Which of the following has the HIGHEST data rate speed?
Which of the following is used for SONET connections and requires a wavelength of 1310nm?
Which of the following connectors is used for coaxial copper cable?
Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
Which of the following 802.11 standards transmits the signals the GREATEST distance?
The unit responsible for the successful shaping and transmission of a digital signal is called:
An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?
Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?
Which of the following wireless standards operates on the same frequency as 802.11a?
Kurt, a technician, notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?
Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?
Which of the following fiber types is MOST often used indoors?
Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?
Which of the following components of wiring distribution is referred to as the core communications closet for an organization?
Which of the following defines a rack located in an office building between the main rack and other office equipment?
In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?
Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?
Which of the following would be considered a Demarc extension?
Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?
Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types?
At which of the following locations does the responsibility of a Telco provider cease?
Which of the following connectors are MOST commonly used on a POTS line?
A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?
Which of the following is the control when observing network bandwidth patterns over time?
A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem?
Which of the following features can BEST be used to facilitate authorized remote access to a network?
A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?
Which of the following network performance methods would Lisa, a technician, use with SIP phones?
Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants to use the workstation’s MAC address. Which of the following protocols would provide the needed information?
A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?
Which of the following syslog severity codes indicates an emergency and that the system is unusable?
Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?
An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?
Kurt, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this?
A server that filters traffic between a WAN and a LAN is which of the following?
Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable?
Which of the following BEST describes a load balancer?
When troubleshooting a connectivity issue, which of the following commands will give Joe, the technician, a list of the host names connected to the network?
After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).
A company has a server with redundant power supplies. Which of the following is this an example of?
Which of the following network appliances will only detect and not prevent malicious network activity?
Karen, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information?
Which of the following defines access for a network?
Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
Which of the following network protocols is used for a secure command line interface for management of network devices?
The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem?
Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?
Which of the following is an advantage of dynamic routing?
A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?
Which of the following default ports would need to be open on a firewall to allow remote desktop access?
Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).
A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?
Which of the following addresses is a class B private address?
Which of the following wireless standards provide speeds up to 150Mbps?
At which of the following layers of the OSI model is the Logical Link Control found?
Drag and drop the following maximum speeds to their corresponding wireless standards. Tokens can be used more than once.
A technician is looking to secure an entire network by blocking all non-essential ports. Which of the following devices would BEST provide this functionality?
A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?
User’s IP: 192.168.5.14
Server IP: 192.168.5.17
Firewall rules:
Permit 192.168.5.16/28192.168.5.0/28
Permit 192.168.5.0/24192.168.4.0/24
Permit 192.168.4.0/24192.168.5.0/24
Deny 192.168.5.0/28192.168.5.16/28
Deny 192.168.14.0/24192.168.5.16/28
Deny 192.168.0.0/24192.168.5.0/24
Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?
A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?
Which of the following cable types is unshielded?
Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?
Which of the following network topologies is ONLY possible between two users?
Which of the following network protocols is used to transport email between servers?
Which of the following provides the STRONGEST security for a tunneled connection over the Internet?
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).
Which of the following is used to describe trunking VLANs on a network?
Which IEEE protocol is used with VLAN technology?
Which of the following uses port 23 by default?
Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?
Which of the following exist at layer three of the OSI model? (Select TWO).
Which of the following is the definition of a DNS server?
Which of the following assists a network administrator in reverse engineering malware and viruses?
IP address based routing occurs on which of the following layers of the OSI model?
Which of the following is the common port used for IMAP?
Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?
Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?
Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Zach perform FIRST before responding to the ticket?
Which of the following is an invalid MAC address?
Which of the following protocols is commonly used for VoIP technology?
At which layer of the OSI model do MAC addresses operate?
Which TCP/IP model layer does the OSI model layer named 'session' respond to?
Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?
Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?
Which of the following network protocols is used to resolve FQDNs to IP addresses?
Which of the following services would have assigned the IP address 169.254.1.89?
If a NIC does not have a link light, there is a failure at which of the following OSI layers?
Which of the following protocols is used by the ping command?
At which layer of the OSI and TCP/IP model would HTTP and FTP be found?
A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
Which of the following network tools is used to identify running services on host devices?
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?
Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
Which of the following is a standard measure of signal power?
Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?
A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
Which of the following security appliances are used to only identify traffic on individual systems?
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
Which of the following should the last line of an ACL normally contain?
Which of the following should be mitigated by employing proper coding techniques when developing software?
Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
Which of the following solutions will detect and disable a rogue access point?
Which of the following tools could attempt to detect operating system vulnerabilities?
An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
Which of the following is MOST commonly implemented for remote access to UNIX systems?
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
Which of the following protocols works at the LOWEST layer of the OSI model?
A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?
Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic?