Term
A group of systems that can receive one another's broadcast messages is known as a __________________.
a.Collision domain b.Active directory domain c.Broadcast domain d.Fully qualified domain name |
|
Definition
Broadcast domain
A broadcast domain is a group of systems that can receive one another's broadcast message. You can break your network into multiple broadcast domains by using routers or VLANs. |
|
|
Term
A message that is sent out on the network and is destined for a group of systems is known as a ______________ message.
a.Unicast b.Full duplex c.Broadcast d.Multicast |
|
Definition
Multicast
Multicast traffic is traffic that is destined for more than one system, but not all systems |
|
|
Term
When a client system boots up and requests an IP address, it first must send out which message?
a.DHCP request b.DHCP discover c.DHCP response d.DHCP ACK |
|
Definition
DHCP discover
The DHCP discover message is the first message sent out by a DHCP client to locate a DHCP server on the network. The DHCP discover message is a broadcast message which has a destination MAC address of FF-FF-FF-FF-FF-FF. |
|
|
Term
What term describes the phenomenon of offering multiple types of communications services on the same network?
a. Unified communications
b. Hybrid network topology
c. Client/server architecture
d. Convergence |
|
Definition
Convergence
Using the same network to deliver multiple types of communications services is known as convergence. A similar term, unified communications, refers to the centralized management of multiple network-based communications. For example, your company might use one software program to manage intra-office phone calls, long-distance phone calls, cell phone calls, voice mail, faxes, and text messaging for all the users on your network. |
|
|
Term
Which protocol is used to send email messages?
a.SMTP
b.SSH
c.SNMP
d.SCP |
|
Definition
SMTP
Simple Mail Transfer Protocol (SMTP) is used to send e-mail messages. Simple Network Management Protocol (SNMP) is used to manage network devices. The Secure Shell (SSH) protocol is the recommended protocol for remotely managing a network node. It uses encryption. Secure Copy Protocol (SCP) is used to copy data from one network node to another, using encryption to protect the data transfer |
|
|
Term
Which protocol should you use if you want to dynamically assign IP addresses to network clients?
a.DNS
b.WINS
c.DHCP
d.CIDR |
|
Definition
DHCP
Dynamic Host Configuration Protocol (DHCP) is a protocol/service that enables a network administrator to assign IP addresses dynamically, without having to configure each machine individually. WINS is an NT protocol/service that maps IP addresses to NetBIOS names. DNS is a protocol/service that maps IP addresses to hostnames. Classless Inter-Domain Routing (CIDR) is also known as supernetting because, unlike subnetting that borrows host bits for a subnet, network bits are borrowed for the host address. The benefit of CIDR is that large numbers of routing table entries can be summarized into a smaller number of entries |
|
|
Term
Which protocol translates TCP/IP addresses to MAC addresses?
a.ARP
b.DNS
c.RARP
d.WINS |
|
Definition
ARP
Address Resolution Protocol (ARP) translates TCP/IP addresses to MAC addresses. WINS is an NT/2000/2003 protocol/service that maps IP addresses to NetBIOS names. DNS is a protocol/service that maps IP addresses to hostnames. RARP is used to map an IP address to an Ethernet or MAC address. |
|
|
Term
The purpose of a bridge is to ____________.
a. Amplify a data signal and all accompanying noise
b. Filter data on a network by MAC address
c. Connect network subnets
d. Prepare signals for transmission on a WAN |
|
Definition
Filter data on a network by MAC address
A bridge connects different segments of a network in order to expand the scope of the network. Bridges filter data on a network by MAC address to isolate traffic on a network segment. Bridges are used as a tool on overloaded networks. By filtering data based on MAC address, they efficiently transmit data between sending and receiving devices. Traffic between segments is reduced and network throughput is increased with a bridge. Routers connect network subnets. CSU/DSUs prepare signals for WAN transmission. Repeaters are network devices that amplify data signals and all accompanying noise. |
|
|
Term
Which layer of the OSI model is concerned with hubs and repeaters?
a.Network
b.Physical
c.Application
d.Data Link |
|
Definition
Physical
The OSI model describes the tasks a protocol suite performs as data moves from node to node on a network. The OSI model consists of seven layers. From layer 1 to layer 7 the layers are Physical, Data Link, Network, Transport, Session, Presentation and Application. Several network devices are associated with layers of the OSI model. Hubs and repeaters are associated with the Physical layer of the OSI model. |
|
|
Term
Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response?
a.3 and 6
b.1 and 2
c.2 and 3
d.5 and 6 |
|
Definition
The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and 100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.
The correct answer is: 3 and 6 |
|
|
Term
True or false? A segment is part of a network usually composed of a group of nodes that use the same communications channel for all their traffic. |
|
Definition
|
|
Term
What is the range of the "Well-known", TCP and UDP ports? |
|
Definition
Below 1024
The well-known port numbers are all below 1024. An example would be HTTPS (Secure WWW) connectivity at port 443. |
|
|
Term
Which of the following Protocols is used when making a connectionless state link on the Transport Layer?
a.TCP
b.UDP
c.IP
d.Peer-to-Peer
e.H.323 |
|
Definition
UDP
User Datagram Protocol (UDP) sacrifices reliability for speed and efficiency in the transport of data.While TCP connections opens a session between nodes to ensure data is transported correctly. |
|
|
Term
An IP address resides at which layer of the OSI reference model?
a.Network layer
b.Application Layer
c.Transport layer
d.Session layer
e.Data link layer |
|
Definition
Network layer
IP addresses can be a typical component at the network layer (Layer 3) of the OSI model. Routers use these addresses to route traffic across a Network |
|
|
Term
Windowing is featured at what layer of the OSI reference model?
a.Data-Link
b.Transport
c.Session
d.Application
e.Network |
|
Definition
|
|
Term
Which type of network transmission uses all available frequencies on its medium to transmit/receive data?
a.Baseband
b.Time Division Multiplexing
c.Duplex
d.Cellular
e.Broadband |
|
Definition
|
|
Term
Of the following physical LAN topologies, which requires the most cabling?
a.Bus
b.Star
c.Ring
d.WLAN |
|
Definition
Star
The star topology is the most common topology used today in switched LANs. It features quite a bit of cabling, as the switches require media to each and every node (wired) that needs to communicate. There are also trunk connections between the switches for an extended star topology, which implies even more cabling |
|
|
Term
How many WAN links are required to create a full mesh of connections between five remote sites?
a.20
b.5
c.25
d.10
e.15 |
|
Definition
10
The equation for the number of connections required for the full-mesh topology is n(n–1)/2, where n is the number of nodes. So, in this case, 5(5–1)/2 is 5(4)/2 = 10 |
|
|
Term
Which device makes traffic-forwarding decisions based on MAC addresses?
a.Modem
b.Router
c.Hub
d.Access Point
e.Switch |
|
Definition
Switch
Switches make forwarding decisions based on the destination MAC (hardware) address contained in the data frame. As opposed to to a router, which makes forwarding decisions based on the destination IP address |
|
|
Term
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?
a.255.255.255.0
b.255.255.240.0
c.255.255.255.240
d.255.255.255.128 |
|
Definition
|
|
Term
At which of the following OSI layers does a Layer 3 switch operate? a. Presentation
b. Data link
c. Session
d. Transport
e. Network |
|
Definition
|
|
Term
Which of the following replaces the destination IP address of a packet?
a.DHCP b.DNS c.NAT d.SNAT |
|
Definition
|
|
Term
Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed?
a.History log
b.System log
c.SNMP agent
d.SNMP trap |
|
Definition
|
|
Term
Which of the following standards provides port authentication?
a.802.1x
b.802.2
c.802.1q
d.802.11 |
|
Definition
|
|
Term
A technician is running new CAT5 cables; which tool should be used to terminate the cables at the patch panel?
a.Punch down tool
b.Multimeter
c.Toner probe
d.Cable crimper |
|
Definition
|
|
Term
Internet-working devices operate at which OSI layer? |
|
Definition
|
|
Term
A network has four switches; each switch has a physical link to all other switches. Which topology is being used? |
|
Definition
|
|
Term
You are troubleshooting communication to a network by looking at the link light on the switch. What layer of the OSI model are you troubleshooting when looking at a link light?
a.Data link
b.Network
c.Physical
d.Application |
|
Definition
Physical
The physical layer of the OSI model deals with physical aspects of the network, such as the cables and connectors. A displayed link light simply means a connection exists. |
|
|
Term
What layer of the OSI model is responsible for breaking the data into smaller segments? |
|
Definition
|
|
Term
Which layer of the OSI model works with packets? |
|
Definition
Layer 3
When the layer-3 header has been added to the message, the message is known as a packet. Layer-3 devices such as routers process packets. |
|
|
Term
What is the application layer protocol for receiving e-mail over the Internet?
a.POP3
b.FTP
c.SNMP
d.SMTP |
|
Definition
|
|
Term
Which Gigabit Ethernet standard uses UTP cabling to reach 1000 Mbps?
a. 1000BaseTX
b.1000BaseSX
c.1000BaseCX
d.1000BaseLX |
|
Definition
|
|
Term
Which 10 Gigabit Ethernet standard uses multimode fiber-optic cabling?
a.10GBaseER
b.1000BaseSX
c.10GBaseLR
d.10GBaseSR |
|
Definition
|
|
Term
Which layer of the OSI model works with frames?
a.Layer 3
b.Layer 1
c.Layer 2
d.Layer 4 |
|
Definition
Layer 2
Layer 2 of the OSI model works with frames. This means that devices such as bridges and switches process the frames because they are considered layer-2 devices. Note that at layer 3 the data being processed is called a packet because it has a layer-3 header, and at layer 4 the data is known as a segment. |
|
|
Term
Which of the following is a secure way to transfer files from one device to another?
a. TFTP
b. FTP
c. SNMPv3
d. SFTP |
|
Definition
|
|
Term
Which of the following commands can be used to find the MAC address of a connecting router?
a.ping sweep
b.traceroute
c.ping
d.arp |
|
Definition
|
|
Term
Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs?
a.10GBase-ER
b.10GBase-SW
c.10GBase-SR
d.100Base-FX |
|
Definition
|
|
Term
Which of the following ports does IPSec use, by default?
a.8080
b.53
c.500
d.3389 |
|
Definition
|
|
Term
Which of the following can be used to find the location of a cable short?
a.TDR
b.Protocol analyser
c.Multimeter
d.CSU/DSU |
|
Definition
TDR
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables). |
|
|
Term
Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user?
a.Baseband
b.POTS
c.Broadband
d.Satellite |
|
Definition
|
|
Term
Which of the following is a commonly used protocol for VoIP network communication?
aDNS
b.SNMP
c.RTP
d.DHCP
e.SSH |
|
Definition
|
|
Term
Which of the following protocols uses port 143 by default?
a.POP3
b.NTP
c.SNMP
d.IMAP4 |
|
Definition
|
|
Term
Which of the following is the GREATEST concern when using an orbital satellite WAN link?
a.Latency
b.Cable length
c.Collisions
d.Duplex |
|
Definition
|
|
Term
VLANs occur at which of the following layers of the OSI model?
a.Layer 3
b.Layer 2
c.Layer 4
d.Layer 1
e.Layer 6 |
|
Definition
|
|
Term
Which of the following classes is the address 208.177.23.1?
a.Class A
b.Class C
c.Class D
d.Class B |
|
Definition
|
|
Term
Which of the following protocols could be used in a peer-to-peer topology?
a.IGMP
b.NetBIOS
c.TACACS+
d.RADIUS |
|
Definition
|
|
Term
Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WPA2-PSK? (Select two.)
a. Subnet mask
b. Name servers
c. SSID
d. Shared key |
|
Definition
|
|
Term
Which of the following WAN technologies requires fiber optics?
a.POTS
b.PSTN
c.ADSL
d.SONET |
|
Definition
|
|
Term
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use?
a.Multimode fiber
b.RG-6 copper
c.CAT6 copper
d.Single-mode fiber |
|
Definition
|
|
Term
Which of the following network protocols is used for sending outbound email from a host?
a.SMTP
b.POP
c.IMAP
d.RTP |
|
Definition
SMTP
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline. The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails. Both protocols are supported by all modern email clients andweb servers. Main difference between IMAP and POP3: The POP3 protocol assumes that there is only one client connected to the mailbox. In contrast, the IMAP protocol allows simultaneous access by multiple clients. IMAP is suitable for you if your mailbox is about to be managed by multiple users. Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the Internet. SMTP uses TCP port 25. |
|
|
Term
A network administrator would MOST likely use a port scanner to do which of the following?
a.Report the link speed and duplex of all ports on a switch
b.Trace a physical network port through a building
c.Remotely test a firewall configuration on a server
d.Capture incoming network packets to port 80 on a workstation |
|
Definition
Remotely test a firewall configuration on a server |
|
|
Term
Which of the following BEST explains the function of OSI layer 4?
a.Specifying signal timing and amplitude
b.Reliable delivery of packets
c.Routing packets across segments
d.Connecting hosts on the same segment |
|
Definition
Reliable delivery of packets |
|
|
Term
Which of the following WAN technologies allows for the fastest connection?
a.T1
b.SONET
c.ADSL
d.OC-12 |
|
Definition
|
|
Term
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distance
a.DSL
b.ATM
c.WiMAX
d.E3/T3 |
|
Definition
|
|
Term
Which of the following Internet technologies would provide the GREATEST bandwidth?
a.T1
b.Cable
c.E3/T3
d.OC3 |
|
Definition
|
|
Term
A particular route's destination address is referred to as the:
a.Shot vector
b.RIP peer
c.Next hop
d.Link state |
|
Definition
|
|
Term
Which of the following tools is designed to send an audible signal through one end of a cable, so that it can be found at the other end of the cable?
a.Cable tester
b.Toner probe
c.Voltage event recorder
d.Multimeter |
|
Definition
|
|
Term
IGP differs from EGP because IGP is designed for use in which of the following?
a.Single autonomous network
b.Communication between WANs
c.Communication between networks
d.Single non-autonomous network |
|
Definition
Single autonomous network |
|
|
Term
Which of the following subnet masks identifies 192.168.7.1 and 192.168.8.1 as being on the same subnet?
a.255.255.240.0
b.255.255.255.128
c.255.255.255.0
d.255.255.255.240 |
|
Definition
|
|
Term
Which of the following network cable types is LEAST susceptible to EMI?
a.UTP CAT3
b.Coaxial
c.UTP CAT5
d.Plenum STP CAT5 |
|
Definition
|
|
Term
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types could be used?
a. CAT 5e
b. CAT 6
c. CAT 5
d. RG 58 coaxial
e. Cat 3 |
|
Definition
|
|
Term
CAT 6 Ethernet cabling has a rated maximum transmission capability of?
a.10Mbps
b.10,000 Mbps
c.100 Mbps
d.20,000 Mbps |
|
Definition
|
|
Term
An admin has been tasked with running cables from one office to another neighbouring office by running cables over the light fixtures in the ceiling that connects both offices. To prevent interference, which of the following should be used?
a.UTP CAT 5e
b.Multimode Fiber
c.RG58 Coaxial
d.UTP CAT6 |
|
Definition
|
|
Term
At which of the following places does the telephone company's responsibility cease?
a.MDF
b.66 Block
c.Demarc
d.IDF
e.110 Block |
|
Definition
|
|
Term
In cable standards, a T always indicates which of the following characteristics? (Choose two.)
a. Maximum distance of 100 meters without repeaters
b. Maximum distance 10,000 feet without repeaters
c. Twisted-pair cable
d. Coaxial cable |
|
Definition
Regardless of the speed of the connection, a T always indicates that twisted pair wire will be used; which will have a maximum segment distance of 100 meters without repeaters The correct answers are: Twisted-pair cable, Maximum distance of 100 meters without repeaters |
|
|
Term
In what form is an IPv6 address usually expressed?
a.Hexadecimal
b.Binary
c.Decimal |
|
Definition
|
|
Term
An Ethernet MAC (Media Access Control) address consists of:
a.64 bits
b.12 bits
c.32 bits
d.48 bits |
|
Definition
|
|
Term
Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard describes the physical layer for networks that use a ring topology?
a.802.4
b.802.5
c.802.2
d.802.3 |
|
Definition
|
|
Term
All of the following IP (Internet Protocol) addresses are routable on the internet EXCEPT:
a.172.16.16.1
b.201.35.44.1
c.126.14.254.1
d.192.10.20.1 |
|
Definition
|
|
Term
Which of the following options are the minimal settings for connecting a computer to a TCP / IP (Transmission Control Protocol / Internet Protocol) LAN (Local Area Network) while accessing the Internet?
a.IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)
b.IP (Internet Protocol) address, DNS (Domain Name Service), and gateway
c.IP (Internet Protocol) address and gateway
d.Subnet mask, IP (Internet Protocol) address, and DNS (Domain Name Service) |
|
Definition
IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service) |
|
|
Term
What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
a.18,000 feet (5,486.4 meters)
b.12,000 feet (3,657.6 meters)
c.6,000 feet (1,828.8 meters)
d.8,000 feet (2,438.4 meters) |
|
Definition
a.18,000 feet (5,486.4 meters) |
|
|
Term
Which of the following cable types is used to link together two buildings that are over 10 miles (16.09 kilometers) apart?
a.Category 6 cable
b.MMF (MultiMode Fiber)
c.SMF (Single Mode Fiber)
d.Coaxial cable |
|
Definition
|
|
Term
Which of the following connectors are SFF (Small Form Factor) fiber connectors?
a.ST (Straight Tip) and SC (Standard Connector)
b.RJ-45 (Registered Jack) and RJ-11 (Registered Jack)
c.Series-A and Series-B
d.MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector) |
|
Definition
MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector) |
|
|
Term
Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
a.3
b.2
c.4
d.1 |
|
Definition
|
|
Term
Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses a 1300 nm (nanometer) beam?
a.10 GBASE-ER and 10 GBASE-SR
b.1000BASE-LX and 10 GBASE-LR
c.1000BASE-CX and 1000BASE-T
d.1000BASE-SX and 10 GBASE-SR |
|
Definition
1000BASE-LX and 10 GBASE-LR |
|
|
Term
At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
a.Network
b.Transport
c.Session
d.Physical |
|
Definition
|
|
Term
Which one of the following is a purpose for subnetting?
a.To block Internet traffic
b.To decrease network congestion
c.To consolidate several small networks into one large network
d.To increase network bandwidth |
|
Definition
To decrease network congestion |
|
|
Term
Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
a.RADIUS (Remote Authentication Dial-In User Service)
b.PPP (Point-to-Point Protocol)
c.TCP / IP (Transmission Control Protocol / Internet Protocol)
d.SLIP (Serial Line Internet Protocol) |
|
Definition
PPP (Point-to-Point Protocol) |
|
|
Term
All of the following are valid IP (Internet Protocol) addresses EXCEPT:
a.172.192.4.256
b.192.168.0.1
c.156.144.226.123
d.10.24.12.0 |
|
Definition
|
|
Term
True or false? 100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters. |
|
Definition
|
|
Term
A(n) _________ is used to convert LAN signals to WAN signals, and vice versa.
a.Modem
b.NTU
c.Demarc
d.CSU/DSU |
|
Definition
|
|
Term
True or false? EIGRP is a link state routing protocol. |
|
Definition
|
|
Term
True or false? Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD. |
|
Definition
|
|
Term
ST and SC are both types of _________ connectors.
a.Thinnet
b.Bus
c.Fast Ethernet
d.Fiber-optic |
|
Definition
|
|
Term
RIP and RIPv2 are both __________ routing protocols.
a.Hybrid
b.Link State
c.Distance Vector
d.Static |
|
Definition
|
|
Term
A bus topology requires __________ to prevent signal bounce, which will disrupt the network.
a.End-Caps
b.Terminators
c.Germinator
d.T-ends |
|
Definition
|
|
Term
A switch controls and segments traffic on your network by learning the ______ addresses of all the components connected to it. |
|
Definition
|
|
Term
Which of the following functions can be performed at layer 6 of the OSI model? (Select all that apply.)
a. Encryption
b. Routing of the message
c. Converting the message to a format that is understood by the destination
d. Compression |
|
Definition
The correct answers are: Compression, Encryption, Converting the message to a format that is understood by the destination |
|
|
Term
Which of the following protocols are transport-layer protocols? (Choose two.)
a. IP
b. IPX
c. SPX
d. TCP |
|
Definition
The correct answers are: TCP, SPX |
|
|
Term
Which protocol in the IPX/SPX protocol suite is responsible for logical addressing and delivery?
a.IPX
b.IP
c.arp
d.SPX |
|
Definition
|
|
Term
Which 802 project standard defines Gigabit Ethernet using fiber-optic cabling?
a.802.11g
b.802.5
c.802.3z
d.802.3ab |
|
Definition
|
|
Term
Which 802 project standard defines 10-Gigabit Ethernet?
a.802.3ab
b.802.11g
c.802.3z
d.802.3ae |
|
Definition
|
|
Term
Which of the following protocols is a nonroutable protocol?
a.IPX/SPX
b.AppleTalk
c.TCP/IP
d.NetBEUI |
|
Definition
|
|
Term
When data is sent to a system on a switch, the data is sent to what port(s)?
a.All ports on the immediate switch, but not any uplinked switch
b.The port of the destination system
c.All ports on the immediate switch and any uplinked switches
d.All ports on the uplinked switch |
|
Definition
The port of the destination system |
|
|
Term
Which layer of the OSI model does a bridge run at? |
|
Definition
|
|
Term
Which networking device routes data used by a routable protocol but bridges data for non routable protocols?
a.Brouter
b.Bridge
c.Router
d.Gateway |
|
Definition
|
|
Term
How many B-channels are in a BRI ISDN connection? |
|
Definition
|
|
Term
What is a BNC connector?
a.Same as an RJ-45 connector
b.A 9-pin DB male connector
c.A 25-pin D female connector
d.A miniature quick connect/disconnect connector used for coaxial cable |
|
Definition
A miniature quick connect/disconnect connector used for coaxial cable |
|
|
Term
Which network address class supports 65,534 hosts?
a.Class B
b.Class D
c.Class C
d.Class A |
|
Definition
|
|
Term
|
Definition
Range from 10.0.0.0 to 10.255.255.255 — a 10.0.0.0 network with a 255.0.0.0 or /8 (an 8-bit) mask
Range from 172.16.0.0 to 172.31.255.255 — a 172.16.0.0 network with a 255.240.0.0 or /12
A 192.168.0.0 to 192.168.255.255 range, which is a 192.168.0.0 network masked by 255.255.0.0 or /16
A special range 100.64.0.0 to 100.127.255.255 with a 255.192.0.0 or /10 network mask; this subnet is recommended according to rfc6598 for use as an address pool for CGN (Carrier-Grade NAT) |
|
|
Term
Which network service is responsible for allowing Microsoft clients access to the file system on a UNIX server? a.SMB
b.Samba
c.NAT
d.NFS |
|
Definition
Samba Samba is responsible for allowing Microsoft clients to access resources on the UNIX system because Samba implements the SMB protocol. |
|
|
Term
Which network service is responsible for allowing Microsoft clients to access the file system on Microsoft servers?
a.SMB
b.NAT
c.Samba
d.NFS |
|
Definition
SMB SMB is the protocol in Microsoft environments that allows Microsoft clients to connect to the file system of other Microsoft systems. |
|
|
Term
Which protocol is responsible for error reporting and status information?
a.ICMP
b.UDP
c.TCP
d.IP |
|
Definition
ICMP ICMP is responsible for reporting errors and sending back status information when communicating over TCP/IP. |
|
|
Term
Which protocol is responsible for logical addressing and delivery of packets?
a.IP
b.TCP
c.ICMP
d.UDP |
|
Definition
IP IP is responsible for packet delivery and logical addressing |
|
|
Term
Which of the following protocols would a tech use to disable switch ports automatically to prevent switching loops?
a.EGP
b.RIP
c.OSPF
d.STP |
|
Definition
STP Spanning Tree Protocol |
|
|
Term
How many bits are in an IPv6 address?
a.64
b.128
c.32
d.256 |
|
Definition
|
|
Term
Which of the following has a backbone network topology that uses a router or switch as the single central connection point for multiple subnetworks?
a.Collapsed
b.Distributed
c.Serial
d.Parallel |
|
Definition
|
|
Term
What switching technique establishes a connection between two network nodes before transmitting data?
a.Circuit switching b.MPLS (Multiple Label Switching) c.Packet switching d.Message switching |
|
Definition
|
|
Term
Which of the following is a 10-gigabit per second Ethernet fiber-optic standard?
a.10GBase-T
b.100Base-FX
c.10GBase-ER
d.10Base-T |
|
Definition
|
|
Term
Which routing protocol is commonly used on LANs that use exclusively Cisco routers?
a.EIGRP
b.OSPF
c.BGP
d.RIPv2 |
|
Definition
|
|
Term
A tech blocks access to ports 25,110 and 143 on the firewall. Which of the applications services will be blocked due to this?
a.Email sending and receiving
b.FTP access to external servers
c.Remote Desktop access
d.Domain Name Service |
|
Definition
Email sending and receiving |
|
|
Term
Which Layer of the OSI model performs error detection using a Frame Check Sequence?
a.Physical
b.Transport
c.Session
d.Data Link |
|
Definition
|
|
Term
Which access method do computers use on an Ethernet network?
a.Token passing
b.CSMA/CA
c.TCP/IP
d.CSMA/CD |
|
Definition
|
|
Term
Which of the following addresses indicate an APIPA address?
a.10.10.10.5
b.172.16.4.2
c.169.254.1.2
d.192.168.2.6 |
|
Definition
169.254.1.2
Automatic Private Internet Protocol Addressing (APIPA) addresses have the first and second octet address of 169.254. All the other addresses are nonroutable private addresses. |
|
|
Term
Which of the following are distance vector routing protocols? (Choose two.)
a. OSPF
b. IS-IS
c. BGP
d. RIPv2 |
|
Definition
RIP, RIPv2, EIGRP, and BGP are all distance vector routing protocols. OSPF and IS-IS are link state routing protocols. The correct answers are: BGP, RIPv2 |
|
|
Term
Which of the following connectors are used for fiber-optic cable? (Choose two.)
a. ST
b. BNC
c. SC
d. RJ-45 |
|
Definition
The correct answers are: SC, ST |
|
|
Term
What type of network connector would you use if you were running fiber-optic cable on your network?
a.BNC
b.RJ-45
c.ST
d.USB |
|
Definition
ST ST connectors are one type of industry-standard connector for fiber-optic cable. A network that uses coaxial cable as the transmission medium, though considered a legacy network, uses T-connectors to connect the transmission medium to the network interface board installed in each computer. The connectivity device that is used to connect cable to a T-connector is a BNC connector. RJ-45 connectors are used with UTP as the transmission medium. Universal Serial Bus (USB) connectors are used to connect USB-compatible peripherals to a computer or a USB hub. |
|
|
Term
Which of the following Ethernet cabling schemes should you use to run 10-megabit Ethernet over fiber optic to the desktop?
a.10Base2
b.1000BaseTX
c.10BaseFL
d.10BaseT
e.10Base5 |
|
Definition
The correct answer is: 10BaseFL |
|
|
Term
Which of the following is a connector type used with coaxial cabling?
a.RJ-45
b.MT-R6
c.RJ-11
d.BNC |
|
Definition
|
|
Term
In which of the following situations is full-duplex NOT possible?
a.A connection between a switch and a host
b.A connection between a hub and a host
c.A connection between a host and a host using a crossover cable
d.A connection between a switch and a switch |
|
Definition
A connection between a hub and a host |
|
|
Term
What is the maximum transmission distance for a network using 10Base5 technology?
a.1,000 meters per segment
b.500 meters per segment
c.185 meters per segment
d.100 meters per segment |
|
Definition
500 meters per segment When describing Ethernet cabling, there are three components in the name. The first number defines the transmission rate in Mbps. The second term is either Base or Broad, which defines the type of signaling used. The last characters are unique cable identifiers. Thicknet is also known as 10Base5. The last character, 5, indicates that the maximum transmission distance for thicknet is 500 meters. |
|
|
Term
Your network is connected to the Internet. As the network administrator, you install packet filtering on the router that connects your network to the Internet. After you configure packet filtering, users on the network are no longer able to download files. What did you do to create this problem?
a.You blocked port 80
b.You blocked port 21
c.You blocked port 25
d.You blocked port 110 |
|
Definition
You blocked port 21
Packet filtering is the process of filtering (discarding) data based on source address, destination address, port number, or domain name. Packet filtering is a software implementation of a firewall. A port is an address that identifies an application that is associated with data. Some of the well-known port numbers are port 15 for NETSTAT, port 21 for FTP, port 23 for Telnet, port 25 for SMTP, port 53 for DNS, port 80 for HTTP, port 110 for POP3, and port 119 for NNTP.
In this question, the problem is the users can no longer download files. In this question, you have blocked port 21, which is associated with File Transfer Protocol (FTP). FTP is responsible for downloading files over a TCP/IP network. This is the protocol that a user configures in order to download files.
The correct answer is: You blocked port 21 |
|
|
Term
True or false? In IPv6, the loopback address has a value of 0:0:0:0:0:0:0:1, which is abbreviated as ::1 |
|
Definition
|
|
Term
True or false? Most LANs will support both Ethernet and token ring frames. |
|
Definition
|
|
Term
Which bus type allows an NIC to be attached externally? a.PCI
b.ISA
c.PCIe
d.PCMCIA |
|
Definition
|
|
Term
If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?
a.AP
b.RFI
c.RSSI
d.Latency |
|
Definition
|
|
Term
A small organisation has just moved into a new office and needs a 100 megabit Ethernet LAN. What is the minimum type of cabling that will support this LAN?
a.Coax (thin net)
b.Category 3
c.Coax (thick net)
d.Category 5 |
|
Definition
|
|
Term
Identify the Quality of Service (QoS) mechanism that can fragment large packets and interleave smaller packets in amongst the packet fragments.
a.Policing
b.CRTP
c.Traffic shaping
d.LFI |
|
Definition
LFI
LFI is the Quality of Service (QoS) mechanism that can fragment large packets and interleave smaller packets in amongst the packet fragments. As a result, the smaller packets can exit a slow-speed interface sooner, and not experience excessive delay.
Link Fragmentation and Interleaving (LFI) and RTP Header Compression (cRTP) are both link efficiency mechanisms, which attempt to make a more efficient use of relatively limited WAN bandwidth.
cRTP can take the Layer 3 and Layer 4 headers of a Real-time Transport Protocol (RTP) packet (used to carry voice over IP traffic), which total 40 Bytes in size, and compress them down to only two or four Bytes (two Bytes without UDP checksums and four Bytes with UDP checksums).
Policing and traffic shaping are both traffic conditioners, each of which can set a bandwidth limit on traffic. However, policing has the ability to drop excess packets, while traffic shaping delays excess traffic. |
|
|
Term
You visit the supply room in search of a cable that will connect one user's computer directly to another user's computer. What type of cable do you reach for?
a. Null
b.Roll-over
c.Crossover
d.Straight-through |
|
Definition
Crossover
You reach for a crossover cable, which will connect one user's computer directly to another user's computer.
Straight-through cables are used to connect a user to a switch, and a switch to a router.
A roll-over cable is used by network engineers to connect the serial port on a terminal to switch or router to manage and configure the device. A null cable may be used for testing or terminating a bus. |
|
|
Term
Your customer is concerned about "bad" storage performance and asks you how to resolve it. Which two steps should be performed first? (Choose two.)
a. Measure cache hits and processor utilisation
b. Clarify the customer's concerns and expectations
c. Determine LUN response times
d. Establish comprehensive data collection |
|
Definition
Clarify the customer's concerns and expectations Establish comprehensive data collection |
|
|
Term
Which three actions will help to reduce the level of Write Pending data in cache during periods of intense random update processing? (Choose three.)
a. Migrate from RAID5 to RAID1
b. Spread the load across more LUNs
c. Spread the load across more ports
d. Switch to faster disk drives
e. Spread the load across more RAID Groups |
|
Definition
Switch to faster disk drives, Migrate from RAID5 to RAID1, Spread the load across more RAID Groups |
|
|
Term
What are the most common types of virtualisation being implemented? (Select three.)
a. Power
b. Cooling
c. Storage
d. Printing
e. Server
f. Clients |
|
Definition
|
|
Term
Which third-party vendors offer implementation of VMs with hardware-assisted virtualisation? (Select two.)
a. Citrix XenServer
b. Red Hat Enterprise Linux
c. SUSE Linux Enterprise
d. Microsoft Hyper-V Server 2016
e. VMware ESX |
|
Definition
Microsoft Hyper-V Server 2016, Citrix XenServer |
|
|
Term
What is the name of the Microsoft product offering for desktop virtualisation and virtual desktop management?
a.Virtual Enterprise Centralised Desktop (VECD)
b.Microsoft Application Virtualisation (App-V)
c.Virtual Desktop Infrastructure (VDI)
d.Microsoft Enterprise Desktop Virtualisation (MED-V) 2.0 |
|
Definition
Microsoft Enterprise Desktop Virtualisation (MED-V) 2.0 |
|
|
Term
Which device acts most like a router?
a.OSI model Layer 2 hub
b.OSI model Layer 3 switch
c.OSI model Layer 1 repeater
d.OSI model Layer 2 bridge |
|
Definition
|
|
Term
Which term identifies a router category that directs data between nodes on an autonomous LAN?
a.Interior router
b.Border router
c.Exterior router
d.Gateway router |
|
Definition
|
|
Term
Which routing protocol is commonly used on LANs that use exclusively Cisco routers?
a.OSPF
b.RIPv2
c.BGP
d.EIGRP |
|
Definition
|
|
Term
A(n) WHAT is the connectivity device that performs the regeneration of a digital signal. |
|
Definition
|
|
Term
A(n) WHAT is a multiport repeater. |
|
Definition
|
|
Term
A(n) WHAT is a device that connects two network segments by analysing incoming frames and making decisions about where to direct them based on each frame’s MAC address. |
|
Definition
|
|
Term
A switch running in WHAT mode reads a frame’s header and decides where to forward the data before it receives the entire packet. |
|
Definition
|
|
Term
WHAT are combinations of networking hardware and software that connect two dissimilar kinds of networks. |
|
Definition
|
|
Term
True or false? All NICs are engineered to work in an older bus regardless of whether a new, faster bus is available on the motherboard. |
|
Definition
|
|
Term
True or false? A computer’s port is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer’s components, including its memory, processor, hard disk and NIC. |
|
Definition
|
|
Term
Which is not an area typically targeted by a data loss prevention policy?
a.Cloud level
b.Client level
c.Storage level
d.Server Level
e.Network level |
|
Definition
|
|
Term
Which is not a typical best practice found in a password policy?
a.Password uniqueness
b.Write down and keep in a safe place
c.Use of uppercase and lowercase letters only
d.Password expiration
e.No usage of proper names |
|
Definition
Use of uppercase and lowercase letters only |
|
|
Term
A technician would use a logical network diagram to determine the number of:
a.Users on the network
b.Broadcast domains on the network
c.Switches on the network
d.Cables in the network |
|
Definition
Broadcast domains on the network |
|
|
Term
Which of the following methods is used in creating an ACL?
a.Content filtering
b.VPNs
c.IP filtering
d.PPPs |
|
Definition
|
|
Term
An administrator needs to check the number of active connections on their computer. Which of the following should the administrator use?
a.dig
b.ping
c.ipconfig
d.netstat |
|
Definition
|
|
Term
You are monitoring network traffic and you notice a number of DHCP discover messages on the network. Which of the following is the destination address of the DHCP discover message?
a.192.168.0.0
b.FF-FF-FF-FF-FF-FF
c.0F-1B-3C-2F-3C-2A
d.192.168.4.5 |
|
Definition
|
|
Term
You are monitoring network traffic and notice that there is a large number of broadcast messages sent across the wire. You would like to separate your network into multiple broadcast domains. How can you do this? (Select two.)
a. Bridge
b. VLANs c. Switch
d. Router |
|
Definition
|
|
Term
Which of the following is a best practice when implementing a basic wireless network?
a.Configuring encryption with a WPA2-PSK key and labeling the key on the WAP
b.Disabling SSID broadcast
c.Adding two access points per area of service
d.Not configuring the ESSID point |
|
Definition
|
|
Term
Which of the following can be used to find the location of a cable short?
a.CSU/DSU
b.TDR
c.Multimeter
d.Protocol analyser |
|
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
The correct answer is: TDR |
|
|
Term
Which is not a typical best practice found in a password policy?
a.Password uniqueness
b.Write down and keep in a safe place
c.Use of uppercase and lowercase letters only
d.Password expiration
e.No usage of proper names |
|
Definition
Use of uppercase and lowercase letters only |
|
|
Term
A technician would use a logical network diagram to determine the number of:
a.Users on the network
b.Broadcast domains on the network
c.Switches on the network
d.Cables in the network |
|
Definition
Broadcast domains on the network |
|
|
Term
Which of the following methods is used in creating an ACL?
a.Content filtering
b.VPNs
c.IP filtering
d.PPPs |
|
Definition
|
|
Term
An administrator needs to check the number of active connections on their computer. Which of the following should the administrator use?
a.dig
b.ping
c.ipconfig
d.netstat |
|
Definition
|
|
Term
You are monitoring network traffic and you notice a number of DHCP discover messages on the network. Which of the following is the destination address of the DHCP discover message?
a.192.168.0.0
b.FF-FF-FF-FF-FF-FF
c.0F-1B-3C-2F-3C-2A
d.192.168.4.5 |
|
Definition
|
|
Term
You are monitoring network traffic and notice that there is a large number of broadcast messages sent across the wire. You would like to separate your network into multiple broadcast domains. How can you do this? (Select two.)
a. Bridge
b. VLANs c. Switch
d. Router |
|
Definition
|
|
Term
Which of the following is a best practice when implementing a basic wireless network?
a.Configuring encryption with a WPA2-PSK key and labeling the key on the WAP
b.Disabling SSID broadcast
c.Adding two access points per area of service
d.Not configuring the ESSID point |
|
Definition
|
|
Term
Which of the following can be used to find the location of a cable short?
a.CSU/DSU
b.TDR
c.Multimeter
d.Protocol analyser |
|
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
The correct answer is: TDR |
|
|
Term
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?
a.Kerberos b.RADIUS c.WPA2-PSK d.TKIP e.WEP |
|
Definition
|
|
Term
Which of the following are more secure file transfer alternatives to using FTP? (Select two)
a. SNTP
b. HTTP
c. RCP
d. SFTP
e. SCP |
|
Definition
|
|
Term
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?
a.WPA2
b.TKIP
c.802.1ad
d.802.1x |
|
Definition
|
|
Term
Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?
a.RDP access
b.IPSec VPN
c.SSL VPN
d.Dial-in access |
|
Definition
|
|
Term
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use?
a.Baseline configurations
b.Security policy
c.Physical network diagram
d.CAT5 wiring schematics |
|
Definition
|
|
Term
Which of the following is used by a company's ISP to troubleshoot network issues?
a. Demarc
b.66 Block
c.Smart Jack
d.110 Block |
|
Definition
|
|
Term
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444?
a.ipconfig /all
b.ifconfig -a
c.netstat -nap
d.netstat -nao |
|
Definition
|
|
Term
XYZ County Schools is a small rural school district. Recently, the CIO was given authorisation to connect the district-office LAN to the Internet. A 56Kbps line was installed in the district office. What two internetworking devices does XYZ County Schools have to install in order to connect the district-office LAN to the Internet? (Choose two.)
a. Router
b. Gateway
c. Repeater
d. CSU/DSU
e. Bridge |
|
Definition
|
|
Term
Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?
a.Kerberos b.RADIUS c.WPA2-PSK d.TKIP e.WEP |
|
Definition
|
|
Term
Which of the following are more secure file transfer alternatives to using FTP? (Select two)
a. SNTP
b. HTTP
c. RCP
d. SFTP
e. SCP |
|
Definition
|
|
Term
A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?
a.WPA2
b.TKIP
c.802.1ad
d.802.1x |
|
Definition
|
|
Term
Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?
a.RDP access
b.IPSec VPN
c.SSL VPN
d.Dial-in access |
|
Definition
|
|
Term
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use?
a.Baseline configurations
b.Security policy
c.Physical network diagram
d.CAT5 wiring schematics |
|
Definition
|
|
Term
Which of the following is used by a company's ISP to troubleshoot network issues?
a. Demarc
b.66 Block
c.Smart Jack
d.110 Block |
|
Definition
|
|
Term
Malicious traffic has been detected terminating at HOST A on TCP port 4444. Which of the following commands can be run on HOST A to determine the process attached to TCP port 4444?
a.ipconfig /all
b.ifconfig -a
c.netstat -nap
d.netstat -nao |
|
Definition
|
|
Term
XYZ County Schools is a small rural school district. Recently, the CIO was given authorisation to connect the district-office LAN to the Internet. A 56Kbps line was installed in the district office. What two internetworking devices does XYZ County Schools have to install in order to connect the district-office LAN to the Internet? (Choose two.)
a. Router
b. Gateway
c. Repeater
d. CSU/DSU
e. Bridge |
|
Definition
|
|
Term
Which of the following commands can be used to find the MAC address of a connecting router?
a.arp
b.traceroute
c.ping sweep
d.ping |
|
Definition
|
|
Term
Which of the following can be used to find the location of a cable short?
a.CSU/DSU
b.TDR
c.Protocol analyzer
d.Multimete |
|
Definition
A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables). The correct answer is: TDR |
|
|
Term
Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used? a.Loopback
b.Straight
c.Crossover
d.Rollover |
|
Definition
|
|
Term
A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem?
Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic
a.Static ARP entries
b.Reverse ARP failure
c.IP address conflict
d.MAC spoofing |
|
Definition
|
|
Term
Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution?
a.Add a router to connect both networks
b.Change the subnet mask to 255.255.254.0
c.Request another class C IP scope from the ISP.
d.Switch to static IP addressing. |
|
Definition
Change the subnet mask to 255.255.254.0 |
|
|
Term
Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80?
a.netstat -r
b.netstat -p tcp
c.netstat -v
d.netstat -at
e.netstat -aupn |
|
Definition
|
|
Term
Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?
a.802.11b
b.802.11g
c.802.11n
d.802.11a |
|
Definition
|
|
Term
Which of the following are usually needed during manual configuration of a client on an 802.11g network segment using DHCP and WPA2-PSK? (Select two.)
a. Name servers
b. Shared key
c. SSID
d. Subnet mask |
|
Definition
|
|
Term
To ensure that VoIP phones are provided with power without using independent power supplies, switches on the network must have which of the following features?
a.PoE
b.PPPoE
c.VLAN tagging
d.Spanning tree |
|
Definition
|
|
Term
A user contacts a technician and states, "The network is down." After further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem?
a.Reboot the core router
b.Have the user ping the default gateway
c.Have the user run netstat
d.Unplug and then plug the network cable back in |
|
Definition
Have the user run netstat |
|
|
Term
Which of the following describes the loss of signal strength as the signal travels away from its source?
a.Crosstalk
b.Latency
c.Noise
d.Attenuation |
|
Definition
|
|
Term
A broken copper strand in a circuit is known as which of the following?
a.Impedance
b.Latency
c.Split Pair
d.Short
e.Open |
|
Definition
The correct answer is: Open |
|
|
Term
What Ethernet switch feature allows a port to automatically determine which of its leads are used for transmitting data and which of its leads are used for receiving data?
a.UTP
b.MDIX
c.LDAP
d.Convergence
e.STP |
|
Definition
MDIX technology makes it so that wrong cable types create fewer problems. |
|
|
Term
In the absence of STP, what issues might result from a Layer 2 loop in a network? (Choose two.)
a. A router interface’s MTU size decreasing
b. MAC address table corruption
c. Broadcast storms
d. Unicast Storm
e. Packet fragmentation |
|
Definition
MAC address table corruption, Broadcast storms |
|
|
Term
If you successfully ping from host A to host B, what can you conclude about host A?
a.Its OSI Layers 1–3 are functional.
b.Its OSI Layers 1–4 are functional.
c.Its OSI Layer 7 is functioning
d.You can only conclude that ICMP traffic can reach host B.
e.Its OSI Layers 1–7 are functional. |
|
Definition
The correct answer is: Its OSI Layers 1–3 are functiona |
|
|
Term
A data packet which is dropped by a router due to an over-sized MTU packet being transferred, and the packets' "Don't Fragment" bit instruction is turned on, is referred to as which of the following?
a.Black-hole router
b.Re-send Bit
c.Null hop
d.Zero-point router
e.Route reflector |
|
Definition
|
|
Term
To what subnet does a host with an IP address of 172.16.155.10/18 belong?
a.172.16.154.0 /18
b.172.16.96.0 /18
c.172.16.0.0 /18
d.172.16.128.0 /18 |
|
Definition
|
|
Term
Which of the following is a value measuring the power of a wireless signal?
a.BSSID
b.SSID
c.RSSI
d.CSMA/CA
e.RFI |
|
Definition
|
|
Term
Which type of fiber-optic cable is used for long distances such as between buildings on an organisation’s campus?
a.FDDI
b.Single-mode
c.10BASE5
d.Multimode |
|
Definition
|
|
Term
In the Network+ troubleshooting model, what should you always do right after you test the result?
a.Identify the affected area
b.Recognise the potential results and effects of the solution
c.Select the most probable cause
d.Document the solution |
|
Definition
Recognise the potential results and effects of the solution |
|
|
Term
Solas Ecollege wants to have its computers networked. They have decided to use coaxial cable as the transmission medium. Which transmission medium connector would connect each computer to the transmission medium?
a.IBM data connector
b.RJ-45 connector
c.ST connector
d.T-connector |
|
Definition
|
|
Term
A reserved set of IP addresses in a DHCP scope is commonly assigned to which of the following network devices? (Select two.) a. Laptop
b. Workstation
c. Hub
d. Printer
e. Server |
|
Definition
The correct answers are: Server, Printer |
|
|
Term
Which of the following technologies can prevent a department's network broadcast from propagating to another department's network if they are located on the same switch?
a.A firewall
b.A VLAN
c.A hub
d.A trunk |
|
Definition
|
|
Term
Which of the following WAN technologies requires fiber optics?
a.ADSL
b.POTS
c.SONET
d.PSTN |
|
Definition
|
|
Term
An administrator is provisioning a 10GBaseSR Ethernet connection between two core switches. Which of the following cable types should the administrator plan to use?
a.RG-6 copper
b.CAT6 copper
c.Multimode fiber
d.Single-mode fiber |
|
Definition
|
|
Term
Which of the following would a technician use to set up a 'building to building' within a campus?
a.IDF
b.MDF
c.ESD
d.EMI |
|
Definition
|
|
Term
Which of the following cable types have a maximum recommended cable length of 100 meters (328 feet)?
a.Fiber
b.Serial
c.Ethernet
d.Coaxial |
|
Definition
|
|
Term
An administrator needs to learn which buildings have multimode or singlemode fiber. Which of the following configuration management documentation would be the BEST choice to use?
a.Physical network diagram
b.Baseline configurations
c.CAT5 wiring schematics
d.Security policy |
|
Definition
|
|
Term
Which of the following would be sent to an SNMP network management system in the event that a failure or predefined threshold was crossed?
a.SNMP agent
b.History log
c.SNMP trap
d.System log |
|
Definition
|
|
Term
Which of the following routing algorithms would provide the fastest convergence time?
a.A static algorithm
b.A link-state algorithm
c.A distance-vector algorithm
d.A path-vector algorithm |
|
Definition
|
|
Term
Which of the following WAN technologies allows for the fastest connection?
a.ADSL
b.SONET
cT1
d.OC-12 |
|
Definition
|
|
Term
A company recently installed a new VoIP phone system that runs over their existing T3 Internet connection. Which of the following network technologies would BEST handle voice traffic prioritisation above all other data? a.PoE
b.IPSec
c.QoS
d.Load balancing |
|
Definition
|
|
Term
Which of the following WAN technology types does not use an Ethernet cable as a medium for communication and is used for long distances?
a.DSL
b.ATM
c.E3/T3
d.WiMAX |
|
Definition
|
|