Term
Which of the following WAN technologies commonly use Unsheilded twisted pair(UTP)? (choose) B)ISDN C)DSL modem D)Post dial-up connection |
|
Definition
B)ISDN C)DSL modem D)Post dial-up connection |
|
|
Term
How many channels on E1 circuit are available for voice, video, or data A)23 B)24 C)30 D)32 |
|
Definition
|
|
Term
Which PPP authentication method provides one-way authentication & sends credentials in clear text data? A)WEP B)MS-CHAP C)PAP D)CHAP |
|
Definition
|
|
Term
What DSL variant has a distance limation of 18,000 ft. between DSL modem & its DSLAM? A)HDSL B)ADSL C)SDSL D)VDSL |
|
Definition
|
|
Term
What kind of network is used by many cable companies to service thier cable modems,& contains both fiber-optic and coaxial cable? A)Head-end B)DOCSIS C)Composite D)HFC |
|
Definition
|
|
Term
What locally significant identifier is used by a frame Realy network to reference a virtual circuit? A)VPL/VLC B)DLCI C)TEI D)MAC |
|
Definition
|
|
Term
How big is the payload portion of an ATM cell? A)5 bytes B)48 bytes C)53 bytes D)64 bytes |
|
Definition
|
|
Term
What type of antenna, radiates relatively equal power in all directions? A)Unidirectional B) Yagi C)Parabolic D)Omndirectional |
|
Definition
|
|
Term
When using the 2-4 GHz band for multiple access points in a WLAN located in the United states, which nooverlapping channels should you select? (Choose3) A)0 B)1 C)5 D)6 E)10 F)11 G)14 |
|
Definition
|
|
Term
What technology do WLAN's use to determine when they gain access to the wireless media? A)SPF B)CSMA/CA C)RSTP D)DUAL |
|
Definition
|
|
Term
What IEEE 802.11 variant supports a maximum speed of 54 Mbps&uses 2.4 Ghz band? A)802.11a B)802.11b C)802.11g D)802.11n |
|
Definition
|
|
Term
Which of the following is used by IEEE 802.11n to achieve high through-put through the used of multiple antennas for transmissions & reception? A)MIMO B)DSSS C)FHSS D)LACP |
|
Definition
|
|
Term
A WLAN formed directly between wireless clients(without the use of a wireless AP) is referred to as what type of WLAN? A)Enterprise mode B)IBSS C)Personal Mode D)BSS |
|
Definition
|
|
Term
When extending the range for a 2.4Ghz WLAN, you can use nonoverlapping in coverage between those cells (using nonoverlapping channels) to prevent a connection from as user roams from one coverage cell to another. what percentage of coverage overlap is recommended for these adjacent cell? A)5-10 percent B)10-15 percent C)15-20 percent D)20-25 percent |
|
Definition
|
|
Term
If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentications is said to be in use? A)WEP B)SSID C)Open D)IV |
|
Definition
|
|
Term
WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called? A)initialization vector B)Chips C)Orthogonal descriptor D)Session key |
|
Definition
|
|
Term
What standard developed by the Wi-Fi Alliance implements the requirement of IEEE 802.11i? A)TKIP B)MIC C)WEP D)WPA2 |
|
Definition
|
|
Term
What is the MPLS header? A)4 bits B)8 bits C)16 bits D)32 bits |
|
Definition
|
|
Term
Which of the following is a social engineering attack? A)Man in the middle B)Worms C)Evil Twin D)Phishing |
|
Definition
|
|
Term
What is the MPLS header? A)4 bits B)8 bits C)16 bits D)32 bits |
|
Definition
|
|
Term
Which of following is a social engineering attack? A)Man in the middle B)Worms C)Evil Twin D)Phishing |
|
Definition
|
|
Term
00:12:34:56:78 can be used in which of the following? A)Channel selection B)WPA-PSK password C)WEP key D)MAC filtering |
|
Definition
|
|
Term
Which of he following devices will monitor for propagating worms? A)IDS B)Firewall C)Proxy server D)Mail server |
|
Definition
|
|
Term
T568Bwiring scheme is typically found on which of the following components? A)66block B)Demarc extension C)Patch Panel D)Vertical Cross Connect |
|
Definition
|
|
Term
Something you have, something you are and something you know are the three tenets of: A)access control B)remote access C)change management D)social engineering |
|
Definition
|
|
Term
Afteru moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem A)Split cables B)Crosstalk C)TX/RX reversed D)DB loss |
|
Definition
|
|
Term
A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this? A)MAC filtering B)WPA encryption C)Changing antenna type D)Decreasing radio strength |
|
Definition
|
|
Term
In IPSCec, which of the following is an agreement on how devices will securely transmit information? A)ESP B)SA C)AH D)ISAKMP |
|
Definition
|
|
Term
Which of the following could be used to estimate RTT across a router? A)traceroute B)dig C)arp D)uptime |
|
Definition
|
|
Term
Which of the following represents the physical address of a network access card A)00-30-48-83-98-C8 B)FF01:D2:C4:87::11 C)09-9D-35-22-L2-34-FF-21 D)2D1A:C3:0:1:C3B2:2AD:FF:FEBE:9D3A |
|
Definition
|
|
Term
Which of the following records would be used for a Reverse DNS lookup? A)MX B)PTR C)A D)AAAA |
|
Definition
|
|
Term
Which of the following technologies allows for redundant links within a layer 2 segments? A)OSPF B)RIP C)Port Mirroring D)Spanning Tree |
|
Definition
|
|
Term
Which of the following defines access for a network? A)ACL B)RDP C)RAS D)ARP |
|
Definition
|
|
Term
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network? A)Wire tap B)Network sniffer C)Load balancing appliance D)NIPS |
|
Definition
|
|
Term
Which of the following is MOST likely to arise when configuring an IPv6 over IPv4 tunnel? A)Routing loop B)MTU black hole C)Framing error D)SYN flood |
|
Definition
|
|
Term
Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2) A) traceroute B) ping C) ipconfig D) netstat E) Bandwidth shaper F) Load Balancer G) DNS server H) IPS |
|
Definition
|
|
Term
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network? A) Fiber multiplexer B) Repeater C) Attenuator D) OTDR |
|
Definition
|
|
Term
A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem? A) DB loss B) EMI C) TXRX reversed D) Open shorts |
|
Definition
|
|
Term
Which of the following is an example of two factor authentication? A) Password device certificate and PIN B) SSL web server certificate and password C) User password and administrator Password D) Password and hardware token OTP |
|
Definition
D) Password and hardware token OTP |
|
|
Term
Which of the following is used to restrict access according to user policies? A) Content filter B) DHCP server C) DNS server D) VPN concentrator |
|
Definition
|
|
Term
Which of the following describes a rationale for a network with redundant paths? A) VPN compatibility B) Unified communications implementation C) High availability requirement D) QoS |
|
Definition
C) High availability requirement |
|
|
Term
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue? A) Increased uptime B) Caching engines C) Traffic shaping D) Load balancing |
|
Definition
|
|
Term
Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A) Loopback plug B) Protocol analyzer C) Smart jack D) Coupler |
|
Definition
|
|
Term
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of192.168.1.65/27. Which configuration change will allow the PING to be successful? A) Replace the router with a layer 2 switch that supports VLANs B) Change VLAN 20 computers Default Gateway to 192.168.1.127/27 C) Change VLAN 10 computers Default Gateway to 192.168.1.32/27 D) Allow ICMP to pass through the router |
|
Definition
D) Allow ICMP to pass through the router |
|
|
Term
Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this?(select two) A) Packet sniffer B) Honeypot C) Port mirroring D) IPS E) Port scanner F) IDS |
|
Definition
A) Packet sniffer C) Port mirroring |
|
|
Term
For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources? A) The server contains several virtual machines & the MAC addresses are from the virtual machines. B) The server is hosting a web server & the MAC addresses are from connected browsers C) The server is hosting a proxy server & the MAC addresses are from the connected clients D) The server NIC is starting to fail & should be replaced. |
|
Definition
A) The server contains several virtual machines & the MAC addresses are from the virtual machines. |
|
|
Term
Which of the following does SNMPv3 BEST provide over previous versions? A) Simplified management B) Increased security C) More data types D) Higher productivity |
|
Definition
|
|
Term
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels? A) MDF B) Caching engines C) Demarc D) IDF |
|
Definition
|
|
Term
A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line? A) CSU B) Demarc C) Registered jack D) DSU |
|
Definition
|
|
Term
A company’s database software runs the cloud. The device hosting the software is an example of which of the following? A) Virtual server B) Virtual switch C) Virtual desktop D) Virtual PBX |
|
Definition
|
|