Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?
Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?
A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements?
Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?
A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released?
Which of the following TCP/IP model layers does the OSI model Presentation layer map to?
Which of the following is the definition of a DNS server?
Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO).
A company has been given a Class C address to be utilized for all devices. The company has several subnets and the largest subnet has 15 hosts. Which of the following represents the MINIMUM CIDR notation of this subnet mask?
Which of the following protocols is used to detect and eliminate switching loops within a network?
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).
Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).
192.168.0.7/8 notation denotes which of the following IPv4 subnet masks?
Which of the following DNS records must be queried to resolve the IPv6 address of a website?
A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic?
Which of the following protocols occurs at Layer 4 of the OSI model?
Which of the following protocols is used to send time synchronization updates on a given network?
Which of the following protocols could the below packet capture be from?
Port: 161
msgVersion:
msgUsername:
msgAuthenticationParameters:
msgPrivacyParameters:
msgData:
data: get-request
request-iD.
error-status: noError (0)
error-index: 0
variable-bindings: 0 items
Which of the following protocols is used to transfer files over the Internet?
Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).
A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?
On which of the following OSI model layers would a MAC address be used?
Which of the following operate at the Data Link layer of the OSI model? (Select TWO).
Which of the following are authentication methods that can use AAA authentication? (Select TWO).
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering?
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:
Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?
Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?
Which of the following protocols provides a secure connection between two networks?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?
A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?
A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?
Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?
A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Firewall rules:
Permit 192.168.5.16/28192.168.5.0/28
Permit 192.168.5.0/24192.168.4.0/24
Permit 192.168.4.0/24192.168.5.0/24
Deny 192.168.5.0/28192.168.5.16/28
Deny 192.168.14.0/24192.168.5.16/28
Deny 192.168.0.0/24192.168.5.0/24
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?
Which of the following are considered AAA authentication methods? (Select TWO).
A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?
Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?
Which of the following uses SSL encryption?
Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?
Which of the following wireless standards provide speed of 11Mbps?
Which of the following connector types would require a punch down tool to attach a network cable to it?
Which of the following types of connectors is used with a CAT6 Ethernet cable?
Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?
A technician tests a cable going to the patch panel and notices the following output from the cable tester:
1------------------1
2------------------2
3------------------3
4------------------4
5------------------5
6------------------6
7------------------7
8------------------8
On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?
A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider?
The unit responsible for the successful shaping and transmission of a digital signal is called:
Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?
Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection?
A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?
A technician can increase the bandwidth of an 802.11n cell by:
Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires?
802.11n can operate at which of the following frequencies? (Select TWO).
A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?
A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?
A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings.
Which of the following methods provides this functionality?
Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?
Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:
A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?
An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?
A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?
Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?
Which of the following technologies is used to connect public networks using POTS lines?
A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?
Access Point 1Access Point 2
802.11g802.11b
Encryption: WPA2Encryption: WEP
Channel: 1Channel: 7
SSID. CompanyWiFiSSID. Visitor
A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
Which of the following connectors is usable in SFP modules?
An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
Which of the following is needed when using WPA2-Enterprise wireless encryption?
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?
Which of the following can be used to limit wireless network access to a single computer?
During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?
Which of the following is the reason why a company’s network may contain a DHCP server?
A technician has a network with a mix of newer and older equipment. Which of the following settings would dynamically configure whether to use full or half duplex?
Which of the following performance benefits would multiple domain controllers BEST provide?
Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.
Which of the following settings is incorrect on the client?
A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO).
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?
A technician has been given the task to install a wireless network in a user’s home. Which of the following should the technician consider when implementing the network? (Select TWO).
Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?
A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.
Which of the following would be the MOST likely reason? (Select TWO).
A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
A network consultant arrives at a customer’s site to troubleshoot their email server. The server is running a Linux operating system, but the consultant is only familiar with Windows operating systems. Which of the following troubleshooting steps should the consultant take?
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?
A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?
A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario?
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?
Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network?
A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?
A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?
A user’s workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors?
A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?
A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
Which of the following network protocols is used for a secure command line interface for management of network devices?
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE).
Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?
Which of the following configuration management documents is used to describe how a computer performs after initial installation onto a network?
A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?