database software runs the cloud.
The device hosting the software is an example
of which of the following?
 A...
Kim, a new employee, is unable to get to the department’s
server while other employees are having no issues. The network
a...
Kim, a customer, wants to install a wireless network
into a shared office space. There are several other
wireless networks...
Which of the following allows a central point
to simultaneously address other points without
addressing all of them?
 A) ...
Zack, a technician, wants to provide the
MOST wireless security on the LAN but does
not have a RADIUS server. Which techno...
Which of the following would a technician plug
into a smartjack?
 A) 25 pair cable
 B) 100 pair cable
 C) Patch cable
...
A customer wishes to network several computers
throughout a large warehouse containing numerous
metal shelves & concrete w...
Lisa, an administrator, is unable to route traffic
between VLAN’s on a switch. Communication between
devices within each V...
Which of the following devices is used to
distribute network traffic equally over
multiple links?
 A) Content filler
 B)...
Which of the following would cause signal
interference in a 2.4 GHz WAP? (Choose 2)
 A) Cell phone
 B) Cordless phone
 ...
Which of the following default services uses
TCP/UDP port 88?
 A) LDAP
 B) IGMP
 C) HTTP
 D) Kerberos
Which of the following TCP/IP & OSI model
layers retransmits a TCP packet if it is not
received successfully at this desti...
Which of the following limits the number of
devices that can be assigned IP addresses by
DHCP?
 A) A Lease
 B) Reservati...
Kim, a network administrator, should consult
which documentation sources FIRST to
determine the cause of recent network
is...
When using high bandwidth applications over
multiple WAN connections, which of the
following should be used?
 A) Static I...
A new user is reporting connectivity issues.
Zach, the network technician, notices that there
is no link light on the user...
Which of the following ports is
the default telnet port?
 A) 20
 B) 21
 C) 22
 D) 23
In which of the following
wireless standards is MIMO used?
 A) 802.11a
 B) 802.11b
 C) 802.11g
 D) 802.11n
Which of the following address blocks
would MOST likely be blocked from
crossing a border router?
 A) 8.0.0.0/8
 B) 172....
Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is ...
Which of the following ports would have to
be allowed through a firewall to allow SNMP
traffic to pass on its default port...
Lisa, a network technician, needs to
introduce a few more cables to the existing
patch panel. Which of the following tools...
Jeff, a technician is setting up an IDS security
device. Which of the following should be
configured on the switch to util...
Jeff, a network technician, is
installing a wireless router. Which of
the following should Jeff consider to
get the BEST s...
Zach, a technician suspects a duplicate IP
address assignment on the network. Which
of the following resources can be used...
Lisa, a technician, decides to upgrade a router
before leaving for vacation. While away, users
begin to report slow perfor...
A VPN concentrator is used for which
of the following purposes?
 A) MAC filtering
 B) Content filtering
 C) Secure netw...
Which of the following layers of the OSI
model, maps to the Network Interface
layer of the TCP/IP Protocol stack? (pick
2)...
Which of the following tools would Lisa, a
technician, BEST use to trace a wire
through an area where multiple wires of
th...
Kim, a user, cannot access the network using
wireless. Which of the following is MOST
likely the cause?
 A) TXRX is rever...
Lisa, a user, reports the network is down. While
troubleshooting, a technician walks into a
communications closet and noti...
Jeff, a technician, is charged with setting up
network monitoring for critical devices in the
network. It is important the...
Which of the following utilities would
Kim, a technician, use to resolve the FQDN
of a web server to its IP address?
 A) ...
Zach, a technician, is installing an 802.11n
network. Which of the following should he
disable to stop broadcasting the ne...
Which of the following can Jeff, a
technician, modify on a 802.11n router that
is not available as an option on an 802.11g...
Jeff, an end user, has plugged in both ends of
the same network cable to two adjacent jacks.
Both ports are connected to t...
An analog POTS voice line is no longer
working and Kim, the technician, is tasked
to verify if a dial tone is present at t...
Lisa, a technician, is troubleshooting a
cable problem. She has checked both ends and
suspects an issue 50 yards (46 meter...
Which of the following properties of DHCP
would Lisa, a technician, use to ensure an
IP address is not leased out from the...
Zach, a network technician, has been
troubleshooting a connectivity problem in the LAN
room. He has diagnosed the problem ...
Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?...
Two WAPs are positioned with overlapping
coverage, but seamless roaming across them
is not working. Which of the following...
Which of the following would Kim, a
technician, do to monitor remote traffic
through an access point?
 A) Enable an SNMP ...
Which of the following 802.11n features
allows for the use of multiple
simultaneous frequencies in order to
increase usabl...
Which of the following ports would Zach, a
technician, need to open on a firewall to
allow SSH on the default port?
 A) 2...
Which of the following separates
broadcast domains?
 A) Port mirroring
 B) Router
 C) Convergence
 D) Switch
Zach, a technician, needs to terminate a
CAT5e Ethernet cable to a 110 block. Which
of the following tools should be used?...
Kim, a technician, needs to locate a cable
in an unorganized wiring closet. Which of
the following tools will help her loc...
Jeff, a technician, has been asked to add a
subnet to the company’s LAN. Which of the
following interfaces on the router w...
Lisa, a network technician, is attempting to map a
FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT....
Jeff, a user, is having a problem with a
POTS line. Which of the following tools
would Jeff use to make sure the phone
lin...
Lisa, a technician, has configured a new switch
that is remotely accessed using SSH. The switch is
working properly, but c...
Which of the following protocols
is used to securely connect to a
multi-layer switch?
 A) HTTP
 B) SMTP
 C) SSH
 D) Te...
Which of the following is the prefix for a
link-local IPv6 address?
 A) FE80::/10
 B) FFOO::/8
 C) 2FFE::/16
 D) FEEF:...
Zach, a technician, is checking newly installed
CAT5 cabling and suspects that some of the ends
were not properly terminat...
There is suspected virus activity on the
network. Which of the following would
Lisa, a technician, use to study network
tr...
Which of the following is used to
prevent Layer 2 switching loops
within a local area network?
 A) STP
 B) MTU
 C) EGP
...
Which of the following network management
tools can filter information from all data
entering and leaving a specific port ...
Which of the following is a method to
prioritize network traffic coming on VoIP
phones?
 A) PAT
 B) DNS
 C) SIP
 D) QoS
Which of the following network
devices hides network nodes
behind one public IP address?
 A) Layer 3 switch
 B) Content ...
A mobile user is no longer able to access network resources.
Jeff, the network technician, is unable to ping the user’s
wo...
Which of the following Ethernet
technologies has the LONGEST
distance possible?
 A) 1000BaseLX
 B) 1000GBaseSR
 C) 1000...
Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
 A) DoS
 B) Smurf attack
...
Which of the following is a terminal
emulator used to manage a network device?
 A) VPN
 B) IDS
 C) PUTTY
 D) IPS
Which of the following DNS record
types is used for IPv6 resolution?
 A) MX
 B) AAAA
 C) A
 D) PTR
A technician has received word that the
telephone company has added another POTS
line to the building. Where will the
tech...
Which of the following is the MAXIMUM
distance a single 1000BaseT segment can
cover?
 A) 100 kilometers (62 miles)
 B) 1...
Kim, a network technician wants to use a packet analyzer to
troubleshoot a reported problem with a user's workstation with...
An organization currently has CAT5e cabling
throughout its office. Kim, the network
technician, is troubleshooting a new C...
Which of the following are components of
IPSec? (Select 2)
 A) AH
 B) ESP
 C) SSH
 D) ICA
 E) TLS
Which of the following
authenticates, allows, and controls
the execution of router commands?
 A) PKI
 B) RADIUS
 C) Ker...
A technician is configuring a wireless
network. To avoid interference from other
wireless networks in the area, the
techni...
Jeff, a company executive, has noticed that a wireless
network signal from the company's WAP can be seen in the
company's ...
Which of the following DNS record types
provides the hostname to IP address
mapping?
 A) A record
 B) NS record
 C) CNA...
Which of the following would be used to
test out the security of a specific
network by allowing it to receive
security att...
Which of the following would Kim, a
technician, use in voice over IP
communications?
 A) SNTP
 B) SCP
 C) SMTP
 D) SIP
Which of the following is the best way to
mitigate security threats on a network?
 A) Social engineering
 B) User traini...
Which of the following subnet masks would
allow for 192.168.0.3 and 192.168.0.240
to be in the same subnet?
 A) 255.255.2...
Jeff, an administrator, wishes to add a
third network segment to the firewall
where the company’s public web servers
will ...
Which of the following would help a new
administrator quickly determine if a
network had a VLAN for its publicly
accessibl...
Which of the following has the
HIGHEST data rate speed?
 A) T1
 B) ADSL
 C) SDSL
 D) OC-3
Which of the following technologies is
associated with the DOCSIS standard?
 A) Cable
 B) Dialup
 C) Wireless
 D) Cell...
Which of the following MUST be used when
securing a VoIP network consisting of
private IP addresses?
 A) IPS
 B) Applica...
Which of the following should an
administrator do after running a command
from the console on the perimeter router?
 A) U...
Kim, a technician, is connecting a new desktop computer to
a switch. She was only able to locate one cable in the
office f...
Which of the following are fiber
connectors? (Select 2)
 A) LC
 B) MTRJ
 C) T1
 D) DB-9
 E) BNC
Which of the following solutions will
detect and disable a rogue access point?
 A) Port scan
 B) packet sniffer
 C) IPS...
Which of the following is the MOST
economical way for Sandy, a
technician, to implement 10-Gigabit
Ethernet at a datacente...
Which of the following can be done
to increase a wireless LAN cell
size?
 A) Add a higher gain omni antenna
 B) Add dive...
Which of the following can be configured
to restrict specific ports and IP
addresses from accessing the internal
network? ...
Which of the following is used to
identify active hosts along with their
network addresses?
 A) Port scan
 B) Ping sweep...
Which of the following is used to share
traffic between multiple network
connections?
 A) Load balancer
 B) Content filt...
What layers of the OSI model
does Stateful Inspection
operate at?
It assures the connection (session) between 2
parties is...
Which of the following cable types
allows for the LONGEST distance of
a Gigabit Ethernet connection?
 A) Multimode fiber
...
Which of the following mediums is
circuit switched?
 A) PSTN
 B) ATM
 C) Frame relay
 D) MPLS
Upcoming SlideShare
Loading in …5
×

Test King Virtual Test--Network+

2,449 views
2,316 views

Published on

CompTIA Network+ Test King Practice Test

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,449
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
19
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Test King Virtual Test--Network+

  1. 1. COMPTIA Exam Questions
  2. 2. Which of the following is a standard measure of signal power?  A) MhZ  B) mips  C) dBm  D) Gbps
  3. 3. Which of the following is the network topology in which computers connect in a closed circle?  A) Bus  B) Mesh  C) Ring  D) Star
  4. 4. The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?  A) 1  B) 3  C) 4  D) 5
  5. 5. Which of the following is the correct representation of an IPv6 address?  A) ::  B) 0:0:0:0:0:0:0:0:1  C) 1:2:3:4:AB:CD:EF  D) 2001::4860:800f::
  6. 6. Which of the following security devices would MOST likely be used on a network to screen & prevent malicious traffic?  A) IDS  B) VPN  C) NIPS  D) HIDS
  7. 7. What is a client?  A Client is a device an end user uses to access a network . This device can be a workstation, laptop, smart phone with wireless capabilities, or a variety of other end-user terminal devices.
  8. 8. Users report that their internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video music. Which of the following would BEST confirm Zach’s theory?  A) Traffic analysis  B) SNMP  C) History logs  D) System logs
  9. 9. A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?  A) IS-IS  B) BGP  C) OSPF  D) RIP
  10. 10. Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?  A) Question users  B) Test the theory  C) Re-establish a theory of probable cause  D) Escalate the problem
  11. 11. A server technician notices that some changes were implemented on a server during non-business hours. Which of the following would allow the technician to identify the last time an administrator was remotely connected to the server?  A) Network sniffer  B) Traffic analyzer  C) System log  D) Security log
  12. 12. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?  A) Gateway  B) Hub  C) Bridge  D) Router
  13. 13. Which of the following 802.11 standards is MIMO used in?  A) a  B) b  C) g  D) n
  14. 14. A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper & ink. Which of the following should the technician do NEXT?  A) Implement the solution  B) Question users  C) Test theory  D) Escalate the problem
  15. 15. Which of the following would be the BEST IDS topology for monitoring one specific device?  A) Signature-based  B) Network-based  C) Host –based  D) Behavior-based
  16. 16. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?  A) Supernetting  B) Dynamic  C) Subletting  D) Convergence
  17. 17. Which of the following fiber types is MOST often used indoors?  A) Plenum  B) Modal conditioning  C) Singlemode  D) Multimode
  18. 18. Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?  A) 20  B) 53  C) 80  D) 3389
  19. 19. A customer reports a network patch cable was unplugged from a switch & plugged back into an available switch port. The switch’s activity lights have been lit up constantly & network response times are extremely slow. Which of the following issues is MOST likely occurring?  A) Switching loop  B) DDoS attack  C) Mismatched MTU  D) Port mirroring
  20. 20. Which of the following protocols is used to assign IP addresses to network devices?  A) UTP  B) DHCP  C) FTP  D) TCP/IP
  21. 21. Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?  A) Content filtering  B) Port filtering  C) MAC filtering  D) IP filtering
  22. 22. Which of the following allows access to a network, based on the hardware address of a network card?  A) Content filtering  B) Port filtering  C) MAC filtering  D) IP filtering
  23. 23. Which of the following is true of NIPS?  A) Routes traffic to the proper port  B) Detects malicious host traffic  C) Detects and prevents harmful traffic  D) Prevents traffic on network hosts
  24. 24. Which of the following protocols is used for remote management of devices?  A) TFTP  B) SNMP  C) Syslog  D) SMTP
  25. 25. Which encryption type uses only a 28 character key?  A) 40/64 bitWEP  B) WPA Personal  C) 104/128 bitWEP  D) WPA@PSK
  26. 26. At which of the following layers of the OSI model do frames exist?  A) Application  B) Network  C) Transport  D) Data link
  27. 27. Which of the following utilities can be used to list the routing table?  A) Ipconficj  B) Nslookup  C) Dig  D) Netstat
  28. 28. Which of the following OSI model layers is between the Network and Session layers?  A) Presentation  B) Data link  C) Physical  D) Transport
  29. 29. Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?  A) OTDR  B) Protocol analyzer  C) TDR  D) Toner probe
  30. 30. Which of the following tools would BEST be used to verify if a network cable is properly terminated?  A) Multimeter  B) Cable certifier  C) Toner probe  D) Cable stripper
  31. 31. Which of the following uses port 53 by default?  A) RDP  B) QoS  C) DHCP  D) DNS
  32. 32. Network administrators use which of the following to monitor and map network availability, performance, and error rates?  A) SMTP  B) PPoE  C) PoE  D) SNMP
  33. 33. Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Jeff implement?  A) DNS  B) NAT  C) PKI  D) RAS
  34. 34. A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed through or dumped is a example of which of the following?  A) Packet sniffing  B) Packet filter  C) Stateful inspection  D) Content filter
  35. 35. Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters) from the house. Zach wants to extend the Internet connection from the home to the garage. Which of the following technologies would MOST likely accommodate this range?  A) DVI cable  B) Bluetooth  C) Wireless  D) CAT3 cable
  36. 36. A power failure caused a router to reboot. Now users are not able to reach remote networks. Which of the following is the MOST likely cause?  A) Dynamic NAT tables were erased by the reset  B) The DNS server settings on the workstations are incorrect  C) MAC entries in the ARP table were not saved  D) The technician did not save the running configuration
  37. 37. Which of the following is a device directly used by an end user to access a network?  A) Server  B) LAN  C) Client  D) Router
  38. 38. What does a Switch do?  Interconnects network components like a hub except the switch interrogates the traffic to find out where its destined and forwards the traffic thru the right port. It is considered a Layer 2 device because it makes its forwarding decisions from the Media Access Control (MAC) address burned into the NIC card.
  39. 39. Which device makes traffic- forwarding decisions based on the MAC address?  A) Hub  B) Router  C) Switch  D) Multiplexer
  40. 40. What type of network is a MAN?  MAN or Metro Ethernet is smaller than aWAN. a MAN interconnects locations throughout a metropolitan area via a service provider’s high speed network (10 Gbps)
  41. 41. A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?  A) WAN  B) CAN  C) PAN  D) MAN
  42. 42. What type of network is a PAN?  PAN is network whose range is only a few meters and much smaller than a LAN. It consists of a connection between a PC and a digital camera via a universal serial bus (USB ) cable. It could also be a PC connected to an external hard drive via a FireWire connection, A PAN is not necessarily a wired connection, it can also be a Bluetooth connection between a cell phone & a car’s wireless audio system.
  43. 43. A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?  A) WAN  B) CAN  C) PAN  D) MAN
  44. 44. What are some characteristics of the star topology?  Most popular physical LAN topology used today. The Ethernet switch is in the center of the star and unshielded twisted pair (UTP) cables run from the switch ports to the client and back. It uses more cables than the other topologies because each device requires its own wiring to the central device. If one of the cables breaks it only affects the device its connected to not the entire group.
  45. 45. Which of the following LAN topologies requires the most cabling?  A) Bus  B) Ring  C) Star  D) WLAN
  46. 46. Which of all the Network Topologies is the least fault tolerant and why?  A bus network requires only a single cable per segment. If any device in the segment fails, then the whole segment crashes.
  47. 47. What are the characteristics of a Full- Mesh topology?  Offers the highest level of redundancy. Each site is directly connected to every other site so an optimal route exists between any two sites. It is also highly fault resistant. It is difficult and expensive to scale, because to add a new site requires aWAN link to every other site.
  48. 48. Which of the following topologies offers the highest level of redundancy?  A) Full Mesh  B) Hub & Spoke  C) BUS  D) Partial Mesh
  49. 49. How to calculate the number of required WAN connections for a Full-Mesh topology?  Example: If you have 5 remote sites  W= number ofWAN links  N = number of sites  W=n * (n-1) / 2  w = 5 * (5-1) / 2 (4 / 2)  w = 5 * 2  w = 10  Ans: 10WAN links are required 5 there & 5 back
  50. 50. How many WAN links are required to create a full mesh of connections between 5 remote sites?  A) 5  B) 10  C) 15  D) 20
  51. 51. How does the Hub and Spoke topology differ from the Full- Mesh topology?  Costs are reduced because each site is connected to a central hub, not to each other so a small amount of links are needed. It’s also more scalable because to add another site only requires a connection to the hub. It also lacks redundancy because every site goes through the central Hub so it becomes a single point of failure. If the hub is down so is the network.
  52. 52. Identify two advantages of a hub-and- spoke WAN topology as compared to a Full-Mesh WAN topology? (Pick 2)  A) Lower Cost  B) Optimal Routes  C) More scalable  D) More redundancy
  53. 53. What are the characteristics of a Peer-to- peer network?  Used for small or home based businesses, less than 10 PC’s. It allows all interconnected devices to share resources like files, and printers. Inexpensive network to run, limited scalability. The more PC’s on the network decreases performance & increases the burden of managing multiple clients for the administration.
  54. 54. Which type of network is based on clients sharing resources with one another?  A) Client-server  B) Client- peer  C) Peer-to-peer  D) Peer-to-server
  55. 55. Which of the following is an advantage of a peer–to-peer network, as compared with a client-server network?  A) More scalable  B) Less expensive  C) Better performance  D) Simplified administration
  56. 56. What is a Server?  A server, serves up resources to a network. These resources might include e-mail access, (as provided by an e-mail server) web pages (as provided by a web server) or files (available on a file server)
  57. 57. What is a Hub?  It is a device that interconnects network components, such as clients, and servers. Hubs vary in their number of available ports. Hubs can be interconnected to a point. Too many hubs chained together will result in network errors. A hub does not perform any inspection of the traffic it passes. It receives traffic through a port that’s connected to a network cable then it repeats that traffic out of all the other ports.
  58. 58. What are the 7 layers of the OSI Model?  Layer 1 The Physical Layer  Layer 2 The Data Link Layer  Layer 3 The Network Layer  Layer 4 TheTransport Layer  Layer 5 The Session Layer  Layer 6 The Presentation Layer  Layer 7 TheApplication Layer
  59. 59. What is the difference between the OSI reference model and the TCP/IP model?  *The OSI ensures reliable delivery of packets at the transport layer (4) *TCP/IP Model matches up to the OSI model as: The Network Interface (Link) layer compares to the Physical & Data Link,The Internet layer is comparable to the Network,Transport is the same in both, &The Application layer inTCP/IP handles layers 5, 6,& 7 in the OSI model. TCP/IP does not guarantee reliable delivery of packets at layer 4 (transport). TCP/IP also offers the UDP (connectionless transport layer protocol) option.
  60. 60. What is the function of the second layer know as The Data Link Layer?  The Data Link Layer has 2 sub layers The 1st sub layer is the Media Access Control (MAC)This handles the:  Physical Addressing  LogicalTopology  Method of transmitting on the media.  The 2nd sub layer is the Logical Link Control (LLC)This sub layer handles the:  Connection services  Synchronizing transmissions.
  61. 61. Which layer of the OSI reference model contains the MAC and LLC sub layers?  A) The Network Layer  B) TheTransport Layer  C) The Physical Layer  D) The Data Link Layer
  62. 62. What is Baseband?  Baseband resides in the 1st layer of the OSI Model in the Physical Layer unlike broadband where it divides the bandwidth over copper etc.. Baseband uses all available frequencies on a medium to transmit data. Ethernet is an example of a network technology that uses baseband.
  63. 63. Which approach to bandwidth usage consumes all available frequencies on a medium to transmit data?  A) Broadband  B) Baseband  C) Time – Division Multiplexing  D) Simplex
  64. 64. Windowing is provided at what layer of the OSI reference model?  A) Data Link Layer  B) Network Layer  C) Transport Layer  D) Physical Layer
  65. 65. Which of the following IP addresses would be classified as private?  A) 10.100.200.0  B) 169.253.5.0  C) 172.168.5.0  D) 200.100.25.0
  66. 66. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)  A) High availability  B) Fault tolerance  C) Reduce latency  D) Wi-MAX  E) CARP
  67. 67. PKI is a method of user authentication which uses which of the following?  A) Various router commands  B) Access control lists  C) Certificate services  D) A RADIUS server
  68. 68. Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).  A) IDS  B) Packet sniffer  C) Port scanner  D) Malware scanner  E) Ping sweep
  69. 69. IP addresses reside at which layer of the OSI reference model?  A) Network Layer  B) Session Layer  C) Data Link Layer  D) Transport Layer
  70. 70. Which of the following is a connectionless transport layer protocol?  A) IP  B) TCP  C) UDP  D) H.323
  71. 71. Identify the 4 layers of the TCP/IP stack (Choose four)  A) Session Layer  B) Transport Layer  C) Internet Layer  D) Data Link Layer  E) Network Layer  F) Application Layer  G) Network Control Layer
  72. 72. What is the range of well-known TCP and UDP ports? A) Below 2048  B) Below 1024  C) 16,384 – 32,768  D) Above 8192
  73. 73. Which protocol supports a secure connection to a remote host via terminal emulation software?  A) Telnet  B) SSH  C) FTP  D) SFTP
  74. 74. Identify the well known port number for NTP?  A) 53  B) 69  C) 123  D) 143
  75. 75. Identify 3 e-mail protocols? (choose 3)  A) SNMP  B) SMTP  C) POP3  D) IMAP4
  76. 76. What type of coaxial cable was often used for 10Base2 Ethernet networks?  A) RG – 6  B) RG – 45  C) RG – 58  D) RG - 59
  77. 77. Which of the following categories of UTP cabling are commonly used for 1000Base-T networks? (choose 2)  A) CAT 5  B) CAT5e  C) CAT6  D) CAT6e
  78. 78. Which type of cable might be required for installation in a drop ceiling, which is used as an open air return duct?  A) Riser  B) Plenum  C) Multimode  D) Twin-axial
  79. 79. Which network infrastructure device primarily makes forwarding decisions based on MAC addresses?  A) Router – (Layer 3 device)  B) Switch (Layer 2 device)  C) HUB ( Layer 1 device)  D) Multi-Layer switch (Layers 2 & above)
  80. 80. A router(Layer 3) primarily makes its forwarding decisions based on what address?  A) Destination MAC address  B) Source IP address  C) Source MAC address  D) Destination IP address
  81. 81. Identify 2 differences between an Ethernet bridge and an Ethernet switch (Choose 2)  A) Switches use ASIC’s to make forwarding decisions, while bridges make their forwarding decisions in software.  B) Bridges typically operate faster than switches  C) Switches typically have higher port densities than bridges  D) Bridges can base their forwarding decisions on logical network layer addresses
  82. 82. What layer do Bridges operate at?  Bridges operate at the Data Link Layer or Layer 2
  83. 83. What is the purpose of the SMB (server message block) protocol?  The SMB protocol runs on the UNIX or Linux server and helps theWindows server see the UNIX/Linux servers as if they were one of the Windows servers itself.
  84. 84. What are BNC connectors used for?  BNC connectors are used to connect computers to a 10Base2 (thinnet) cable in the BUS topology.
  85. 85. A router has 12 ports. How many broadcast domains does the router have?  A) None  B) One  C) Two  D) Twelve
  86. 86. A switch has 12 ports. How many collision domains does the switch have?  A) None  B) One  C) Two  D) Twelve
  87. 87. What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?  A) DHCPOFFER  B) DHCPACK  C) DHCPDISCOVER  D) DHCPREQUEST
  88. 88. What specialized network device is commonly used to load balance traffic across multiple servers in a group?  A) Content switch  B) Proxy server  C) DNS server  D) Content engine
  89. 89. What is CSMA/CA AND WHAT DOES IT DO?  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) It is the basic medium access method for IEEE 802.11(g) wireless networks. (CSMA/CD is collision detection, and it’s the basic access method for Ethernet networks)
  90. 90. What is DNS?  Domain Name System (DNS) A system that provides a way to map friendly host names or URL’s to IP addresses.
  91. 91. What is meant by Default Gateway?  It is the route taken so that a computer on one segment can communicate with a computer on another segment.
  92. 92. What is the Demilitarized Zone (DMZ) and what does it do?  The DMZ describes the area in a network design that is located between the internal network & the external network. Usually the internet. It is used for devices accessible to internet traffic such as the web server, FTP server, SMTP server, and DNS.
  93. 93. Which of the following describes a DNS server?  A) Translates an IP address to a name  B) Caches commonly viewed web pages  C) Assigns IP addresses to network devices  D) Provides port security for a network
  94. 94. After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).  A) Bad Ethernet switch port  B) TX/RX reversed  C) Bad connectors  D) Bad patch cable  E) Mismatched MTU
  95. 95. Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?  A) RDP  B) SSLVPN  C) ISAKMP  D) TLS2.0
  96. 96. Which of the following can be an STP cable?  A) RG-6  B) CAT5E  C) Fiber  D) RG-59
  97. 97. Which of the following wireless authentication methods provides the GREATEST amount of security?  A) WEP  B) WPA Enterprise  C) WPA Personal  D) WPA2 Personal
  98. 98. Which of the following OSI model layers is used for logical addressing?  A) Physical  B) Transport  C) Network  D) Data link
  99. 99. In which of the following layers of the OSI model does the TCP protocol operate?  A) Session  B) Network  C) Data link  D) Transport
  100. 100. A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause?  A) Protocol mismatch  B) MTU size was not increased for the new distance  C) IncorrectVLAN assignment  D) Incorrect cabling
  101. 101. Which of the following protocols is used by the ping command?  A) SMTP  B) ICMP  C) TFTP  D) ARP
  102. 102. Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration?  A) Baseline  B) Physical network diagram  C) Wiring schematic  D) Logical diagram
  103. 103. Which of the following authenticates, allows, and controls the execution of router commands?  A) PKI  B) RADIUS  C) Kerberos  D) TACACS+
  104. 104. A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?  A) Document the solution and process  B) Establish the most probable cause  C) Implement and test the solution  D) Identify additional symptoms and problems
  105. 105. A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?  A) Packet filtering  B) Content filtering  C) Packet sniffing  D) Application gateway
  106. 106. Which of the following is a valid IPv6 address?  A) 1056: 958: E486:: F8:8962  B) 1596:H593:B5D8::B589  C) 2048:9584:A6B8::0983  D) 4820::0985:489D::8761
  107. 107. Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?  A) Change the DNS server IP on the client  B) Information gathering  C) Change the workstation IP address  D) Establish a plan of action
  108. 108. Logically separating the ports on a switch without physically separating them can be done using which of the following?  A) Routing tables  B) Hub logic  C) Spanning tree protocol  D) VLANs
  109. 109. Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?  A) nmap  B) nbtstat  C) dig  D) arp
  110. 110. A customer wants to have several internal services hosted on multiple servers, all of which need to be available to the Internet through a single public IP address. Which of the following would need to be configured?  A) QoS  B) PoE  C) PAT  D) VLAN
  111. 111. Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?  A) Connectionless  B) Stateful  C) Full duplex  D) Quality of Service
  112. 112. Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?  A) Decreasing radio strength  B) MAC filtering  C) WEP encryption  D) SSID broadcast disable
  113. 113. Which of the following security measures is the LEAST intrusive on an end device?  A) NIPS  B) Host-based firewall  C) Antivirus  D) HIDS
  114. 114. At which of the following layers of the OSI model does an unmanaged switch operate?  A) Layer 1  B) Layer 2  C) Layer 3  D) Layer 4
  115. 115. Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?  A) The subnet mask is incorrect  B) A routing loop has occurred  C) Jeff used a crossover cable to connect the switch to the gateway  D) The server is missing default-gateway information
  116. 116. An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre- shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues?  A) Limit the devices to 802.11n only  B) Enable the SSID broadcast  C) Enable MAC filtering  D) UseWEP 128-bit key
  117. 117. When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?  A) Signal strength  B) SSID enable  C) Encryption  D) Password hardening
  118. 118. Which of the following is an environment where only a username and password are required for successful authentication results in access to multiple resources?  A) Multiple logins  B) Multifactor authentication  C) Two-factor authentication  D) Single sign-on
  119. 119. Which of the following methods limits access to a network based on characteristics of the network card?  A) IP filtering  B) MAC filtering  C) Port filtering  D) Encryption
  120. 120. Which of the following threats is MOST likely to enable an attacker to modify data in transit?  A) DoS  B) Smurf attack  C) Virus  D) Man-in-the-middle
  121. 121. Which of the following Ethernet technologies has the LONGEST distance possible?  A) 1000BaseLX  B) 1000GBaseSR  C) 1000BaseSX  D) 1000BaseT
  122. 122. Which of the following technologies allows for redundant links within a layer 2 segment?  A OSPF  B RIP  C Port Mirroring  D SpanningTree
  123. 123. Which of the following defines access for a network?  A) ACL  B) RDP  C) RAS  D) ARP
  124. 124. A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?  A) Wire tap  B) Network sniffer  C) Load balancing appliance  D) NIPS
  125. 125. Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?  A) Routing loop  B) MTU black hole  C) Framing error  D) SYN flood
  126. 126. Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2)  A) traceroute E) Bandwidth shaper  B) ping F) Load Balancer  C) ipconfig G) DNS server  D) netstat H) IPS
  127. 127. A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?  A) Fiber multiplexer  B) Repeater  C) Attenuator  D) OTDR
  128. 128. A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?  A) DB loss  B) EMI  C) TXRX reversed  D) Open shorts
  129. 129. Which of the following is an example of two factor authentication?  A) Password device certificate and PIN  B) SSL web server certificate and password  C) User password and administrator  Password  D) Password and hardware token OTP
  130. 130. Which of the following is used to restrict access according to user policies?  A) Content filter  B) DHCP server  C) DNS server  D) VPN concentrator
  131. 131. Which of the following describes a rationale for a network with redundant paths?  A) VPN compatibility  B) Unified communications implementation  C) High availability requirement  D) QoS
  132. 132. Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?  A) Increased uptime  B) Caching engines  C) Traffic shaping  D) Load balancing
  133. 133. Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?  A) Loopback plug  B) Protocol analyzer  C) Smart jack  D) Coupler
  134. 134. A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?  A) Replace the router with a layer 2 switch that supportsVLANs  B) ChangeVLAN 20 computers Default Gateway to 192.168.1.127/27  C) ChangeVLAN 10 computers Default Gateway to 192.168.1.32/27  D) Allow ICMP to pass through the router
  135. 135. Identify the distance limitation of a 10BASE5 (thicknet)Ethernet network?  A) 100m  B) 185m  C) 500m  D) 2km  m = meters
  136. 136. If 2 devices simultaneously transmit data on an Ethernet network & a collision occurs, what does each station do in an attempt to resend the data & avoid another collision? A) Each device compares the other device’s priority value (determined by IP address) with its own, & the device with the highest priority value transmits first B) Each device waits for a clear to send (CTS) signal from the switch C) Each device randomly picks a priority value, & the device with the highest value transmits first D) Each device sets a random back off timer, & the device will attempt retransmission after the timer expires
  137. 137. What kind of media is used by 100GBASE- SR10 Ethernet?  A) UTP  B) MMF  C) STP  D) SMF
  138. 138. Which of the following statements are true regarding VLAN’s? (choose 2)  A) A VLAN has a single broadcast domain  B) For traffic to pass between 2VLANs, that traffic must be routed.  C) Because of a switch’s MAC address table, traffic does not need to be routed to pass between 2VLAN’s  D) A VLAN has a single collision domain 
  139. 139. What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?  A) NativeVLAN  B) DefaultVLAN  C) ManagementVLAN  D) VLAN 0
  140. 140. In a topology running STP, every network segment has a single __________ port, which is the port on that segment that is closest to the root bridge, in terms of cost?  A) Root  B) Designated  C) Non-Designated  D) Non-root
  141. 141. What is the IEEE standard for link aggregation?  A) 802.1Q  B) 802.3ad  C) 802.1d  D) 802.3af
  142. 142. What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?  A) 7.7W  B) 15.4W  C) 26.4W  D) 32.4W
  143. 143. What switch feature allows you to connect a network sniffer to a switch port & tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?  A) Port Interception  B) Port Duplexing  C) Port Mirroring  D) Port Redirect
  144. 144. Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?  A) Supplicant  B) Authentication server  C) Access point  D) Authenticator
  145. 145. What is the binary representation of the decimal number 117?  A) 10110101  B) 01110101  C) 10110110  D) 01101001
  146. 146. The binary number 10110100 has what decimal equivalent?  A) 114  B) 190  C) 172  D) 180
  147. 147. What is the class of IP address 10.1.2.3/24?  A) Class A  B) Class B  C) Class C  D) Class D
  148. 148. Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (choose 2)  A) BOOTP  B) APIPA  C) Zeroconf  D) DHCP
  149. 149. How many assignable IP addresses exist in the 172.16.1.10/27 network?  A) 30  B) 32  C) 14  D) 64
  150. 150. What is the prefix notation for a subnet mask of 255. 255. 255. 240?  A) /20  B) /24  C) /28  D) /29
  151. 151. Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate 7 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?  A) /24  B) /26  C) /27  D) /28
  152. 152. A client with an IP address of 172.16.18.5/18 belongs to what network?  A) 172.16.0.0/18  B) 172.16.4.0/18  C) 172.16.8.0/18  D) 172.16.16.0/18
  153. 153. How can the following IPv6 address be condensed? 0AA0:0123:4040:0000:0000:000:000A:100B  A) AA0::123:404:A:100B  B) AA::123:404:A:1B  C) AA0:123:4040::A:100B  D) 0AA0:0123:4040::0::000A:100Bsection
  154. 154. If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address & destination MAC address will be placed in the packet/frame header sent by the PC?  A) Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway  B) Dest.IP: IP address of remote host. Dest.MAC: MAC address of default gateway  C) Dest.IP: IP address of remote host. Dest. MAC: MAC address of remote host  D) Dest.IP: IP address of remote host. Dest.MAC: MAC address of local PC
  155. 155. What protocol is used to request a MAC address that corresponds to a known IP address?  A) IGMP  B) TTL  C) ICMP  D) ARP
  156. 156. What is the network address & subnet mask of a default route?  A) 255.255.255.255/32  B) 0.0.0.0/32  C) 255.255.255.255/0  D) 0.0.0.0/0
  157. 157. What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?  A) Weight  B) Metric  C) Administrative distance  D) SPF algorithm
  158. 158. Which of the following are distance vector routing protocol features that can prevent routing loops? (choose 2)  A) Reverse path forwarding (RPF) check  B) Split Horizon  C) Poison Reverse  D) Rendezvous point
  159. 159. Which of the following is a distance-vector routing protocol with a maximum hop count of 15?  A) BGP  B) IS-IS  C) RIP  D) OSPF
  160. 160. Which of the following routing protocols is an EGP?  A) BGP  B) IS-IS  C) RIP  D) OSPF
  161. 161. What NAT IP address is a public IP address that references an inside device?  A) Inside Local  B) Inside Global  C) Outside Local  D) Outside Global
  162. 162. What NAT variation automatically assigns an inside global address from a pool of available addresses?  A) SNAT  B) DNAT  C) PAT  D) GNAT
  163. 163. What multicast protocol is used between clients & routers to let routers know which of their interfaces are connected to a multicast receiver?  A) IGMP  B) PIM-DM  C) PIM-SM  D) SPT switchover
  164. 164. ISDN is considered to be what type of WAN connection?  A) Dedicated leased line  B) Circuit-switched connection  C) Packet-switched connection  D) Cell-switched connection
  165. 165. What is the data rate of an OC-3 connection?  A) 51.84 Mbps  B) 622 Mbps  C) 155.52 Mbps  D) 159.25 Gbps
  166. 166. Which of the following WAN technologies commonly use unshielded twisted pair (UTP)? (choose 3)  A) Cable modem  B) ISDN  C) DSL modem  D) POTS dial-up connection
  167. 167. How many channels on an E1 circuit are available for voice, video, or data?  A) 23  B) 24  C) 30  D) 32
  168. 168. Which PPP authentication method provides one- way authentication & sends credentials in clear text data?  A) WEP  B) MS-CHAP  C) PAP  D) CHAP
  169. 169. What DSL variant has a distance limitation of 18,000 ft. between DSL modem & its DSLAM?  A) HDSL  B) ADSL  C) SDSL  D) VDSL
  170. 170. What kind of network is used by many cable companies to service their cable modems, & contains both fiber-optic and coaxial cable?  A) Head-end  B) DOCSIS  C) Composite  D) HFC
  171. 171. What locally significant identifier is used by a frame Relay network to reference a virtual circuit?  A) VPI/VCI  B) DLCI  C) TEI  D) MAC
  172. 172. How big is the payload portion of an ATM cell?  A) 5 bytes  B) 48 bytes  C) 53 bytes  D) 64 bytes
  173. 173. What type of antenna, commonly used in wireless AP’s & wireless routers in SOHO locations, radiates relatively equal power in all directions?  A) Unidirectional  B) Yagi  C) Parabolic  D) Omnidirectional
  174. 174. When using the 2.4 GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (choose 3)  A) 0  B) 1  C) 5  D) 6  E) 10  F) 11  G) 14
  175. 175. What technology do WLAN’s use to determine when they gain access to the wireless media?  A) SPF  B) CSMA/CA  C) RSTP  D) DUAL
  176. 176. What IEEE 802.11 variant supports a maximum speed of 54 Mbps & uses 2.4 GHz band?  A) 802.11a  B) 802.11b  C) 802.11g  D) 802.11n
  177. 177. Which of the following is used by IEEE 802.11n to achieve high through-put through the use of multiple antennas for transmission & reception?  A) MIMO  B) DSSS  C) FHSS  D) LACP
  178. 178. A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?  A) Enterprise mode  B) IBSS  C) Personal Mode  D) BSS
  179. 179. When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?  A) 5 – 10 percent  B) 10 – 15 percent  C) 15 – 20 percent  D) 20 – 25 percent
  180. 180. If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentication is said to be in use?  A) WEP  B) SSID  C) Open  D) IV
  181. 181. WEP’s RC4 approach to encryption uses a 24- bit string of characters added to transmitted data, such that the same plain text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?  A) Initialization vector  B) Chips  C) Orthogonal descriptor  D) Session key
  182. 182. What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i ?  A) TKIP  B) MIC  C) WEP  D) WPA2
  183. 183. What is the MPLS header?  A) 4 bits  B) 8 bits  C) 16 bits  D) 32 bits
  184. 184. Which of the following is a social engineering attack?  A) Man in the middle  B) Worms  C) EvilTwin  D) Phishing
  185. 185. 00:12:34:56:78 can be used in which of the following?  A Channel selection  B WPA-PSK password  C WEP key  D MAC filtering
  186. 186. Which of the following devices will monitor for propagating worms?  A IDS  B Firewall  C Proxy server  D Mail server
  187. 187. T568B wiring scheme is typically found on which of the following components?  A 66 block  B Demarc extension  C Patch Panel  D Vertical Cross Connect
  188. 188. Something you have, something you are and something you know are the three tenets of:  A) access control  B) remote access  C) change management  D) social engineering
  189. 189. After moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem  A Split cables  B Crosstalk  C TX/RX reversed  D DB loss
  190. 190. A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this?  A MAC filtering  B WPA encryption  C Changing antenna type  D Decreasing radio strength
  191. 191. In IPSec, which of the following is an agreement on how devices will securely transmit information?  A) ESP  B) SA  C) AH  D) ISAKMP
  192. 192. Which of the following could be used to estimate RTT across a router?  A traceroute  B dig  C arp  D uptime
  193. 193. The cable tester displays the following information  11  2------- 2  3------- 3  4xxxxx 4  5xxxxx 5  6------- 6  7------- 7  8------- 8  What is being reported?  A) 5 is open, 1|4 are open  B) 1 is open, 4|5 are shorted  C) 4|5 is shorted, 1 is ok  D) 1 is shorted, 4|5 are open
  194. 194. Which of the following represents the physical address of a network access card  A 00-30-48-83-9B-C8  B FF01:D2:C4:87::11  C 08-9D-35-22-L2-34-FF-21  D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
  195. 195. Which of the following records would be used for a Reverse DNS lookup?  A) MX  B) PTR  C) A  D) AAAA
  196. 196. Which of the following defines access for a network?  A) ACL  B) RDP  C) RAS  D) ARP
  197. 197. A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?  A) DB loss  B) EMI  C) TXRX reversed  D) Open shorts
  198. 198. Which of the following is used to restrict access according to user policies?  A) Content filter  B) DHCP server  C) DNS server  D) VPN concentrator
  199. 199. Which of the following describes a rationale for a network with redundant paths?  A) VPN compatibility  B) Unified communications implementation  C) High availability requirement  D) QoS
  200. 200. Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (select two)  A) Packet sniffer  B) Honeypot  C) Port mirroring  D) IPS  E) Port scanner  F) IDS
  201. 201. For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?  A) The server contains several virtual machines & the MAC addresses are from the virtual machines.  B) The server is hosting a web server & the MAC addresses are from connected browsers  C) The server is hosting a proxy server & the MAC addresses are from the connected clients  D) The server NIC is starting to fail & should be replaced.
  202. 202. Which of the following does SNMPv3 BEST provide over previous versions?  A) Simplified management  B) Increased security  C) More data types  D) Higher productivity
  203. 203. In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?  A) MDF  B) Caching engines  C) Demarc  D) IDF
  204. 204. A company’s database software runs the cloud. The device hosting the software is an example of which of the following?  A) Virtual server  B) Virtual switch  C) Virtual desktop  D) Virtual PBX
  205. 205. Kim, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Kim has permission to the server & the workstation is able to get to other network resources. Which of the following is the MOST likely cause?  A) The department server is having network issues  B) Kim’s workstation is a part of the wrongVLAN  C) The onboard NIC has outdated drivers installed  D) The wireless NIC has not been enabled for Kim’s workstation 
  206. 206. Kim, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Kim’s wireless network to differentiate it from other wireless networks & still provide the BEST performance & security? (Choose 2)  A) SSID  B) Channel  C) Antenna type  D) Wireless standard  E) NAT
  207. 207. Which of the following allows a central point to simultaneously address other points without addressing all of them?  A) Multicast  B) Subnetting  C) Unicast  D) Broadcast
  208. 208. Zack, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?  A) PEAP  B) WPA Personal  C) WPA2 Enterprise  D) WPA2 PSK
  209. 209. Which of the following would a technician plug into a smartjack?  A) 25 pair cable  B) 100 pair cable  C) Patch cable  D) Patch panel
  210. 210. A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves & concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?  A) Fiber optic  B) Wireless  C) CAT5e  D) CAT3
  211. 211. Lisa, an administrator, is unable to route traffic between VLAN’s on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside?  A) Network  B) Data link  C) Transport  D) Session
  212. 212. Which of the following devices is used to distribute network traffic equally over multiple links?  A) Content filler  B) DNS server  C) Load balancer  D) Proxy server
  213. 213. Which of the following would cause signal interference in a 2.4 GHz WAP? (Choose 2)  A) Cell phone  B) Cordless phone  C) Microwave oven  D) Printer  E) Television
  214. 214. Which of the following default services uses TCP/UDP port 88?  A) LDAP  B) IGMP  C) HTTP  D) Kerberos
  215. 215. Which of the following TCP/IP & OSI model layers retransmits a TCP packet if it is not received successfully at this destination?  A) The transport OSI model layer & the InternetTCP/IP model layer  B) The transport OSI model layer & the transportTCP/IP model layer  C) The network OSI model layer & the transportTCP/IP model layer  D) The network OSI model layer & the internetTCP/IP model layer
  216. 216. Which of the following limits the number of devices that can be assigned IP addresses by DHCP?  A) A Lease  B) Reservation  C) DNS setting  D) Scope
  217. 217. Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?  A) Network map  B) Cable management  C) Change management  D) Asset management
  218. 218. When using high bandwidth applications over multiple WAN connections, which of the following should be used?  A) Static IP addressing  B) Half-duplex  C) PoE devices  D) Load balancing
  219. 219. A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?  A) Butt set  B) Cable certifier  C) Toner probe  D) Snips
  220. 220. Which of the following ports is the default telnet port?  A) 20  B) 21  C) 22  D) 23
  221. 221. In which of the following wireless standards is MIMO used?  A) 802.11a  B) 802.11b  C) 802.11g  D) 802.11n
  222. 222. Which of the following address blocks would MOST likely be blocked from crossing a border router?  A) 8.0.0.0/8  B) 172.16.0.0/12  C) 122.0.0.0/24  D) 248.0.0.0/8
  223. 223. Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?  A) Nmap  B) Nbtstat  C) Dig  D) Arp
  224. 224. Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO)  A) 22  B) 23  C) 243  D) 161  E) 162  F) 8080
  225. 225. Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?  A) OTDR  B) Multimeter  C) Punch down tool  D) Temperature monitor
  226. 226. Jeff, a technician is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?  A) PoE  B) Port mirroring  C) Convergence  D) Port speed
  227. 227. Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?  A) WAP placement  B) PoE devices  C) MAC filtering  D) Encryption type
  228. 228. Zach, a technician suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?  A) Network map  B) Environmental monitor  C) Placement map  D) Syslog
  229. 229. Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?  A) Change management  B) Baselines  C) Asset management  D) Cable management
  230. 230. A VPN concentrator is used for which of the following purposes?  A) MAC filtering  B) Content filtering  C) Secure network access  D) Connectivity troubleshooting
  231. 231. Which of the following layers of the OSI model, maps to the Network Interface layer of the TCP/IP Protocol stack? (pick 2)  A) Physical  B) Session  C) Data Link  D) Network  E) Transport
  232. 232. Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?  A) Cable tester  B) Toner probe  C) Cable crimper  D) Punch down tool
  233. 233. Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?  A) TXRX is reversed  B) Faulty crossover cable  C) IncorrectWEP key  D) A short in the cable pairs
  234. 234. Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?  A) Switch loop  B) Port bonding  C) Virtual switch  D) Port mirroring
  235. 235. Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?  A) SNMPv2  B) VPN  C) SYSLOG  D) SMTP
  236. 236. Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?  A) Netstat  B) Route  C) Nslookup  D) Arp
  237. 237. Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?  A) Channel  B) WEP  C) SSID  D) WEPA
  238. 238. Which of the following can Jeff, a technician, modify on a 802.11n router that is not available as an option on an 802.11g device?  A) SSID  B) Encryption  C) Channels  D) Spectrum
  239. 239. Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?  A) VLAN malfunction  B) Broadcast storm  C) Quality of Service loss  D) Duplicate IP addresses
  240. 240. An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?  A) Protocol analyzer  B) Butt set  C) OTDR  D) Toner probe
  241. 241. Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?  A) TDR  B) Protocol analyzer  C) Multimeter  D) Cable crimper
  242. 242. Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?  A) Reservations  B) Lease times  C) Removing IPs from the active leases  D) Configuring the DNS options
  243. 243. Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach’s NEXT step?  A) Test the theory  B) Establish a plan of action  C) Establish a theory  D) Document findings
  244. 244. Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?  A) OTDR  B) Protocol analyzer  C) Toner probe  D) TDR
  245. 245. Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?  A) WPA should be enabled  B) PKI should be turned off  C) WAP SID’s are matching  D) WAPs are transmitting on the same channel
  246. 246. Which of the following would Kim, a technician, do to monitor remote traffic through an access point?  A) Enable an SNMP agent  B) Enable network mapping  C) Set monitoring SSID  D) SelectWPA2
  247. 247. Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?  A) Channel bonding  B) MIMO  C) Spatial reuse  D) 20MHzchannel spacing
  248. 248. Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?  A) 20  B) 21  C) 22  D) 23
  249. 249. Which of the following separates broadcast domains?  A) Port mirroring  B) Router  C) Convergence  D) Switch
  250. 250. Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should be used?  A) Tone probe  B) Punch down  C) Wire tester  D) Crimper
  251. 251. Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?  A) Protocol analyzer  B) Cable tester  C) Toner probe  D) Punch down tool
  252. 252. Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified?  A) Fast Ethernet 0/0  B) AUX 0  C) Console 0  D) Serial 0/0/0
  253. 253. Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?  A) This is a private address that cannot be seen by external users  B) This address does not have the appropriate subnet mask assigned  C) This is a public address which can only be seen by internal users  D) This is a private address which can only be seen by external users
  254. 254. Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?  A) Loopback plugs  B) Butt set  C) Cable certifier  D) Tone probe
  255. 255. Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly, but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?  A) Port speed  B) Cryptokey  C) DataVLAN  D) NAT/PAT
  256. 256. Which of the following protocols is used to securely connect to a multi-layer switch?  A) HTTP  B) SMTP  C) SSH  D) Telnet
  257. 257. Which of the following is the prefix for a link-local IPv6 address?  A) FE80::/10  B) FFOO::/8  C) 2FFE::/16  D) FEEF::/12
  258. 258. Zach, a technician, is checking newly installed CAT5 cabling and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?  A) Cable tester  B) Tone probe  C) OTDR  D) Loopback plug
  259. 259. There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?  A) Protocol analyzer  B) Cable tester  C) Cable verifier  D) Environmental monitor
  260. 260. Which of the following is used to prevent Layer 2 switching loops within a local area network?  A) STP  B) MTU  C) EGP  D) IGP
  261. 261. Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch?  A) SNMP trap  B) Bandwidth analyzer  C) Network sniffer  D) Syslog server
  262. 262. Which of the following is a method to prioritize network traffic coming on VoIP phones?  A) PAT  B) DNS  C) SIP  D) QoS
  263. 263. Which of the following network devices hides network nodes behind one public IP address?  A) Layer 3 switch  B) Content filter  C) VPN server  D) Proxy server
  264. 264. A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?  A) Net share  B) Hostname  C) IPconfig  D) Tracert
  265. 265. Which of the following Ethernet technologies has the LONGEST distance possible?  A) 1000BaseLX  B) 1000GBaseSR  C) 1000BaseSX  D) 1000BaseT
  266. 266. Which of the following threats is MOST likely to enable an attacker to modify data in transit?  A) DoS  B) Smurf attack  C) Virus  D) Man-in-the-middle
  267. 267. Which of the following is a terminal emulator used to manage a network device?  A) VPN  B) IDS  C) PUTTY  D) IPS
  268. 268. Which of the following DNS record types is used for IPv6 resolution?  A) MX  B) AAAA  C) A  D) PTR
  269. 269. A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?  A) CSU  B) Demarc  C) Registered jack  D) DSU
  270. 270. Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?  A) 100 kilometers (62 miles)  B) 10 kilometers (6 miles)  C) 1000 meters (3281 feet)  D) 100 meters (328 feet)
  271. 271. Kim, a network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets she wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?  A) DHCP  B) ARP  C) DNS  D) Ping
  272. 272. An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?  A) Improper grounding  B) TXRX reversed  C) Incorrect termination  D) Outdated NIC drivers
  273. 273. Which of the following are components of IPSec? (Select 2)  A) AH  B) ESP  C) SSH  D) ICA  E) TLS
  274. 274. Which of the following authenticates, allows, and controls the execution of router commands?  A) PKI  B) RADIUS  C) Kerberos  D) TACACS+
  275. 275. A technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?  A) Channel  B) SSID  C) Firewall rule  D) Encryption
  276. 276. Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?  A) Implement WEP encryption  B) Decrease signal strength  C) Change wireless channels  D) Rotate the SSID daily
  277. 277. Which of the following DNS record types provides the hostname to IP address mapping?  A) A record  B) NS record  C) CNAME record  D) MX record
  278. 278. Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?  A) Honeynet  B) Honeypot  C) Vulnerability scanner  D) Network based IDS
  279. 279. Which of the following would Kim, a technician, use in voice over IP communications?  A) SNTP  B) SCP  C) SMTP  D) SIP
  280. 280. Which of the following is the best way to mitigate security threats on a network?  A) Social engineering  B) User training  C) Incident response  D) Man-in-the-middle
  281. 281. Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?  A) 255.255.255.0  B) 255.255.255.128  C) 255.255.255.192  D) 255.255.255.248
  282. 282. Jeff, an administrator, wishes to add a third network segment to the firewall where the company’s public web servers will be placed. Which of the following BEST describes this new segment?  A) PKI  B) VPN  C) IPS  D) DMZ
  283. 283. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?  A) Baselines  B) Regulations  C) Logical network diagrams  D) Wiring schematics
  284. 284. Which of the following has the HIGHEST data rate speed?  A) T1  B) ADSL  C) SDSL  D) OC-3
  285. 285. Which of the following technologies is associated with the DOCSIS standard?  A) Cable  B) Dialup  C) Wireless  D) Cellular
  286. 286. Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?  A) IPS  B) Application layer firewall  C) IDS  D) An unmanaged switch
  287. 287. Which of the following should an administrator do after running a command from the console on the perimeter router?  A) Update the configuration logs  B) Update the network wiring schematics  C) Update the network configuration procedures  D) Compare the configuration with the baseline
  288. 288. Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for installation. The wires at each end are color coded as follows: END A orange-white, orange, green- white, blue, blue-white, green, brown-white, brown. END B green-white, green, orange-white, blue, blue- white, orange, brown-white, brown. Which of the following should Kim do to complete the installation?  A) Re-end the provided cable, keeping the wiring the same.  B) Use the provided cable  C) Purchase a crossover cable  D) Purchase a straight-through cable
  289. 289. Which of the following are fiber connectors? (Select 2)  A) LC  B) MTRJ  C) T1  D) DB-9  E) BNC
  290. 290. Which of the following solutions will detect and disable a rogue access point?  A) Port scan  B) packet sniffer  C) IPS  D) IDS
  291. 291. Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter?  A) 10GBaseLR  B) 10GBaseSR  C) 10G BaseX  D) 10GBaseT
  292. 292. Which of the following can be done to increase a wireless LAN cell size?  A) Add a higher gain omni antenna  B) Add diversity antennas  C) Add a higher gain yagi antenna  D) Increase the PoE wattage
  293. 293. Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (select 2)  A) Layer 2 switch  B) MAC address filtering  C) ACLs  D) IIS server  E) Port scanner  F) Firewall
  294. 294. Which of the following is used to identify active hosts along with their network addresses?  A) Port scan  B) Ping sweep  C) IDS  D) NIPS
  295. 295. Which of the following is used to share traffic between multiple network connections?  A) Load balancer  B) Content filter  C) VPN concentrator  D) Proxy server
  296. 296. What layers of the OSI model does Stateful Inspection operate at? It assures the connection (session) between 2 parties is valid and inspects packets from this connection to assure the packets are not malicious (application level) and acts as a circuit level firewall. It operates at the network 3, session 5, & application 7 layers
  297. 297. Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?  A) Multimode fiber  B) CAT6a  C) Single mode fiber  D) Coaxial
  298. 298. Which of the following mediums is circuit switched?  A) PSTN  B) ATM  C) Frame relay  D) MPLS

×