You are on page 1of 62

1.

After adding a new cable segment to the network, the technician should:
A. Update the disaster recovery plan
B. Document the changes in the business continuity plan
C. Update the wiring schematics
D. Create a new baseline document
2. Which of the following devices can be used to breakup a broadcast domain?
A. Unmanaged switch
B. Router
C. DHCP server
D. Bridge
3. Which of the following is a secure way to transfer files from one device to a
nother?
A. SFTP
B. SNMPv3
C. TFTP
D. FTP
4. An administrator has a networking closet on the first floor of a building wit
h all of the network and
communication equipment. However, the telephony provider installed the communica
tions line in
the basement. Which of the following needs to be extended to connect the line to
the networking
closet?
A. Smart jack
B. Demarcation point
C. Patch panel
D. Router
5. Which of the following methods is used to provide access to a VPN?
A. IGP
B. PPTP
C. PPP
D. RAS
6. Two clients are directly connected via RJ-45 and CAT5e cables and communicati
ng with IP. The
first client sends data out of its RJ-45 on pins 1 and 2. On which of the follow
ing pins will the client
expect to receive a response?
A. 1 and 2
B. 2 and 3
C. 3 and 6
D. 5 and 6
7. Which of the following network access security methods involves the analysis
of a physical
hardware addresses?
A. IP filtering
B. L2TP
C. MAC filtering
D. RAS
8. Which of the following is a direct advantage of having wireless standards?
A. Increased use of wireless spectrum
B. Greater device security
C. Interoperability between devices
D. Increased number of protocols can be used
9. Which of the following is a best practice when implementing a basic wireless
network?
A. Disabling ESSID broadcast
B. Configuring encryption with a WEP key and labeling the key on the WAP
C. Adding two access points per area of service
D. Not configuring the ESSID point
10. Which of the following wiring standards would MOST likely be used to connect
a single network
node to a switch?
A. Loopback
B. Straight
C. Rollover
D. Crossover
11. Which of the following is the maximum distance that CAT5 cable can run befor
e experiencing db
loss?
A. 100 feet (30.5meters)
B. 207 feet (63.1 meters)
C. 328 feet (100 meters)
D. 358 feet (109.12meters)
12. A media converter is also known as a:
A. transceiver
B. hub
C. modem
D. repeater
13. An administrator installs a device that can detect and throttle peer-to-peer
traffic. Which of the
following device types is being installed?
A. Bandwidth shaper
B. Intrusion detection
C. Proxy server
D. Load balancer
14. A technician arrives at a site and is troubleshooting an unfamiliar network.
Which of the following
steps should be done FIRST to diagnose the problem?
A. Escalate the problem to administrative technician
B. Compare wiring schematics to industry standards
C. Identify symptoms and draw a network diagram
D. Use a port analyzer to determine network topology
15. Which of the following commands can be used to find the MAC address of a con
necting router?
A. arp
B. traceroute
C. ping
D. ping sweep
16. Which of the following describes an email that is sent to users with web lin
ks that direct them to
malicious websites?
A. Viruses
B. Phishing
C. Rogue access points
D. Man-in-the-middle
17. Which of the following tools would an administrator MOST likely use to deter
mine the RJ-45 jack in
a cubicle corresponds to a given RJ-45 jack in a patch panel?
A. Punch-down tool
B. Spectrum analyzer
C. Toner probe
D. Multimeter
18. Which of the following network types is suitable for a 10 gigabyte core netw
ork using 10 meter (33
feet) fiber runs?
A. 100Base-FX
B. 10GBase-SR
C. 10GBase-ER
D. 10GBase-SW
19. An administrator is troubleshooting network connectivity and would like to v
iew the path that
packets are taking from workstation A to server 1. Which of the following comman
d line tools is
MOST appropriate to use?
A. nslookup
B. route
C. traceroute
D. ping
20. Which of the following is the MOST appropriate policy for updating physical
network diagrams?
A. Update whenever a connection is changed
B. Update after new personnel are hired
C. Update before regularly scheduled network audits
D. Update after weekly network support team review
21. After accepting a request packet on port 80, the firewall automatically allo
ws the reply packet to
pass. Which of the following terms BEST describes this firewall behavior?
A. Stateful inspection
B. Intrusion detection
C. Content filtering
D. Passive fingerprinting
22. Which of the following connectivity issues is the MOST likely to result from
bundling network
cables tightly together?
A. Collision
B. Attenuation
C. Crosstalk
D. Open circuit
23. Which of the following ports does IPSec use, by default?
A. 53
B. 500
C. 3389
D. 8080
24. Which of the following can be used to find the location of a cable short?
A. Multimeter
B. CSU/DSU
C. Protocol analyzer
D. TDR
25. Which of the following authentication mechanisms on a wireless network uses
a separate network
authentication server?
A. Kerberos
B. TKIP
C. RADIUS
D. WEP
26. Which of the following physical connections allows for the BEST performance
when connecting to
a VPN server for a remote user?
A. Baseband
B. Broadband
C. Satellite
D. POTS
27. A company needs to perform stateful packet filtering on the core network. Wh
ich of the following
network devices would BEST be suited to match this equipment?
A. Firewall
B. Proxy
C. Router ACLs
D. DHCP server
28. Which of the following are more secure file transfer alternatives to using F
TP? (Select TWO).
A. SFTP
B. HTTP
C. SNTP
D. RCP
E. SCP
29. Two network switches need to be cabled together via copper cabling. These sw
itches do not
support MDI-X. Which of the following cabling will need to be used?
A. Straight
B. Rollover
C. Crossover
D. Loopback
30. A technician wishes to implement network authentication at the switch port l
evel. Which of the
following standards is designed to accomplish this?
A. 802.1ad
B. TKIP
C. WPA2
D. 802.1x
31. Which of the following is a commonly used protocol for VoIP network communic
ation?
A. SNMP
B. SSH
C. DNS
D. RTP
32. Which of the following protocols uses port 143 by default?
A. NTP
B. SNMP
C. SSH
D. IMAP4
33. A user calls network support and reports that email is not working. Which of
the following should
the technician do FIRST?
A. Ask the user what operation was performed, what the expected result was, and
what the actual
result was.
B. Scan a list of open ports on the mail hub to scan for excessive traffic and e
scalate to network
administrator if needed.
C. Attempt to send a test email message to a known account at a remote facility
and scan logs to
see if it is sent.
D. Determine which mail hub the user was connected to and perform a graceful res
tart.
34. Which of the following can be used to set options such as TFTP server addres
ses, DNS search
lists, and broadcast addresses on network clients and workstations?
A. Networkbridge
B. Layer 2 switch
C. DHCP server
D. Smart jack
35. Which of the following exchanges routing information between two autonomous
systems?
A. EGP
B. OSPF
C. IGP
D. EIGRP
36. Which of the following is the GREATEST concern when using an orbital satelli
te WAN link?
A. Collisions
B. Latency
C. Duplex
D. Cable length
37. An administrator needs to connect a fiber cable to a PC that only has a RJ-4
5 jack. Which of the
following could be used to accomplish this connection?
A. Smart jack
B. Optical media
C. Token ring
D. Media converter
38. VLANs occur at which of the following layers of the OSI model?
A. 1
B. 2
C. 3
D. 4
39. Which of the following is the metric used for OSPF?
A. Latency
B. Cost
C. Bandwidth
D. Next hop
40. A computer is unable to access the corporate web server, which has an IP add
ress of
172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the compu
ter. Based
on the output below, which of the following is the MOST likely cause of this pro
blem?
Internet Address Physical Address
Type
172.30.0.5 00-30-48-82-72-8c
dynamic
172.30.0.100 000-15-5d-22-44-8d
dynamic
172.30.0.101 00-15-5d-72-7a-be
dynamic
A. Reverse ARP failure
B. IP address conflict
C. MAC spoofing
D. Static ARP entries
41. Two networks in different offices have been using DHCP set up for 192.168.0.
0/24. After
consolidating the officer's networks, they have run out of IP addresses. Which o
f the following is
the MOST cost-effective solution?
A. Request another class C IP scope from the ISP
B. Switch to static IP addressing
C. Change the subnet mask to 255.255.254.0
D. Add a router to connect both networks
42. An administrator suspects that packets to an IP address are being dropped ov
er the internet.
Which of the following tools would be the BEST to determine the hop that is drop
ping the packets?
A. ping
B. nslookup
C. traceroute
D. netstat
43. A workstation on the network can ping hosts on the network but it cannot pin
g any addresses on
the internet. Other hosts on the same network can connect to the internet. Which
of the following
should the technician check?
A. The DNS server entries
B. The network card
C. The default gateway
D. The hosts file
44. Which of the following commands would MOST likely be used to list the status
of all established
TCP connections on port 80?
A. netstat -at
B. netstat -aupn
C. netstat -r
D. netstat -v
E. netstat -p tcp
45. An administrator would like to evaluate network traffic. Which of the follow
ing tools should the
administrator use?
A. OTDR
B. Protocol analyzer
C. Certifier
D. Toner probe
46. Which of the following ports would be commonly used for FTP traffic?
A. 20
B. 22
C. 23
D. 25
47. Which of the following device can connect multiple workstations, support VLA
Ns, and function as a
router?
A. Repeater
B. Switch
C. Hub
D. Multilayer switch
48. Which of the following classes is the address 208.177.23.1?
A. Class A
B. Class B
C. Class C
D. Class D
49. Which of the following specifications of 802.11 can operate simultaneously a
t 2.4GHz and 5GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
50. Which of the following protocols could be used in a peer-to-peer topology?
A. NetBIOS
B. IGMP
C. RADIUS
D. TACACS+
51. A private AS number is useful in which of the following situations?
A. Internet multihoming with multiple carriers
B. Isolated network at a single site
C. Enterprise network without redundant links
D. Internet multihoming with all ISPs in same BGP area
52. A network with twenty clients needs to view a video file. Which of the follo
wing should be
configured on the client's computers to reduce network traffic?
A. Class C addresses
B. Class A addresses
C. Broadcast
D. Multicast
53. A new LAN switch is installed with on fiber ports. Which of the following wo
uld a technician need
on the new switch to allow compatibility to the existing fiber network?
A. Router
B. Repeater
C. Media converter
D. Hub
54. Mobile users are connecting from sites that have strong security policies an
d filter most traffic
except HTTPS. Which of the following would be the BEST solution to allow them ac
cess to the
corporate network?
A. Dial-in access
B. RDP access
C. IPSec VPN
D. SSL VPN
55. Which of the following protocols are commonly used for VoIP? (Select TWO).
A. NPP
B. SIP
C. HSRP
D. RTP
E. NNTP
56. Which of the following describes how original network diagrams contained in
the documentation
should be maintained?
A. Used only to satisfy a network upgrade checklist requirement
B. Used as a point-in-time reference but never relied upon
C. Regular audits to ensure that diagrams remain accurate
D. Considered to be the only source-of-truth of the network state
57. Which of the following are usually needed during manual configuration of a c
lient on an 802.11g
network segment using DHCP and WEP? (Select TWO)
A. IP address
B. Name servers
C. SSID
D. Subnet mask
E. Shared key
58. To ensure that VoIP phones are provided with power without using independent
power supplies,
switches on the network must have which of the following features?
A. PoE
B. VLAN tagging
C. PPPoE
D. Spanning tree
59. A user contacts a technician and states, "The network is down." After furthe
r investigation the user
is unable to get to a file share on the LAN. Which of the following is the NEXT
step the technician
should take to help determine the root cause of the problem?
A. Have the user ping the default gateway
B. Unplug and then plug the network cable back in
C. Reboot the core router
D. Have the user run netstat
60. An end user is able to connect to a wireless network and is able to browse t
he internet, yet is
unable to access network servers. Which of the following is the MOST likely caus
e of the
problem?
A. The end user is connected to the incorrect wireless network
B. The device is configured with an incorrect subnet mask
C. There is a problem with the DNS server
D. The network card is malfunctioning
61. The primary goal of implementing network QoS features is:
A. Provide predictable network performance
B. Increase network throughput
C. Prevent undesirable network traffic from entering the network
D. Provide fault tolerance to the network design
62. A LAN support team is installing new cables when all networked applications
slow and then stop
working. Switches in the server room show all connected ports at 100% activity.
Which of the
following has MOST likely occurred?
A. Cable run has a short
B. New switch port is in wrong VLAN
C. Switching loop
D. Cable run has a break
63. After receiving network problem reports from users, the technician notices t
hat the router is
rebooting itself several times a day. Which of the following would the technicia
n do NEXT to
further diagnose this problem?
A. Test the router's connection with a throughput tester
B. Replace the router's memory and CPU
C. Install redundant network connections to the router
D. Review the router's event logs
64. Which of the following protocols has similar functionality to Telnet but ope
rates more securely than
Telnet?
A. TFTP
B. SSH
C. SNAT
D. RSH
65. A technician would use a logical network diagram to determine the number of:
A. Cables in the network
B. Broadcast domains on the network
C. Switches on the network
D. Users on the network
66. Which of the following methods is used in creating an ACL?
A. IP filtering
B. PPPs
C. Content filtering
D. VPNs
67. A reserved set of IP addresses in a DHCP scope is commonly assigned to which
of the following
network devices? (Select TWO).
A. Server
B. Workstation
C. Printer
D. Hub
E. Laptop
68. Which of the following technologies can prevent a department's network broad
cast from
propagating to another department's network if they are located on the same swit
ch?
A. A hub
B. A firewall
C. A trunk
D. A VLAN
69. Where does the responsibility for maintenance and support shift from the tel
ecommunication
company to the customer?
A. Central office
B. Where the telecommunication lines enter the building
C. Smart jack
D. Demarc
70. An administrator wants to connect users at three branch offices to the main
office through the
internet. Which of the following devices should the administrator install at the
main office to BEST
accomplish this goal?
A. IPS sensor
B. Proxy server
C. Layer 2 switch
D. VPN concentrator
71. Which of the following protocols is the MOST secure for transferring network
device
configurations?
A. TFTP
B. FTP
C. SCP
D. RCP
72. A network has four switches; each switch has a physical link to all other sw
itches. Which of the
following topologies is being used?
A. Ring
B. Point-to-multipoint
C. Star
D. Mesh
73. Which of the following commands is MOST appropriate to determine whether a n
etwork interface
is up or down?
A. SNORT
B. ISAKMPD
C. ARP
D. IFCONFIG
74. Which of the following WAN technologies requires fiber optics?
A. POTS
B. SONET
C. ADSL
D. PSTN
75. Internet-working devices operate at OSI layer:
A. 2
B. 3
C. 4
D. 5
76. A small company needs to temporarily extend its call center by ten employees
. The company
decides to rent office space on the opposite side of the building; the two space
s are 400 feet (122
meters) apart. Which of the following is the MOST cost effective solution?
A. Install a new T1 line for that office
B. Use a wireless repeater and a WAP
C. Connect the two offices with fiber
D. Install gigabit switches and run Ethernet
77. An administrator is provisioning a 10GBaseSR Ethernet connection between two
core switches.
Which of the following cable types should the administrator plan to use?
A. Multimode fiber
B. RG-6 copper
C. Single-mode fiber
D. CAT6 copper
78. Which of the following network protocols is used for sending outbound email
from a host?
A. SMTP
B. POP
C. RTP
D. IMAP
79. Which of the following is a correct Ethernet MAC address?
A. 12:7H:45:89:9F:65
B. 16-15-4D-31-59-5J
C. 11:34:7A:88:0C:DB
D. 12-88-FF-9X-58-9E
80. Which of the following would a technician set up for a building to building
within a campus?
A. ESD
B. MDF
C. IDF
D. EMI
81. Which of the following allows an administrator to view malicious activity af
ter it has taken place?
A. IDS
B. IPS
C. Port scanner
D. Packet sniffer
82. A technician is running new CAT5 cables; which tool should be used to termin
ate the cables at the
patch panel?
A. Cable crimper
B. Punch down tool
C. Toner probe
D. Multimeter
83. Which of the following is an acceptable method for deciding placement of wir
eless access points?
A. Where there are electrical service and network connections available
B. Every300 feet (91 meters)
C. In the middle of each room
D. A site survey
84. Which of the following command line tools can be used to display listening s
ockets and
established connections on the local computer?
A. nslookup
B. nbtstat
C. netstat
D. ipconfig
85. Which of the following tools is used to connect analog telephony wire pairs
to a block, such as a
110 or 66 block?
A. Butt set
B. Protocol analyzer
C. Toner probe
D. Punch down tool
86. An application layer firewall is MOST beneficial when used with which of the
following protocols?
A. VoIP
B. GRE
C. HTTP
D. SNMP
87. Which of the following cable types have a maximum recommended cable length o
f 100 meters
(328 feet)?
A. Coaxial
B. Ethernet
C. Serial
D. Fiber
88. A network administrator would MOST likely use a port scanner to do which of
the following?
A. Capture incoming network packets to port 80 on a workstation
B. Trace a physical network port through a building
C. Remotely test a firewall configuration on a server
D. Report the link speed and duplex of all ports on a switch
89. An administrator needs to learn which buildings have multimode or singlemode
fiber. Which of the
following configuration management documentation would be the BEST choice to use
?
A. Physical network diagram
B. Baseline configurations
C. Security policy
D. CAT5 wiring schematics
90. Which of the following standards provides port authentication?
A. 802.1x
B. 802.11
C. 802.1q
D. 802.2
91. Which of the following would be sent to an SNMP network management system in
the event that a
failure or predefined threshold was crossed?
A. SNMP trap
B. History log
C. System log
D. SNMP agent
92. A user is reporting issues connecting to the corporate web server. When anal
yzing the output from
a packet sniffer an administrator sees:
Client-> Server SYN
Server ->Client ACK
Client-> Server RST
Which of the following is the user experiencing?
A. The client is prematurely closing the connection
B. The server is failing to properly respond
C. The 3-way handshake is complete but the browser is unresponsive
D. The server is prematurely closing the connection
93. Which of the following connectors can be used for serial connections?
A. SC
B. RS-232
C. BNC
D. ST
94. A client attempts to connect to a network resource and is given an error mes
sage about their
access being restricted. Which of the following BEST describes the reason for de
nial?
A. The user's account failed to authenticate with correct permissions
B. The user's account is disabled
C. The network resource is unavailable
D. The user is not connected to the network
95. Which of the following routing algorithms would provide the fastest converge
nce time?
A. A distance-vector algorithm
B. A static algorithm
C. A link-state algorithm
D. A path-vector algorithm
96. Where would a technician MOST likely place the company MX and A records?
A. Proxy server
B. Load balancer
C. DNS server
D. Firewall
97. Which of the following BEST explains the function of OSI layer 4?
A. Connecting hosts on the same segment
B. Specifying signal timing and amplitude
C. Reliable delivery of packets
D. Routing packets across segments
98. Which of the following tools can be used to determine the MAC address of a m
achine on the local
subnet?
A. ping
B. arp
C. host
D. dig
99. The task of replacing hubs with switches reduces retransmissions by increasi
ng which of the
following?
A. Frequency domains
B. Broadcast domains
C. Domain kiting
D. Collision domains
100. Which of the following WAN technologies allows for the fastest connection?
A. ADSL
B. SONET
C. T1
D. OC-12
101. A company recently installed a new VoIP phone system that runs over their e
xisting T3 Internet
connection. Which of the following network technologies would BEST handle voice
traffic
prioritization above all other data?
A. QoS
B. IPSec
C. PoE
D. Load balancing
102. Which of the following mitigation techniques is MOST effective against a ma
n-in-the-middle
attack?
A. Authentication
B. Encryption
C. Popup blocker
D. ACL
103. Which of the following WAN technology types does not use an Ethernet cable
as a medium for
communication and is used for long distances?
A. DSL
B. WiMAX
C. E3/T3
D. ATM
104. Which of the following Internet technologies would provide the GREATEST ban
dwidth?
A. T1
B. Cable
C. OC3
D. T3
105. An administrator has configured two hosts as follows:
HOST A
IP 192.168.3.100
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
HOSTB
IP 192.168.1.200
NETMASK 255.255.254.0
GATEWAY 192.168.2.1
Which of the following MUST be changed in order to allow HOST A to talk to HOST
B?
A. HOST B netmask to 255.255.252.0
B. HOSTA netmask to 255.255.255.0
C. HOST A IP address to192.168.2.100
D. HOST B IP address to192.168.2.200
106. When installing a new secure wireless network the administrator should turn
on:
A. WEP and turn on SSID broadcast
B. WPA and turn on SSID broadcast
C. WPA and turn off SSID broadcast
D. WEP and turn off SSID broadcast
107. An administrator is at a client's site to figure out an intermittent networ
k problem. Which of the
following is the FIRST step in the troubleshooting methodology that should be pe
rformed?
A. Implement and test the solution
B. Create an action plan and solution identifying potential effects
C. Identify the affected areas of the network
D. Gather information
108. All nodes on a subnet are experiencing network slowness. The administrator
suspects an infected
computer is on the network and checks if a node is saturating the network. Which
of the following
tools should be utilized in this situation?
A. Multimeter
B. Port scanner
C. Protocol analyzer
D. IGMP
109. A mobile user reports that after receiving a new patch cable for their lapt
op, the laptop is unable to
connect to the network. An administrator verifies that the port is configured co
rrectly and the LAN
drop is active. Which of the following is the MOST likely cause?
A. Crosstalk on the cable
B. Duplex mismatch
C. Speed mismatch
D. Open pairs are present
110. Which of the following devices does not limit network broadcast traffic and
does not increase
performance?
A. Router
B. Brouter
C. Hub
D. Switch
111. Multiple users are reporting network issues. Before taking any course of ac
tion, which of the
following is the FIRST step a technician should take?
A. Create a plan of action and a final solution for the issues
B. Gather information about the problems/symptoms
C. Establish the probable cause behind the network issues
D. Document the solution and update all logical/physical network diagrams
112. Which of the following network devices would MOST likely be installed to al
low a fiber optic cable
to be plugged into a network device with only RJ-45 connections?
A. WAP
B. Basic switch
C. Hub
D. Media convertor
113. A particular route's destination address is referred to as the:
A. RIP peer
B. shot vector
C. link state
D. next hop
114. The helpdesk has been informed that the company's ISP is experiencing netwo
rk outages. Which
of the following commands can an administrator run to quickly locate and determi
ne the TTL of the
further reachable node?
A. route
B. ping
C. traceroute
D. arp
115. Which of the following uses a certificate for a tunneling connection?
A. RDP
B. PPTP
C. VNC
D. SSL VPN
116. Multiple users are reporting no connectivity after a recent power outage. A
n administrator needs a
cable to plug their laptop into the router in order to be able to console into i
t. Which of the following
would the administrator need to make this connection?
A. Crossover
B. Loopback
C. Rollover
D. 568B
117. Which of the following activities will not be possible if the gateway IP ad
dress is set incorrectly on
a client's machines?
A. Printing over a local network
B. Sniffing the network traffic
C. Pinging a remote computer
D. Sharing local network files
118. Which of the following replaces the destination IP address of a packet?
A. NAT
B. DNS
C. SNAT
D. DHCP
119. Which of the following is the BEST tool to use when terminating a network j
ack?
A. Snips
B. Cable stripper
C. Toner probe
D. Punch down
120. An administrator would like to monitor the network to evaluate which employ
ees are using an
excessive amount of bandwidth on peer to peer sharing services. Which of the fol
lowing
monitoring techniques would BEST be used?
A. Stateful packet inspection
B. Load balancing
C. Packet sniffing
D. Throughput testing
121. A solution provided less than ideal results, and the technician is forced t
o go back and devise a
new solution. Which of the following would be done NEXT, assuming probable cause
is
established and escalation is not necessary?
A. Determine if anything has changed.
B. Gather information about the problem.
C. Document the solution and steps taken during the process.
D. Create an action plan and accompanying solution.
122. Users utilizing wireless laptops in an outdoor storage yard are experiencin
g new connectivity
issues. Which of the following is MOST likely causing the new issues?
A. Antenna placement
B. Environment factors
C. Antenna distance
D. Signal bounce
123. How many potential MAC address schemes are possible?
A. 2 to the 32nd
B. 2 to the 46th
C. 2 to the 48th
D. 2 to the 64th
124. Which of the following would MOST likely contain information about unlabele
d datacenter
connections?
A. Procedures manual
B. Emergency call list
C. Logical network diagram
D. Wiring schematic
125. A technician needs to install phones that will only require one cable for b
oth data and power to be
supplied. Which of the following features MUST the switch support?
A. Port mirroring
B. VLAN
C. Spanning tree
D. PoE
126. Which of the following connection methods is considered secure?
A. HTTP
B. RCP
C. HTTPS
D. TELNET
127. In which of the following networking types can a computer be a client to ot
her computers and act
as a server as well?
A. Bus
B. Ring
C. VPN
D. Peer to peer
128. An administrator has determined that auto-negotiation has failed on a conne
ction. Which of the
following are the MOST important settings that should be matched on each side of
the
connection?
A. IP address, OSPF area, route propagation
B. Port enable, port mirroring,link aggregation
C. Port speed, port duplex, flow control
D. VLAN assignment, port authentication, flow control
129. A technician needs to segment a network to provide additional security for
the HR department
shares. Which of the following features would need to be configured to provide t
his?
A. VLAN
B. Port mirroring
C. Spanning tree
D. PoE
130. A technician has deployed multiple temperature monitoring devices with IP a
ddresses in the
10.137.24.0/25 network. Such devices must receive an ICMP keep-alive packet from
the server
every five minutes. Which of the following destination IP addresses must the tec
hnician configure
on the server to send keep-alive packets to all the devices?
A. 10.137.24.0
B. 10.137.24.1
C. 10.137.24.127
D. 10.137.24.128
131. Which of the following OSI layers does a Layer 3 switch operate at? (Select
TWO).
A. Presentation
B. Session
C. Transport
D. Data link
E. Network
132. An administrator wants to monitor live traffic on a switch to determine if
a malicious source is
broadcasting ARP traffic. Which of the following utilities would BEST accomplish
this?
A. Switchport mapper
B. Packet injector
C. Network mapper
D. Packet sniffer
133. Which of the following requires the pin-outs to be the same on both ends of
a cable?
A. Straight
B. Crossover
C. Rollover
D. Loopback
134. Which of the following tools is designed to send a signal through one end o
f a cable, so that it can
be found at the other end of the cable?
A. Multimeter
B. Toner probe
C. Cable tester
D. Voltage event recorder
135. An administrator needs to check the number of active connections on their c
omputer. Which of the
following should be administrator use?
A. dig
B. ping
C. ipconfig
D. netstat
136. Which of the following is used by a company's ISP to troubleshoot network i
ssues?
A. Demarc
B. 66 Block
C. Smart Jack
D. 110 Block
137. IGP differs from EGP because IGP is designed for use in which of the follow
ing?
A. Communication between WANs
B. Communication between networks
C. Single autonomous network
D. Single non-autonomous network
138. Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1
as being on the same
subnet?
A. 255.255.240.0
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.255.240
139. Malicious traffic has been detected terminating at HOST A on TCP port 4444.
Which of the
following commands can be run on HOST A to determine the process attached to TCP
port 4444?
A. ipconfig /all
B. ifconfig -a
C. netstat -nav
D. netstat -nap
140. Which of the following network cable types is LEAST susceptible to EMI?
A. Plenum STP CAT5
B. UTP CAT5
C. UTP CAT3
D. Coaxial
141. A user has reported slow network response in a large training room; the cla
ss requires many
students to access the same website each day. Which of the following would BEST
remedy this
problem?
A. Caching engine
B. Jitter correction
C. Firewall
D. Fault tolerance
142. Which of the following pairs should be crossed to create a crossover cable?
A. 1,2 and 3,4
B. 1,2 and 3,6
C. 5,6 and 7,8
D. 4,5 and 6,7
143. An administrator has replaced a faulty 1000BaseT NIC on the server switch w
ith a new
1000BaseFX. Which of the following should the administrator do NEXT?
A. Reboot the switch to enable the new connection
B. Update the logical network diagram
C. Update the switch configuration logs
D. Update the wiring schematics
144. A technician moves a VoIP phone to a new location, but discovers the phone
does not start up
when plugged into the network. Which of the following explains this situation?
A. The switch does not support PoE
B. The jack needs to be rewired using the 568B standard
C. QoS is not enabled on the switch
D. The phone needs a fiber port
145. A port scanner is used by network administrator for which of the following?
A. To find routers with weak passwords
B. To determine open ports on network hosts
C. To secure switches and routers
D. To make a physical network diagram
146. Which of the following can be used to help verify that a remote web server
is not blocked by a
firewall?
A. Packet injector
B. Toner probe
C. Protocol analyzer
D. Port scanner
147. SONET is normally associated with which of the following?
A. Point to point
B. Point to multipoint
C. Ring
D. Bus
148. An administrator wants to provide redundant paths to network resources in c
ase a link fails. Which
of the following switch features would the administrator need to use to accompli
sh this task?
A. PoE
B. VLAN
C. Trunking
D. Spanning tree
149. TCP occurs at which layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
150. Which of the following would an administrator MOST likely require in order
to connect a client to a
WPA encrypted network?
A. Pre-shared key
B. Gateway address
C. PIN
D. DSA public key
E. SSID
151. Which of the following technologies is the MOST cost-effective when protect
ing a large number of
networked workstations from external attacks?
A. Host-based IDS
B. External scanning service
C. Network-based firewall
D. Network-based IPS
152. Which of the following transport protocols should be used to avoid retransm
itting lost packets?
A. UDP
B. TCP
C. ARP
D. IGMP
153. A firewall is set to block inbound connections on port 25. Which of the fol
lowing protocols would
enable the administrator to retrieve email without reconfiguring the firewall?
A. SNMP
B. SMTP
C. POP3
D. FTP
154. The 802.11n protocol operates at which of the following layers of the OSI m
odel? (Select TWO).
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
155. When installing an access point, which of the following encryption schemes
should be
implemented to BEST secure the network?
A. WPA
B. WEP
C. WPA with PSK
D. WPA2 with PSK
156. Which of the following networking protocols is used to give the remote comp
uter secure command
line access to the server?
A. SSH
B. Telnet
C. ICMP
D. RTP
157. Which of the following defines the required distance between each LAN drop
that will be installed
within a building?
A. Acceptance use policy
B. Wiring schematics
C. Logical network diagrams
D. Company regulations
158. Plenum cable should be used to:
A. protect against ESD
B. increase reliability
C. decrease cost
D. comply with fire codes
159. Which of the following describes what happens when a technician pings the b
roadcast address?
A. All clients on the subnet respond
B. The broadcast server responds
C. An ICMP loop floods the network
D. All clients in the multicast group respond
160. Which of the following describes a routing table that needs to be maintaine
d manually?
A. Hop count based
B. Link-state
C. Static
D. Dynamic
161. Which of the following protocols resolves MAC addresses from IP addresses?
A. RTP
B. DHCP
C. DNS
D. ARP
162. Which of the following is strictly used to convert analog to digital signal
s?
A. NIC
B. Modem
C. Repeater
D. Hub
163. In a new wireless network installation, the administrator has successfully
installed and tested the
equipment. The NEXT step after turning wireless access on would be to:
A. Document the physical layout
B. Configure the DHCP server
C. Configure wireless adapters
D. Perform a war drive to test for vulnerabilities
164. The MAIN difference between an IDS and an IPS is the:
A. IPS blocks malicious activity while the IDS only alerts about malicious activ
ity
B. IDS blocks malicious activity while the IPS only alerts about malicious activ
ity
C. IDSuses a deterministic engine while the IPS uses probabilistic engine
D. IDSis an inline system while the IPS is placed on a span port and has no IP a
ddress
165. An administrator would like to determine which wire pair on a 100 block con
nects a jack in the next
room. Which of the following utilities would MOST likely be used to determine th
is?
A. Port scanner
B. Toner probe
C. Multimeter
D. Protocol analyzer
166. Which of the following commands would test the loopback adapter of an inter
nal NIC?
A. ping 127.127.0.0
B. ping 127.127.1.0
C. ping 127.0.0.1
D. ping 127.1.1.1
167. Which of the following LAN connection technologies has a full duplex speed
of 200Mbps and uses a CAT5e cable?
A. 1000BaseX
B. 100BaseFX
C. 1000BaseTX
D. 100BaseT
168. A technician must enable which of the following services to prevent broadca
st storms?
A. DHCP
B. Port mirroring
C. Spanning tree
D. Bonding
169. One end of a CAT5 cable is punched down following the 568B standard. The ot
her end should be terminated using which standard to make a straight through cab
le?
A. 568B
B. RJ45
C. 568A
D. RJ11
170. Which of the following IPv4 address pairs would be able to share files on a
network using a hub?
A. 10.192.2.220/16 and 10.254.2.222/16
B. 10.254.2.220/16 and 10.254.2.222/24
C. 10.192.2.220/16 and 10.254.2.222/16
D. 10.254.2.220/16 and 10.254.2.222/16
171. Which of the following networks has the LEAST likelihood of collisions?
A. Ring
B. Mesh
C. Star
D. Bus
172. A technician is configuring a router for a SOHO network. The technician has
changed the IP
address scheme on the router and disabled DHCP service before the wireless was c
onfigured.
After the router updates the information, the PC can no longer connect to the ro
uter. Which of the
following would be the BEST solution to reestablish the connection while maintai
ning the routers
current configuration state?
A. Restart the PC so it obtains a new IP address from the router
B. Restart the router so that the PC obtains a new IP address
C. Assign a static IP address on the PC that matches the router
D. Use APIPA to connect the PC to the router
173. Which of the following is the number of bits used for IPv6?
A. 128
B. 32
C. 64
D. 256
174. Which of the following network components would be used to create VLANs?
A. Routers
B. Gateways
C. Switches
D. Bridges
175. Which of the following protocols is the MOST susceptible to a packet sniffe
r?
A. SFTP
B. SSH
C. HTTPS
D. SNMPv2
176. Which of the following WAN technologies uses fiber as a transmission medium
?
A. T1
B. ADSL
C. E1
D. SONET
177. Which of the following would be a correct statement about VLANs?
A. VLANs help isolate network traffic
B. VLAN broadcasts are limited to the switch
C. VLANs create physical segments
D. VLANs help prevent overlapping
178. When configuring a wireless access point, which of the following principles
should be used to
select a channel to operate on?
A. Select the same channel as that configured on the neighboring access points
B. Select the channel closest to that configured on neighboring access points
C. Select the channel with the frequency range least used in the given area
D. Select the channel farthest from that configured on neighboring access points
179. Which of the following protocols enables administrators to control network
devices like routers and
switches?
A. NAT
B. SNMP
C. DNS
D. NFS
180. Which of the following is used to test the operation of a NIC?
A. Loopback
B. 568B
C. Rollover
D. Crossover
181. Which of the following protocols are used for tunneling and encryption purp
oses?(Select TWO).
A. L2TP
B. PAP
C. SLIP
D. PPPoE
E. IPSec
182. Which of the following TCP connect scanners is always set for normal data f
low once a connection
is established?
A. TCP
B. ACK
C. SYN
D. RSH
183. A company has a wired bus topology and a client accidentally unplugs the ne
twork cabling to their
computer. Which of the following is true about the company's network?
A. It will function properly once all affected PCs are rebooted and authenticate
to the network
B. It will function with no downtime
C. It will function with minimal downtime
D. It will not function properly until the wires are reconnected
184. Which of the following protocols is used to encrypt packets over the Intern
et? (Select TWO).
A. SIP
B. HTTPS
C. SMTP
D. SMNP
E. SSH
185. A user is able to access the network shares and their email, but is unable
to connect to any
website. Which of the following command line tools should a technician use on th
at users workstation to
begin troubleshooting?
A. Traceroute to any website to see where the disconnection is occurring
B. Perform theipconfig command to verify settings on that workstation are correc
t
C. Use the routeadd command to add static routes to see if the routes are an iss
ue
D. Use the ping command to see if the workstation can access the DHCP server
186. Users at a branch office have informed a technician that access to static w
eb content is slow from
their location. It is determined that most users are visiting the same site repe
atedly throughout the
day. Which of the following would improve WAN utilization?
A. A caching proxy server at the branch
B. A traffic shaper
C. A load balancer at the datacenter hosting the web servers
D. An application level firewall
187. A technician is asked to verify available phone numbers at a telecommunicat
ion block. Which of
the following tools is required to verify the available numbers?
A. Multimeter
B. Butt set
C. Punch down tool
D. Toner probe
188. When connecting two switches together, which of the following protocols wou
ld be used to trunk
multiple VLAN traffic across the same physical link?
A. Port trunking
B. 802.1q
C. Port mirroring
D. 802.1x
189. Which of the following cables is used to connect multiple layer 2 switches?
A. Loopback
B. Crossover
C. Serial
D. Rollover
190. An active/passive server cluster in which only one server is active and han
dling requests, is an
example of which of the following network performance optimization?
A. Traffic shaping
B. QoS
C. High availability
D. Load balancing
191. A company needs the ability to run a network that can handle 30Mbps datatra
nsfer speeds but
also needs to keep the cost of installing the network down. Which of the followi
ng cable types
would BEST meet the company's needs?
A. CAT6
B. CAT3
C. CAT5e
D. CAT1
192. Which of the following data is included in a wireless access points beacon
frame?
A. SSID and MAC address
B. IP and MAC address
C. SSID and WEP key
D. Channel and WEP key
193. Which of the following devices has a primary purpose of proactively detecti
ng and reacting to
security threats?
A. SSL
B. IDS
C. IPS
D. VPN
194. Which of the following is the default port for telnet?
A. 21
B. 23
C. 20
D. 22
195. A technician is resolving an issue where a computer is unable to connect to
the Internet using a
wireless access point. The computer is able to transfer files locally to other m
achines, but cannot
successfully reach the Internet. When the technician examines the IP address and
default
gateway they are both on the 192.168.1.0/24. Which of the following has occurred
?
A. The computers gateway is not routing to a public IP address
B. The computer is using an invalid IP address
C. The computer and the gateway are not on the same network
D. The computer is not using a private IP address
196. In an office visitors need to be connected to the Internet without attachin
g to the company server.
Employees also need to connect to the company server and to the Internet. All th
e connections
are managed by the same switch. Which of the following should be used to meet th
ese
requirements?
A. RIP
B. OSPF
C. Port trunking
D. VLAN
197. How much bandwidth does an OC12 provide?
A. 12Mbps
B. 622Mbps
C. 1.2Gbps
D. 45Mbps
198. An office has just added an employee kitchen area. The work area and equipm
ent has stayed the
same. Which of the following is the MOST likely reason why they are now having w
ireless
connectivity problems?
A. Distance
B. Interference
C. Encryption
D. Antenna placement
199. A scanner has determined the open ports on a network device.Assuming servic
es are running on
their default ports, which of the following ports will provide secure communicat
ions?
A. 25
B. 21
C. 22
D. 23
200. Implementing a set of policies and procedures that define the corporate inf
ormation is confidential
and training employees on these procedures can help prevent which of the followi
ng?
A. Smurf attacks
B. Man in the middle attacks
C. Social engineering
D. Patch management
201. A network technician is asked to implement a separate network for guests th
at arrive onsite.
Which of the following would be the MOST cost effective solution?
A. Create a VLAN
B. Install a firewall
C. Install a VPN
D. Implementtrunking
202. A user is unable to send an email to another user at company. A network tec
hnician believes that
the issue is DNS related. After typing nslookup, which of the following commands
would help
determine the IP address of company As mail server?
A. set type=mx
B. set type=ptr
C. set type=soa
D. set type=cname
203. Which of the following does a star ring topology use for data transfer
A. CSMA/CA
B. CHAP
C. CSMA/CD
D. Token passing
204. Which of the following commands would allow a technician to see the DNS ser
vers that a
computer is configured to use?
A. netstat
B. nbtstat
C. nslookup
D. arp
205. A network with multiple devices needs to have a smaller broadcast domain wh
ile working with a
small budget. Which of the following is the BEST solution?
A. Create VLANs
B. Implement more hubs
C. Implement more switches
D. Assign static IPs
206. None of the users in an office can connect to the servers using the FQDN. W
hich of the following
is MOST likely the cause of this issue?
A. WINS is not enabled
B. NetBIOS is not enabled
C. DNS is not enabled
D. DHCP is not enabled
207. The role of intelligently forwarding frames from one broadcast domain to an
other would be
performed by which of the following network equipment?
A. Router
B. Hub
C. Media converter
D. Unmanaged switch
208. Which of the following protocols is used for connecting clients to a news s
erver?
A. IMAP4
B. NCP
C. NNTP
D. SMTP
209. Which of the following OSI layers handles the routing of data across segmen
ts?
A. Network
B. Transport
C. Session
D. Data Link
210. Which of the following wireless networks is configured without an access po
int?
A. Adhoc
B. Multiport repeating
C. Local
D. Extended
211. Which of the following network devices could be used to extend the range li
mitation of Ethernet
networks?
A. Load balancer
B. Repeater
C. IDS
D. Firewall
212. Using a routing table, which of the following routes will be selected MOST
frequently?
A. The lowest administrative distance
B. The highest administrative distance
C. The BGP route
D. The one with the greatest number of hops
213. Automatic private Internet protocol addressing (APIPA) assigns IP addresses
from which of the
following ranges?
A. 10.0.x.x
B. 169.254.x.x
C. 192.168.x.x
D. 172.16.x.x
214. How many broadcast domains are created by a 24 port switch configured with
12 VLANs with all
of the ports being actively used?
A. 2
B. 12
C. 36
D. 24
215. A client wants to extend the range of their wireless network without runnin
g wires throughout the
small office. Which of the following could be implemented with the LEAST adminis
trative effort?
A. Install a repeater at the end of the office
B. Install an 802.11n router and change all NICS to match
C. Install a WAP in the middle of the office
D. Install an additional router to help with congestion
216. Which of the following is the default port for SMTP?
A. 443
B. 21
C. 110
D. 25
217. When troubleshooting a network error, a technician using a laptop as a netw
ork sniffer can see all
the communications on the network segment. Which of the following network device
s is the laptop
plugged into?
A. Gateway
B. Router
C. Hub
D. Basic switch
218. Which of the following could be installed to improve network performance wh
en accessing Internet
websites?
A. Caching engine
B. Traffic shaping
C. Load balancing
D. Firewall
219. Which of the following WAN layer two protocols would be BEST suited for a f
ull mesh topology?
A. PPP
B. ATM
C. MPLS
D. Framerelay
220. A network administrator is configuring a network with a dynamic routing pro
tocol. Which of the
following would support equal cost load balancing and have all routers contain t
he same topology
view?
A. OSPF
B. IGRP
C. RIP
D. BGP
221. Which of the following is the maximum amount of wires that fit into a RJ11
connector?
A. 2
B. 8
C. 4
D. 6
222. Which of the following components in a structured wiring system supports an
Ethernet network?
A. 110 block
B. 66 block
C. 25 pair cable
D. Smart jack
223. Which of the following is the maximum CAT3 length acceptable for a horizont
al crossconnect?
A. 100 meters (328 feet)
B. 125 meters (410 feet)
C. 256 meters (840 feet)
D. 328 meters (1076 feet)
224. A technician has gathered information on a network issue, and has determine
d the affected area.
Which of the following would be the NEXT step in resolving this issue?
A. The technician should test the best solution for the issue.
B. The technician should check to see if there have been any recent changes to t
his area of the
network.
C. The technician should consider any negative impacts to the network that might
be caused by a
solution.
D. The technician should implement whatthe is the best solution for the issue.
225. A company's web server is located in a climate controlled environment, with
multiple power
supplies, and a UPS to provide the maximum uptime available. Which of the follow
ing would allow
the company the BEST opportunity to increase network uptime for the web server?
A. Upgrade all switches to Gigabit speed
B. Install an additional Router
C. Upgrade the outbound NIC to a gigabit card
D. Install additional NICs
226. Which of the following devices will segment a network and help cut down on
network congestion?
A. Switch
B. Repeater
C. Gateway
D. Hub
227. Which of the following protocols is used in a ping command?
A. IGMP
B. ICMP
C. SMTP
D. TFTP
228. Which of the following would allow for encrypted login credentials to be se
nt over the network?
A. Telnet
B. FTP
C. SSH
D. HTTP
229. Which of the following is the maximum hop count for RIPv2?
A. 18
B. 10
C. 16
D. 17
230. Which of the following is used to simplify the process of setting up a netw
ork and the
administration of the network?
A. ZEROCONF
B. SNMP
C. WINS
D. DNS
231. When terminating a CAT5e cable a technician terminates the 568A end and the
568B end. The
resulting cable is:
A. a straight through cable
B. nonfunctional
C. a crossover cable
D. capable of 10GBaseT
232. Which of the following is the maximum CAT5 length acceptable for a horizont
al crossconnect?
A. 500 feet (152 meters)
B. 100 feet (30.5 meters)
C. 336 feet (102 meters)
D. 328 feet (100 meters)
233. Some users are unable to access the network. A technician determines that t
he computers that
were unable to access the network have an IP address of 169.254.0.1. Which of th
e following
network services should the technician check?
A. TFTP
B. DNS
C. BOOTP
D. DHCP
234. A technician is troubleshooting a workstation that is connected to a star n
etwork. The technician
determines that the workstation is unable to connect to the network resources. W
hich of the
following should be checked FIRST?
A. The link lights on the server network card
B. The link lights on the network card
C. The link lights on the switch
D. The installed network drivers
235. An administrator is in charge of several remote servers in Japan. Users cal
l and report they cannot
connect to the company's resources located on those servers. Which of the follow
ing commands
would allow the administrator to verify the servers are running?
A. nbtstat
B. ping
C. telnet
D. netstat
236. Which of the following does an administrator need to be aware of when insta
lling a wireless
network in a building with multiple floors?
A. Frequency configuration
B. SSID naming
C. Channel overlap
D. Encryption algorithm
237. A network technician is contacted about a system that is unable to connect
to a file server. After
investigating the problem thoroughly the technician is able to successfully test
and resolve the
issue.Which of the following is the NEXT step the technician should take?
A. Document the solution
B. Create an action plan
C. Reboot the server
D. Identify the problem
238. Which of the following is implemented on multiple switches to allow alterna
te paths?
A. Spanning tree
B. VLAN
C. Port authentication
D. Port mirroring
239. A small office home office (SOHO)wireless user reports their new laptop is
802.11b and 802.11g
capable but will not wirelessly connect faster than 11Mbps. Which of the followi
ng is the cause of
the problem?
A. The laptop wireless card is running on a different frequency
B. The wireless router needs a firmware update
C. The wireless router is 802.11b only
D. The wireless router is defective
240. An automated application capable of infecting computers without user intera
ction would be
described as which of the following?
A. A social engineering attack
B. A Trojan
C. A smurf attack
D. A worm
241. Which of the following is a valid IP address in the public addressing schem
e?
A. 172.20.10.1
B. 10.20.1.1
C. 168.192.10.1
D. 233.10.20.1
242. A system administrator is troubleshooting an application that is terminatin
g frequently. Which of
the following utilities can be used to determine the problem?
A. Port scanner
B. History log
C. DNS log
D. Application log
243. While analyzing the contents of the IP routing table in a router, the admin
istrator notices the
following routes in the table:
PrefixNextHop
IPInterface 192.168.1.0 /24172.16.31.1
Ethernet0 192.168.2.0 /24172.16.31.1
Ethernet0 172.16.31.0 /24
Directly Connected
Ethernet0 0.0.0.0/0172.16.31.2
Ethernet0
Which of the following BEST describes what would occur if a packet from 192.168.
1.4 were sent to
192.168.3.4?
A. The packet will be dropped as there is no matching route in the IP routing ta
ble to reach the
destination network
B. An ICMP network unreachable message will be sent to 192.168.1.4
C. The packet will be forwarded to 172.16.31.2
D. The packet will be forwarded to 172.16.31.1 since the source IP address is in
the
192.168.1.0/24 range
244. Which of the following wireless standards allows for increased bandwidth by
allowing channel
bonding?
A. 802.11g
B. 802.11a
C. 802.11b
D. 802.11n
245. If static addressing is not configured and the DHCP server for a network is
unavailable, which of
the following will a PC use to configure its IP address?
A. APIPA
B. BOOTP
C. DNS
D. TFTP
246. A technician is creating a crossover cable to connect two devices. Which of
the following pins
would be different between connector A and connector B?
A. Pin4, Pin5, Pin7, Pin8
B. Pin6, Pin7, Pin8, Pin1
C. Pin4, Pin5, Pin1, Pin2
D. Pin1, Pin2, Pin3, Pin6
247. A network technician is troubleshooting a network issue that has just been
reported. Which of the
following troubleshooting steps should the technician take FIRST to help resolve
this issue?
A. Record what steps should be taken to resolve the issue
B. Ask the user who reported the issue what past documentation they have
C. Ask the user who reported the issue to explain the symptoms in detail
D. Record the solution in the appropriate logs for future use
248. A user has been transferred from the accounting team to the human resources
team. The user
can only print to the accounting teams printer and cannot print to the human res
ources teams
printer. Which of the following is the cause of the problem?
A. Wrong gateway
B. Wrong DNS
C. Wrong host file
D. Wrong VLAN
249. Which of the following protocols allows secure access to a VPN?
A. PPP
B. SLIP
C. PPPoE
D. PPTP
250. Which of the following devices uses the IEEE 1394 standard?
A. FireWire
B. USB 2.0
C. iSCSI
D. Parallel
251. Which of the following is the maximum segment distance of a 100BaseFX
network?
A. 100 meters (328 feet)
B. 2,000 meters (6,561 feet)
C. 1,024 meters (3,359 feet)
D. 1,023 meters (3,356 feet)
252. Which of the following devices is used to extend the signal strength on a n
etwork segment?
A. Repeater
B. NIC
C. Transceiver
D. Modem
253. Which of the following remote access solutions allows the LEAST connection
overhead?
A. L2TP VPN
B. IPSec VPN
C. SSL VPN
D. PPTP VPN
254. A technician is at a small facility that has five computers connected to a
central switch and
accessing a single server for file and print sharing. One computer becomes unabl
e to connect to
the network, while the other four are still connecting properly. Which of the fo
llowing could be
causing the computer to not connect to the network?
A. The server has failed
B. The computers OS needs to be updated
C. The switch has failed
D. The NIC has failed
255. After increasing the interface MTU of a branch router to 1600 bytes, a netw
ork administrator is no
longer able to send packets with a size of 1501 bytes. Which of the following is
the cause?
A. The WAN link does not support frames over 1500 bytes in size
B. The branch router cannot process frames larger than 1500 bytes
C. The router at the other end of the WAN link is configured with an MTU of 1500
D. The frames take too long to send causing collisions with other devices attemp
ting to send
traffic
256. Users on the network can no longer access a custom application that uses TC
P 8090 hosted on
the DMZ. A technician has verified that the firewall is permitting the TCP port.
Which of the
following commands would verify the server is still accepting connections on TCP
8090?
A. netstat
B. ipconfig
C. telnet
D. nslookup
257. Which of the following is commonly used to test fiber connectivity?
A. OTDR
B. Toner probe
C. Butt set
D. Multimeter
258. Which of the following protocols transmits using UDP ports?
A. RIPv2
B. HTTP
C. HTTPS
D. TFTP
259. Which of the following routing protocols uses AS-Path as one of the methods
to build the routing
table?
A. OSPF
B. ISIS
C. BGP
D. EIGRP
260. A network technician wants a server to have fault tolerance. Which of the f
ollowing would be the
MOST cost effective solution?
A. Install two NICs for teaming
B. Install two switches
C. Install a single fiber NIC
D. Install a single router
261. An employee is having issues accessing shared resources on a file server. W
hich of the following
troubleshooting steps should the technician take FIRST?
A. Document the problem
B. Search the internet for the problem
C. Test the results
D. Identify the symptoms
262. A user states that they have decreased signal strength on their wireless co
nnection. They have
been using the wireless network previously without problems and the network conf
iguration has
not been changed. Which of the following is MOST likely the cause of the degrade
d signal?
A. Incorrect encryption
B. Standards mismatch
C. Incorrect SSID
D. Environmental factors
263. A user reports their wireless 802.11g Internet connection is intermittently
disrupted. Which of the
following is the cause of the problem?
A. Infrared printer
B. Cordless phone
C. Cell phone
D. Incandescent light
264. Which of the following will list the destination MAC addresses?
A. arp
B. ping
C. dig
D. nbtstat
265. Which of the following cable types has the shortest maximum cable run lengt
h?
A. Single mode fiber
B. Coaxial
C. Plenum
D. CAT3
266. Which of the following is the MOST common pinout
configuration used when crimping RJ45
connectors?
A. UTP
B. IEEE 802.5
C. T568A/B
D. STP
267. A network administrator is summarizing the following IP address ranges into
a single route for
redistribution into the network core:
192.168.0.0 /24
192.168.1.0 /24
192.168.2.0 /24
192.168.3.0 /24
Which of the following IP summary addresses will represent the listed network ra
nges without
including any ranges not listed?
A. 192.168.0.0 /21
B. 192.168.0.0 /23
C. 192.168.0.0 /16
D. 192.168.0.0 /22
268. A network technician has been asked to retrieve device statistics, informat
ion, and errors. Which
of the following tools would the technician likely use?
A. TFTP
B. Packet sniffer
C. SNMP
D. SMTP
269. Which of the following is found in a layer two switch?
A. SSID settings
B. Routing protocols
C. DNS zones
D. VLAN settings
270. Which of the following cable types transmits data over 100Mbps per directio
n?
A. 100BaseTX
B. 10BaseT
C. 100BaseT
D. 10GBaseT
271. A technician is dispatched to a remote office to install a new NIC in a cli
ent computer. After
successfully installing and configuring the operating system to recognize the de
vice, the computer
still cannot access the network. Which of the following would MOST likely be the
problem?
A. The CAT5 cable is defective
B. The NIC is disabled in BIOS
C. The NIC is disabled in Device Manager
D. The RJ11 jack is defective
272. Which of the following is the MOST likely cause of a wireless connection dr
opoff
in a wireless G network?
A. Cellular interference
B. AM Radio
C. Cordless phones
D. FM Radio
273. Which of the following tools will identify if a CAT5e cable is operating at
optimal performance?
A. Toner probe
B. Multimeter
C. Certifier
D. Butt set
274. Which of the following is the default port for POP3?
A. 21
B. 80
C. 110
D. 25
275. A user contacts a technician and states that they are unable to access the
network. The technician
discovers that the IP address of the workstation is 169.123.142.34. Which of the
following has
occurred?
A. The workstation has obtained a public address
B. The workstation has obtained a multicast address
C. The workstation has obtained a private address
D. The workstation has obtained an APIPA address
276. A technician needs to trace a wire that is in the wall. Which of the follow
ing is the BEST way for
the technician to identify the wires location?
A. Media Tester
B. Continuity Tester
C. Tone Generator
D. Multimeter
277. Users are reporting that they can access Internet web pages but cannot acce
ss the internal
company website. Which of the following is the MOST likely source of the problem
?
A. The intranet server is down
B. The intranet DNS entry is non-authoritative
C. The DNS address handed out by DHCP is incorrect
D. The default gateway is incorrect
278. When connecting two devices for voice on a vertical connect, which of the f
ollowing cables would
be used to connect the two devices?
A. Crossconnect wire
B. 25 pair cable
C. CAT3
D. CAT5
279. Which of the following protocols allows email to be viewed while remaining
on the email server?
A. SMTP
B. SSL
C. POP3
D. IMAP4
280. A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 ca
n be rewritten in
classless interdomain routing notation (CIDR) as which of the following?
A. 220.100.100.100 /24
B. 220.100.100.100 /16
C. 220.100.100.100 /8
D. 220.100.100.100 /32
281. A company is getting a new sales system that must remain secure and isolate
d. The network
administrator needs to segregate network traffic for security reasons. Currently
there is one
addressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0.Which of the fo
llowing
methods would BEST help in segregating the traffic?
A. Implementing a dedicated broadcast network
B. Implementing a dedicated multicast network
C. Changing the IP scheme to class C addresses
D. Creating a new subnet for this system
282. A network administrator has been receiving work orders about poor voice qua
lity crossing a
branch T1.The cause is determined to be users running high bandwidth file sharin
g applications
across the T1 sending large packets delaying the smaller voice streams. Which of
the following
would improve voice quality?
A. Install a content caching proxy at the branch to reduce inbound WAN traffic.
B. Configure traffic shaping to reduce the bandwidth available to the file shari
ng application.
C. Configure a separate VLAN for the IP phones.
D. Upgrade switches to provide higher bandwidth ports for workstations and IP ph
ones.
283. Which of the following uses pointer records and A records?
A. NAT server
B. IPS
C. DNS server
D. IDS
284. DNS services are in a failed state on a network. Some users require FQDN to
access specific
services. A temporary solution would be to:
A. create a local host file on the PC
B. release and renew DHCP
C. change the IP address of the specific services needed
D. change all domain relationships to WINS
285. A user has a small network of four computers that they want to connect to a
single cable modem.
Which of the following devices would allow the user to do this?
A. Four port wireless router
B. Four port switch
C. Four port hub
D. Four port WAP
286. Which of the following devices allows segregation of collision domains but
not broadcasting
domains?
A. NIC
B. Switch
C. Hub
D. Router
287. A user reports that when the phone rings in their house the wireless on the
ir laptops becomes
disconnected. Which of the following BEST describes the issue?
A. The cordless phones are2.4Ghz which interferes with wireless
B. The cordless phones are plugged into the RJ11 jack
C. The cordless phones are5.8Ghz which interferes with wireless
D. The cordless phones are plugged into same outlet as the router
288. Which of the following documentation would a network administrator need to
update if they have
just finished upgrading the firmware on all the switches within the LAN?
A. Wiring schematics
B. Logical network diagram
C. Physical network diagram
D. Baseline and configuration documentation
289. After deploying three large additional servers in a rack there are reports
of network instability and
other issues across all servers in the rack. It has been verified that there is
sufficient power
resources and network bandwidth. Which of the following should the technician ch
eck NEXT?
A. Cable tester
B. Certifier
C. Temperature monitor
D. Multimeter
290. A network engineer for a company has issued the 10.44.210.0/24 network for
a branch office. The
network administrator for the branch has three separate VLANs for voice, worksta
tions, and
servers. There are approximately 50 end user workstations, 50 IP phones that req
uire addressing,
and a dozen servers. How should the network administrator use the block allocate
d to the branch?
A. Subnet the block into /26s and assign one to each VLAN.b
B. Do not subnet the block?use the /24 for all VLANs
C. The administrator must request more networks and use the networks given so fa
r for the
servers and workstation VLANs
D. Subnet the block into /25s and assign one to each voice and workstation VLANs
291. Which of the following is the standard data transmission rate for an OC3
line?
A. 51.84Mbps
B. 44.74Mbps
C. 622.08Mbps
D. 155.52Mbps
292. A router receives a packet with a destination address 72.44.69.254?however,
no entry in the
routing table exists for the network. Which of the following actions will the ro
uter take?
A. The packet will be queued while the router queries for an acceptable path to
the destination.
B. The packet will be dropped as nonroutable.
C. The packet will be forwarded out until another router forwards the packet.
D. The packet will be forwarded to the next hop address of the default route.
293. A technician is sent to troubleshoot a connectivity issue on A company's we
b server. Which of the
following is the NEXT step after verifying that one of the NICs has no LEDs flas
hing?
A. Reinstall application
B. Check for hardware conflicts or disabled devices
C. Reinstall drivers
D. Check system properties for correct caching settings
294. Which of the following WAN technologies uses thirty 64Kbps channels?
A. ATM
B. T1
C. E1
D. MPLS
295. Which of the following is considered a connection oriented protocol?
A. UDP
B. SPX
C. TCP
D. IP
296. A technician wants to remotely log into an office computer using remote des
ktop. The technician
needs to do this in a secure manner. Which of the following would accomplish thi
s?
A. VPN
B. Telnet
C. VLAN
D. Tagged packets
297. A user is trying to establish an FTP connection to a computer at home. The
home computer is
turned on and has Internet connectivity? however, they are unable to connect fro
m the PC at work.
The IP address that the user is trying to connect to is 192.168.1.125.Which of t
he following is the
MOST likely problem?
A. The firewall at the office is blocking the outgoing connection
B. FTP client is not installed in the work computer
C. FTP server is not installed on the home computer
D. The IP address of the home computer is not routable across the Internet
298. A company requires a hub and spoke WAN solution. Which of the following are
BEST suited to
meet this need? (Select THREE).
A. ISDN
B. MPLS
C. ADSL
D. SONET
E. Framerelay
F. ATM
G. DOCSIS
299. Which of the following tools enables the technician to trace cables in mult
iple pair wiring?
A. Cable tester
B. Multimeter
C. Butt set
D. Toner probe
300. Which of the following is a routable public class A address?
A. 10.0.0.255
B. 19.16.18.255
C. 10.0.0.10
D. 19.16.18.1
301. A technician wants to see how many server connections are open on a client
machine. Which of
the following is the command to see these connections?
A. dig
B. netstat
C. nslookup
D. arp
302. A technician is creating a patch cable to connect two PCs for file sharing.
Which of the following
cables should the technician use?
A. Straight
B. Loopback
C. Crossover
D. Rollover
303. Which of the following is the maximum number of wire pairs that can be used
in an RJ11
connector?
A. 8
B. 2
C. 6
D. 4
304. Which of the following is correct when converting 192 to binary?
A. 00110000
B. 00001100
C. 11000000
D. 00000011b
305. Which of the following is the FIRST criterion used to select a nexthop from
the routing table?
A. Lowest administrative distance
B. Greatest number of hops
C. Most precise matching prefix
D. The BGP route
306. Which of the following is port 123 commonly used for?
A. IMAP4
B. HTTPS
C. NTP
D. DNS
307. A remote user cannot connect to the office via VPN. The user has establishe
d Internet
connectivity. Which of the following is the MOST likely next step in troubleshoo
ting?
A. Reinstall the VPN client at the remote computer
B. Determine if the VPN service is running at the office
C. Power cycle the VPN concentrator at the office
D. Determine if the user has the correct VPN address and password
308. Which of the following would limit the availability of the types of sites t
hat users on a LAN have
access to?
A. A DNS server
B. A proxy server
C. A DC server
D. A DHCP server
309. Which of the following utilities will produce the results printed below?
Tracing route to 172.30.0.78 over a maximum of 30 hops
1 <1 ms <1 ms172.30.0.78
A. arp
B. tracert
C. ping
D. netstat
310. Which of the following would a network administrator MOST likely configure
on a workstation to
block certain websites and ports?
A. Network based firewall
B. Antivirus service
C. Host based firewall
D. Port scanner
311. A user is having intermittent problems connecting to their network shares.
A network technician is
able to determine that there is a problem within the network cabling in between
the workstation
and the switch. All other users are able to connect successfully to the network.
Which of the
following is the MOST likely cause?
A. Patch cable is a crossover cable instead of straight through
B. Cable is not punched down at the punch panel
C. Cable has been cut somewhere within the wall
D. Crosstalk and interference are occurring
312. Which of the following protocols provides a secure method to remotely admin
ister a server?
A. HTTP
B. SFTP
C. SSH
D. Telnet
313. Which of the following is the maximum distance a 10GBaseEW connection can t
ransmit with one repeater?
A. 10,000 meters (32,808 feet)
B. 80,000 meters (262,467 feet)
C. 20,000 meters (65,616 feet)
D. 40,000 meters (131,233 feet)
314. On a Windows network, users are reporting that they cannot access any netwo
rk resources. The
userscan ping the IP address and connect to the network resource using the IP ad
dress. Which of
the following is the cause of the problem?
A. The domain controller is not responding
B. The DNS server is not resolving correctly
C. The DHCP server is not assigning correct IP addresses
D. The file server is offline
315. A network technician is assigned the task of connecting two switches in two
different wiring
closets. Which of the following cable types is the appropriate choice?
A. Crossover
B. Loopback
C. 568A
D. Rollover
316. Which of the following access methods is used for wireless medium access?
A. CSMA / CD
B. PPPoE
C. CSMA / CA
D. PPTP
317. A new segment needs to be added to a network to provide access for 64 serve
rs. Which of the
following subnets will provide the needed access and still conserve IP addresses
?
A. 192.168.1.0/25
B. 192.168.1.0/26
C. 192.168.1.0/23
D. 192.168.1.0/24
318. When connecting two devices for data on a vertical cross connect, which of
the following cables
would be used to connect those devices?
A. CAT5e
B. Fiber
C. Coaxial
D. CAT6
319. Which of the following network protocols is needed to ensure that users can
type in a FQDN
instead of the IP address?
A. DNS
B. WINS
C. IMAP4
D. FTP
320. A technician is called to a clients desktop for connection issues. Which of
the following is the
FIRST step the technician should take?
A. Check the LEDs on the NIC
B. Reinstall the OS
C. Install a new NIC
D. Reset the router
321. A technician is extending a data circuit to the other side of the building.
Which of the following
would the technician set up at the new location?
A. EMI
B. MDF
C. IDF
D. ESD
322. Which of the following network devices filters packets based on rules that
have been configured
for it?
A. Layer 2 switch
B. Firewall
C. Hub
D. Bridge
323. A network administrator is configuring a server to provide file sharing for
offices across the
company. Which of the following addresses would be acceptable to set on a device
?
A. 255.255.255.255
B. 192.168.0.255
C. 192.168.0.25
D. 192.255.255.255
324. Which of the following is the purpose of a packet sniffer?
A. Checks the route to a remote host
B. Views network datagrams
C. Verifies if a service is running on a remote host
D. Verifies name to IP address resolution
325. Two PCs have been assigned the following IP addresses, subnet mask, and def
ault gateway:
PC1
192.168.100.20
255.255.255.240
No DG
PC2
192.168.100.10
255.255.255.240
192.168.100.1
Assuming all network devices including the switch the PCs are connected to, netw
ork cabling, and
the default gateway are all functioning which of the following will occur when P
C1 attempts to
transfer a file to PC2?
A. PC1 will not be able to communicate with PC2 since PC2 is in a different subn
et and PC1 does
not have a default gateway configured
B. PC1 will perform an ARP broadcast to resolve PC2s IP address to MAC address s
ince both
PCs have the same subnet mask and communication will occur
C. PC1 and PC2 will not be able to communicate since both PCs must have the same
default
gateway
D. PC1 will send traffic to the default gateway at 192.168.100.1 since PC2 is in
a different subnet
and communication will occur
326. Which of the following tools will measure in Ohms?
A. Cable tester
B. Multimeter
C. TDR
D. Butt set
327. Which of the following are features of a DHCP server? (Select TWO)
A. Transferring files over the network
B. Dynamic IP addressing
C. Static IP address reservations
D. Resolving IP addresses to canonical names
E. Secure shell connections
328. Which of the following routing protocols uses the next hop metric in decidi
ng how to route traffic?
A. RIP
B. BGP
C. IGP
D. ISIS
329. Which of the following techniques would increase the bandwidth for network
transmission by
joining together multiple connections into one logical connection?
A. Bonding
B. Supernetting
C. Broadcasting
D. Traffic shaping
330. Which of the following properties describes a rate at which bits are transm
itted over a WAN link?
A. Transmission speed
B. Baud rate
C. Frequency
D. Throughput
331. Which of the following is a utility that translates the IP address to its p
hysical network address?
A. netstat
B. arp
C. rarp
D. nslookup
332. When determining responsibility for repair and maintenance of a T1, up to w
hich of the following
points is the local exchange carrier responsible for?
A. The smart jack
B. The central office
C. The point of demarcation
D. The router
333. Which of the following is a disadvantage of static routing?
A. Unresponsive to changes
B. High network utilization due to updates
C. RIP updates will need to be transmitted via TCP
D. Packet destination cannot be controlled
334. A scanner has determined the open ports on a network device. Assuming servi
ces are running on
their default ports, which of the following ports will provide secure communicat
ions?
A. 69
B. 143
C. 67
D. 443
335. Which of the following tools would be used to determine if the connection i
s punched down and
there is noise coming across the cable?
A. Multimeter
B. Cable tester
C. Voltage event recorder
D. Protocol analyzer
336. Which of the following items changes the encryption key on a users session
after a set period of
time?
A. TKIP
B. AES
C. RADIUS
D. WEP
337. PPTP is a combination of which of the following protocols? (Select TWO).
A. PPP
B. POP3
C. PPPoE
D. TCP
E. TCP/IP
338. In the OSI model, which of the following layers would be the cause of a ses
sion timeout
while browsing the web?
A. Layer 5
B. Layer 7
C. Layer 3
D. Layer 2
339. A network administrator has just installed a new frame relay DS3 to connect
an office to the corporate datacenter. Users report long load times for large d
ocuments hosted on fileservers in the datacenter. Which of the following tests w
ould be MOST useful in identifying the problem?
A. A penetration test
B. A throughput test
C. ping t
D. ping f
340. A technician has tested a cable and has established it can successfully sen
d and receive signals.
Which of the following tools can be used to check the speed and condition of the
signal?
A. Toner probe
B. Voltage event recorder
C. Protocol analyzer
D. TDR
341. Which of the following wireless security protocols supports the highest enc
ryption standards?
A. 3DES
B. WPA2
C. WPA
D. WEP
342. How many pairs are crossed in a crossover cable?
A. Three
B. Two
C. One
D. Four
343. Which of the following is the length of a MAC address?
A. 48bit
B. 32bit
C. 24bit
D. 64bit
344. Which of the following layers of the OSI model does a network router perfor
m traffic routing at?
A. Layer 3
B. Layer 4
C. Layer 2
D. Layer 5
345. All printers on a network are network printers with server hosted queues. A
user reports that they
cannot print. The dispatched technician verifies that all jobs sent from the use
rs computer to the
network printer fail. Which of the following would be an appropriate NEXT step?
A. Reboot the print server
B. Power cycle the switch
C. Try the printer from another PC
D. Replace the printer
346. Which of the following BEST describes the use of plenum cable?
A. Increases the cable signal
B. Decreases the cable signal
C. Reduces toxic gas released during a fire
D. Reduces the amount of EMI going to the cable
347. Which of the following is an example of a valid MAC address for a workstati
on?
A. 05:14:K9:07:B2:M4
B. FFFF.FFFF.FFFF
C. 00:08:38:05:B5:F4
D. 131.44.32.255
348. Which of the following would be used before a technician crimps a connector
to a UTP/STP cable?
A. Multimeter
B. Punch down tool
C. Cable tester
D. Cable stripper
349. A network technician is connecting through the console port to configure a
switch. Which of the
following ports would be used to transfer configuration files from the switch?
A. TCP 110
B. UDP 67
C. UDP 69
D. TCP 69
350. Which of the following tools would be used to establish a connection on a w
all jack to connect to
the desktop?
A. Multimeter
B. Snips
C. Punch down tool
D. Cable stripper
351. A computer configured to use DHCP cannot locate a DHCP server. Automatic Pr
ivate IP Address
(APIPA)will assign which of the following addresses?
A. 172.16.1.25
B. 192.168.1.25
C. 169.254.1.25
D. 10.16.1.25
352. A company guest is requesting to use their personal laptop on the company w
ireless network.
DHCP is configured correctly for wireless and a temporary WEP key is assigned. T
he laptop
cannot connect to the network because:
A. this laptop is enabled for both 802.11b and 802.11g
B. DNS server is not working properly
C. the network is out of wireless connections
D. MAC filtering is enabled on the WAP
353. 221.17.101.223/28 is an example of which kind of notation?
A. CIDR
B. DNS
C. Port Number
D. ARP
354. Which of the following is the BEST reason to implement QoS when realtime
applications are in use in the network?
A. Increase network reliability
B. Prioritize delay sensitive traffic
C. Increase network bandwidth of delay sensitive traffic
D. Prioritize bulk traffic
355. Which of the following would be an appropriate use of an EGP?
A. Unequal cost load balancing over a switched network
B. Advertising a /24 to an upstream provider
C. Periodic updates to neighbors on the LAN
D. Routing between VLANs on an Ethernet network
356. Which of the following cables has a solid Kevlar center to restrict it from
making a 90 degree
bend?
A. CAT6
B. CAT5
C. CAT5e
D. CAT3
357. A network technician is installing a series of three access points to cover
the entire wing of a
building. Each access point has a wired connection and 802.11g is being used for
the wireless
transmission. Which of the following channels should be used for the access poin
ts?
A. Channels 7,1,11
B. Channels 1,6,11
C. Channels 1,3,5
D. Channels 2,4,6
358. A technician is working on a new employees workstation in the accounting de
partment? the
workstation needs access to the accounting server. Currently the technician noti
ces that the
employee can only access the Internet. Which of the following would the technici
an need to verify?
A. Correct VPN setting
B. Correct VLAN setting
C. Correct DNS setting
D. Correct WINS setting
359. Which of the following devices can be remotely looped for troubleshooting p
urposes?
A. A 66 block
B. A 110 block
C. A smart jack
D. A patch panel
360. Which of the following is part of the TCP/IP protocol suite?
A. UDP
B. IPX
C. NetBEUI
D. SPX
361. The function of a tone generator is to generate a tone to test:
A. continuity
B. signal strength
C. impedance
D. signal feedback
362. A technician is not able to ping a server by the FQDN but can by the IP. Wh
ich of the following
should the technician check?
A. Ensure that WINS is configured
B. Ensure that the DNS is configured
C. Ensure the MAC address is correct
D. Ensure that the IP address is correct
363. Which of the following cable types allows for the maximum cable run distanc
e?
A. Coaxial
B. Multimode fiber
C. Singlemode fiber
D. CAT3
364. Which of the following is a function of a NIC?
A. It filters frame packets
B. It captures keystrokes
C. It sends data to NonVolatile RAM
D. It transceives digital data
365. A network technician discovers that the phone company has installed the sma
rt jack in the wrong
location. It needs to be moved 75 feet (23 meters) to the computer room. Which o
f the following
should be requested?
A. A replacement smart jack
B. A 66 block extension
C. A demarc extension
D. A 110 block extension
366. Remote users are having problems accessing files from a file server. Which
of the following should
a technician check FIRST?
A. User accounts
B. Access rights
C. Network resources
D. Connectivity
367. A technician can successfully remote into the company's server? however, th
e technician cannot
connect to any of the other servers directories from the server itself, but can
ping them via an IP
address. Which of the following could be the problem?
A. The server is on a different physical network
B. DNS is not correctly configured
C. The server is on a different VLAN
D. DHCP is not correctly configured
368. Which of the following characteristics BEST describe SMF? (Select TWO).
A. Can be used for distances exceeding 2 kilometers (1.24 miles)
B. Can be used for distances up to 2 kilometers (1.24 miles)
C. Uses laser light for transmission
D. Uses LED light for transmission
E. Costs less than MMF
369. A user is unable to connect to the network. A network technician is able to
determine that there is
a problem on the switch. All other users on that switch are able to connect succ
essfully to the
network. Which of the following is a probable cause?
A. Switching loop is occurring on the switch
B. Incorrect SNMP settings on the switch
C. Wrong subnet mask on the switch
D. Port is misconfigured on the switch
370. Which of the following would be used to connect a vertical cross connect wh
en using data
connections?
A. 110 blocks
B. Demarc extension
C. Patch panel
D. 66 blocks
371. Which of the following tools would be used to test the break in a fiber con
nection on the network?
A. Butt set
B. Multimeter
C. Toner probe
D. OTDR
372. Which of the following network devices would be responsible for translating
canonical names into
IP addresses?
A. A router
B. A DHCP server
C. A DNS server
D. A firewall
373. When all routers in a network agree about the path from one point to anothe
r, the network is said
to be which of the following?
A. Static
B. Converged
C. Secure
D. Dynamic
374. Which of the following would be used to relocate a T1 closer to the switch
for connectivity?
A. Patch panel
B. 25 pair cable
C. Demarc extension
D. Smart jack
375. An organization with 2,500 users has exhausted their Internet bandwidth. Af
ter some investigation,
the network administrator discovers that 95%of the traffic is coming from web br
owsing. Which of
the following network devices could be added to BEST reduce the amount of Intern
et bandwidth
the company is using?
A. Content switch
B. Load balancer
C. Proxy server
D. An additional DNS server
376. Which of the following subnet masks will produce the smallest subnet size f
or a pointtopoint
network link?
A. 255.255.255.248
B. 255.255.255.128
C. 255.255.255.252
D. 255.255.255.0
377. Which of the following documentation would a network administrator refer to
discover a rogue
WAP?
A. Wiring schematics
B. Policies
C. Baseline
D. Regulations
378. Which of the following Will allow an administrator to restrict communicatio
n between network
devices?
A. DHCP
B. NAT
C. CIDR
D. ACL
379. For an enterprise to use one of the reserved private IP address ranges, as
best practice they
should coordinate with:
A. their IT department
B. IANA
C. IEEE
D. their legal department
380. Which of the following is the maximum transmission distance of 10GBaseLR?
A. 6 miles (9.7 kilometers)
B. 25 miles (40 kilometers)
C. 512 miles (824 kilometers)
D. 1,024 miles (1648 kilometers)
381. A company has many traveling sales employees that need secure access to cor
porate resources
from non-trusteddevices (e.g. computers at client sites and/or public computers)
. Which VPN
solution is MOST appropriate for this company?
A. SSL
B. PPTP
C. IPSec
D. L2TP
382. Which of the following commands would provide the following output?
DNS request timed out. timeout was 2 seconds.
*** Cant find server name for address 172.30.0.5: Timed out
*** Default servers are not available
Server: UnKnownAddress: 172.30.0.5
DNS request timed out. timeout was 2 seconds.
*** Request to UnKnown timedout
A. winipcfg
B. nslookup
C. ipconfig
D. netstat
383. A technician is troubleshooting a switch and has identified the symptoms. W
hich of the following
steps should the technician take NEXT?
A. Escalate the issue
B. Determine the scope of the problem
C. Implement and test the solution on the switch
D. Create an action plan for reconfiguring the switch
384. Which of the following transfers data at a maximum rate of 44.7Mbps?
A. T3
B. T2
C. T5
D. T1
385. A technician is asked to reterminate a wall jack that has become loose. Upo
n looking at the wiring,
the technician notices that it was originally wired as 568A. The company impleme
nted a policy
stating that all cable terminations should adhere to the 568B standard. With thi
s in mind the
technician should:
A. reterminate both ends of the cable to the 568B standard
B. run a new cable andterminate both ends to the 568B standard
C. reterminate the non loose end of the cable to the 568B standard
D. reterminate the loose end of the cable to the 568B standard
386. When using the ping utility, which switch pings a network device until stop
ped?
A. ping -t
B. ping -s
C. ping -a
D. ping -r
387. Which of the following cables would a technician make in order to identify
a physical interface
problem?
A. Serial
B. Rollover
C. Console
D. Loopback
388. A client is able to ping its default gateway, but is unable to communicate
with a remote host.
Which of the following utilities would the technician use to determine where the
fault is?
A. arp
B. pingt
C. traceroute
D. nbstat
389. Which of the following is an example of secure tunneling?
A. PPPoE
B. SSL VPN
C. PPP
D. PAP
390. Which of the following cable types is used in a 100BaseFX network?
A. UTP
B. Coaxial
C. STP
D. Fiber
391. A technician receives a call on monday morning that several computers will
not connect to the
network. The technician determines that the computers left on over the weekend a
re functional and those
that were turned off over the weekend are not functioning. Which of the followin
g is the MOST
likely source of the problem?
A. WINS needs to be restarted
B. DNS is not functioning
C. LDAP is not functioning
D. DHCP is not functioning
392. To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.
0.200/25 which of the
following devices will be required?
A. A router
B. A layer 2 switch
C. A hub
D. A DNS server
393. Which of the following technologies do the 802.11 networks utilize to preve
nt packet collisions?
A. FDDI
B. CSMA/CD
C. Token ring
D. CSMA/CA
394. Which of the following protocols uses port 22 by default?
A. FTP
B. DNS
C. Telnet
D. SSH
395. Which of the following protocols permits secure polling of network devices?
A. SNMPv2
B. SCP
C. SNMPv3
D. SSH
396. Which of the following commands is used to provide the output below in a Wi
ndows environment?
1 * * * Request timed out
2 * * * Request timed out
3 * * * Request timed out
A. nbtstat
B. netstat
C. tracert
D. ping
397. Which of the following traffic types would a network layer firewall be unab
le to filter?
A. SMTP traffic
B. HTTP traffic
C. ICMP messages
D. Email sender verification
398. Which of the following protocols would a multilayer switch use to learn the
IP address of a directly
connected device?
A. ARP
B. BOOTP
C. DNS
D. DHCP
399. Two servers and five workstations are connected using a 100BASET network. W
hich of the following physical topologies is used?
A. FDDI
B. Bus
C. Ring
D. Star
400. A company's network is wired in a bus topology and one of the computers is
unable to access the
network. Which of the following is the FIRST step in the troubleshooting process
?
A. Reinstall the NIC driver
B. Replace the cable
C. Check the cable connections
D. Replace the NIC

You might also like