Which of the following protocols is used by the ping command?
Which of the following uses port 23 by default?
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?
Which of the following protocols uses port 3389 by default?
Frame relay occurs at which of the following layers of the OSI model?
A forward lookup zone converts which of the following?
Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections?
Which protocol is represented by the packet capture below?
UDP 0.0.0.0:68 -> 255.255.255.255:67
In order for switching loops to be automatically disabled, which of the following needs to be implemented?
Which of the following BEST describes a switch port?
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
Which of the following is used to describe trunking VLANs on a network?
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
Which of the following would Joe, a technician, use for a service that needs fast communication and is unaffected by packet loss?
A technician has resolved a ticket to fix a user’s printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?
An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?
Which of the following protocols does DNS utilize on port 53?
A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?
Which of the following is used to prevent Layer 2 switching loops within a local area network?
A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?
Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?
At which layer of the TCP/IP model would cabling exist?
Which of the following is used to create a secure connection between a client and a host?
A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?
A technician is troubleshooting a host name being directed to the wrong system. The ‘arp –a’ command line utility is used to identify and display which of the following?
Which of the following network protocols is used for a secure command line interface for management of network devices?
Which of the following ports is used by Telnet?
The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the:
Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?
Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?
Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through single mode fiber?
When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
A user at a small business states that they cannot connect to the Internet via the company’s wireless network every time their cordless phone rings. Which of the following is MOST likely occurring?
Spanning-Tree Protocol is used with which of the following network devices?
Which of the following configurations of a wireless network would be considered MOST secure?
Which of the following protocols can be implemented to provide encryption during transmission between email gateways?
A technician has set up a wired network IP scheme with the following specifications:
DHCP: 192.168.1.100-150
Gateway: 192.168.1.1
DNS: 192.168.1.1
Which of the following is represented by this addressing scheme?
A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?
A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?
Which of the following will prevent switching loops by selectively shutting down switch ports?
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?
A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?
Which of the following would allow for a specific device to receive the same IP address from a DHCP server?
Which of the following technologies is used on cellular networks?
Which of the following WAN technologies has the highest latency?
MIMO technology in the 802.11n standard provides for which of the following benefits?
A user’s new computer is not able to connect to the network at all. Upon further investigation, Karen, the administrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable in the IDF, which of the following is the MOST likely cause of the problem?
Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?
Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?
Which of the following are standard fiber cable connector types? (Select TWO).
The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?
Which of the following is the MAXIMUM data transmission rate of 802.11a?
Which of the following cable types is required to run through an air duct?
Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps?
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?
Which of the following uses copper wiring?
Which of the following has a DB-9 connector?
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?
Which of the following connectors are MOST commonly used on a POTS line?
Which of the following is the FASTEST Ethernet technology?
Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?
In which of the following wireless standards is MIMO used?
Which of the following technologies can cause interference for 802.11g?
Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?
Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?
Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?
The selection of the correct punch down tool to use depends on which of the following?
DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOST likely use to verify this problem?
Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?
Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?
Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?
Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory?
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?
Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO).
A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?
Querying active state...
TCP Global Parameters
----------------------------------------------
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
Which of the following devices will allow Lisa, a user, to see a cached copy of websites?
Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?
Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?
Which of the following does SNMPv3 BEST provide over previous versions?
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?
Which of the following performance benefits would multiple domain controllers BEST provide?
Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
Which of the following is used to filter outgoing network requests?
After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?
Which of the following uses a Management Information Base (MIB) to monitor the network?
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?
Which of the following is an example of two-factor authentication?
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
Honeypots and honeynets are different in which of the following ways?
Which of the following technologies allows multiple staff members to connect back to a centralized office?
Which of the following wireless security measures, although widely implemented, does not provide strong security?
Which of the following will a firewall NOT protect the network from?
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company?
Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
Which of the following is a standard measure of signal power?
Lisa, an administrator, believes that the network has been attacked and there is no known definition or prevention method to help avoid this attack. Which of the following BEST describes this scenario?
Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic?
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
The process of restricting internal web traffic to an employee-only website based upon Layer 3 addresses is known as which of the following?
Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?